CN111710110A - Two-dimensional code safety payment equipment - Google Patents

Two-dimensional code safety payment equipment Download PDF

Info

Publication number
CN111710110A
CN111710110A CN202010509529.1A CN202010509529A CN111710110A CN 111710110 A CN111710110 A CN 111710110A CN 202010509529 A CN202010509529 A CN 202010509529A CN 111710110 A CN111710110 A CN 111710110A
Authority
CN
China
Prior art keywords
characteristic information
comparison
comparison characteristic
chip
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010509529.1A
Other languages
Chinese (zh)
Other versions
CN111710110B (en
Inventor
王斌
李延平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Huijietong Technology Co ltd
Original Assignee
Fujian Huijietong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Huijietong Technology Co ltd filed Critical Fujian Huijietong Technology Co ltd
Priority to CN202010509529.1A priority Critical patent/CN111710110B/en
Publication of CN111710110A publication Critical patent/CN111710110A/en
Application granted granted Critical
Publication of CN111710110B publication Critical patent/CN111710110B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/0036Checkout procedures
    • G07G1/0045Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Abstract

The invention relates to two-dimensional code safety payment equipment which comprises a processor group, a comparison characteristic information acquisition device and input and output equipment, wherein the processor group mainly comprises a main CPU and an SE chip, the main CPU is used for providing basic functions of the equipment including driving and communication, and the SE chip is used for storing sensitive information and carrying out sensitive calculation; the comparison characteristic information acquisition device is used for acquiring comparison characteristic information; the input and output equipment is used for information interaction with a user; when a user initiates a payment transaction request to the equipment, the user inputs comparison characteristic information through the comparison characteristic information acquisition device, then the comparison characteristic information is compared with preset comparison characteristic information in the SE chip, if the comparison is passed, sensitive information stored in the SE chip is allowed to be used and sensitive calculation is carried out, and if the comparison is not passed, the request is rejected. The device is beneficial to improving the safety of payment.

Description

Two-dimensional code safety payment equipment
Technical Field
The invention belongs to the technical field of payment, and particularly relates to two-dimensional code safe payment equipment.
Background
The two-dimensional code is the most popular payment equipment at present, but the two-dimensional code payment equipment that most individuals adopted at present is the smart mobile phone, and its main shortcoming is: 1) the smart phone is expensive, and the normal price of one mobile phone is hundreds of thousands of yuan larger; 2) the payment steps are more by using the smart phone, and the smart phone is difficult to master for partial crowds such as children and the old; 3) the smart phone uses a general-purpose intelligent operating system, such as android or IOS, which generally has known vulnerabilities that may be hacked to cause money to be hacked; 5) most smart phones do not have a dedicated SE chip, and the security is lower than that of the dedicated SE chip.
Disclosure of Invention
The invention aims to provide two-dimensional code safety payment equipment which is beneficial to improving the safety of payment.
In order to achieve the purpose, the invention adopts the technical scheme that: a two-dimensional code safety payment device comprises a processor group, a comparison characteristic information acquisition device and an input/output device, wherein the processor group mainly comprises a main CPU and an SE chip, the main CPU is used for providing basic functions of devices including driving and communication, and the SE chip is used for storing sensitive information and carrying out sensitive calculation; the comparison characteristic information acquisition device is used for acquiring comparison characteristic information; the input and output equipment is used for information interaction and comprises a camera module for scanning the two-dimensional code and a display module for displaying the two-dimensional code; when a user initiates a payment transaction request to the equipment, the user inputs comparison characteristic information through the comparison characteristic information acquisition device, then the comparison characteristic information is compared with preset comparison characteristic information in the SE chip, if the comparison is passed, sensitive information stored in the SE chip is allowed to be used and sensitive calculation is carried out, and if the comparison is not passed, the request is rejected.
Further, the sensitive information includes key, PIN, PAN, Token information and comparison feature information, and when the sensitive information is used, the sensitive information can be used by a comparison verifier; the sensitive calculation comprises the operation of using sensitive information, encryption and decryption of a secret key, signature and verification, calculation and verification of an MAC value, comparison of characteristic information and calculation of two-dimensional code display content.
Furthermore, the equipment adopts an embedded operating system or no operating system; if an embedded operating system is adopted, the embedded operating system is a closed operating system.
Further, the main CPU and the SE chip adopt a secure starting mechanism, and downloaded firmware and application programs can be downloaded into the equipment after being legally signed by equipment manufacturers so as to ensure the safety of the equipment.
Further, the comparison characteristic information is a password or biometric information, the biometric information is a fingerprint, a human face or an iris, the comparison characteristic information acquisition device is a numeric keypad, a password keypad or a biometric information acquisition device, and the biometric information acquisition device is a fingerprint module, a human face recognition module or an iris acquisition module.
Furthermore, the comparison characteristic information acquisition device is connected with the SE chip, and the SE chip directly acquires comparison characteristic information so as to improve the safety.
Furthermore, a safe operation time threshold is arranged in the SE chip, and the sensitive calculation time of the SE chip is not more than the safe operation time threshold in unit time so as to prevent the SE chip from being cracked by brute force exhaustion.
Further, the device pre-installs a device private key and a certificate as follows:
A1) the equipment uploads equipment information to an equipment authentication background;
A2) the device generates a public and private key pair;
A3) the device sends a public key and device related information to a device authentication background;
A4) the device authentication background signs the public key into a certificate and issues the certificate to the device.
Further, the equipment presets or modifies preset comparison characteristic information according to the following method:
B1) a user sends a request for preassembling the comparison characteristic information to the equipment through the input and output equipment;
B2) the equipment judges whether the comparison characteristic information is pre-installed, if so, the step B3 is carried out, otherwise, the step B4 is carried out;
B3) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step B4 is switched, if the verification is not passed, the request is rejected, and exit is finished;
B4) and the user inputs legal and effective comparison characteristic information through the comparison characteristic information acquisition device and stores the legal and effective comparison characteristic information in the SE chip to finish the preassembly or modification of the comparison characteristic information.
Further, the device performs sensitive calculations as follows:
C1) a user sends a sensitive calculation request to equipment through input and output equipment;
C2) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step C3 is switched, if the verification is not passed, the request is rejected, and exit is finished;
C3) and the SE chip performs sensitive calculation, feeds back the result to the user, and finishes quitting after success.
Compared with the prior art, the invention has the following beneficial effects: the two-dimensional code safety payment equipment is provided, sensitive information is stored and sensitive calculation is carried out through setting an independent SE chip, and then comparison characteristic information is acquired through a comparison characteristic information acquisition device so as to carry out user identity comparison and verification, so that the payment safety is improved. In addition, this equipment structure is simple, and the cost is low, and is exclusively used in the safe payment based on the two-dimensional code, and is simple to use convenient. Therefore, the invention has strong practicability and wide application prospect.
Drawings
Fig. 1 is a block diagram of an apparatus configuration of an embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the figures and the embodiments.
The invention provides two-dimensional code safety payment equipment, which comprises a processor group, a comparison characteristic information acquisition device and input and output equipment as shown in figure 1.
The processor group mainly comprises a main CPU and an SE chip, wherein the main CPU is used for providing basic functions of driving, communication and other equipment, and the SE chip is used for storing sensitive information and carrying out sensitive calculation. The sensitive information includes but is not limited to information such as a key, a PIN, a PAN, a Token, comparison characteristic information and the like, and when the sensitive information is used, the sensitive information needs to be used by an authorized party, and the authorization mode includes a fingerprint, a PIN and the like. The sensitive calculation comprises operations of access, deletion, modification and the like of using sensitive information, encryption/decryption of a secret key, signature and signature verification, calculation/verification of an MAC value, comparison of comparison characteristic information, calculation of two-dimensional code display content and the like.
The comparison characteristic information acquisition device is used for acquiring comparison characteristic information so as to carry out user identity authentication when a user requests to operate the SE chip.
The input and output equipment is used for information interaction. The input and output equipment comprises a camera module for scanning the two-dimensional code, a display module for displaying the two-dimensional code and other necessary equipment.
When a user initiates a payment transaction request to the equipment, the user inputs comparison characteristic information through the comparison characteristic information acquisition device, then the comparison characteristic information is compared with preset comparison characteristic information in the SE chip, if the comparison is passed, sensitive information stored in the SE chip is allowed to be used and sensitive calculation is carried out, and if the comparison is not passed, the request is rejected.
The invention ensures that the storage of the sensitive information is safe and reliable by using the SE chip, and an attacker is difficult to directly acquire the sensitive data by reading or exporting the data on the memory (FLASH). Meanwhile, sensitive calculation is realized in the SE chip, so that the difficulty of acquiring sensitive information by an attacker in a physical attack mode can be further increased.
The equipment of the invention adopts an embedded operating system or a non-operating system, such as a kernel, free RTOS, thread x and the like. The embedded operating system or the non-operating system can reduce the requirement on the performance of the CPU, which is beneficial to reducing the cost, and meanwhile, as the operating system is a non-intelligent operating system, a hacker can hardly find a leak, thereby improving the safety of the equipment. If the embedded operating system is adopted, the embedded operating system is a closed operating system, other application programs signed by a third party are not allowed to be installed except the application programs authorized by a device manufacturer, and the safety of the device is enhanced by closing or controlling the installation application program channel. Preferably, the main CPU and the SE chip employ a Secure Boot mechanism (Secure Boot), and the downloaded firmware and application program need to be downloadable into the device after being legally signed by the device manufacturer, so as to ensure the security of the device.
The invention can also be provided with special payment related keys comprising 0-9 number keys, display and code scanning keys, so that the payment process is simple and easy to use.
In this embodiment, the comparison characteristic information is a password or biometric information, the biometric information is a fingerprint, a human face or an iris, the comparison characteristic information acquisition device is a numeric keypad, a password keypad or a biometric information acquisition device, and the biometric information acquisition device is a fingerprint module, a human face recognition module or an iris acquisition module.
Preferably, the comparison characteristic information acquisition device is connected with the SE chip, and the SE chip directly acquires comparison characteristic information to improve safety.
In order to prevent the SE chip from being cracked by brute force exhaustion, a safe operation time threshold is arranged in the SE chip, and the sensitive calculation time of the SE chip is not more than the safe operation time threshold in unit time.
The following describes a working method of the two-dimensional code secure payment device of the present invention.
The device of the invention pre-installs the private key and the certificate of the device according to the following method: :
A1) the equipment uploads equipment information to an equipment authentication background;
A2) the device generates a public and private key pair;
A3) the device sends a public key and device related information to a device authentication background;
A4) the device authentication background generates a certificate for the public key signature and issues the certificate to the device.
The equipment of the invention presets or modifies the preset comparison characteristic information according to the following method:
B1) a user sends a request for preassembling the comparison characteristic information to the equipment through the input and output equipment;
B2) the equipment judges whether the comparison characteristic information is pre-installed, if so, the step B3 is carried out, otherwise, the step B4 is carried out;
B3) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step B4 is switched, if the verification is not passed, the request is rejected, and exit is finished;
B4) and the user inputs legal and effective comparison characteristic information through the comparison characteristic information acquisition device and stores the legal and effective comparison characteristic information in the SE chip to finish the preassembly or modification of the comparison characteristic information.
The equipment carries out sensitive calculation according to the following method:
C1) a user sends a sensitive calculation request to equipment through input and output equipment;
C2) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step C3 is switched, if the verification is not passed, the request is rejected, and exit is finished;
C3) and the SE chip performs sensitive calculation, feeds back the result to the user, and finishes quitting after success.
The following are several specific examples of user use of sensitive information stored in the SE chip.
Using the password scenario:
prompting a user to input a personal password on the AP, sending a command to the SE end by the AP, and requesting the SE end to start a user password input processing flow.
And 2, after receiving the request command of the AP, the SE end starts to enter the password input processing of the user.
3. The user starts entering the password and confirms completion.
And 4, comparing the identity authentication password stored in the SE terminal by the SE terminal, if the identity authentication password passes the verification, allowing subsequent sensitive data operation, and returning the result to the AP.
And 5, after receiving the result, the AP performs corresponding processing according to the result, prompts the user and quits if the result fails, and continues to execute the next step if the result succeeds.
AP requests to manipulate sensitive data stored in SE, see details: the request sends the original data to the SE using a data operation request process (e.g., requesting the SE to encrypt a string of data with a key).
And 7, after the SE receives the data, processing according to the result state in the step 4, if the verification in the step 4 is passed, responding to the AP request operation, otherwise, rejecting the request, and returning the result to the AP.
And 8, the AP receives the response and performs the next operation according to the result, if the response fails, the AP prompts the user and pushes out the response, and if the response succeeds, the AP continues to execute the step 6, or enters the step 9 to perform exit operation.
And 9, after the SE receives the exit request command of the AP, resetting the current state (the authentication operation needs to be executed again in the next operation), and returning the result to the AP.
10. And after receiving the SE response, the AP ends the process.
Authentication scenario using biometric information:
prompting a user to input a personal password on the AP, sending a command to the SE end by the AP, and requesting the SE end to start a process of collecting the biological information of the user.
And 2, after the SE end receives the request command of the AP, starting to enter the process of biological information acquisition.
SE starts to collect biological information (fingerprint, eye mask, human face, etc.) and confirms the completion.
And 4, the SE terminal compares the biological identity information data stored in the SE terminal, if the verification is passed, the subsequent operation of sensitive data is allowed, and the result is returned to the AP.
And 5, after receiving the result, the AP performs corresponding processing according to the result, prompts the user and quits if the result fails, and continues to execute the next step if the result succeeds.
The AP requests to manipulate the sensitive data stored in the SE (e.g., requests the SE to encrypt a string of data with a key), and sends the original data to the SE.
And 7, after the SE receives the data, processing according to the result state in the step 4, if the verification in the step 4 is passed, responding to the AP request operation, otherwise, rejecting the request, and returning the result to the AP.
And 8, the AP receives the response and performs the next operation according to the result, if the response fails, the AP prompts the user and pushes out the response, and if the response succeeds, the AP continues to execute the step 6, or enters the step 9 to perform exit operation.
And 9, after the SE receives the exit request command of the AP, resetting the current state (the authentication operation needs to be executed again in the next operation). And returns the result to the AP.
10. And after receiving the SE response, the AP ends the process.
Requesting to use a data operation flow (the following example is that the AP requests the SE to generate a set of transaction message data using Token stored at the SE end):
the AP sends data to be transacted (e.g., payer account, payee account, transaction amount, etc.) to the SE requesting a set of data with Token signature.
And 2, after receiving the request of the AP end, the SE end forms a corresponding message according to the communication message format, generates a final check value (such as a signature or an MAC (media access control) mode) by using the Token correspondingly stored at the safe position of the SE end, attaches the final check value to the back of the message, and forms a section of complete transaction message to be returned to the AP.
And 3, after receiving the message of the SE, the AP directly sends the message to a transaction background in a network communication mode, and waits for the processing result of the background.
4. And the background takes out the Token corresponding to the two-dimensional code terminal according to the information of the message, calculates a check value by using an agreed algorithm, compares the check value with the check value of the message, if the check value is the same, the message is real, the transaction is effective, performs final service processing, and finally returns the successful processing to the two-dimensional code terminal, otherwise, rejects the transaction and returns the error code to the two-dimensional code terminal.
5. And the two-dimension code terminal receives the background transaction result and promotes the transaction result.
The above are preferred embodiments of the present invention, and all changes made according to the technical scheme of the present invention that produce functional effects do not exceed the scope of the technical scheme of the present invention belong to the protection scope of the present invention.

Claims (10)

1. The two-dimensional code safety payment equipment is characterized by comprising a processor group, a comparison characteristic information acquisition device and input and output equipment, wherein the processor group mainly comprises a main CPU and an SE chip, the main CPU is used for providing basic functions of the equipment including driving and communication, and the SE chip is used for storing sensitive information and carrying out sensitive calculation; the comparison characteristic information acquisition device is used for acquiring comparison characteristic information; the input and output equipment is used for information interaction and comprises a camera module for scanning the two-dimensional code and a display module for displaying the two-dimensional code; when a user initiates a payment transaction request to the equipment, the user inputs comparison characteristic information through the comparison characteristic information acquisition device, then the comparison characteristic information is compared with preset comparison characteristic information in the SE chip, if the comparison is passed, sensitive information stored in the SE chip is allowed to be used and sensitive calculation is carried out, and if the comparison is not passed, the request is rejected.
2. The two-dimensional code secure payment device of claim 1, wherein the sensitive information comprises a secret key, a PIN, a PAN, Token information and comparison characteristic information, and the sensitive information can be used by a comparison verifier when the sensitive information is used; the sensitive calculation comprises the operation of using sensitive information, encryption and decryption of a secret key, signature and verification, calculation and verification of an MAC value, comparison of characteristic information and calculation of two-dimensional code display content.
3. The two-dimensional code secure payment device of claim 1, wherein the device employs an embedded operating system or no operating system; if an embedded operating system is adopted, the embedded operating system is a closed operating system.
4. The two-dimension code secure payment device as claimed in claim 3, wherein the main CPU and SE chip employ a secure boot mechanism, and the downloaded firmware and application program can be downloaded to the device after being legally signed by the device manufacturer, so as to ensure the security of the device.
5. The two-dimensional code secure payment equipment according to claim 1, wherein the comparison characteristic information is a password or biometric information, the biometric information is a fingerprint, a human face or an iris, the comparison characteristic information acquisition device is a numeric keypad, a password keypad or a biometric information acquisition device, and the biometric information acquisition device is a fingerprint module, a human face recognition module or an iris acquisition module.
6. The two-dimensional code secure payment equipment according to claim 1, wherein the comparison feature information acquisition device is connected with an SE chip, and the SE chip directly acquires comparison feature information to improve security.
7. The two-dimensional code secure payment device according to claim 1, wherein a secure operation number threshold is arranged in the SE chip, and the number of sensitive calculations of the SE chip must not be greater than the secure operation number threshold per unit time, so as to prevent from being cracked by brute force exhaustion.
8. The two-dimensional code secure payment device of claim 1, wherein the device pre-installs the device private key and certificate as follows:
A1) the equipment uploads equipment information to an equipment authentication background;
A2) the device generates a public and private key pair;
A3) the device sends a public key and device related information to a device authentication background;
A4) the device authentication background signs the public key into a certificate and issues the certificate to the device.
9. The two-dimensional code secure payment device of claim 1, wherein the device presets or modifies preset comparison feature information as follows:
B1) a user sends a request for preassembling the comparison characteristic information to the equipment through the input and output equipment;
B2) the equipment judges whether the comparison characteristic information is pre-installed, if so, the step B3 is carried out, otherwise, the step B4 is carried out;
B3) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step B4 is switched, if the verification is not passed, the request is rejected, and exit is finished;
B4) and the user inputs legal and effective comparison characteristic information through the comparison characteristic information acquisition device and stores the legal and effective comparison characteristic information in the SE chip to finish the preassembly or modification of the comparison characteristic information.
10. The two-dimensional code secure payment device of claim 1, wherein the device performs sensitive calculation according to the following method:
C1) a user sends a sensitive calculation request to equipment through input and output equipment;
C2) the user inputs the comparison characteristic information through the comparison characteristic information acquisition device, the SE chip performs comparison and verification on the comparison characteristic information, if the verification is passed, the step C3 is switched, if the verification is not passed, the request is rejected, and exit is finished;
C3) and the SE chip performs sensitive calculation, feeds back the result to the user, and finishes quitting after success.
CN202010509529.1A 2020-06-08 2020-06-08 Two-dimensional code safety payment equipment Active CN111710110B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010509529.1A CN111710110B (en) 2020-06-08 2020-06-08 Two-dimensional code safety payment equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010509529.1A CN111710110B (en) 2020-06-08 2020-06-08 Two-dimensional code safety payment equipment

Publications (2)

Publication Number Publication Date
CN111710110A true CN111710110A (en) 2020-09-25
CN111710110B CN111710110B (en) 2022-07-05

Family

ID=72539089

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010509529.1A Active CN111710110B (en) 2020-06-08 2020-06-08 Two-dimensional code safety payment equipment

Country Status (1)

Country Link
CN (1) CN111710110B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523509A (en) * 2011-12-22 2012-06-27 紫光股份有限公司 Application of digital television system in households
CN103401277A (en) * 2013-07-11 2013-11-20 广州广电运通金融电子股份有限公司 Intelligent power supply and method for realizing mobile payment by utilizing intelligent power supply
US20140089196A1 (en) * 2012-09-25 2014-03-27 Google Inc. Securing personal identification numbers for mobile payment applications by combining with random components
CN105701663A (en) * 2016-01-18 2016-06-22 连连银通电子支付有限公司 Electronic account secret payment system
CN105956857A (en) * 2016-05-06 2016-09-21 上海动联信息技术股份有限公司 System and method for generating security virtual password keyboard
CN106209383A (en) * 2016-07-13 2016-12-07 广东商联支付网络技术有限公司 A kind of method and device of mobile payment security certification
CN106910303A (en) * 2015-12-22 2017-06-30 北京握奇智能科技有限公司 A kind of supervising device of making out an invoice, billing system and billing method for being applied to tax control
CN108256863A (en) * 2018-01-26 2018-07-06 鼎讯网络安全技术有限公司 The method of Quick Response Code generation, storage, identification and related encryption and decryption based on SE
CN108898384A (en) * 2018-07-06 2018-11-27 深圳西龙同辉技术股份有限公司 A kind of digital wallet and its application method
CN111158273A (en) * 2019-12-20 2020-05-15 中核控制系统工程有限公司 Method for realizing safety display interface without operating system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523509A (en) * 2011-12-22 2012-06-27 紫光股份有限公司 Application of digital television system in households
US20140089196A1 (en) * 2012-09-25 2014-03-27 Google Inc. Securing personal identification numbers for mobile payment applications by combining with random components
CN103401277A (en) * 2013-07-11 2013-11-20 广州广电运通金融电子股份有限公司 Intelligent power supply and method for realizing mobile payment by utilizing intelligent power supply
CN106910303A (en) * 2015-12-22 2017-06-30 北京握奇智能科技有限公司 A kind of supervising device of making out an invoice, billing system and billing method for being applied to tax control
CN105701663A (en) * 2016-01-18 2016-06-22 连连银通电子支付有限公司 Electronic account secret payment system
CN105956857A (en) * 2016-05-06 2016-09-21 上海动联信息技术股份有限公司 System and method for generating security virtual password keyboard
CN106209383A (en) * 2016-07-13 2016-12-07 广东商联支付网络技术有限公司 A kind of method and device of mobile payment security certification
CN108256863A (en) * 2018-01-26 2018-07-06 鼎讯网络安全技术有限公司 The method of Quick Response Code generation, storage, identification and related encryption and decryption based on SE
CN108898384A (en) * 2018-07-06 2018-11-27 深圳西龙同辉技术股份有限公司 A kind of digital wallet and its application method
CN111158273A (en) * 2019-12-20 2020-05-15 中核控制系统工程有限公司 Method for realizing safety display interface without operating system

Also Published As

Publication number Publication date
CN111710110B (en) 2022-07-05

Similar Documents

Publication Publication Date Title
CN107800725B (en) Remote online management device and method for digital certificates
US7788500B2 (en) Biometric authentication device and terminal
US20140093144A1 (en) More-Secure Hardware Token
CN113902446A (en) Face payment security method based on security unit and trusted execution environment
CN102542449B (en) A kind of radio communication device and payment authentication method
CN106899551B (en) Authentication method, authentication terminal and system
EP2065798A1 (en) Method for performing secure online transactions with a mobile station and a mobile station
CN112528258A (en) System and method for securely managing biometric data
US20100277278A1 (en) Contactless biometric authentication system and authentication method
WO2008149366A2 (en) Device method & system for facilitating mobile transactions
US20180247313A1 (en) Fingerprint security element (se) module and payment verification method
JP2011165102A (en) Biometrics authentication system and portable terminal
US8931080B2 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
KR100974815B1 (en) System for Authenticating a Living Body Doubly
JP2002112340A (en) Personal authentication system for mobile device and its method
CN111710110B (en) Two-dimensional code safety payment equipment
CN111259362B (en) Identity authentication method of hardware digital certificate carrier
KR20050014052A (en) Mobile Devices and Method for Certificating Biometric Information by Using It
EP4083825A1 (en) Method for controlling a smart card
WO2022237550A1 (en) Access control authentication method, apparatus and system for preventing privacy leak
KR20170142983A (en) Method for Providing Appointed Service by using Biometric Information
CN214475130U (en) Fingerprint card system based on digital currency payment
KR102243016B1 (en) Automatic service provision method using biometric information
KR102165105B1 (en) Method for Providing Appointed Service by using Biometric Information
US20230410098A1 (en) Authentication method secured by structural decoupling of personal and service identifiers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant