CN111710110A - Two-dimensional code safety payment equipment - Google Patents
Two-dimensional code safety payment equipment Download PDFInfo
- Publication number
- CN111710110A CN111710110A CN202010509529.1A CN202010509529A CN111710110A CN 111710110 A CN111710110 A CN 111710110A CN 202010509529 A CN202010509529 A CN 202010509529A CN 111710110 A CN111710110 A CN 111710110A
- Authority
- CN
- China
- Prior art keywords
- characteristic information
- comparison
- comparison characteristic
- chip
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/0036—Checkout procedures
- G07G1/0045—Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Abstract
The invention relates to two-dimensional code safety payment equipment which comprises a processor group, a comparison characteristic information acquisition device and input and output equipment, wherein the processor group mainly comprises a main CPU and an SE chip, the main CPU is used for providing basic functions of the equipment including driving and communication, and the SE chip is used for storing sensitive information and carrying out sensitive calculation; the comparison characteristic information acquisition device is used for acquiring comparison characteristic information; the input and output equipment is used for information interaction with a user; when a user initiates a payment transaction request to the equipment, the user inputs comparison characteristic information through the comparison characteristic information acquisition device, then the comparison characteristic information is compared with preset comparison characteristic information in the SE chip, if the comparison is passed, sensitive information stored in the SE chip is allowed to be used and sensitive calculation is carried out, and if the comparison is not passed, the request is rejected. The device is beneficial to improving the safety of payment.
Description
Technical Field
The invention belongs to the technical field of payment, and particularly relates to two-dimensional code safe payment equipment.
Background
The two-dimensional code is the most popular payment equipment at present, but the two-dimensional code payment equipment that most individuals adopted at present is the smart mobile phone, and its main shortcoming is: 1) the smart phone is expensive, and the normal price of one mobile phone is hundreds of thousands of yuan larger; 2) the payment steps are more by using the smart phone, and the smart phone is difficult to master for partial crowds such as children and the old; 3) the smart phone uses a general-purpose intelligent operating system, such as android or IOS, which generally has known vulnerabilities that may be hacked to cause money to be hacked; 5) most smart phones do not have a dedicated SE chip, and the security is lower than that of the dedicated SE chip.
Disclosure of Invention
The invention aims to provide two-dimensional code safety payment equipment which is beneficial to improving the safety of payment.
In order to achieve the purpose, the invention adopts the technical scheme that: a two-dimensional code safety payment device comprises a processor group, a comparison characteristic information acquisition device and an input/output device, wherein the processor group mainly comprises a main CPU and an SE chip, the main CPU is used for providing basic functions of devices including driving and communication, and the SE chip is used for storing sensitive information and carrying out sensitive calculation; the comparison characteristic information acquisition device is used for acquiring comparison characteristic information; the input and output equipment is used for information interaction and comprises a camera module for scanning the two-dimensional code and a display module for displaying the two-dimensional code; when a user initiates a payment transaction request to the equipment, the user inputs comparison characteristic information through the comparison characteristic information acquisition device, then the comparison characteristic information is compared with preset comparison characteristic information in the SE chip, if the comparison is passed, sensitive information stored in the SE chip is allowed to be used and sensitive calculation is carried out, and if the comparison is not passed, the request is rejected.
Further, the sensitive information includes key, PIN, PAN, Token information and comparison feature information, and when the sensitive information is used, the sensitive information can be used by a comparison verifier; the sensitive calculation comprises the operation of using sensitive information, encryption and decryption of a secret key, signature and verification, calculation and verification of an MAC value, comparison of characteristic information and calculation of two-dimensional code display content.
Furthermore, the equipment adopts an embedded operating system or no operating system; if an embedded operating system is adopted, the embedded operating system is a closed operating system.
Further, the main CPU and the SE chip adopt a secure starting mechanism, and downloaded firmware and application programs can be downloaded into the equipment after being legally signed by equipment manufacturers so as to ensure the safety of the equipment.
Further, the comparison characteristic information is a password or biometric information, the biometric information is a fingerprint, a human face or an iris, the comparison characteristic information acquisition device is a numeric keypad, a password keypad or a biometric information acquisition device, and the biometric information acquisition device is a fingerprint module, a human face recognition module or an iris acquisition module.
Furthermore, the comparison characteristic information acquisition device is connected with the SE chip, and the SE chip directly acquires comparison characteristic information so as to improve the safety.
Furthermore, a safe operation time threshold is arranged in the SE chip, and the sensitive calculation time of the SE chip is not more than the safe operation time threshold in unit time so as to prevent the SE chip from being cracked by brute force exhaustion.
Further, the device pre-installs a device private key and a certificate as follows:
A1) the equipment uploads equipment information to an equipment authentication background;
A2) the device generates a public and private key pair;
A3) the device sends a public key and device related information to a device authentication background;
A4) the device authentication background signs the public key into a certificate and issues the certificate to the device.
Further, the equipment presets or modifies preset comparison characteristic information according to the following method:
B1) a user sends a request for preassembling the comparison characteristic information to the equipment through the input and output equipment;
B2) the equipment judges whether the comparison characteristic information is pre-installed, if so, the step B3 is carried out, otherwise, the step B4 is carried out;
B3) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step B4 is switched, if the verification is not passed, the request is rejected, and exit is finished;
B4) and the user inputs legal and effective comparison characteristic information through the comparison characteristic information acquisition device and stores the legal and effective comparison characteristic information in the SE chip to finish the preassembly or modification of the comparison characteristic information.
Further, the device performs sensitive calculations as follows:
C1) a user sends a sensitive calculation request to equipment through input and output equipment;
C2) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step C3 is switched, if the verification is not passed, the request is rejected, and exit is finished;
C3) and the SE chip performs sensitive calculation, feeds back the result to the user, and finishes quitting after success.
Compared with the prior art, the invention has the following beneficial effects: the two-dimensional code safety payment equipment is provided, sensitive information is stored and sensitive calculation is carried out through setting an independent SE chip, and then comparison characteristic information is acquired through a comparison characteristic information acquisition device so as to carry out user identity comparison and verification, so that the payment safety is improved. In addition, this equipment structure is simple, and the cost is low, and is exclusively used in the safe payment based on the two-dimensional code, and is simple to use convenient. Therefore, the invention has strong practicability and wide application prospect.
Drawings
Fig. 1 is a block diagram of an apparatus configuration of an embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the figures and the embodiments.
The invention provides two-dimensional code safety payment equipment, which comprises a processor group, a comparison characteristic information acquisition device and input and output equipment as shown in figure 1.
The processor group mainly comprises a main CPU and an SE chip, wherein the main CPU is used for providing basic functions of driving, communication and other equipment, and the SE chip is used for storing sensitive information and carrying out sensitive calculation. The sensitive information includes but is not limited to information such as a key, a PIN, a PAN, a Token, comparison characteristic information and the like, and when the sensitive information is used, the sensitive information needs to be used by an authorized party, and the authorization mode includes a fingerprint, a PIN and the like. The sensitive calculation comprises operations of access, deletion, modification and the like of using sensitive information, encryption/decryption of a secret key, signature and signature verification, calculation/verification of an MAC value, comparison of comparison characteristic information, calculation of two-dimensional code display content and the like.
The comparison characteristic information acquisition device is used for acquiring comparison characteristic information so as to carry out user identity authentication when a user requests to operate the SE chip.
The input and output equipment is used for information interaction. The input and output equipment comprises a camera module for scanning the two-dimensional code, a display module for displaying the two-dimensional code and other necessary equipment.
When a user initiates a payment transaction request to the equipment, the user inputs comparison characteristic information through the comparison characteristic information acquisition device, then the comparison characteristic information is compared with preset comparison characteristic information in the SE chip, if the comparison is passed, sensitive information stored in the SE chip is allowed to be used and sensitive calculation is carried out, and if the comparison is not passed, the request is rejected.
The invention ensures that the storage of the sensitive information is safe and reliable by using the SE chip, and an attacker is difficult to directly acquire the sensitive data by reading or exporting the data on the memory (FLASH). Meanwhile, sensitive calculation is realized in the SE chip, so that the difficulty of acquiring sensitive information by an attacker in a physical attack mode can be further increased.
The equipment of the invention adopts an embedded operating system or a non-operating system, such as a kernel, free RTOS, thread x and the like. The embedded operating system or the non-operating system can reduce the requirement on the performance of the CPU, which is beneficial to reducing the cost, and meanwhile, as the operating system is a non-intelligent operating system, a hacker can hardly find a leak, thereby improving the safety of the equipment. If the embedded operating system is adopted, the embedded operating system is a closed operating system, other application programs signed by a third party are not allowed to be installed except the application programs authorized by a device manufacturer, and the safety of the device is enhanced by closing or controlling the installation application program channel. Preferably, the main CPU and the SE chip employ a Secure Boot mechanism (Secure Boot), and the downloaded firmware and application program need to be downloadable into the device after being legally signed by the device manufacturer, so as to ensure the security of the device.
The invention can also be provided with special payment related keys comprising 0-9 number keys, display and code scanning keys, so that the payment process is simple and easy to use.
In this embodiment, the comparison characteristic information is a password or biometric information, the biometric information is a fingerprint, a human face or an iris, the comparison characteristic information acquisition device is a numeric keypad, a password keypad or a biometric information acquisition device, and the biometric information acquisition device is a fingerprint module, a human face recognition module or an iris acquisition module.
Preferably, the comparison characteristic information acquisition device is connected with the SE chip, and the SE chip directly acquires comparison characteristic information to improve safety.
In order to prevent the SE chip from being cracked by brute force exhaustion, a safe operation time threshold is arranged in the SE chip, and the sensitive calculation time of the SE chip is not more than the safe operation time threshold in unit time.
The following describes a working method of the two-dimensional code secure payment device of the present invention.
The device of the invention pre-installs the private key and the certificate of the device according to the following method: :
A1) the equipment uploads equipment information to an equipment authentication background;
A2) the device generates a public and private key pair;
A3) the device sends a public key and device related information to a device authentication background;
A4) the device authentication background generates a certificate for the public key signature and issues the certificate to the device.
The equipment of the invention presets or modifies the preset comparison characteristic information according to the following method:
B1) a user sends a request for preassembling the comparison characteristic information to the equipment through the input and output equipment;
B2) the equipment judges whether the comparison characteristic information is pre-installed, if so, the step B3 is carried out, otherwise, the step B4 is carried out;
B3) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step B4 is switched, if the verification is not passed, the request is rejected, and exit is finished;
B4) and the user inputs legal and effective comparison characteristic information through the comparison characteristic information acquisition device and stores the legal and effective comparison characteristic information in the SE chip to finish the preassembly or modification of the comparison characteristic information.
The equipment carries out sensitive calculation according to the following method:
C1) a user sends a sensitive calculation request to equipment through input and output equipment;
C2) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step C3 is switched, if the verification is not passed, the request is rejected, and exit is finished;
C3) and the SE chip performs sensitive calculation, feeds back the result to the user, and finishes quitting after success.
The following are several specific examples of user use of sensitive information stored in the SE chip.
Using the password scenario:
prompting a user to input a personal password on the AP, sending a command to the SE end by the AP, and requesting the SE end to start a user password input processing flow.
And 2, after receiving the request command of the AP, the SE end starts to enter the password input processing of the user.
3. The user starts entering the password and confirms completion.
And 4, comparing the identity authentication password stored in the SE terminal by the SE terminal, if the identity authentication password passes the verification, allowing subsequent sensitive data operation, and returning the result to the AP.
And 5, after receiving the result, the AP performs corresponding processing according to the result, prompts the user and quits if the result fails, and continues to execute the next step if the result succeeds.
AP requests to manipulate sensitive data stored in SE, see details: the request sends the original data to the SE using a data operation request process (e.g., requesting the SE to encrypt a string of data with a key).
And 7, after the SE receives the data, processing according to the result state in the step 4, if the verification in the step 4 is passed, responding to the AP request operation, otherwise, rejecting the request, and returning the result to the AP.
And 8, the AP receives the response and performs the next operation according to the result, if the response fails, the AP prompts the user and pushes out the response, and if the response succeeds, the AP continues to execute the step 6, or enters the step 9 to perform exit operation.
And 9, after the SE receives the exit request command of the AP, resetting the current state (the authentication operation needs to be executed again in the next operation), and returning the result to the AP.
10. And after receiving the SE response, the AP ends the process.
Authentication scenario using biometric information:
prompting a user to input a personal password on the AP, sending a command to the SE end by the AP, and requesting the SE end to start a process of collecting the biological information of the user.
And 2, after the SE end receives the request command of the AP, starting to enter the process of biological information acquisition.
SE starts to collect biological information (fingerprint, eye mask, human face, etc.) and confirms the completion.
And 4, the SE terminal compares the biological identity information data stored in the SE terminal, if the verification is passed, the subsequent operation of sensitive data is allowed, and the result is returned to the AP.
And 5, after receiving the result, the AP performs corresponding processing according to the result, prompts the user and quits if the result fails, and continues to execute the next step if the result succeeds.
The AP requests to manipulate the sensitive data stored in the SE (e.g., requests the SE to encrypt a string of data with a key), and sends the original data to the SE.
And 7, after the SE receives the data, processing according to the result state in the step 4, if the verification in the step 4 is passed, responding to the AP request operation, otherwise, rejecting the request, and returning the result to the AP.
And 8, the AP receives the response and performs the next operation according to the result, if the response fails, the AP prompts the user and pushes out the response, and if the response succeeds, the AP continues to execute the step 6, or enters the step 9 to perform exit operation.
And 9, after the SE receives the exit request command of the AP, resetting the current state (the authentication operation needs to be executed again in the next operation). And returns the result to the AP.
10. And after receiving the SE response, the AP ends the process.
Requesting to use a data operation flow (the following example is that the AP requests the SE to generate a set of transaction message data using Token stored at the SE end):
the AP sends data to be transacted (e.g., payer account, payee account, transaction amount, etc.) to the SE requesting a set of data with Token signature.
And 2, after receiving the request of the AP end, the SE end forms a corresponding message according to the communication message format, generates a final check value (such as a signature or an MAC (media access control) mode) by using the Token correspondingly stored at the safe position of the SE end, attaches the final check value to the back of the message, and forms a section of complete transaction message to be returned to the AP.
And 3, after receiving the message of the SE, the AP directly sends the message to a transaction background in a network communication mode, and waits for the processing result of the background.
4. And the background takes out the Token corresponding to the two-dimensional code terminal according to the information of the message, calculates a check value by using an agreed algorithm, compares the check value with the check value of the message, if the check value is the same, the message is real, the transaction is effective, performs final service processing, and finally returns the successful processing to the two-dimensional code terminal, otherwise, rejects the transaction and returns the error code to the two-dimensional code terminal.
5. And the two-dimension code terminal receives the background transaction result and promotes the transaction result.
The above are preferred embodiments of the present invention, and all changes made according to the technical scheme of the present invention that produce functional effects do not exceed the scope of the technical scheme of the present invention belong to the protection scope of the present invention.
Claims (10)
1. The two-dimensional code safety payment equipment is characterized by comprising a processor group, a comparison characteristic information acquisition device and input and output equipment, wherein the processor group mainly comprises a main CPU and an SE chip, the main CPU is used for providing basic functions of the equipment including driving and communication, and the SE chip is used for storing sensitive information and carrying out sensitive calculation; the comparison characteristic information acquisition device is used for acquiring comparison characteristic information; the input and output equipment is used for information interaction and comprises a camera module for scanning the two-dimensional code and a display module for displaying the two-dimensional code; when a user initiates a payment transaction request to the equipment, the user inputs comparison characteristic information through the comparison characteristic information acquisition device, then the comparison characteristic information is compared with preset comparison characteristic information in the SE chip, if the comparison is passed, sensitive information stored in the SE chip is allowed to be used and sensitive calculation is carried out, and if the comparison is not passed, the request is rejected.
2. The two-dimensional code secure payment device of claim 1, wherein the sensitive information comprises a secret key, a PIN, a PAN, Token information and comparison characteristic information, and the sensitive information can be used by a comparison verifier when the sensitive information is used; the sensitive calculation comprises the operation of using sensitive information, encryption and decryption of a secret key, signature and verification, calculation and verification of an MAC value, comparison of characteristic information and calculation of two-dimensional code display content.
3. The two-dimensional code secure payment device of claim 1, wherein the device employs an embedded operating system or no operating system; if an embedded operating system is adopted, the embedded operating system is a closed operating system.
4. The two-dimension code secure payment device as claimed in claim 3, wherein the main CPU and SE chip employ a secure boot mechanism, and the downloaded firmware and application program can be downloaded to the device after being legally signed by the device manufacturer, so as to ensure the security of the device.
5. The two-dimensional code secure payment equipment according to claim 1, wherein the comparison characteristic information is a password or biometric information, the biometric information is a fingerprint, a human face or an iris, the comparison characteristic information acquisition device is a numeric keypad, a password keypad or a biometric information acquisition device, and the biometric information acquisition device is a fingerprint module, a human face recognition module or an iris acquisition module.
6. The two-dimensional code secure payment equipment according to claim 1, wherein the comparison feature information acquisition device is connected with an SE chip, and the SE chip directly acquires comparison feature information to improve security.
7. The two-dimensional code secure payment device according to claim 1, wherein a secure operation number threshold is arranged in the SE chip, and the number of sensitive calculations of the SE chip must not be greater than the secure operation number threshold per unit time, so as to prevent from being cracked by brute force exhaustion.
8. The two-dimensional code secure payment device of claim 1, wherein the device pre-installs the device private key and certificate as follows:
A1) the equipment uploads equipment information to an equipment authentication background;
A2) the device generates a public and private key pair;
A3) the device sends a public key and device related information to a device authentication background;
A4) the device authentication background signs the public key into a certificate and issues the certificate to the device.
9. The two-dimensional code secure payment device of claim 1, wherein the device presets or modifies preset comparison feature information as follows:
B1) a user sends a request for preassembling the comparison characteristic information to the equipment through the input and output equipment;
B2) the equipment judges whether the comparison characteristic information is pre-installed, if so, the step B3 is carried out, otherwise, the step B4 is carried out;
B3) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step B4 is switched, if the verification is not passed, the request is rejected, and exit is finished;
B4) and the user inputs legal and effective comparison characteristic information through the comparison characteristic information acquisition device and stores the legal and effective comparison characteristic information in the SE chip to finish the preassembly or modification of the comparison characteristic information.
10. The two-dimensional code secure payment device of claim 1, wherein the device performs sensitive calculation according to the following method:
C1) a user sends a sensitive calculation request to equipment through input and output equipment;
C2) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step C3 is switched, if the verification is not passed, the request is rejected, and exit is finished;
C3) and the SE chip performs sensitive calculation, feeds back the result to the user, and finishes quitting after success.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010509529.1A CN111710110B (en) | 2020-06-08 | 2020-06-08 | Two-dimensional code safety payment equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010509529.1A CN111710110B (en) | 2020-06-08 | 2020-06-08 | Two-dimensional code safety payment equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111710110A true CN111710110A (en) | 2020-09-25 |
CN111710110B CN111710110B (en) | 2022-07-05 |
Family
ID=72539089
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010509529.1A Active CN111710110B (en) | 2020-06-08 | 2020-06-08 | Two-dimensional code safety payment equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111710110B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102523509A (en) * | 2011-12-22 | 2012-06-27 | 紫光股份有限公司 | Application of digital television system in households |
CN103401277A (en) * | 2013-07-11 | 2013-11-20 | 广州广电运通金融电子股份有限公司 | Intelligent power supply and method for realizing mobile payment by utilizing intelligent power supply |
US20140089196A1 (en) * | 2012-09-25 | 2014-03-27 | Google Inc. | Securing personal identification numbers for mobile payment applications by combining with random components |
CN105701663A (en) * | 2016-01-18 | 2016-06-22 | 连连银通电子支付有限公司 | Electronic account secret payment system |
CN105956857A (en) * | 2016-05-06 | 2016-09-21 | 上海动联信息技术股份有限公司 | System and method for generating security virtual password keyboard |
CN106209383A (en) * | 2016-07-13 | 2016-12-07 | 广东商联支付网络技术有限公司 | A kind of method and device of mobile payment security certification |
CN106910303A (en) * | 2015-12-22 | 2017-06-30 | 北京握奇智能科技有限公司 | A kind of supervising device of making out an invoice, billing system and billing method for being applied to tax control |
CN108256863A (en) * | 2018-01-26 | 2018-07-06 | 鼎讯网络安全技术有限公司 | The method of Quick Response Code generation, storage, identification and related encryption and decryption based on SE |
CN108898384A (en) * | 2018-07-06 | 2018-11-27 | 深圳西龙同辉技术股份有限公司 | A kind of digital wallet and its application method |
CN111158273A (en) * | 2019-12-20 | 2020-05-15 | 中核控制系统工程有限公司 | Method for realizing safety display interface without operating system |
-
2020
- 2020-06-08 CN CN202010509529.1A patent/CN111710110B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102523509A (en) * | 2011-12-22 | 2012-06-27 | 紫光股份有限公司 | Application of digital television system in households |
US20140089196A1 (en) * | 2012-09-25 | 2014-03-27 | Google Inc. | Securing personal identification numbers for mobile payment applications by combining with random components |
CN103401277A (en) * | 2013-07-11 | 2013-11-20 | 广州广电运通金融电子股份有限公司 | Intelligent power supply and method for realizing mobile payment by utilizing intelligent power supply |
CN106910303A (en) * | 2015-12-22 | 2017-06-30 | 北京握奇智能科技有限公司 | A kind of supervising device of making out an invoice, billing system and billing method for being applied to tax control |
CN105701663A (en) * | 2016-01-18 | 2016-06-22 | 连连银通电子支付有限公司 | Electronic account secret payment system |
CN105956857A (en) * | 2016-05-06 | 2016-09-21 | 上海动联信息技术股份有限公司 | System and method for generating security virtual password keyboard |
CN106209383A (en) * | 2016-07-13 | 2016-12-07 | 广东商联支付网络技术有限公司 | A kind of method and device of mobile payment security certification |
CN108256863A (en) * | 2018-01-26 | 2018-07-06 | 鼎讯网络安全技术有限公司 | The method of Quick Response Code generation, storage, identification and related encryption and decryption based on SE |
CN108898384A (en) * | 2018-07-06 | 2018-11-27 | 深圳西龙同辉技术股份有限公司 | A kind of digital wallet and its application method |
CN111158273A (en) * | 2019-12-20 | 2020-05-15 | 中核控制系统工程有限公司 | Method for realizing safety display interface without operating system |
Also Published As
Publication number | Publication date |
---|---|
CN111710110B (en) | 2022-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107800725B (en) | Remote online management device and method for digital certificates | |
US7788500B2 (en) | Biometric authentication device and terminal | |
US20140093144A1 (en) | More-Secure Hardware Token | |
CN113902446A (en) | Face payment security method based on security unit and trusted execution environment | |
CN102542449B (en) | A kind of radio communication device and payment authentication method | |
CN106899551B (en) | Authentication method, authentication terminal and system | |
EP2065798A1 (en) | Method for performing secure online transactions with a mobile station and a mobile station | |
CN112528258A (en) | System and method for securely managing biometric data | |
US20100277278A1 (en) | Contactless biometric authentication system and authentication method | |
WO2008149366A2 (en) | Device method & system for facilitating mobile transactions | |
US20180247313A1 (en) | Fingerprint security element (se) module and payment verification method | |
JP2011165102A (en) | Biometrics authentication system and portable terminal | |
US8931080B2 (en) | Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource | |
KR100974815B1 (en) | System for Authenticating a Living Body Doubly | |
JP2002112340A (en) | Personal authentication system for mobile device and its method | |
CN111710110B (en) | Two-dimensional code safety payment equipment | |
CN111259362B (en) | Identity authentication method of hardware digital certificate carrier | |
KR20050014052A (en) | Mobile Devices and Method for Certificating Biometric Information by Using It | |
EP4083825A1 (en) | Method for controlling a smart card | |
WO2022237550A1 (en) | Access control authentication method, apparatus and system for preventing privacy leak | |
KR20170142983A (en) | Method for Providing Appointed Service by using Biometric Information | |
CN214475130U (en) | Fingerprint card system based on digital currency payment | |
KR102243016B1 (en) | Automatic service provision method using biometric information | |
KR102165105B1 (en) | Method for Providing Appointed Service by using Biometric Information | |
US20230410098A1 (en) | Authentication method secured by structural decoupling of personal and service identifiers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |