CN109657764B - Method and system for generating two-dimensional code in TEE environment - Google Patents

Method and system for generating two-dimensional code in TEE environment Download PDF

Info

Publication number
CN109657764B
CN109657764B CN201811229739.4A CN201811229739A CN109657764B CN 109657764 B CN109657764 B CN 109657764B CN 201811229739 A CN201811229739 A CN 201811229739A CN 109657764 B CN109657764 B CN 109657764B
Authority
CN
China
Prior art keywords
dimensional code
key information
generating
tee
tee environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811229739.4A
Other languages
Chinese (zh)
Other versions
CN109657764A (en
Inventor
杨玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing WatchSmart Technologies Co Ltd
Original Assignee
Beijing WatchSmart Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing WatchSmart Technologies Co Ltd filed Critical Beijing WatchSmart Technologies Co Ltd
Priority to CN201811229739.4A priority Critical patent/CN109657764B/en
Publication of CN109657764A publication Critical patent/CN109657764A/en
Application granted granted Critical
Publication of CN109657764B publication Critical patent/CN109657764B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Abstract

The invention discloses a method and a system for generating a two-dimensional code in a TEE environment, wherein the method comprises the following steps: s1, acquiring key information for generating a two-dimensional code by a TA in a TEE environment; s2, calculating key information through key factors in the TA to generate an identification code; and S3, generating the two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface. According to the method and the system provided by the invention, the key factors are prefabricated in the TEE environment, the key factors are used for operating the key information in the TEE environment, the operation result is used as the identification code of the information, the key information and the identification code are used for generating the two-dimensional code, the authenticity of the identification information can be identified through the identification code when the two-dimensional code is scanned, the key information in the two-dimensional code is prevented from being tampered, and compared with the traditional two-dimensional code generation mode, the security is enhanced, and the risk of information attack can be obviously reduced.

Description

Method and system for generating two-dimensional code in TEE environment
Technical Field
The invention relates to the field of information security, in particular to a method and a system for generating a two-dimensional code in a TEE environment.
Background
The two-dimensional code is a bar code which records data symbol information by using a black-white smelling graph which is distributed on a plane (two-dimensional direction) according to a certain rule by using a certain specific geometric graph. The method has the advantages of large information capacity, high reliability, flexible coding mode, strong confidentiality and anti-counterfeiting performance and the like.
The two-dimensional code is an information carrier, is also an important method and means for information acquisition and transmission, and can play a role in improving efficiency in various fields. Along with popularization of intelligent terminals and rapid popularization of mobile networks, two-dimensional codes become a window of future data age. The two-dimensional code technology is widely used in the fields of mobile electronic commerce, text quick entry, food safety management and the like.
Two-dimensional code is the carrier of information, among the prior art, according to the difference of information source, the mode of generating two-dimensional code includes following several kinds:
(1) The information factors for generating the two-dimension codes are stored in the APP of REE, and the APP end generates the two-dimension codes and displays the two-dimension codes through a UI interface.
(2) The information factors for generating the two-dimension codes are obtained from the server, and the APP terminal generates the two-dimension codes and displays the two-dimension codes through the UI interface.
(3) The APP provides information factors for the UI to collect input by the user, the APP end generates a two-dimensional code to be displayed through the UI interface, and the two-dimensional code contains information input by the user.
However, in the prior art, the two-dimensional code is displayed in the REE, and compared with the TEE environment, the data in the REE environment is unsafe, so that the information input by a user and the presented two-dimensional code are intercepted and tampered.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a method and a system for generating a two-dimensional code in a TEE environment, which are enhanced in safety compared with the traditional two-dimensional code generation mode, realize the application of the two-dimensional code in the TEE environment and can obviously reduce the risk of information attack.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
a method for generating a two-dimensional code in a TEE environment comprises the following steps:
s1, acquiring key information for generating a two-dimensional code by a TA in a TEE environment;
s2, calculating the key information through a key factor in the TA to generate an authentication code;
and S3, generating the two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface.
Further, as described above, in the method for generating a two-dimensional code in a TEE environment, step S1 includes:
a1, initiating an application request to a TA in a TEE environment through an APP of a client;
a2, after receiving the application request, the TA initiates a TUI service request;
a3, the TA receives and stores key information input by the user on the TUI interface.
Further, as described above, in the method for generating a two-dimensional code in a TEE environment, step S1 includes:
b1, establishing a secure channel between a server and a TEE;
b2, initiating a request to a TA in a TEE environment through an APP of the client, and initiating an application request to the server through the APP by the TA;
b3, the server sends the key information to the TA in the TEE environment through the secure channel according to the application request;
and B4, decrypting the key information in the TA, and storing the decrypted key information.
Further, as described above, in the method for generating a two-dimensional code in a TEE environment, step B1 specifically includes: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method.
Further, the method for generating the two-dimensional code in the TEE environment comprises a digital certificate and a digital envelope.
The embodiment of the invention also provides a system for generating the two-dimensional code in the TEE environment, which comprises the following steps:
the acquisition module is used for acquiring key information for generating the two-dimensional code by the TA in the TEE environment;
the operation module is used for operating the key information through a key factor in the TA to generate an authentication code;
and the generation module is used for generating the two-dimensional code from the key information and the identification code and displaying the two-dimensional code through a TUI interface.
Further, as described above, in the system for generating a two-dimensional code in a TEE environment, the acquisition module includes:
the first launching module is used for launching an application request to the TA in the TEE environment through the APP of the client;
the second initiator module is used for initiating a TUI service request after the TA receives the application request;
and the receiving and storing sub-module is used for receiving and storing key information input by a user on the TUI interface by the TA.
Further, as described above, in the system for generating a two-dimensional code in a TEE environment, the acquisition module further includes:
the establishing sub-module is used for establishing a secure channel between the server and the TEE;
the first sending submodule is used for initiating a request to a TA in a TEE environment through an APP of the client, and the TA initiates an application request to the server through the APP;
the second sending submodule is used for sending the key information to the TA in the TEE environment through the secure channel according to the application request by the server;
and the decryption storage sub-module is used for decrypting the key information in the TA and storing the decrypted key information.
Further, as described above, in the system for generating a two-dimensional code in a TEE environment, the creation submodule is specifically configured to: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method.
Further, the system for generating the two-dimensional code in the TEE environment comprises the digital certificate and the digital envelope.
The invention has the beneficial effects that: according to the method and the system provided by the invention, the key factors are prefabricated in the TEE environment, the key factors are used for operating the key information in the TEE environment, the operation result is used as the identification code of the information, the key information and the identification code are used for generating the two-dimensional code, the authenticity of the identification information can be identified through the identification code when the two-dimensional code is scanned, the key information in the two-dimensional code is prevented from being tampered, and compared with the traditional two-dimensional code generation mode, the security is enhanced, and the risk of information attack can be obviously reduced.
Drawings
Fig. 1 is a flow chart of a method for generating a two-dimensional code in a TEE environment according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a system for generating two-dimensional codes in a TEE environment according to an embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and the detailed description.
As shown in fig. 1, a method for generating a two-dimensional code in a TEE environment includes:
s1, acquiring key information for generating a two-dimensional code by a TA in a TEE environment;
s2, calculating key information through key factors in the TA to generate an identification code;
and S3, generating the two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface.
The step S1 comprises the following steps:
a1, initiating an application request to a TA in a TEE environment through an APP of a client;
a2, after receiving the application request, the TA initiates a TUI service request;
a3, the TA receives and stores key information input by the user on the TUI interface.
The step S1 comprises the following steps:
b1, establishing a secure channel between a server and a TEE;
b2, initiating a request to a TA in the TEE environment through an APP of the client, and initiating an application request to a server through the APP by the TA;
b3, the server sends the key information to the TA in the TEE environment through the secure channel according to the application request;
and B4, decrypting the key information in the TA, and storing the decrypted key information.
The step B1 specifically comprises the following steps: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method. The key hierarchy method includes digital certificates and digital envelopes.
Example 1
S101, initiating an application request to a TA in a TEE environment through an APP of a client;
s102, after receiving an application request, the TA initiates a TUI service request;
s103, the TA receives and stores key information input by a user on a TUI interface;
s104, calculating key information through key factors in the TA to generate an identification code;
s105, generating the two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface.
In this embodiment, a key factor is prefabricated in a TEE environment, an APP initiates a request, the key factor operates key information input by a user in the TEE environment, the operation result is used as an identification code of the key information, the generated two-dimensional code has sensitive information (i.e., the key information) and is additionally provided with an identification code of information, and the authenticity of the information can be identified through the identification code when the two-dimensional code is scanned, so that the key information in the two-dimensional code is prevented from being tampered.
A TEE (trusted execution environment ) is a secure area that exists within a mobile terminal device separate from a rich execution environment. It is separated from the rich execution environment and the applications above the rich execution environment, ensuring that various sensitive data is stored, processed and protected in a trusted environment, while the trusted execution environment provides a secure execution environment for trusted applications loaded therein.
The TA is an application running within the TEE that accesses the TEE controlled hardware resources by calling the API provided by the TEE. The TA may use the secure application within the SE by calling the SE API to invoke the TUI API to perform trusted interactions with the user.
The TUI (trusted user interface ) is a TEE-controlled TA application that provides a user information display, isolated from the REEs.
Example two
S201, establishing a secure channel between a server and a TEE through a GP protocol, a key system method or a white box encryption method;
s202, initiating a request to a TA in a TEE environment through an APP of a client, and initiating an application request to a server through the APP by the TA;
s203, the server sends key information in the application request to the TA in the TEE environment through the secure channel;
s204, decrypting the key information in the TA, and storing the decrypted key information;
s205, calculating key information through key factors in the TA to generate an identification code;
s206, generating the two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface.
In this embodiment, a secure channel is established between the server and the TA, the APP plays a role in data transparent transmission between the server and the TA, key information sent by the server is decrypted in the TA, key factors in the TA operate the key information to generate an authentication code, the key information and the authentication code are generated into a two-dimensional code, and the two-dimensional code is presented through the TUI.
There are several methods for establishing a secure channel between the server and the TEE: through GP protocol, key system method (such as digital certificate, digital envelope, etc.), white box encryption mode with higher security level, etc.
Example III
Taking the mobile terminal two-dimension code collection service as an example, the prior art and the invention are compared and explained:
a. business logic for realizing two-dimension code collection by adopting the prior art:
1. the user inputs information such as the collection amount, collection account number and the like in the REE environment;
2, APP generates a two-dimensional code;
3. the payer scans the two-dimension code for payment.
Sensitive information (account number, amount and the like) in the process is cached in a memory in a plaintext or ciphertext mode, the risk of interception and tampering by a person exists, and the risk of interception and tampering also exists at the APP end in the process of presenting the two-dimensional code.
b. Business logic for realizing two-dimension code collection by adopting the first embodiment of the invention:
1. the user initiates a collection request through the APP;
the TA receives the request, initiates a TUI service request, and allows the user to input information such as a collection account number, an amount and the like;
the key factor in TA operates the information input by the user to generate an identification code, the information and the identification code are generated into a two-dimensional code, and the two-dimensional code is presented through TUI;
4. the payer scans the two-dimensional code and verifies the authenticity of the information through the identification code at the same time, so as to pay.
In the APP operation process, user information input and two-dimensional code presentation are completed through the TUI in the TEE environment, and an identification code of the information is added in the two-dimensional code, so that risks of interception and tampering of the information by people are reduced. In the environment where REE and TEE coexist, the key factors and the sensitive information are arranged in the safe TEE environment and isolated from CA data, so that the sensitive information is prevented from being attacked or tampered.
The REEs (rich execution environments, rich execution environment) are environments managed and controlled by rich operating systems, and correspond to TEE, and the rich execution environments and applications running therein have unsafe and unreliable characteristics, such as android, apples and other operating systems.
CA (Client Application) is a generic application running within the TEE that can request TA security services running within the TEE by calling the Client API provided by the TEE.
As shown in fig. 2, the embodiment of the present invention further provides a system for generating a two-dimensional code in a TEE environment, including:
the acquisition module 1 is used for acquiring key information for generating the two-dimensional code by the TA in the TEE environment;
the operation module 2 is used for operating the key information through the key factors in the TA to generate an identification code;
and the generation module 3 is used for generating the two-dimensional code from the key information and the identification code and displaying the two-dimensional code through the TUI interface.
The acquisition module 1 includes:
the first launching module is used for launching an application request to the TA in the TEE environment through the APP of the client;
the second initiator module is used for initiating a TUI service request after the TA receives the application request;
and the receiving and storing sub-module is used for receiving and storing key information input by a user on the TUI interface by the TA.
The acquisition module further includes:
the establishing sub-module is used for establishing a secure channel between the server and the TEE;
the first sending submodule is used for initiating a request to a TA in the TEE environment through an APP of the client, and the TA initiates an application request to a server through the APP;
the second sending submodule is used for sending the key information to the TA in the TEE environment through the secure channel according to the application request by the server;
and the decryption storage sub-module is used for decrypting the key information in the TA and storing the decrypted key information.
The building sub-module is specifically configured to: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method. The key hierarchy method includes digital certificates and digital envelopes.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (8)

1. The method for generating the two-dimensional code in the TEE environment is characterized by comprising the following steps of:
s1, acquiring key information for generating a two-dimensional code by a TA in a TEE environment;
s2, calculating the key information through a key factor in the TA to generate an authentication code;
s3, generating a two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface;
the step S1 comprises the following steps:
a1, initiating an application request to a TA in a TEE environment through an APP of a client;
a2, after receiving the application request, the TA initiates a TUI service request;
a3, the TA receives and stores key information input by the user on the TUI interface.
2. The method for generating a two-dimensional code in a TEE environment according to claim 1, wherein step S1 includes:
b1, establishing a secure channel between a server and a TEE;
b2, initiating a request to a TA in a TEE environment through an APP of the client, and initiating an application request to the server through the APP by the TA;
b3, the server sends the key information to the TA in the TEE environment through the secure channel according to the application request;
and B4, decrypting the key information in the TA, and storing the decrypted key information.
3. The method for generating the two-dimensional code in the TEE environment according to claim 2, wherein the step B1 specifically includes: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method.
4. A method for generating a two-dimensional code in a TEE environment according to claim 3, wherein the key hierarchy method includes digital certificates and digital envelopes.
5. A system for generating a two-dimensional code in a TEE environment is characterized by comprising:
the acquisition module is used for acquiring key information for generating the two-dimensional code by the TA in the TEE environment;
the operation module is used for operating the key information through a key factor in the TA to generate an authentication code;
the generation module is used for generating the two-dimensional code from the key information and the identification code and displaying the two-dimensional code through a TUI interface;
the acquisition module comprises:
the first launching module is used for launching an application request to the TA in the TEE environment through the APP of the client;
the second initiator module is used for initiating a TUI service request after the TA receives the application request;
and the receiving and storing sub-module is used for receiving and storing key information input by a user on the TUI interface by the TA.
6. The system for generating a two-dimensional code in a TEE environment of claim 5, wherein the acquisition module further comprises:
the establishing sub-module is used for establishing a secure channel between the server and the TEE;
the first sending submodule is used for initiating a request to a TA in a TEE environment through an APP of the client, and the TA initiates an application request to the server through the APP;
the second sending submodule is used for sending the key information to the TA in the TEE environment through the secure channel according to the application request by the server;
and the decryption storage sub-module is used for decrypting the key information in the TA and storing the decrypted key information.
7. The system for generating two-dimensional codes in TEE environment according to claim 6, wherein the establishing submodule is specifically configured to: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method.
8. The system for generating two-dimensional codes in a TEE environment of claim 7, wherein said key hierarchy method comprises digital certificates and digital envelopes.
CN201811229739.4A 2018-10-22 2018-10-22 Method and system for generating two-dimensional code in TEE environment Active CN109657764B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811229739.4A CN109657764B (en) 2018-10-22 2018-10-22 Method and system for generating two-dimensional code in TEE environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811229739.4A CN109657764B (en) 2018-10-22 2018-10-22 Method and system for generating two-dimensional code in TEE environment

Publications (2)

Publication Number Publication Date
CN109657764A CN109657764A (en) 2019-04-19
CN109657764B true CN109657764B (en) 2024-04-02

Family

ID=66110360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811229739.4A Active CN109657764B (en) 2018-10-22 2018-10-22 Method and system for generating two-dimensional code in TEE environment

Country Status (1)

Country Link
CN (1) CN109657764B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110677261B (en) * 2019-09-29 2023-05-12 四川虹微技术有限公司 Trusted two-dimensional code generation method and device, electronic equipment and storage medium
CN111522541B (en) * 2020-01-17 2023-08-01 中国银联股份有限公司 Graphical code generation method and device and computer readable storage medium
CN114036527B (en) * 2021-11-04 2023-01-31 云海链控股股份有限公司 Code injection method, code running end, code injection end and related equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229956A (en) * 2017-12-13 2018-06-29 北京握奇智能科技有限公司 Network bank business method, apparatus, system and mobile terminal
CN108256850A (en) * 2016-12-29 2018-07-06 陈新 Believable intelligent commercial service system
CN108616352A (en) * 2018-04-13 2018-10-02 北京握奇智能科技有限公司 Dynamic password formation method based on safety element and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256850A (en) * 2016-12-29 2018-07-06 陈新 Believable intelligent commercial service system
CN108229956A (en) * 2017-12-13 2018-06-29 北京握奇智能科技有限公司 Network bank business method, apparatus, system and mobile terminal
CN108616352A (en) * 2018-04-13 2018-10-02 北京握奇智能科技有限公司 Dynamic password formation method based on safety element and system

Also Published As

Publication number Publication date
CN109657764A (en) 2019-04-19

Similar Documents

Publication Publication Date Title
US20200372503A1 (en) Transaction messaging
US8499156B2 (en) Method for implementing encryption and transmission of information and system thereof
CN109657764B (en) Method and system for generating two-dimensional code in TEE environment
WO2020073715A1 (en) Two-dimensional code anti-counterfeiting method, device and system based on security application
KR20220117211A (en) Contactless Card Personal Identification System
CN102801710A (en) Networked transaction method and system
US20140289129A1 (en) Method for secure contactless communication of a smart card and a point of sale terminal
CN111222178B (en) Data signature method and device
CN101496044A (en) Method and system for implementing confirmation business by using movable unit mode
CN113298526B (en) Offline bill generation method and device
CN109272314B (en) Secure communication method and system based on two-party collaborative signature calculation
US20200014543A1 (en) Identity authentication
CN114501431A (en) Message transmission method and device, storage medium and electronic equipment
CN110401531B (en) Cooperative signature and decryption system based on SM9 algorithm
CN108055271B (en) Encryption and decryption method for electronic mail, storage medium and electronic equipment
CN114584355B (en) Security authentication method, device and system for digital currency transaction
CN102300176B (en) Method and system for enhancing security of email of mobile terminal system based on secure TransFlash (TF) card
CN113918904A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN112862488A (en) Data signature method and device, electronic equipment and computer readable storage medium
CN106535144A (en) Sending method for encrypted short message and terminal
CN111914308A (en) Method for mobile data signature by using CA certificate in intelligent card
CN114826616B (en) Data processing method, device, electronic equipment and medium
CN104123636A (en) Processing object processing method, system and equipment
CN110399714A (en) For verifying the method and its system of the trusted user interface authenticity of terminal
CN109474592B (en) Public key binding method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant