CN108256850A - Believable intelligent commercial service system - Google Patents

Believable intelligent commercial service system Download PDF

Info

Publication number
CN108256850A
CN108256850A CN201611234739.4A CN201611234739A CN108256850A CN 108256850 A CN108256850 A CN 108256850A CN 201611234739 A CN201611234739 A CN 201611234739A CN 108256850 A CN108256850 A CN 108256850A
Authority
CN
China
Prior art keywords
security module
service system
security
code
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611234739.4A
Other languages
Chinese (zh)
Inventor
陈新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201611234739.4A priority Critical patent/CN108256850A/en
Publication of CN108256850A publication Critical patent/CN108256850A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3229Use of the SIM of a M-device as secure element
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3227Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3274Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of believable intelligent commercial service system, by intelligent terminal, application software, security module and cloud service system composition;Security module in NFC SWP smart cards, have in full card, bluetooth SIM card or the SE chips of antenna that integrated security code is realized, pass through secret seed and generate timeliness authentication data with iterative parameter operation;Application software includes the TA trusted applications run in intelligent terminal TEE security systems, and the authentication data that security module generates safely is showed in TEE;Cloud service system has artificial intelligence service, supports speech recognition, image identification and data mining, by same cryptographic calculation authentication verification data, and code, secret seed and the service content of can network update or destruction security module.This system compatibility Quick Response Code is applied and NFC applications, suitable for various intelligent terminals, wearable device and commercial intelligence service.

Description

Believable intelligent commercial service system
Technical field
The present invention relates to a kind of believable intelligent commercial service systems that can take into account SIM card and NFC applications, coordinate with TEE, The Quick Response Code of safety and NFC applications are realized, suitable for commercial intelligence service field.
Technical background
Common mobile service system, such as payment system need NFC controller, external POS machine for intelligent terminal It needs to be transformed, it is of high cost, it pushes slow.And the Quick Response Code payment quickly popularized lacks safety guarantee, if passing through front and rear compatibility Pattern, do not having on the mobile phone of NFC function, by the Quick Response Code of SIM card or SE hardware realizations safety pay, supporting Under the scene of NFC, additionally it is possible to NFC secure payments are realized by Applet in SIM card, can preferably solve compatibility and it is low into This development problem.
Invention content
The invention discloses a kind of believable intelligent commercial service systems, which is characterized in that by intelligent terminal, application software, User's unique number, secret seed, disposable authentication data, security module and cloud service system composition;The intelligent terminal It is mobile terminal or wearable device, has one or more in display screen, loud speaker and wireless signal transceiver;It is described Security module built-in security code and secret seed corresponding with user's unique number, by secret seed and iterative parameter into Row cryptographic calculation generates effective disposable authentication data;The iterative parameter is derived from intelligent terminal current time, encryption fortune Calculate the random sequence of generation, the internal counter of security module, user's unique number, key corresponding with user's unique number, One or more of the synchronous code consistent with cloud service system, disposable authentication data of security module last computation;Institute Application software is stated by sending out the request instructions of tape verifying data so that security module is able to verify that request instruction and generates primary The disposable authentication data that security module generates is shown, plays or is transmitted by wireless signal by property authentication data, application software Out;External equipment obtains disposable authentication data by camera, microphone or wireless signal receiver, together in service To hold and verification data is sent to cloud service system together, cloud service system is stored with the secret seed consistent with security module, Disposable authentication data can be verified by same cryptographic calculation, the cloud service system also is able to networking update or destroys Security module code and secret seed;The disposable authentication data can pass through number, character, bar code, Quick Response Code, figure One or more in code, wireless signal and audio are shown, played or are transmitted.
The believable intelligent commercial service system, which is characterized in that the security module used in cryptographic calculation with The relevant hardware parameter of specific hardware or corresponding cryptographic Hash, in secret seed generates or activates, security module can also incite somebody to action hard Part parameter or corresponding cryptographic Hash send cloud service system to;The specific hardware includes intelligent terminal and/or security module Chip serial number, the MAC Address of wireless signal transceiver, the characteristic value of memory and consistent with cloud service system same It walks one or more in code.
The believable intelligent commercial service system, which is characterized in that the application software also includes on intelligent terminal The application program of operation;One kind in PIN code input by user, fingerprint, iris, image and audio of the application software or It is a variety of, it is compared with the data for presetting or storing, the request instruction of tape verifying data can be sent out after correct so that Security module is able to verify that request instruction and generates correctly disposable authentication data, exports to application program.
The believable intelligent commercial service system, which is characterized in that the application software includes supporting in intelligent terminal TEE security systems in the TA trusted programs that run;The TEE security systems refer to credible performing environment, are to operate in support Security system on the CPU of data isolation technology, being capable of lock resource so that the memory used in TA trusted program implementation procedures It by external attack and is not stolen with computing resource, in TEE security systems, safe input can be realized by TA trusted programs And comparison so that data input by user are not stolen by peripheral operation system or other application program, and after comparing correctly, TA is credible Program sends out the request instructions of tape verifying data to security module, and disposable certification number is generated after security module checking request instruction Give TA trusted programs according to output, TA trusted programs are still shown or are played in TEE security systems, not by external attack and It steals, forms complete security service.
Credible performing environment includes:TrustZone security isolation frameworks based on ARM;M-Shield data based on TI Protection mechanism;DRTM dynamic trust root mechanism based on Intel and the SVM special instructions based on AMD, pass through TPM security modules Realize insulation blockings of the CPU for sensitive application and data.
TPM is an individual secure chip on computer south bridge bus, coordinates with CPU and completes trust computing.
The believable intelligent commercial service system, which is characterized in that the application software has local voice identification Function, user can replace conventional manual operation by sending out special sound.
The believable intelligent commercial service system, which is characterized in that the application software has the function of Application on Voiceprint Recognition, User identity can be identified according to the audio frequency characteristics in user speech.
The believable intelligent commercial service system, which is characterized in that the security module be by smart card, SE, It is one or more in external security module, integrate what associated encryption algorithm and code were realized;The SE is individual chips or conjunction And the safe IP in master chip, have independent memory space and calculation resources;The external security module passes through intelligent end The Peripheral Interface at end, connect with application software.
The believable intelligent commercial service system, which is characterized in that the application software is the STK rule based on SIM card The menu application that model is realized, can also be made in the case where intelligent terminal does not install any application software by STK menu operations With;The code of the menu application passes through OTA system updates.
The believable intelligent commercial service system, which is characterized in that the security module has NFC-SWP functions Pair of the full card SIM card in double interfaces of smart card or SIM card or integrated NFC antenna or integrated NFC signal amplifiers and NFC antenna The full card SIM card in interface or integrated NFC interface simultaneously support the SE chips of ESIM functions or the external safe mould of integrated NFC interface Block can support that a variety of Quick Response Codes are applied and NFC is applied by code renewable in security module or JavaApplet.
The believable intelligent commercial service system, which is characterized in that the security module has blue tooth interface, passes through indigo plant Tooth interface can update code and secret seed in security module.Cloud service system has artificial intelligence service, supports language Sound identification, image identification and data mining.
The data mining be using mathematical modeling, by fuzzy clustering, linear regression, nonlinear regression, genetic algorithm, One or more algorithms of different combination in bayesian algorithm, graph-theoretical algorithm and machine learning algorithm is realized.
Specific embodiment
The believable intelligent commercial service system of the present invention, specific embodiment are that security module is used with NFC-SWP The SIM card of function, the built-in code for supporting authentication data generation and the JavaApplet programs for supporting NFC applications, intelligent terminal Using the mobile phone with TEE security systems, application software is divided into two parts, and a part is that the TA run in TEE security systems can Believe program, input PIN code or biological attribute data, generation apply for instruction and check code, send SIM card to and obtain safely by TUI It takes authentication data and shows, another part is the user APP run under open operation system, and user APP is by calling in TEE TA completes payment function.Cloud service system has artificial intelligence service, supports speech recognition and data mining, use and operation The TSM systems of quotient's network connection can control and update security module.

Claims (10)

1. a kind of believable intelligent commercial service system, which is characterized in that by intelligent terminal, application software is user's unique number, secret Close seed, disposable authentication data, security module and cloud service system composition;The intelligent terminal is mobile terminal or can wear Equipment is worn, is had one or more in display screen, loud speaker and wireless signal transceiver;The security module built-in security Code and secret seed corresponding with user's unique number, operation generation, which is encrypted, with iterative parameter by secret seed has The disposable authentication data of timeliness;The iterative parameter be derived from intelligent terminal current time, cryptographic calculation generation random sequence, It is the internal counter of security module, user's unique number, key corresponding with user's unique number, consistent with cloud service system Synchronous code, one or more of the disposable authentication data of security module last computation;The application software is by sending out The request instruction of tape verifying data so that security module is able to verify that request instruction and generates disposable authentication data, and application is soft The disposable authentication data that security module generates is shown, plays or is sent out by wireless signal by part;External equipment passes through Camera, microphone or wireless signal receiver obtain disposable authentication data, together with service content and verification data Cloud service system is sent to, cloud service system is stored with the secret seed consistent with security module, can be by similarly adding Disposable authentication data is verified in close operation, and the cloud service system also is able to networking update or destroys security module code and secret Close seed;The disposable authentication data can pass through number, character, bar code, Quick Response Code, graphic code, wireless signal and sound One or more in frequency are shown, played or are transmitted.
2. according to the believable intelligent commercial service system described in claim 1, which is characterized in that the security module is being encrypted Hardware parameter relevant with specific hardware or corresponding cryptographic Hash are used in operation, in secret seed generates or activates, safety Module can also send hardware parameter or corresponding cryptographic Hash to cloud service system;The specific hardware includes intelligent terminal And/or the chip serial number of security module, the MAC Address of wireless signal transceiver, memory characteristic value and with high in the clouds take It is engaged in one or more in the synchronous code of systems compliant.
3. according to the believable intelligent commercial service system described in claim 2, which is characterized in that the application software further includes The application program run on intelligent terminal;The application software is according to PIN code input by user, fingerprint, iris, image and sound It is one or more in frequency, it is compared with the data for presetting or storing, tape verifying data can be sent out after correct Request instruction so that security module is able to verify that request instruction and generates correctly disposable authentication data, exports to using journey Sequence.
4. according to the believable intelligent commercial service system described in claim 3, which is characterized in that the application software includes The TA trusted programs run in the TEE security systems that intelligent terminal is supported;The TEE security systems refer to credible performing environment, It is the security system operated on the CPU for supporting data isolation technology, it being capable of lock resource so that TA trusted program implementation procedures In the memory used and computing resource by external attack and do not steal, can be real by TA trusted programs in TEE security systems Now safe input and comparison so that data input by user are not stolen by peripheral operation system or other application program, are compared After correct, TA trusted programs send out the request instructions of tape verifying data to security module, raw after security module checking request instruction It being exported into disposable authentication data and gives TA trusted programs, TA trusted programs are still shown or are played in TEE security systems, It not by external attack and steals, forms complete security service;It is real that the TEE security systems include the TrustZone based on ARM Existing security isolation framework, the data protection schemes that the M-Shield based on TI is realized and the DRTM dynamics based on Intel are believed Appoint root mechanism and the SVM special instructions based on AMD, the isolation for sensitive application and data realized by TPM security modules Protection.
5. according to the believable intelligent commercial service system described in claim 4, which is characterized in that the application software has this The function of ground speech recognition, user can replace conventional manual operation by sending out special sound.
6. according to the believable intelligent commercial service system described in claim 5, which is characterized in that the application software has sound The function of line identification can identify user identity according to the audio frequency characteristics in user speech.
7. according to the believable intelligent commercial service system any in claim 1 to 6, which is characterized in that the safe mould Block is by one or more in smart card, SE, external security module, integrates associated encryption algorithm and code realizes; The SE is individual chips or merges the safe IP in master chip, has independent memory space and calculation resources;It is described outer Peripheral Interface of the security module by intelligent terminal is connect, is connect with application software.
8. according to the believable intelligent commercial service system described in claim 7, which is characterized in that the application software is to be based on The menu application that the STK specifications of SIM card are realized, can also pass through in the case where intelligent terminal does not install any application software STK menu operations use;The code of the menu application passes through OTA system updates.
9. according to the believable intelligent commercial service system described in claim 7, which is characterized in that the security module is that have The full card SIM card in double interfaces of the smart card of NFC-SWP functions or integrated NFC antenna or integrated NFC signal amplifiers and NFC days The full card SIM card in double interfaces of line or integrated NFC interface simultaneously support the SE chips of ESIM functions or the external peace of integrated NFC interface Full module can support that a variety of Quick Response Codes are applied and NFC is applied by code renewable in security module or JavaApplet.
10. according to the believable intelligent commercial service system any in claim 8 to 9, which is characterized in that the safe mould Block has blue tooth interface, and code and secret seed in security module can be updated by blue tooth interface;The cloud service system System has artificial intelligence service, supports speech recognition, image identification and data mining.
CN201611234739.4A 2016-12-29 2016-12-29 Believable intelligent commercial service system Pending CN108256850A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611234739.4A CN108256850A (en) 2016-12-29 2016-12-29 Believable intelligent commercial service system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611234739.4A CN108256850A (en) 2016-12-29 2016-12-29 Believable intelligent commercial service system

Publications (1)

Publication Number Publication Date
CN108256850A true CN108256850A (en) 2018-07-06

Family

ID=62720120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611234739.4A Pending CN108256850A (en) 2016-12-29 2016-12-29 Believable intelligent commercial service system

Country Status (1)

Country Link
CN (1) CN108256850A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109299941A (en) * 2018-09-18 2019-02-01 上海点融信息科技有限责任公司 Art work information input method, calculating equipment and storage medium based on block chain network
CN109657764A (en) * 2018-10-22 2019-04-19 北京握奇智能科技有限公司 The method and system of two dimensional code are generated under a kind of TEE environment
CN111712815A (en) * 2018-08-14 2020-09-25 华为技术有限公司 Artificial intelligence AI processing method and AI processing device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111712815A (en) * 2018-08-14 2020-09-25 华为技术有限公司 Artificial intelligence AI processing method and AI processing device
US11954204B2 (en) 2018-08-14 2024-04-09 Huawei Technologies Co., Ltd. Artificial intelligence AI processing method and AI processing apparatus
CN109299941A (en) * 2018-09-18 2019-02-01 上海点融信息科技有限责任公司 Art work information input method, calculating equipment and storage medium based on block chain network
CN109657764A (en) * 2018-10-22 2019-04-19 北京握奇智能科技有限公司 The method and system of two dimensional code are generated under a kind of TEE environment
CN109657764B (en) * 2018-10-22 2024-04-02 北京握奇智能科技有限公司 Method and system for generating two-dimensional code in TEE environment

Similar Documents

Publication Publication Date Title
US11621855B2 (en) Electronic device and method for managing blockchain address using the same
CN109951489B (en) Digital identity authentication method, equipment, device, system and storage medium
KR102242218B1 (en) User authentication method and apparatus, and wearable device registration method and apparatus
CN110677418B (en) Trusted voiceprint authentication method and device, electronic equipment and storage medium
US20200167775A1 (en) Virtual pos terminal method and apparatus
CN105391840B (en) Automatically create destination application
US12041189B2 (en) Method for storing and recovering key for blockchain-based system, and device therefor
CN107820238B (en) SIM card, blockchain application security module, client and security operation method thereof
US20150310427A1 (en) Method, apparatus, and system for generating transaction-signing one-time password
CN106533687A (en) Identity authentication method and device
CN106157025A (en) The mobile terminal safety method of payment of identity-based card and system
CN105427106B (en) Authorization processing method and payment processing method of electronic cash data and virtual card
US10872327B2 (en) Mobile payment systems and mobile payment methods thereof
CN114270777A (en) Electronic device for providing block chain account information and operation method thereof
JP6553810B2 (en) Payment authentication method and apparatus for mobile terminal and mobile terminal
CN105635168A (en) Off-line transaction device and security key using method thereof
CN105791277A (en) Identity authentication method
CN108256850A (en) Believable intelligent commercial service system
KR20140131201A (en) Smart card having OTP generation function and OTP authentication server
WO2015168878A1 (en) Payment method and device and payment factor processing method and device
CN110659899B (en) Offline payment method, device and equipment
CN107437997B (en) Radio frequency communication device and method
CN105635164A (en) Method and device for security authentication
KR20200101053A (en) Electronic device and certification method in electronic device
KR20190108888A (en) Electronic device and certification method in electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180706