CN110119946B - Pairing authentication method for electronic transaction device - Google Patents

Pairing authentication method for electronic transaction device Download PDF

Info

Publication number
CN110119946B
CN110119946B CN201810113888.8A CN201810113888A CN110119946B CN 110119946 B CN110119946 B CN 110119946B CN 201810113888 A CN201810113888 A CN 201810113888A CN 110119946 B CN110119946 B CN 110119946B
Authority
CN
China
Prior art keywords
storage device
key
closed storage
electronic device
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810113888.8A
Other languages
Chinese (zh)
Other versions
CN110119946A (en
Inventor
庄佑邦
欧仕迈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Coolbitx Ltd
Original Assignee
Coolbitx Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Coolbitx Ltd filed Critical Coolbitx Ltd
Priority to CN201810113888.8A priority Critical patent/CN110119946B/en
Publication of CN110119946A publication Critical patent/CN110119946A/en
Application granted granted Critical
Publication of CN110119946B publication Critical patent/CN110119946B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/356Aspects of software for card payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a pairing authentication method of an electronic transaction device, which comprises the following steps: respectively installing application software on a first electronic device and a second electronic device to enable the two application software to respectively form a public key; the first electronic device is connected with the closed storage device, so that the first electronic device forms a verification key; storing one of the public key and the verification key in a security chip located in a closed storage device; the second electronic device is connected with the closed device and forms an authorization key which accords with the verification key, and the other public key and the authorization key are transmitted to the closed storage device; the closed storage device verifies that the authorization key is matched with the verification key, and stores the other public key in the security chip, so that only a card holder who knows the verification key can use the closed storage device, and the risk of stealing assets due to losing the closed storage device is avoided.

Description

Pairing authentication method of electronic transaction device
Technical Field
The present invention relates to a pairing authentication method for an electronic transaction device, and more particularly, to a pairing authentication method for an electronic transaction device, in which a verification key is formed after the electronic transaction device and a closed storage device are connected to each other, and only a cardholder who knows the verification key uses the closed storage device.
Background
With the advance of technology, many transaction and payment methods are replaced by Integrated Circuit (IC) cards, in which a memory is disposed to store information of a card holder, and the IC cards are widely used in various fields, such as money drawing cards, financial cards, credit cards, telephone cards, value cards, etc., which are common IC cards at present, and the commonly used IC cards can be roughly classified into contact type interfaces, non-contact type interfaces and composite type interfaces according to the methods of storing and reading data.
Taking a financial card with credit card and debit card functions as an example, before the financial card is used for transaction or service through an automatic teller machine, the automatic teller machine needs a card holder to input a preset password to obtain the right to use the financial card, so even if the financial card is lost or stolen, an unary card holder cannot steal cash through the automatic teller machine.
In addition, with the technology of wireless transmission changing day by day, a part of ICs adopt a wireless transmission technology of Radio frequency (RFID/Radio-frequency identification), and the wireless Radio frequency technology is most commonly applied to consumption transactions with small amounts, such as taking public transportation vehicles like buses and rapid transportation, and can be deducted by using a yo-yo card in a wireless sensing manner.
In addition, for speed and convenience, the IC card for the door access system can smoothly enter and exit the area with the door access control only by holding the correct IC card, so that when the IC for the door access system is lost or stolen, the non-owner picking up the IC card can directly enter and exit the area with the door access control through the picked-up IC card, thereby causing a potential safety hazard.
Disclosure of Invention
The main purpose of the present invention is that when the electronic device is connected to the closed storage device, a secret key known only by the original card holder is generated, and then the card holder who inputs the correct secret key can use the electronic device through the closed storage device, so that even if the closed storage device is lost and picked up by a non-original card holder, the non-original card holder can not use the electronic device because of not knowing the secret key, and further, the information stored in the closed storage device can be prevented from being stolen or properties are prevented from being lost.
To achieve the above object, the present invention relates to a pairing authentication method for an electronic transaction device, comprising the following steps: respectively installing an application software on a first electronic device and a second electronic device, wherein the first electronic device and the second electronic device respectively form a first public key and a second public key through the application software.
The first electronic device searches a closed storage device and carries out online on the closed storage device, detects a security chip located in the closed storage device, and confirms that the security chip is in an authorization state without a public key, so that the first electronic device generates a verification key.
In this embodiment, when the closed storage device receives the first public key and the check key, a microprocessor of the closed storage device first forms a request login information, and then an operation unit of the closed storage device generates an execution confirmation information transmitted to the microprocessor, so that the microprocessor generates an execution login information according to the request login information, and the first public key and the check key are stored in the security chip.
The second electronic device searches the closed storage device and connects the closed storage device, detects the security chip and confirms that the security chip is in the limited state, so that the second electronic device generates a request message for forming the checking key, acquires an authorization key according to the request message, and transmits the second public key and the authorization key to the closed storage device.
Finally, when the closed storage device verifies that the authorization key conforms to the verification key, the second public key stores the security chip, and at this time, when the security chip stores the second public key, the security chip generates identification information corresponding to the application software according to the second public key, and the closed storage device transmits the identification information to the second electronic device.
However, when the enclosed storage device verifies that the authorization key does not conform to the verification key, the security chip rejects to store the second public key, and one of the first electronic device and the second electronic device generates reset information transmitted to the enclosed storage device through the application software, so that the security chip is changed from the limited state to the authorization state according to the reset information.
The invention is characterized in that when the first electronic device is installed with application software and connected with the closed storage device, the first electronic device can form a public key and a check key to store a security chip of the closed storage device, so that the security chip is changed from an authorization state without storing the public key to a limit state with the public key, and when the second electronic device wants to use the closed storage device, the second electronic device must form an authorization key which is in accordance with the check key and store the second public key in the security chip to enable the second electronic device to use the closed storage device, therefore, even if the closed storage device is lost and picked up by a non-owner, the non-owner can not use the closed storage device because the check key is unknown, and further, the information stored in the closed storage device can be prevented from being stolen or causing property loss.
Drawings
FIG. 1 is a flowchart illustrating steps of a pairing authentication method according to the present invention;
FIG. 2 is a block diagram of a pairing authentication device;
FIG. 3 is a flowchart illustrating a process from a setup step to a first login step of the first electronic device;
FIG. 4 is a schematic diagram of the setup step of FIG. 1;
FIG. 5 is a schematic diagram of a first online step in FIG. 1;
FIG. 6 is a schematic diagram of a first login step in FIG. 1;
fig. 7 is a schematic flow chart illustrating a process from a second connection step to a second login step of the second electronic device;
FIG. 8 is a schematic illustration of a second coupling step of FIG. 1;
FIG. 9 is a diagram illustrating a second login step in FIG. 1;
FIG. 10 is a flowchart illustrating a reset procedure performed by the second electronic device;
FIG. 11 is a diagram illustrating a reset step in FIG. 1.
Description of reference numerals: 1-a pairing authentication method; 2-a pairing authentication device; 20-a first electronic device; 21-a second electronic device; 22-a closed storage device; 221-an operation unit; 222-a display; 223-a microprocessor; 224-a secure chip; 224 a-a processing unit; 23-the internet; 24-first application software; 25-a second application software; s1, establishing; s2, a first online step; s3, a first login step; s4, a second machine combining step; s5, a verification step; s6, a second login step; s7, resetting.
Detailed Description
The invention will be further described with reference to specific embodiments and drawings, the advantages and features of which will become apparent as the description proceeds.
Referring to fig. 1 and fig. 2, a pairing authentication method 1 of an electronic transaction device according to the present invention is used in conjunction with a pairing authentication device 2, the pairing authentication device 2 has a first electronic device 20, a second electronic device 21 and a closed storage device 22, wherein the first and second electronic devices 20 and 21 can be mobile phones, computers or tablet computers.
The external of the enclosed storage device 22 has an operation unit 221 and a display 222, both the operation unit 221 and the display 222 are electrically connected to a microprocessor 223 located inside the enclosed storage device 22, and the microprocessor 223 is electrically connected to a secure chip 224 located in the enclosed storage device 22, wherein the secure chip 224 has a processing unit 224a, at this time, the secure chip 224 does not store any public key and presents an authorized state, wherein the enclosed storage device 22 is an Integrated Circuit (IC) card.
Referring to fig. 1, 3 and 4, when the first electronic device 20, the second electronic device 21 and the enclosed storage device 22 are to be paired and authenticated, the first electronic device 20 and the second electronic device 21 are connected to the internet 23, so that the first electronic device 20 downloads and installs a first application software 24, and meanwhile, the second electronic device 21 downloads and installs a second application software 25 having a program identical to that of the first application software 24, wherein after the first electronic device 20 installs the first application software 24, the first electronic device 20 forms a first public key and a first secret key corresponding to the first public key through the first application software 24, the first public key is displayed on the display screen of the first electronic device 20, and correspondingly, after the second electronic device 21 installs the second application software 25, the second electronic device 21 forms a second public key different from the first public key and a second secret key different from the first secret key through the second application software 25, wherein the second public key corresponds to the second secret key, the second public key is displayed on the display screen of the second electronic device 21, and when the first and second electronic devices 20 and 21 respectively form the first and second public keys and the first and second secret keys, an establishing step S1 is completed.
Referring to fig. 1, 3 and 5, after the establishing step S1 is completed, a first connecting step S2 is performed, in which the first electronic device 20 searches the closed storage device 22 and transmits a first pairing request message to the closed storage device 22, and since the secure chip 224 is in the authorized state, the closed storage device 22 is directly connected to the first electronic device 20 according to the first pairing request message, at this time, the first electronic device 20 starts to detect the secure chip 224 of the closed storage device 22 because of being connected to the closed storage device 22, and can know that the secure chip 224 is in the authorized state, so that the first electronic device 20 checks a secret key.
Referring to fig. 1, 3 and 6, next, a first login step S3 is performed from the first connection step S2, the first electronic device 20 transmits the first public key and the check key to the enclosed storage device 22, when the enclosed storage device 22 receives the first public key and the check key, the microprocessor 223 of the enclosed storage device 22 forms a login request message with the first public key and the check key, and transmits the login request message to the display 222 of the enclosed storage device 22, so that the display 222 displays the first public key and the check key.
Then, the user using the first electronic device 20 views the display 222 of the enclosed storage device 22 and confirms that the first public key and the verification key are not wrong, presses the operation unit 221 of the enclosed storage device 22, so that the operation unit 221 generates an execution confirmation message, and transmits the execution confirmation message to the microprocessor 223, so that the microprocessor 223 forms an execution login message transmitted to the security chip 224 through the request login message, so that the first public key and the verification key are stored in the security chip 224, the security chip 224 is converted from the authorized state to a restricted state in which the public key is stored, at this time, the security chip 224 stores the first public key, and the security chip 224 generates first identification information corresponding to the first application software 24 according to the first public key, and the enclosed storage device 22 transmits the first identification information to the first electronic device 20.
Referring to fig. 1, 7 and 8, a second connection step S4 is performed, in which the second electronic device 21 searches the closed storage device 22 and transmits a second pairing request message to the closed storage device 22, so that the second electronic device 21 is connected to the closed storage device 22, at this time, the second electronic device 21 detects the security chip 224 and confirms that the security chip 224 is in the restricted state, and the security chip 224 forms a request message transmitted to the second electronic device 21 because the security chip 224 is in the restricted state, wherein the second electronic device 21 obtains an authorization key formed by user input according to the request message, and the second electronic device 21 transmits the second public key and the authorization key to the closed storage device 22.
Referring to fig. 1, 7 and 9, when the security chip 224 in the restricted state receives the second public key and the authorization key, a verification step S5 is performed, and when the microprocessor 223 of the closed storage device 22 verifies that the authorization key matches the verification key, the microprocessor 223 of the closed storage device 22 forms a pair verification message with the authorization key and the verification key, and transmits the pair verification message to the display 222 of the closed storage device 22, so that the display 222 displays the authorization key and the verification key.
Then, the user using the second electronic device 21 views the display 222 of the closed storage device 22 and confirms that there is no error between the authorization key and the verification key, then presses the operation unit 221 of the closed storage device 22, so that the operation unit 221 generates an authorization confirmation message transmitted to the microprocessor 223, so that the microprocessor 223 forms an authorization approval message transmitted to the security chip 224 through the pairing verification message, and the security chip 224 performs a second login step S6 when receiving the authorization approval message, and when performing the second login step S6, the second public key is stored in the security chip 224, so that the security chip 224 stores the first and second public keys, so that the first and second electronic devices 20 and 21 can use the closed storage device 22, at this time, the security chip 224 stores the second public key, and the security chip 224 generates a second identification message corresponding to the second application software 25 according to the second public key, and transmits the second identification message to the second electronic device 21 from the closed storage device 22.
Referring to fig. 1, 10 and 11, when the verification step S5 is performed, and the microprocessor 223 of the enclosed storage device 22 verifies that the authorization key does not conform to the check key, the security chip 224 rejects to store the second public key, i.e. a reset step S7 can be performed, since the second electronic device 21 cannot form the authorization key conforming to the check key, the second electronic device 21 cannot use the enclosed storage device 22, and then the second electronic device 21 generates reset information through the second application software 25, and transmits the reset information to the enclosed storage device 22, so that the microprocessor 223 of the enclosed storage device 22 forms a request reset information displayed on the display 222 according to the reset information, and a user using the second electronic device 21 views the display 222 and confirms that the security chip 224 is to be reset, and then presses the operation unit 221 of the enclosed storage device 22, so that the operation unit 221 generates a reset confirmation information transmitted to the microprocessor 223, so that the microprocessor 223 generates an execution reset information through the request reset information, and transmits the execution reset information to the security chip 224, and the security chip 224 is in a state limited by the security chip 224, and there is no authorization state 224.
In addition, if the user using the second electronic device 21 does not want to change the secure chip 224 to the authorized state, the user does not need to press the operation unit 221 of the enclosed storage device 22, so that the operation unit 221 does not form the execution reset information, and the secure chip 224 still assumes the restricted state, and the generation of the reset information by the second electronic device 21 via the second application software 25 is only for convenience of description, that is, the reset information can be formed by the first electronic device 20 via the first application software 24.
The foregoing description and examples are exemplary only, and are not intended to limit the scope of the invention in any way. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention, and that such changes and modifications may be made without departing from the spirit and scope of the invention.

Claims (7)

1. A pairing authentication method of an electronic transaction device is characterized by comprising the following steps:
respectively installing application software on a first electronic device and a second electronic device, wherein the first electronic device and the second electronic device respectively form a first public key and a second public key through the application software;
the first electronic device searches a closed storage device and carries out online on the closed storage device, detects a security chip positioned in the closed storage device and confirms that the security chip presents an authorization state without a public key, so that the first electronic device generates a check key;
the first electronic device transmits the first public key and the check key to the closed storage device, so that the first public key and the check key are stored in the security chip, and the security chip is converted from the authorization state to a limited state in which the public key is stored;
the second electronic device searches the closed storage device and connects the closed storage device, detects the security chip and confirms that the security chip is in the limited state, so that the second electronic device generates a request message for forming the checking key;
the second electronic device obtains an authorization key according to the request information and transmits the second public key and the authorization key to the closed storage device; and
when the closed storage device verifies that the authorization key conforms to the verification key, the second public key is stored in the security chip.
2. The pairing authentication method of an electronic transaction device according to claim 1, wherein: when the closed storage device receives the first public key and the check key, a microprocessor of the closed storage device firstly forms a request login message, then an operation unit of the closed storage device generates an execution confirmation message transmitted to the microprocessor, so that the microprocessor generates an execution login message according to the request login message, and the first public key and the check key are stored in the security chip.
3. The pairing authentication method of an electronic transaction device according to claim 1, wherein: before the closed storage device verifies the authorization key, a microprocessor positioned in the closed storage device generates pairing verification information, an operation unit arranged in the closed storage device generates authorization confirmation information transmitted to the microprocessor, so that the microprocessor generates authorization approval information according to the pairing verification information and verifies the authorization key and the verification key.
4. The pairing authentication method of an electronic transaction device according to claim 1, wherein: when the first public key or the second public key is stored in the security chip, the security chip generates identification information corresponding to the application software according to the first public key or the second public key, and the closed storage device transmits the identification information to the first electronic device or the second electronic device.
5. The pairing authentication method of an electronic transaction device according to claim 1, wherein: when the closed storage device verifies that the authorization key does not conform to the verification key, the security chip refuses to store the second public key.
6. The pairing authentication method of an electronic transaction device according to claim 1, wherein: one of the first electronic device and the second electronic device generates reset information transmitted to the closed storage device through the application software, so that the security chip is converted from the restricted state to the authorized state according to the reset information.
7. The pairing authentication method of an electronic transaction device according to claim 6, wherein: before the security chip is converted from the limit state to the authorization state, a microprocessor of the closed storage device forms a request reset message according to the reset message, and then an operation unit of the closed storage device generates a reset confirmation message transmitted to the microprocessor, so that the microprocessor generates an execution reset message according to the request reset message, and the security chip is converted into the authorization state.
CN201810113888.8A 2018-02-05 2018-02-05 Pairing authentication method for electronic transaction device Active CN110119946B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810113888.8A CN110119946B (en) 2018-02-05 2018-02-05 Pairing authentication method for electronic transaction device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810113888.8A CN110119946B (en) 2018-02-05 2018-02-05 Pairing authentication method for electronic transaction device

Publications (2)

Publication Number Publication Date
CN110119946A CN110119946A (en) 2019-08-13
CN110119946B true CN110119946B (en) 2022-12-13

Family

ID=67519820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810113888.8A Active CN110119946B (en) 2018-02-05 2018-02-05 Pairing authentication method for electronic transaction device

Country Status (1)

Country Link
CN (1) CN110119946B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005084846A (en) * 2003-09-08 2005-03-31 Akira Ichikawa Automatic individual identification of ic card
JP2007019824A (en) * 2005-07-07 2007-01-25 Nippon Telegr & Teleph Corp <Ntt> Token authentication method and system
CN101140605A (en) * 2007-10-24 2008-03-12 北京飞天诚信科技有限公司 Data safety reading method and safety storage apparatus thereof
CN101860525A (en) * 2009-09-25 2010-10-13 深圳市安捷信联科技有限公司 Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal
CN102081821A (en) * 2009-11-27 2011-06-01 中国银联股份有限公司 IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal
JP2011171946A (en) * 2010-02-17 2011-09-01 Toshiba Corp Portable electronic device, method for controlling portable electronic device, and ic card
CN102867366A (en) * 2012-09-19 2013-01-09 中国工商银行股份有限公司 Portable bank card data processing device, system and method
CN103258268A (en) * 2012-02-17 2013-08-21 网路乾坤有限公司 Identity authentication method of transaction system
CN103366277A (en) * 2012-03-26 2013-10-23 福特全球技术公司 Method and apparatus for identification verification and purchase validation
CN103971234A (en) * 2013-02-06 2014-08-06 徐嘉宏 Mobile payment assembly and system and method adopting same
CN104021473A (en) * 2014-05-30 2014-09-03 刘劲彤 Safe payment method of visual financial card
CN104102934A (en) * 2014-07-09 2014-10-15 中国工商银行股份有限公司 Portable IC card read-write device, system and method
CN105634730A (en) * 2015-12-29 2016-06-01 中国建设银行股份有限公司 Secret key management system of financial IC card
KR20170087678A (en) * 2016-01-21 2017-07-31 삼성전자주식회사 Security Chip, Application Processor, Device including security Chip and Operating Method thereof

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005084846A (en) * 2003-09-08 2005-03-31 Akira Ichikawa Automatic individual identification of ic card
JP2007019824A (en) * 2005-07-07 2007-01-25 Nippon Telegr & Teleph Corp <Ntt> Token authentication method and system
CN101140605A (en) * 2007-10-24 2008-03-12 北京飞天诚信科技有限公司 Data safety reading method and safety storage apparatus thereof
CN101860525A (en) * 2009-09-25 2010-10-13 深圳市安捷信联科技有限公司 Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal
CN102081821A (en) * 2009-11-27 2011-06-01 中国银联股份有限公司 IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal
JP2011171946A (en) * 2010-02-17 2011-09-01 Toshiba Corp Portable electronic device, method for controlling portable electronic device, and ic card
CN103258268A (en) * 2012-02-17 2013-08-21 网路乾坤有限公司 Identity authentication method of transaction system
CN103366277A (en) * 2012-03-26 2013-10-23 福特全球技术公司 Method and apparatus for identification verification and purchase validation
CN102867366A (en) * 2012-09-19 2013-01-09 中国工商银行股份有限公司 Portable bank card data processing device, system and method
CN103971234A (en) * 2013-02-06 2014-08-06 徐嘉宏 Mobile payment assembly and system and method adopting same
CN104021473A (en) * 2014-05-30 2014-09-03 刘劲彤 Safe payment method of visual financial card
CN104102934A (en) * 2014-07-09 2014-10-15 中国工商银行股份有限公司 Portable IC card read-write device, system and method
CN105634730A (en) * 2015-12-29 2016-06-01 中国建设银行股份有限公司 Secret key management system of financial IC card
KR20170087678A (en) * 2016-01-21 2017-07-31 삼성전자주식회사 Security Chip, Application Processor, Device including security Chip and Operating Method thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种基于安全芯片的可信移动存储设备的双向认证机制;王冠等;《计算机与应用化学》;20130528(第05期);全文 *
无中心化离线认证技术的应用与实践;彭桂林等;《智能建筑与智慧城市》;20170925(第09期);全文 *

Also Published As

Publication number Publication date
CN110119946A (en) 2019-08-13

Similar Documents

Publication Publication Date Title
US10275758B2 (en) System for secure payment over a wireless communication network
US10706136B2 (en) Authentication-activated augmented reality display device
EP2997531B1 (en) Methods and systems for provisioning payment credentials
CN106506496A (en) A kind of methods, devices and systems that withdraws the money without card
KR20180086436A (en) Method, device, server, and system for authenticating a user
US11315122B2 (en) Authentication method for e-wallet carrier
US10555173B2 (en) Pairing authentication method for electronic transaction device
KR20100061628A (en) Auto teller machine
TWI646481B (en) Pairing authentication method for electronic transaction device
CN110119946B (en) Pairing authentication method for electronic transaction device
US20220327518A1 (en) Multi-Purpose Physical Smartcard
EP3095081A1 (en) Authentication method and system
TWI695614B (en) Method for digital currency transaction with authorization of multiple private key
JP6559831B1 (en) Pairing authentication method for electronic transaction equipment
KR102046708B1 (en) Pairing authentication method for electronic transaction device
KR102268468B1 (en) Method for Providing Transaction Between Device by using NFC Tagging
CN113383527B (en) Method for authenticating terminal user on trusted device
CN111695896A (en) Digital currency transaction method authorized by multiple keys

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40008684

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant