CN108256850A - Believable intelligent commercial service system - Google Patents
Believable intelligent commercial service system Download PDFInfo
- Publication number
- CN108256850A CN108256850A CN201611234739.4A CN201611234739A CN108256850A CN 108256850 A CN108256850 A CN 108256850A CN 201611234739 A CN201611234739 A CN 201611234739A CN 108256850 A CN108256850 A CN 108256850A
- Authority
- CN
- China
- Prior art keywords
- security module
- service system
- security
- code
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3229—Use of the SIM of a M-device as secure element
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3227—Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3274—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of believable intelligent commercial service system, by intelligent terminal, application software, security module and cloud service system composition;Security module in NFC SWP smart cards, have in full card, bluetooth SIM card or the SE chips of antenna that integrated security code is realized, pass through secret seed and generate timeliness authentication data with iterative parameter operation;Application software includes the TA trusted applications run in intelligent terminal TEE security systems, and the authentication data that security module generates safely is showed in TEE;Cloud service system has artificial intelligence service, supports speech recognition, image identification and data mining, by same cryptographic calculation authentication verification data, and code, secret seed and the service content of can network update or destruction security module.This system compatibility Quick Response Code is applied and NFC applications, suitable for various intelligent terminals, wearable device and commercial intelligence service.
Description
Technical field
The present invention relates to a kind of believable intelligent commercial service systems that can take into account SIM card and NFC applications, coordinate with TEE,
The Quick Response Code of safety and NFC applications are realized, suitable for commercial intelligence service field.
Technical background
Common mobile service system, such as payment system need NFC controller, external POS machine for intelligent terminal
It needs to be transformed, it is of high cost, it pushes slow.And the Quick Response Code payment quickly popularized lacks safety guarantee, if passing through front and rear compatibility
Pattern, do not having on the mobile phone of NFC function, by the Quick Response Code of SIM card or SE hardware realizations safety pay, supporting
Under the scene of NFC, additionally it is possible to NFC secure payments are realized by Applet in SIM card, can preferably solve compatibility and it is low into
This development problem.
Invention content
The invention discloses a kind of believable intelligent commercial service systems, which is characterized in that by intelligent terminal, application software,
User's unique number, secret seed, disposable authentication data, security module and cloud service system composition;The intelligent terminal
It is mobile terminal or wearable device, has one or more in display screen, loud speaker and wireless signal transceiver;It is described
Security module built-in security code and secret seed corresponding with user's unique number, by secret seed and iterative parameter into
Row cryptographic calculation generates effective disposable authentication data;The iterative parameter is derived from intelligent terminal current time, encryption fortune
Calculate the random sequence of generation, the internal counter of security module, user's unique number, key corresponding with user's unique number,
One or more of the synchronous code consistent with cloud service system, disposable authentication data of security module last computation;Institute
Application software is stated by sending out the request instructions of tape verifying data so that security module is able to verify that request instruction and generates primary
The disposable authentication data that security module generates is shown, plays or is transmitted by wireless signal by property authentication data, application software
Out;External equipment obtains disposable authentication data by camera, microphone or wireless signal receiver, together in service
To hold and verification data is sent to cloud service system together, cloud service system is stored with the secret seed consistent with security module,
Disposable authentication data can be verified by same cryptographic calculation, the cloud service system also is able to networking update or destroys
Security module code and secret seed;The disposable authentication data can pass through number, character, bar code, Quick Response Code, figure
One or more in code, wireless signal and audio are shown, played or are transmitted.
The believable intelligent commercial service system, which is characterized in that the security module used in cryptographic calculation with
The relevant hardware parameter of specific hardware or corresponding cryptographic Hash, in secret seed generates or activates, security module can also incite somebody to action hard
Part parameter or corresponding cryptographic Hash send cloud service system to;The specific hardware includes intelligent terminal and/or security module
Chip serial number, the MAC Address of wireless signal transceiver, the characteristic value of memory and consistent with cloud service system same
It walks one or more in code.
The believable intelligent commercial service system, which is characterized in that the application software also includes on intelligent terminal
The application program of operation;One kind in PIN code input by user, fingerprint, iris, image and audio of the application software or
It is a variety of, it is compared with the data for presetting or storing, the request instruction of tape verifying data can be sent out after correct so that
Security module is able to verify that request instruction and generates correctly disposable authentication data, exports to application program.
The believable intelligent commercial service system, which is characterized in that the application software includes supporting in intelligent terminal
TEE security systems in the TA trusted programs that run;The TEE security systems refer to credible performing environment, are to operate in support
Security system on the CPU of data isolation technology, being capable of lock resource so that the memory used in TA trusted program implementation procedures
It by external attack and is not stolen with computing resource, in TEE security systems, safe input can be realized by TA trusted programs
And comparison so that data input by user are not stolen by peripheral operation system or other application program, and after comparing correctly, TA is credible
Program sends out the request instructions of tape verifying data to security module, and disposable certification number is generated after security module checking request instruction
Give TA trusted programs according to output, TA trusted programs are still shown or are played in TEE security systems, not by external attack and
It steals, forms complete security service.
Credible performing environment includes:TrustZone security isolation frameworks based on ARM;M-Shield data based on TI
Protection mechanism;DRTM dynamic trust root mechanism based on Intel and the SVM special instructions based on AMD, pass through TPM security modules
Realize insulation blockings of the CPU for sensitive application and data.
TPM is an individual secure chip on computer south bridge bus, coordinates with CPU and completes trust computing.
The believable intelligent commercial service system, which is characterized in that the application software has local voice identification
Function, user can replace conventional manual operation by sending out special sound.
The believable intelligent commercial service system, which is characterized in that the application software has the function of Application on Voiceprint Recognition,
User identity can be identified according to the audio frequency characteristics in user speech.
The believable intelligent commercial service system, which is characterized in that the security module be by smart card, SE,
It is one or more in external security module, integrate what associated encryption algorithm and code were realized;The SE is individual chips or conjunction
And the safe IP in master chip, have independent memory space and calculation resources;The external security module passes through intelligent end
The Peripheral Interface at end, connect with application software.
The believable intelligent commercial service system, which is characterized in that the application software is the STK rule based on SIM card
The menu application that model is realized, can also be made in the case where intelligent terminal does not install any application software by STK menu operations
With;The code of the menu application passes through OTA system updates.
The believable intelligent commercial service system, which is characterized in that the security module has NFC-SWP functions
Pair of the full card SIM card in double interfaces of smart card or SIM card or integrated NFC antenna or integrated NFC signal amplifiers and NFC antenna
The full card SIM card in interface or integrated NFC interface simultaneously support the SE chips of ESIM functions or the external safe mould of integrated NFC interface
Block can support that a variety of Quick Response Codes are applied and NFC is applied by code renewable in security module or JavaApplet.
The believable intelligent commercial service system, which is characterized in that the security module has blue tooth interface, passes through indigo plant
Tooth interface can update code and secret seed in security module.Cloud service system has artificial intelligence service, supports language
Sound identification, image identification and data mining.
The data mining be using mathematical modeling, by fuzzy clustering, linear regression, nonlinear regression, genetic algorithm,
One or more algorithms of different combination in bayesian algorithm, graph-theoretical algorithm and machine learning algorithm is realized.
Specific embodiment
The believable intelligent commercial service system of the present invention, specific embodiment are that security module is used with NFC-SWP
The SIM card of function, the built-in code for supporting authentication data generation and the JavaApplet programs for supporting NFC applications, intelligent terminal
Using the mobile phone with TEE security systems, application software is divided into two parts, and a part is that the TA run in TEE security systems can
Believe program, input PIN code or biological attribute data, generation apply for instruction and check code, send SIM card to and obtain safely by TUI
It takes authentication data and shows, another part is the user APP run under open operation system, and user APP is by calling in TEE
TA completes payment function.Cloud service system has artificial intelligence service, supports speech recognition and data mining, use and operation
The TSM systems of quotient's network connection can control and update security module.
Claims (10)
1. a kind of believable intelligent commercial service system, which is characterized in that by intelligent terminal, application software is user's unique number, secret
Close seed, disposable authentication data, security module and cloud service system composition;The intelligent terminal is mobile terminal or can wear
Equipment is worn, is had one or more in display screen, loud speaker and wireless signal transceiver;The security module built-in security
Code and secret seed corresponding with user's unique number, operation generation, which is encrypted, with iterative parameter by secret seed has
The disposable authentication data of timeliness;The iterative parameter be derived from intelligent terminal current time, cryptographic calculation generation random sequence,
It is the internal counter of security module, user's unique number, key corresponding with user's unique number, consistent with cloud service system
Synchronous code, one or more of the disposable authentication data of security module last computation;The application software is by sending out
The request instruction of tape verifying data so that security module is able to verify that request instruction and generates disposable authentication data, and application is soft
The disposable authentication data that security module generates is shown, plays or is sent out by wireless signal by part;External equipment passes through
Camera, microphone or wireless signal receiver obtain disposable authentication data, together with service content and verification data
Cloud service system is sent to, cloud service system is stored with the secret seed consistent with security module, can be by similarly adding
Disposable authentication data is verified in close operation, and the cloud service system also is able to networking update or destroys security module code and secret
Close seed;The disposable authentication data can pass through number, character, bar code, Quick Response Code, graphic code, wireless signal and sound
One or more in frequency are shown, played or are transmitted.
2. according to the believable intelligent commercial service system described in claim 1, which is characterized in that the security module is being encrypted
Hardware parameter relevant with specific hardware or corresponding cryptographic Hash are used in operation, in secret seed generates or activates, safety
Module can also send hardware parameter or corresponding cryptographic Hash to cloud service system;The specific hardware includes intelligent terminal
And/or the chip serial number of security module, the MAC Address of wireless signal transceiver, memory characteristic value and with high in the clouds take
It is engaged in one or more in the synchronous code of systems compliant.
3. according to the believable intelligent commercial service system described in claim 2, which is characterized in that the application software further includes
The application program run on intelligent terminal;The application software is according to PIN code input by user, fingerprint, iris, image and sound
It is one or more in frequency, it is compared with the data for presetting or storing, tape verifying data can be sent out after correct
Request instruction so that security module is able to verify that request instruction and generates correctly disposable authentication data, exports to using journey
Sequence.
4. according to the believable intelligent commercial service system described in claim 3, which is characterized in that the application software includes
The TA trusted programs run in the TEE security systems that intelligent terminal is supported;The TEE security systems refer to credible performing environment,
It is the security system operated on the CPU for supporting data isolation technology, it being capable of lock resource so that TA trusted program implementation procedures
In the memory used and computing resource by external attack and do not steal, can be real by TA trusted programs in TEE security systems
Now safe input and comparison so that data input by user are not stolen by peripheral operation system or other application program, are compared
After correct, TA trusted programs send out the request instructions of tape verifying data to security module, raw after security module checking request instruction
It being exported into disposable authentication data and gives TA trusted programs, TA trusted programs are still shown or are played in TEE security systems,
It not by external attack and steals, forms complete security service;It is real that the TEE security systems include the TrustZone based on ARM
Existing security isolation framework, the data protection schemes that the M-Shield based on TI is realized and the DRTM dynamics based on Intel are believed
Appoint root mechanism and the SVM special instructions based on AMD, the isolation for sensitive application and data realized by TPM security modules
Protection.
5. according to the believable intelligent commercial service system described in claim 4, which is characterized in that the application software has this
The function of ground speech recognition, user can replace conventional manual operation by sending out special sound.
6. according to the believable intelligent commercial service system described in claim 5, which is characterized in that the application software has sound
The function of line identification can identify user identity according to the audio frequency characteristics in user speech.
7. according to the believable intelligent commercial service system any in claim 1 to 6, which is characterized in that the safe mould
Block is by one or more in smart card, SE, external security module, integrates associated encryption algorithm and code realizes;
The SE is individual chips or merges the safe IP in master chip, has independent memory space and calculation resources;It is described outer
Peripheral Interface of the security module by intelligent terminal is connect, is connect with application software.
8. according to the believable intelligent commercial service system described in claim 7, which is characterized in that the application software is to be based on
The menu application that the STK specifications of SIM card are realized, can also pass through in the case where intelligent terminal does not install any application software
STK menu operations use;The code of the menu application passes through OTA system updates.
9. according to the believable intelligent commercial service system described in claim 7, which is characterized in that the security module is that have
The full card SIM card in double interfaces of the smart card of NFC-SWP functions or integrated NFC antenna or integrated NFC signal amplifiers and NFC days
The full card SIM card in double interfaces of line or integrated NFC interface simultaneously support the SE chips of ESIM functions or the external peace of integrated NFC interface
Full module can support that a variety of Quick Response Codes are applied and NFC is applied by code renewable in security module or JavaApplet.
10. according to the believable intelligent commercial service system any in claim 8 to 9, which is characterized in that the safe mould
Block has blue tooth interface, and code and secret seed in security module can be updated by blue tooth interface;The cloud service system
System has artificial intelligence service, supports speech recognition, image identification and data mining.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611234739.4A CN108256850A (en) | 2016-12-29 | 2016-12-29 | Believable intelligent commercial service system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611234739.4A CN108256850A (en) | 2016-12-29 | 2016-12-29 | Believable intelligent commercial service system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108256850A true CN108256850A (en) | 2018-07-06 |
Family
ID=62720120
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611234739.4A Pending CN108256850A (en) | 2016-12-29 | 2016-12-29 | Believable intelligent commercial service system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108256850A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109299941A (en) * | 2018-09-18 | 2019-02-01 | 上海点融信息科技有限责任公司 | Art work information input method, calculating equipment and storage medium based on block chain network |
CN109657764A (en) * | 2018-10-22 | 2019-04-19 | 北京握奇智能科技有限公司 | The method and system of two dimensional code are generated under a kind of TEE environment |
CN111712815A (en) * | 2018-08-14 | 2020-09-25 | 华为技术有限公司 | Artificial intelligence AI processing method and AI processing device |
-
2016
- 2016-12-29 CN CN201611234739.4A patent/CN108256850A/en active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111712815A (en) * | 2018-08-14 | 2020-09-25 | 华为技术有限公司 | Artificial intelligence AI processing method and AI processing device |
US11954204B2 (en) | 2018-08-14 | 2024-04-09 | Huawei Technologies Co., Ltd. | Artificial intelligence AI processing method and AI processing apparatus |
CN109299941A (en) * | 2018-09-18 | 2019-02-01 | 上海点融信息科技有限责任公司 | Art work information input method, calculating equipment and storage medium based on block chain network |
CN109657764A (en) * | 2018-10-22 | 2019-04-19 | 北京握奇智能科技有限公司 | The method and system of two dimensional code are generated under a kind of TEE environment |
CN109657764B (en) * | 2018-10-22 | 2024-04-02 | 北京握奇智能科技有限公司 | Method and system for generating two-dimensional code in TEE environment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11621855B2 (en) | Electronic device and method for managing blockchain address using the same | |
CN109951489B (en) | Digital identity authentication method, equipment, device, system and storage medium | |
KR102242218B1 (en) | User authentication method and apparatus, and wearable device registration method and apparatus | |
CN110677418B (en) | Trusted voiceprint authentication method and device, electronic equipment and storage medium | |
US20200167775A1 (en) | Virtual pos terminal method and apparatus | |
CN105391840B (en) | Automatically create destination application | |
US12041189B2 (en) | Method for storing and recovering key for blockchain-based system, and device therefor | |
CN107820238B (en) | SIM card, blockchain application security module, client and security operation method thereof | |
US20150310427A1 (en) | Method, apparatus, and system for generating transaction-signing one-time password | |
CN106533687A (en) | Identity authentication method and device | |
CN106157025A (en) | The mobile terminal safety method of payment of identity-based card and system | |
CN105427106B (en) | Authorization processing method and payment processing method of electronic cash data and virtual card | |
US10872327B2 (en) | Mobile payment systems and mobile payment methods thereof | |
CN114270777A (en) | Electronic device for providing block chain account information and operation method thereof | |
JP6553810B2 (en) | Payment authentication method and apparatus for mobile terminal and mobile terminal | |
CN105635168A (en) | Off-line transaction device and security key using method thereof | |
CN105791277A (en) | Identity authentication method | |
CN108256850A (en) | Believable intelligent commercial service system | |
KR20140131201A (en) | Smart card having OTP generation function and OTP authentication server | |
WO2015168878A1 (en) | Payment method and device and payment factor processing method and device | |
CN110659899B (en) | Offline payment method, device and equipment | |
CN107437997B (en) | Radio frequency communication device and method | |
CN105635164A (en) | Method and device for security authentication | |
KR20200101053A (en) | Electronic device and certification method in electronic device | |
KR20190108888A (en) | Electronic device and certification method in electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180706 |