CN114125828A - Mobile terminal, processing method, equipment and medium for near field communication - Google Patents

Mobile terminal, processing method, equipment and medium for near field communication Download PDF

Info

Publication number
CN114125828A
CN114125828A CN202111462470.6A CN202111462470A CN114125828A CN 114125828 A CN114125828 A CN 114125828A CN 202111462470 A CN202111462470 A CN 202111462470A CN 114125828 A CN114125828 A CN 114125828A
Authority
CN
China
Prior art keywords
module
instruction
data information
generates
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111462470.6A
Other languages
Chinese (zh)
Inventor
刘列宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
Spreadtrum Communications Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Shanghai Co Ltd filed Critical Spreadtrum Communications Shanghai Co Ltd
Priority to CN202111462470.6A priority Critical patent/CN114125828A/en
Publication of CN114125828A publication Critical patent/CN114125828A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules

Abstract

The invention provides a mobile terminal, a processing method, equipment and a medium for near field communication, wherein the mobile terminal comprises the following components: the instruction generation module is internally provided with a CA module, responds to a first calling command and generates a first instruction according to the first calling command; the data generation module is arranged in a Trusted Execution Environment (TEE), a TA (timing advance) module and an interaction module are arranged in the data generation module, the TA module receives a first instruction from the CA module, generates data information according to the first instruction and sends the data information to the interaction module. According to the invention, the CA module and the TA module transmit instructions, and the data generation module is arranged in the trusted execution environment TEE, so that the problem of information leakage during near field communication data transmission is solved, and the safety in the near field communication data transmission process is improved.

Description

Mobile terminal, processing method, equipment and medium for near field communication
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a mobile terminal, a processing method, a device, and a medium for near field communication.
Background
Near Field Communication (NFC) is a radio technology with short distance and high frequency, and NFC chips can communicate with each other. NFC is widely used for mobile payment, identity authentication, ticketing, and the like, so NFC is often used to transmit some sensitive data, such as personal identity information, bank account information, and the like.
In the prior art, as shown in fig. 1, a line 1 is used for communication between an application (which may be a mobile payment application (like riding software, cloud flash payment, etc.) and an interactive interface), and depends on a process communication mechanism of each Rich Execution Environment (REE) software system; the line 2 is a passage between the interactive interface and the NFC chip; and the NFC chip and the wireless equipment realize non-contact interaction.
However, when data transmission is performed by the above design method, the transmitted data is easily intercepted by other intrusion software, which causes information leakage.
Therefore, in order to solve the above problems, the present invention provides a mobile terminal, a processing method, a device and a medium for near field communication, so as to improve security during data transmission.
Disclosure of Invention
The invention provides a mobile terminal, a processing method, equipment and a medium for near field communication, which can prevent the problem of information leakage caused by information interception in the near field communication process and improve the safety in the near field communication data transmission process.
In a first aspect, the present invention provides a mobile terminal for near field communication, including: the instruction generation module is arranged in the rich execution environment REE, a CA module is arranged in the instruction generation module, and the CA module responds to a first calling command and generates a first instruction according to the first calling command; the data generation module is arranged in a Trusted Execution Environment (TEE), a TA (timing advance) module and an interaction module are arranged in the data generation module, a communication relation exists between the TA module and the CA module, the TA module receives a first instruction from the CA module, generates data information according to the first instruction and sends the data information to the interaction module; and the interaction module is used for sending the data information to an NFC chip.
The beneficial effects are that: according to the invention, the CA module and the TA module transmit the instruction, and the data generation module is arranged in the trusted execution environment TEE, so that the transmission route of the data information is in a safe environment, the data information can be prevented from being intercepted and stolen by the outside in the near field communication process, and the safety of data transmission is improved.
Optionally, a transfer module is further disposed in the instruction generating module, and the transfer module is configured to transmit the first instruction to the TA module. The beneficial effects are that: because the TA module may have a plurality of TA applications, in order to prevent the first instruction from being transmitted incorrectly, the relay module transmits the first instruction to the TA module, so that the relay module immediately notifies the corresponding TA application to start working when receiving the first instruction, so that the TA application corresponding to the TA module can receive the first instruction, and the working efficiency of the mobile terminal is improved.
Optionally, the mobile terminal further includes an initialization module, where the initialization module is disposed in the rich execution environment REE; the initialization module controls the CA module to generate a second instruction and sends the second instruction to the TA module; the TA module generates test data information according to the second instruction; the TA module also generates verification data information, compares the test data information with the verification data information, completes initialization of the mobile terminal if the test data information is consistent with the verification data information, otherwise, regenerates a second instruction by the CA module until the test data information generated by the TA module is consistent with the verification data information, and ends the initialization process. The beneficial effects are that: since the TA module and the CA module are in instruction transmission, in order to ensure that the data information generated by the TA module after receiving the instruction is the data information that the CA module needs to call, that is, the test data information and the verification data information are consistent, it is necessary to initialize the mobile terminal, and when the test data information generated by the TA module and the verification data information are consistent, the initialization process is ended.
Optionally, when the CA module stores sensitive data, a private key corresponding to the sensitive data is set in the TA module, and a public key of the private key is set in the CA module; the CA module generates a public key according to a second calling command, the TA module receives the public key from the CA module, and the TA module generates the sensitive data according to the public key and the private key and sends the sensitive data to the interaction module. The beneficial effects are that: because the instruction generation module is arranged in the rich execution environment REE, when sensitive data needs to be stored in the CA, in order to prevent the sensitive data from being leaked in the transmission process, a private key corresponding to the sensitive data needs to be arranged in the TA module, and a public key of the private key needs to be arranged in the CA module, so that ciphertext transmission is performed in the CA module and the TA module at this time, even if the ciphertext is stolen, decryption cannot be performed, and the concealment of the sensitive data in the transmission process is improved.
In a second aspect, the present invention provides a processing method for near field communication, including: the CA module responds to a first calling command and generates a first instruction according to the first calling command, the CA module is arranged in an instruction generating module, and the instruction generating module is arranged in an abundant execution environment (REE); the TA module receives a first instruction from the CA module, generates data information according to the first instruction, and sends the data information to the interaction module, wherein the CA module and the interaction module are arranged in a trusted execution environment; and the interaction module sends the data information to an NFC chip.
The beneficial effects are that: according to the invention, the CA module and the TA module are transmitted through the instruction, and the CA module and the interaction module are arranged in a trusted execution environment, so that data information can be prevented from being stolen in the information exchange between the CA module and the TA module, and the safety of near field communication data transmission is improved.
Optionally, the CA module transmits the first instruction to the TA module through a transfer module, and the transfer module is disposed in the instruction generation module. The beneficial effects are that: because the TA module may have a plurality of TA applications, in order to prevent the first instruction from being transmitted incorrectly, the relay module transmits the first instruction to the TA module, so that the relay module immediately notifies the corresponding TA application to start working when receiving the first instruction, so that the TA application corresponding to the TA module can receive the first instruction, and the working efficiency of the mobile terminal is improved.
Optionally, the method further comprises: the initialization module controls the CA module to generate a second instruction and sends the second instruction to the TA module, and the initialization module is arranged in a rich execution environment REE; the TA module generates test data information according to the second instruction; and the TA module generates verification data information, compares the test data information with the verification data information, completes initialization of the mobile terminal if the test data information is consistent with the verification data information, otherwise, regenerates a second instruction by the CA module, and ends the initialization process until the test data information generated by the TA module is consistent with the verification data information. The beneficial effects are that: since the TA module and the CA module are in instruction transmission, in order to ensure that the data information generated by the TA module after receiving the instruction is the data information that the CA module needs to call, that is, the test data information and the verification data information are consistent, it is necessary to initialize the mobile terminal, and when the test data information generated by the TA module and the verification data information are consistent, the initialization process is ended.
Optionally, when the CA module stores sensitive data, a private key corresponding to the sensitive data is set in the TA module, and a public key of the private key is set in the CA module; the CA module generates a public key according to the second calling command; and the TA module receives a public key from the CA module, generates the sensitive data according to the public key and the private key, and sends the sensitive data to the interaction module. The beneficial effects are that: when sensitive data needs to be stored in the CA module, in order to prevent the sensitive data from being leaked in the transmission process, a private key corresponding to the sensitive data needs to be set in the TA module, and a public key of the private key is set in the CA module, so that ciphertext is transmitted in the CA module and the TA module at the moment, and even if the ciphertext is stolen, the ciphertext cannot be decrypted, and the concealment of the sensitive data in the transmission process is improved.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor and a memory. Wherein the memory is used to store one or more computer programs; the one or more computer programs stored in the memory, when executed by the processor, enable the electronic device to implement any of the possible design approaches of the second aspect described above.
In a fourth aspect, the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements any one of the possible design methods of the second aspect.
In a fifth aspect, an embodiment of the present application further provides a computer program product, which, when run on an electronic device, causes the electronic device to execute any one of the possible design methods of the second aspect.
As for the advantageous effects of the above third to fifth aspects, reference may be made to the description in the above first or second aspect.
Drawings
FIG. 1 is a schematic diagram of a mobile terminal for near field communication;
fig. 2 is a schematic diagram of a mobile terminal for near field communication according to an embodiment of the present disclosure;
fig. 3 is a flowchart of a processing method of near field communication according to an embodiment of the present disclosure;
fig. 4 is a schematic view of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solution in the embodiments of the present application is described below with reference to the drawings in the embodiments of the present application. In the description of the embodiments of the present application, the terminology used in the following embodiments is for the purpose of describing particular embodiments only and is not intended to be limiting of the present application. As used in the specification of the present application and the appended claims, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, such as "one or more", unless the context clearly indicates otherwise. It should also be understood that in the following embodiments of the present application, "at least one", "one or more" means one or more than two (including two). The term "and/or" is used to describe an association relationship that associates objects, meaning that three relationships may exist; for example, a and/or B, may represent: a alone, both A and B, and B alone, where A, B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise. The term "coupled" includes both direct and indirect connections, unless otherwise noted. "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated.
In the embodiments of the present application, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or descriptions. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
An embodiment of the present application provides a mobile terminal for near field communication, as shown in fig. 2, the mobile terminal 200 includes: an instruction generation module 21 and a data generation module 22.
The instruction generating module 21 is disposed in a rich execution environment REE (not shown in the figure), and a CA module 211 is disposed in the instruction generating module, and the CA module 211 responds to the first call command and generates a first instruction according to the first call command.
For example, N Client Applications (CAs) may be set in the CA module 211, where N is a positive integer; the first call command may be a payment command, a save consumption record command, an information recognition command, etc.
The data generating module 22 is disposed in a Trusted Execution Environment (TEE) (not shown in the figure), and a TA module 221 and an interaction module 222 are disposed in the data generating module 22, a communication relationship exists between the TA module 221 and the CA module 211, the TA module 221 receives a first instruction from the CA module 211, generates data information according to the first instruction, and sends the data information to the interaction module 222; the interaction module 222 is configured to send the data information to the NFC chip 23.
In this embodiment, N Trusted Applications (TAs) may be set in the TA module 221, where N is a positive integer. In this embodiment, a database may be set in the TA module 221 in advance, and the data information may be generated by invoking relevant information content in the database. The NFC chip 23 is further configured to send the data information to a wireless device 24, where the wireless device 24 may be a card reader, a door access controller, or a code scanner.
Optionally, a transfer module (not shown in fig. 2) is further disposed in the instruction generating module 21, and the transfer module is configured to transmit the first instruction to the TA module 221.
For example, the relay module may be a process, when there are A, B, C, D four TA applications in the TA module, and the CA module 211 needs to send an a instruction to an a in the TA module, and when the a instruction is transferred to the relay module, the relay module immediately notifies the a to start work, so that the a can successfully receive the a instruction, thereby preventing a transmission error of the a instruction and improving the working efficiency of the mobile terminal.
Optionally, the mobile terminal further comprises an initialization module (not shown in fig. 2), the initialization module being disposed within the rich execution environment REE; the initialization module controls the CA module 211 to generate a second instruction, and sends the second instruction to the TA module 221; the TA module 221 generates test data information according to the second instruction; the TA module 221 further generates verification data information, and the TA module 221 compares the test data information with the verification data information, if the test data information is consistent with the verification data information, the mobile terminal is initialized, otherwise, the CA module 211 regenerates the second instruction, and the initialization process is ended until the test data information generated by the TA module 221 is consistent with the verification data information.
Exemplarily, it is assumed that the verification data information generated by the TA module 221 is D, the second instruction is C, and the test data information generated by the TA module 221 according to the second instruction C is C. When C and D are consistent, the initialization is completed; when C and D are not consistent, the CA module 211 regenerates the second instruction D until the test data information generated by the TA module 221 is consistent with the verification data information, and ends the initialization process.
Optionally, when the CA module 211 stores sensitive data, a private key corresponding to the sensitive data is set in the TA module 221, and a public key of the private key is set in the CA module 211; the CA module 211 generates a public key according to the second call command, the TA module 221 receives the public key from the CA module 211, and the TA module 221 generates the sensitive data according to the public key and the private key, and sends the sensitive data to the interaction module 222.
In the present embodiment, it is most preferable to store all data information in the TA module 221, but it is not excluded that some data information may be placed in the CA module 211. If some sensitive data need to be stored in the CA module 211, so as to prevent the sensitive data from being leaked during transmission, a private key corresponding to the sensitive data needs to be set in the TA module 221, and a public key of the private key needs to be set in the CA module 211, then ciphertext transmission is performed in the CA module 211 and the TA module 221 at this time, and even if the ciphertext transmission is stolen, the ciphertext cannot be decrypted, so that the concealment of the sensitive data during transmission is improved.
The embodiment of the present application provides a processing method for near field communication, a flow of which is shown in fig. 3, and the specific steps are as follows:
s301, the CA module responds to a first calling command and generates a first instruction according to the first calling command, the CA module is arranged in the instruction generating module, and the instruction generating module is arranged in the rich execution environment REE.
S302, the TA module receives a first instruction from the CA module, generates data information according to the first instruction, and sends the data information to the interaction module, wherein the CA module and the interaction module are arranged in a trusted execution environment.
And S303, the interaction module sends the data information to an NFC chip.
Exemplarily, because a virtual bus card can be set in the mobile phone application, when a bus needs to pay, the mobile phone is close to the card swiping machine, at this time, the CA module receives a payment calling command, the CA module generates a payment instruction according to the calling command and sends the payment instruction to the TA module, the TA module receives the payment instruction and determines payment information according to the payment instruction, the payment information includes related payment information such as a payment mode and a payment amount, the TA module sends the determined payment information to the interaction module, the interaction module sends the payment information to the NFC chip, the NFC chip sends the payment information to the card swiping machine through a wireless network, and when a display screen on the card swiping machine displays the amount, the payment is successfully deducted.
In one possible embodiment, the CA module communicates the first instruction to the TA module via a relay module, which is disposed within the instruction generation module.
In yet another possible embodiment, the method further comprises: the initialization module controls the CA module to generate a second instruction and sends the second instruction to the TA module, and the initialization module is arranged in a rich execution environment REE; the TA module generates test data information according to the second instruction; and the TA module generates verification data information, compares the test data information with the verification data information, completes initialization of the mobile terminal if the test data information is consistent with the verification data information, otherwise, regenerates a second instruction by the CA module, and ends the initialization process until the test data information generated by the TA module is consistent with the verification data information.
In a further possible embodiment, when the CA module stores sensitive data, a private key corresponding to the sensitive data is set in the TA module, and a public key of the private key is set in the CA module; the CA module generates a public key according to the second calling command; and the TA module receives a public key from the CA module, generates the sensitive data according to the public key and the private key, and sends the sensitive data to the interaction module.
In other embodiments of the present application, an embodiment of the present application discloses an electronic device, which may include, as shown in fig. 4: one or more processors 401; a memory 402; a display 403; one or more application programs (not shown); and one or more computer programs 404, which may be connected via one or more communication buses 405. Wherein the one or more computer programs 404 are stored in the memory 402 and configured to be executed by the one or more processors 401, the one or more computer programs 404 comprising instructions which may be used to perform the steps as in the respective embodiment of fig. 3.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
Each functional unit in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a processor to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: flash memory, removable hard drive, read only memory, random access memory, magnetic or optical disk, and the like.
The above description is only a specific implementation of the embodiments of the present application, but the scope of the embodiments of the present application is not limited thereto, and any changes or substitutions within the technical scope disclosed in the embodiments of the present application should be covered by the scope of the embodiments of the present application. Therefore, the protection scope of the embodiments of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A mobile terminal for near field communication, comprising:
the instruction generation module is arranged in the rich execution environment REE, a CA module is arranged in the instruction generation module, and the CA module responds to a first calling command and generates a first instruction according to the first calling command;
the data generation module is arranged in a Trusted Execution Environment (TEE), a TA (timing advance) module and an interaction module are arranged in the data generation module, a communication relation exists between the TA module and the CA module, the TA module receives a first instruction from the CA module, generates data information according to the first instruction and sends the data information to the interaction module; and the interaction module is used for sending the data information to an NFC chip.
2. The mobile terminal according to claim 1, wherein a relay module is further disposed in the instruction generating module, and the relay module is configured to transmit the first instruction to the TA module.
3. The mobile terminal according to claim 1, further comprising an initialization module disposed within a rich execution environment REE;
the initialization module controls the CA module to generate a second instruction and sends the second instruction to the TA module;
the TA module generates test data information according to the second instruction;
the TA module also generates verification data information, compares the test data information with the verification data information, completes initialization of the mobile terminal if the test data information is consistent with the verification data information, otherwise, regenerates a second instruction by the CA module until the test data information generated by the TA module is consistent with the verification data information, and ends the initialization process.
4. The mobile terminal according to claim 1, wherein when the CA module stores sensitive data, a private key corresponding to the sensitive data is set in the TA module, and a public key of the private key is set in the CA module;
the CA module generates a public key according to a second calling command, the TA module receives the public key from the CA module, and the TA module generates the sensitive data according to the public key and the private key and sends the sensitive data to the interaction module.
5. A method for processing near field communication, comprising:
the CA module responds to a first calling command and generates a first instruction according to the first calling command, the CA module is arranged in an instruction generating module, and the instruction generating module is arranged in an abundant execution environment (REE);
the TA module receives a first instruction from the CA module, generates data information according to the first instruction, and sends the data information to the interaction module, wherein the CA module and the interaction module are arranged in a trusted execution environment;
and the interaction module sends the data information to an NFC chip.
6. The method of claim 5, wherein the CA module communicates the first command to the TA module via a relay module disposed within the command generation module.
7. The method of claim 5, further comprising:
the initialization module controls the CA module to generate a second instruction and sends the second instruction to the TA module, and the initialization module is arranged in a rich execution environment REE;
the TA module generates test data information according to the second instruction;
and the TA module generates verification data information, compares the test data information with the verification data information, completes initialization of the mobile terminal if the test data information is consistent with the verification data information, otherwise, regenerates a second instruction by the CA module, and ends the initialization process until the test data information generated by the TA module is consistent with the verification data information.
8. The method according to claim 5, wherein when the CA module stores sensitive data, the TA module sets a private key corresponding to the sensitive data, and sets a public key of the private key in the CA module;
the CA module generates a public key according to the second calling command;
and the TA module receives a public key from the CA module, generates the sensitive data according to the public key and the private key, and sends the sensitive data to the interaction module.
9. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program operable on the processor, the computer program, when executed by the processor, causing the processor to carry out the method of any one of claims 5 to 8.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 5 to 8.
CN202111462470.6A 2021-12-02 2021-12-02 Mobile terminal, processing method, equipment and medium for near field communication Pending CN114125828A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111462470.6A CN114125828A (en) 2021-12-02 2021-12-02 Mobile terminal, processing method, equipment and medium for near field communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111462470.6A CN114125828A (en) 2021-12-02 2021-12-02 Mobile terminal, processing method, equipment and medium for near field communication

Publications (1)

Publication Number Publication Date
CN114125828A true CN114125828A (en) 2022-03-01

Family

ID=80366179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111462470.6A Pending CN114125828A (en) 2021-12-02 2021-12-02 Mobile terminal, processing method, equipment and medium for near field communication

Country Status (1)

Country Link
CN (1) CN114125828A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616352A (en) * 2018-04-13 2018-10-02 北京握奇智能科技有限公司 Dynamic password formation method based on safety element and system
CN109544137A (en) * 2018-11-05 2019-03-29 深圳市恒达移动互联科技有限公司 Digital wallet generation method and system based on TEE and NFC

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616352A (en) * 2018-04-13 2018-10-02 北京握奇智能科技有限公司 Dynamic password formation method based on safety element and system
CN109544137A (en) * 2018-11-05 2019-03-29 深圳市恒达移动互联科技有限公司 Digital wallet generation method and system based on TEE and NFC

Similar Documents

Publication Publication Date Title
US11743721B2 (en) Protection of a communication channel between a security module and an NFC circuit
US10716007B2 (en) Protection of a security module in a telecommunication device coupled to an NFC circuit
US11963004B2 (en) Detection of a rerouting of a communication channel of a telecommunication device connected to an NFC circuit
CN102542453B (en) Mobile payment identity verification method
US9185561B2 (en) Protection against rerouting in an NFC circuit communication channel
EP2916484B1 (en) User Authentication using elliptic curve based OTP
US9179301B2 (en) Protection of a communication channel of a telecommunication device coupled to an NFC circuit against misrouting
CN102136172A (en) Card terminal and realization method thereof used by individuals or families
CN102938081A (en) Intelligent card individualized data processing, controller and system
TWI715833B (en) Air card issuing method, device, computing equipment, computer readable storage medium and computer program product
CN102665208B (en) Mobile terminal, terminal banking safety certifying method and system
WO2021133495A1 (en) Secure password generation and management using nfc and contactless smart cards
CN114125828A (en) Mobile terminal, processing method, equipment and medium for near field communication
CN105635103A (en) Network authentication method using card device
EP4246873A1 (en) Method and system for changing key in security module
CN102487320B (en) Method and system used for automatic teller machine identity authentication
CN109347791A (en) Double I/O bus SIM cards
CN106534047A (en) Information transmitting method and apparatus based on Trust application
CN109872148B (en) Trusted data processing method and device based on TUI and mobile terminal
CN114139121A (en) Identity verification method and device, electronic equipment and computer readable storage medium
KR20160046655A (en) Apparatus and method for user authentication using subscriber identification module
US20230367867A1 (en) Router
CN214475131U (en) Visual card transaction system based on digital currency payment
CN108600218B (en) Remote authorization system and remote authorization method
US20220311627A1 (en) Systems and methods for transaction card-based authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination