CN109657764B - Method and system for generating two-dimensional code in TEE environment - Google Patents
Method and system for generating two-dimensional code in TEE environment Download PDFInfo
- Publication number
- CN109657764B CN109657764B CN201811229739.4A CN201811229739A CN109657764B CN 109657764 B CN109657764 B CN 109657764B CN 201811229739 A CN201811229739 A CN 201811229739A CN 109657764 B CN109657764 B CN 109657764B
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- key information
- generating
- tee
- tee environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 230000000977 initiatory effect Effects 0.000 claims description 18
- 239000003999 initiator Substances 0.000 claims description 3
- 230000008569 process Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 244000141359 Malus pumila Species 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 235000021016 apples Nutrition 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 235000013305 food Nutrition 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Abstract
The invention discloses a method and a system for generating a two-dimensional code in a TEE environment, wherein the method comprises the following steps: s1, acquiring key information for generating a two-dimensional code by a TA in a TEE environment; s2, calculating key information through key factors in the TA to generate an identification code; and S3, generating the two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface. According to the method and the system provided by the invention, the key factors are prefabricated in the TEE environment, the key factors are used for operating the key information in the TEE environment, the operation result is used as the identification code of the information, the key information and the identification code are used for generating the two-dimensional code, the authenticity of the identification information can be identified through the identification code when the two-dimensional code is scanned, the key information in the two-dimensional code is prevented from being tampered, and compared with the traditional two-dimensional code generation mode, the security is enhanced, and the risk of information attack can be obviously reduced.
Description
Technical Field
The invention relates to the field of information security, in particular to a method and a system for generating a two-dimensional code in a TEE environment.
Background
The two-dimensional code is a bar code which records data symbol information by using a black-white smelling graph which is distributed on a plane (two-dimensional direction) according to a certain rule by using a certain specific geometric graph. The method has the advantages of large information capacity, high reliability, flexible coding mode, strong confidentiality and anti-counterfeiting performance and the like.
The two-dimensional code is an information carrier, is also an important method and means for information acquisition and transmission, and can play a role in improving efficiency in various fields. Along with popularization of intelligent terminals and rapid popularization of mobile networks, two-dimensional codes become a window of future data age. The two-dimensional code technology is widely used in the fields of mobile electronic commerce, text quick entry, food safety management and the like.
Two-dimensional code is the carrier of information, among the prior art, according to the difference of information source, the mode of generating two-dimensional code includes following several kinds:
(1) The information factors for generating the two-dimension codes are stored in the APP of REE, and the APP end generates the two-dimension codes and displays the two-dimension codes through a UI interface.
(2) The information factors for generating the two-dimension codes are obtained from the server, and the APP terminal generates the two-dimension codes and displays the two-dimension codes through the UI interface.
(3) The APP provides information factors for the UI to collect input by the user, the APP end generates a two-dimensional code to be displayed through the UI interface, and the two-dimensional code contains information input by the user.
However, in the prior art, the two-dimensional code is displayed in the REE, and compared with the TEE environment, the data in the REE environment is unsafe, so that the information input by a user and the presented two-dimensional code are intercepted and tampered.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a method and a system for generating a two-dimensional code in a TEE environment, which are enhanced in safety compared with the traditional two-dimensional code generation mode, realize the application of the two-dimensional code in the TEE environment and can obviously reduce the risk of information attack.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
a method for generating a two-dimensional code in a TEE environment comprises the following steps:
s1, acquiring key information for generating a two-dimensional code by a TA in a TEE environment;
s2, calculating the key information through a key factor in the TA to generate an authentication code;
and S3, generating the two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface.
Further, as described above, in the method for generating a two-dimensional code in a TEE environment, step S1 includes:
a1, initiating an application request to a TA in a TEE environment through an APP of a client;
a2, after receiving the application request, the TA initiates a TUI service request;
a3, the TA receives and stores key information input by the user on the TUI interface.
Further, as described above, in the method for generating a two-dimensional code in a TEE environment, step S1 includes:
b1, establishing a secure channel between a server and a TEE;
b2, initiating a request to a TA in a TEE environment through an APP of the client, and initiating an application request to the server through the APP by the TA;
b3, the server sends the key information to the TA in the TEE environment through the secure channel according to the application request;
and B4, decrypting the key information in the TA, and storing the decrypted key information.
Further, as described above, in the method for generating a two-dimensional code in a TEE environment, step B1 specifically includes: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method.
Further, the method for generating the two-dimensional code in the TEE environment comprises a digital certificate and a digital envelope.
The embodiment of the invention also provides a system for generating the two-dimensional code in the TEE environment, which comprises the following steps:
the acquisition module is used for acquiring key information for generating the two-dimensional code by the TA in the TEE environment;
the operation module is used for operating the key information through a key factor in the TA to generate an authentication code;
and the generation module is used for generating the two-dimensional code from the key information and the identification code and displaying the two-dimensional code through a TUI interface.
Further, as described above, in the system for generating a two-dimensional code in a TEE environment, the acquisition module includes:
the first launching module is used for launching an application request to the TA in the TEE environment through the APP of the client;
the second initiator module is used for initiating a TUI service request after the TA receives the application request;
and the receiving and storing sub-module is used for receiving and storing key information input by a user on the TUI interface by the TA.
Further, as described above, in the system for generating a two-dimensional code in a TEE environment, the acquisition module further includes:
the establishing sub-module is used for establishing a secure channel between the server and the TEE;
the first sending submodule is used for initiating a request to a TA in a TEE environment through an APP of the client, and the TA initiates an application request to the server through the APP;
the second sending submodule is used for sending the key information to the TA in the TEE environment through the secure channel according to the application request by the server;
and the decryption storage sub-module is used for decrypting the key information in the TA and storing the decrypted key information.
Further, as described above, in the system for generating a two-dimensional code in a TEE environment, the creation submodule is specifically configured to: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method.
Further, the system for generating the two-dimensional code in the TEE environment comprises the digital certificate and the digital envelope.
The invention has the beneficial effects that: according to the method and the system provided by the invention, the key factors are prefabricated in the TEE environment, the key factors are used for operating the key information in the TEE environment, the operation result is used as the identification code of the information, the key information and the identification code are used for generating the two-dimensional code, the authenticity of the identification information can be identified through the identification code when the two-dimensional code is scanned, the key information in the two-dimensional code is prevented from being tampered, and compared with the traditional two-dimensional code generation mode, the security is enhanced, and the risk of information attack can be obviously reduced.
Drawings
Fig. 1 is a flow chart of a method for generating a two-dimensional code in a TEE environment according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a system for generating two-dimensional codes in a TEE environment according to an embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and the detailed description.
As shown in fig. 1, a method for generating a two-dimensional code in a TEE environment includes:
s1, acquiring key information for generating a two-dimensional code by a TA in a TEE environment;
s2, calculating key information through key factors in the TA to generate an identification code;
and S3, generating the two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface.
The step S1 comprises the following steps:
a1, initiating an application request to a TA in a TEE environment through an APP of a client;
a2, after receiving the application request, the TA initiates a TUI service request;
a3, the TA receives and stores key information input by the user on the TUI interface.
The step S1 comprises the following steps:
b1, establishing a secure channel between a server and a TEE;
b2, initiating a request to a TA in the TEE environment through an APP of the client, and initiating an application request to a server through the APP by the TA;
b3, the server sends the key information to the TA in the TEE environment through the secure channel according to the application request;
and B4, decrypting the key information in the TA, and storing the decrypted key information.
The step B1 specifically comprises the following steps: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method. The key hierarchy method includes digital certificates and digital envelopes.
Example 1
S101, initiating an application request to a TA in a TEE environment through an APP of a client;
s102, after receiving an application request, the TA initiates a TUI service request;
s103, the TA receives and stores key information input by a user on a TUI interface;
s104, calculating key information through key factors in the TA to generate an identification code;
s105, generating the two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface.
In this embodiment, a key factor is prefabricated in a TEE environment, an APP initiates a request, the key factor operates key information input by a user in the TEE environment, the operation result is used as an identification code of the key information, the generated two-dimensional code has sensitive information (i.e., the key information) and is additionally provided with an identification code of information, and the authenticity of the information can be identified through the identification code when the two-dimensional code is scanned, so that the key information in the two-dimensional code is prevented from being tampered.
A TEE (trusted execution environment ) is a secure area that exists within a mobile terminal device separate from a rich execution environment. It is separated from the rich execution environment and the applications above the rich execution environment, ensuring that various sensitive data is stored, processed and protected in a trusted environment, while the trusted execution environment provides a secure execution environment for trusted applications loaded therein.
The TA is an application running within the TEE that accesses the TEE controlled hardware resources by calling the API provided by the TEE. The TA may use the secure application within the SE by calling the SE API to invoke the TUI API to perform trusted interactions with the user.
The TUI (trusted user interface ) is a TEE-controlled TA application that provides a user information display, isolated from the REEs.
Example two
S201, establishing a secure channel between a server and a TEE through a GP protocol, a key system method or a white box encryption method;
s202, initiating a request to a TA in a TEE environment through an APP of a client, and initiating an application request to a server through the APP by the TA;
s203, the server sends key information in the application request to the TA in the TEE environment through the secure channel;
s204, decrypting the key information in the TA, and storing the decrypted key information;
s205, calculating key information through key factors in the TA to generate an identification code;
s206, generating the two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface.
In this embodiment, a secure channel is established between the server and the TA, the APP plays a role in data transparent transmission between the server and the TA, key information sent by the server is decrypted in the TA, key factors in the TA operate the key information to generate an authentication code, the key information and the authentication code are generated into a two-dimensional code, and the two-dimensional code is presented through the TUI.
There are several methods for establishing a secure channel between the server and the TEE: through GP protocol, key system method (such as digital certificate, digital envelope, etc.), white box encryption mode with higher security level, etc.
Example III
Taking the mobile terminal two-dimension code collection service as an example, the prior art and the invention are compared and explained:
a. business logic for realizing two-dimension code collection by adopting the prior art:
1. the user inputs information such as the collection amount, collection account number and the like in the REE environment;
2, APP generates a two-dimensional code;
3. the payer scans the two-dimension code for payment.
Sensitive information (account number, amount and the like) in the process is cached in a memory in a plaintext or ciphertext mode, the risk of interception and tampering by a person exists, and the risk of interception and tampering also exists at the APP end in the process of presenting the two-dimensional code.
b. Business logic for realizing two-dimension code collection by adopting the first embodiment of the invention:
1. the user initiates a collection request through the APP;
the TA receives the request, initiates a TUI service request, and allows the user to input information such as a collection account number, an amount and the like;
the key factor in TA operates the information input by the user to generate an identification code, the information and the identification code are generated into a two-dimensional code, and the two-dimensional code is presented through TUI;
4. the payer scans the two-dimensional code and verifies the authenticity of the information through the identification code at the same time, so as to pay.
In the APP operation process, user information input and two-dimensional code presentation are completed through the TUI in the TEE environment, and an identification code of the information is added in the two-dimensional code, so that risks of interception and tampering of the information by people are reduced. In the environment where REE and TEE coexist, the key factors and the sensitive information are arranged in the safe TEE environment and isolated from CA data, so that the sensitive information is prevented from being attacked or tampered.
The REEs (rich execution environments, rich execution environment) are environments managed and controlled by rich operating systems, and correspond to TEE, and the rich execution environments and applications running therein have unsafe and unreliable characteristics, such as android, apples and other operating systems.
CA (Client Application) is a generic application running within the TEE that can request TA security services running within the TEE by calling the Client API provided by the TEE.
As shown in fig. 2, the embodiment of the present invention further provides a system for generating a two-dimensional code in a TEE environment, including:
the acquisition module 1 is used for acquiring key information for generating the two-dimensional code by the TA in the TEE environment;
the operation module 2 is used for operating the key information through the key factors in the TA to generate an identification code;
and the generation module 3 is used for generating the two-dimensional code from the key information and the identification code and displaying the two-dimensional code through the TUI interface.
The acquisition module 1 includes:
the first launching module is used for launching an application request to the TA in the TEE environment through the APP of the client;
the second initiator module is used for initiating a TUI service request after the TA receives the application request;
and the receiving and storing sub-module is used for receiving and storing key information input by a user on the TUI interface by the TA.
The acquisition module further includes:
the establishing sub-module is used for establishing a secure channel between the server and the TEE;
the first sending submodule is used for initiating a request to a TA in the TEE environment through an APP of the client, and the TA initiates an application request to a server through the APP;
the second sending submodule is used for sending the key information to the TA in the TEE environment through the secure channel according to the application request by the server;
and the decryption storage sub-module is used for decrypting the key information in the TA and storing the decrypted key information.
The building sub-module is specifically configured to: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method. The key hierarchy method includes digital certificates and digital envelopes.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
Claims (8)
1. The method for generating the two-dimensional code in the TEE environment is characterized by comprising the following steps of:
s1, acquiring key information for generating a two-dimensional code by a TA in a TEE environment;
s2, calculating the key information through a key factor in the TA to generate an authentication code;
s3, generating a two-dimensional code from the key information and the identification code, and displaying the two-dimensional code through a TUI interface;
the step S1 comprises the following steps:
a1, initiating an application request to a TA in a TEE environment through an APP of a client;
a2, after receiving the application request, the TA initiates a TUI service request;
a3, the TA receives and stores key information input by the user on the TUI interface.
2. The method for generating a two-dimensional code in a TEE environment according to claim 1, wherein step S1 includes:
b1, establishing a secure channel between a server and a TEE;
b2, initiating a request to a TA in a TEE environment through an APP of the client, and initiating an application request to the server through the APP by the TA;
b3, the server sends the key information to the TA in the TEE environment through the secure channel according to the application request;
and B4, decrypting the key information in the TA, and storing the decrypted key information.
3. The method for generating the two-dimensional code in the TEE environment according to claim 2, wherein the step B1 specifically includes: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method.
4. A method for generating a two-dimensional code in a TEE environment according to claim 3, wherein the key hierarchy method includes digital certificates and digital envelopes.
5. A system for generating a two-dimensional code in a TEE environment is characterized by comprising:
the acquisition module is used for acquiring key information for generating the two-dimensional code by the TA in the TEE environment;
the operation module is used for operating the key information through a key factor in the TA to generate an authentication code;
the generation module is used for generating the two-dimensional code from the key information and the identification code and displaying the two-dimensional code through a TUI interface;
the acquisition module comprises:
the first launching module is used for launching an application request to the TA in the TEE environment through the APP of the client;
the second initiator module is used for initiating a TUI service request after the TA receives the application request;
and the receiving and storing sub-module is used for receiving and storing key information input by a user on the TUI interface by the TA.
6. The system for generating a two-dimensional code in a TEE environment of claim 5, wherein the acquisition module further comprises:
the establishing sub-module is used for establishing a secure channel between the server and the TEE;
the first sending submodule is used for initiating a request to a TA in a TEE environment through an APP of the client, and the TA initiates an application request to the server through the APP;
the second sending submodule is used for sending the key information to the TA in the TEE environment through the secure channel according to the application request by the server;
and the decryption storage sub-module is used for decrypting the key information in the TA and storing the decrypted key information.
7. The system for generating two-dimensional codes in TEE environment according to claim 6, wherein the establishing submodule is specifically configured to: and establishing a secure channel between the server and the TEE through a GP protocol, a key hierarchy method or a white-box encryption method.
8. The system for generating two-dimensional codes in a TEE environment of claim 7, wherein said key hierarchy method comprises digital certificates and digital envelopes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811229739.4A CN109657764B (en) | 2018-10-22 | 2018-10-22 | Method and system for generating two-dimensional code in TEE environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811229739.4A CN109657764B (en) | 2018-10-22 | 2018-10-22 | Method and system for generating two-dimensional code in TEE environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109657764A CN109657764A (en) | 2019-04-19 |
CN109657764B true CN109657764B (en) | 2024-04-02 |
Family
ID=66110360
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811229739.4A Active CN109657764B (en) | 2018-10-22 | 2018-10-22 | Method and system for generating two-dimensional code in TEE environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109657764B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110677261B (en) * | 2019-09-29 | 2023-05-12 | 四川虹微技术有限公司 | Trusted two-dimensional code generation method and device, electronic equipment and storage medium |
CN111522541B (en) * | 2020-01-17 | 2023-08-01 | 中国银联股份有限公司 | Graphical code generation method and device and computer readable storage medium |
CN114036527B (en) * | 2021-11-04 | 2023-01-31 | 云海链控股股份有限公司 | Code injection method, code running end, code injection end and related equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108229956A (en) * | 2017-12-13 | 2018-06-29 | 北京握奇智能科技有限公司 | Network bank business method, apparatus, system and mobile terminal |
CN108256850A (en) * | 2016-12-29 | 2018-07-06 | 陈新 | Believable intelligent commercial service system |
CN108616352A (en) * | 2018-04-13 | 2018-10-02 | 北京握奇智能科技有限公司 | Dynamic password formation method based on safety element and system |
-
2018
- 2018-10-22 CN CN201811229739.4A patent/CN109657764B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108256850A (en) * | 2016-12-29 | 2018-07-06 | 陈新 | Believable intelligent commercial service system |
CN108229956A (en) * | 2017-12-13 | 2018-06-29 | 北京握奇智能科技有限公司 | Network bank business method, apparatus, system and mobile terminal |
CN108616352A (en) * | 2018-04-13 | 2018-10-02 | 北京握奇智能科技有限公司 | Dynamic password formation method based on safety element and system |
Also Published As
Publication number | Publication date |
---|---|
CN109657764A (en) | 2019-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200372503A1 (en) | Transaction messaging | |
US8499156B2 (en) | Method for implementing encryption and transmission of information and system thereof | |
CN109657764B (en) | Method and system for generating two-dimensional code in TEE environment | |
WO2020073715A1 (en) | Two-dimensional code anti-counterfeiting method, device and system based on security application | |
KR20220117211A (en) | Contactless Card Personal Identification System | |
CN102801710A (en) | Networked transaction method and system | |
US20140289129A1 (en) | Method for secure contactless communication of a smart card and a point of sale terminal | |
CN111222178B (en) | Data signature method and device | |
CN101496044A (en) | Method and system for implementing confirmation business by using movable unit mode | |
CN113298526B (en) | Offline bill generation method and device | |
CN109272314B (en) | Secure communication method and system based on two-party collaborative signature calculation | |
US20200014543A1 (en) | Identity authentication | |
CN114501431A (en) | Message transmission method and device, storage medium and electronic equipment | |
CN110401531B (en) | Cooperative signature and decryption system based on SM9 algorithm | |
CN108055271B (en) | Encryption and decryption method for electronic mail, storage medium and electronic equipment | |
CN114584355B (en) | Security authentication method, device and system for digital currency transaction | |
CN102300176B (en) | Method and system for enhancing security of email of mobile terminal system based on secure TransFlash (TF) card | |
CN113918904A (en) | Data processing method and device, electronic equipment and computer readable storage medium | |
CN112862488A (en) | Data signature method and device, electronic equipment and computer readable storage medium | |
CN106535144A (en) | Sending method for encrypted short message and terminal | |
CN111914308A (en) | Method for mobile data signature by using CA certificate in intelligent card | |
CN114826616B (en) | Data processing method, device, electronic equipment and medium | |
CN104123636A (en) | Processing object processing method, system and equipment | |
CN110399714A (en) | For verifying the method and its system of the trusted user interface authenticity of terminal | |
CN109474592B (en) | Public key binding method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |