WO2013097351A1 - Procédé, dispositif et système pour une interaction de clé - Google Patents

Procédé, dispositif et système pour une interaction de clé Download PDF

Info

Publication number
WO2013097351A1
WO2013097351A1 PCT/CN2012/072192 CN2012072192W WO2013097351A1 WO 2013097351 A1 WO2013097351 A1 WO 2013097351A1 CN 2012072192 W CN2012072192 W CN 2012072192W WO 2013097351 A1 WO2013097351 A1 WO 2013097351A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
remote server
channel
processing device
service processing
Prior art date
Application number
PCT/CN2012/072192
Other languages
English (en)
Chinese (zh)
Inventor
傅启洪
朱渊
范勇
魏攀
赵栋
Original Assignee
中兴通讯股份有限公司
杨杰
张芝萍
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司, 杨杰, 张芝萍 filed Critical 中兴通讯股份有限公司
Publication of WO2013097351A1 publication Critical patent/WO2013097351A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • the present invention relates to the field of communications, and in particular to a key interaction method, device and system.
  • BACKGROUND OF THE INVENTION Near Field Communication (FC) is a short-range wireless communication technology suitable for handheld mobile devices. It combines radio frequency identification (Radio Frequency Identification, referred to as
  • NFC NFC's communication distance is usually 0-10 cm, which is a very safe communication range. Within this distance, data transfer between the two devices can be completed in a very short time.
  • FC technology has the advantages of simple and convenient connection, safe communication and automatic, and is a wireless communication technology that is very suitable for mobile phones.
  • Over-the-Air Technology is a technology for remotely managing data and applications of Universal Integrated Circuit Card (UICC) through the air interface of mobile communications.
  • the mode of the 0TA service support includes a short message mode and a Bearer Independent Protocol (BIP).
  • BIP Bearer Independent Protocol
  • the bearer modes supported by the BIP protocol include: General Packet Radio Service (GPRS); Wireless Local Area Networks (WLAN); Bluetooth, Wireless Fidelity (abbreviation) For WiFi) and more.
  • GPRS General Packet Radio Service
  • WLAN Wireless Local Area Networks
  • Bluetooth Wireless Fidelity
  • the application of OTA technology enables mobile communications to not only provide voice and data services, but also to provide new service downloads.
  • the service merchant manually checks the user's mobile phone information and checks it, and then confirms that it is correct.
  • Key review It can be seen that the operation in the related art as a method of using a short message or a verification code as a key certificate is cumbersome, reduces the user experience, and, because of the need to manually participate in reading information during verification, thereby increasing the occurrence of errors. Probability. SUMMARY OF THE INVENTION In view of the cumbersome operation of the key usage in the prior art, the present invention provides a key interaction scheme to solve at least the above problems.
  • a key interaction method including: a user equipment UE receives a key sent by a remote server; and in a case where the received key is needed, the UE and the service
  • the processing device establishes a near field communication FC channel; the UE transmits the key to the service processing device by using the established FC channel.
  • the user equipment UE receives the key sent by the remote server, and the method includes: the UE receiving a key sent by the remote server by using a bearer-independent protocol BIP in the over-the-air technology OTA.
  • the method further includes: the UE receiving a BIP channel open request sent by the remote server; and the UE starting the BIP channel The UE sends a BIP channel open confirmation message to the remote server.
  • the method further includes: the UE storing the key as an FC tag in the universal integrated circuit card UICC of the UE. in.
  • a key interaction apparatus located on a user equipment side, including: a communication processing module, configured to receive a key sent by a remote server; and a near field communication module, configured to process with a service The device establishes a near field communication FC channel, and transmits the key to the service processing device through the established FC channel.
  • the communication processing module is further configured to receive a key sent by the remote server through a bearer-independent protocol BIP in the over-the-air technology OTA.
  • the device further includes: a universal integrated circuit card UICC module, configured to receive a BIP channel open request sent by the remote server, to notify the communication processing module to open a BIP channel;
  • the module includes: an opening unit, configured to enable a BIP channel according to the BIP channel open request; and an acknowledgment unit configured to send a confirmation message that the BIP channel is opened to the UICC module.
  • the UICC module is further configured to store the key received by the communication processing module as an FC tag into the UICC.
  • the apparatus further includes: a deleting module, configured to delete the key from the UICC after the near field communication module transmits the key to the service processing device.
  • a user equipment UE is provided, including: the interaction device of the above key provided by the present invention.
  • a key interaction system is provided, including: a remote server, a user equipment UE, and a service processing device, where the remote server is configured to send a key to the UE;
  • the interaction device of the above-mentioned key provided by the present invention is configured to receive a key sent by the remote server, and establish a near field communication with the service processing device if the received key is needed to be used.
  • the FC channel is configured to transmit the key to the service processing device by using the established FC channel; the service processing device is configured to receive the key that is transmitted by the UE through an NFC channel.
  • the remote server sends a key to the UE by means of a bearer-independent protocol BIP in the over-the-air technology OTA.
  • the service processing device is further configured to: after receiving the key, send the received key to the remote server; the remote server is further configured to receive the service processing.
  • the key sent by the device verifies the received key and returns the verification result to the service processing device.
  • the user equipment receives the key sent by the remote server.
  • FIG. 1 is a schematic diagram of an interaction system of keys according to an embodiment of the present invention
  • 2 is a structural block diagram of an apparatus for interacting with a key according to an embodiment of the present invention
  • FIG. 3 is a structural block diagram of an apparatus for interacting with a preferred key according to an embodiment of the present invention
  • FIG. 4 is another preferred embodiment of the present invention according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of a key interaction method according to an embodiment of the present invention
  • FIG. 6 is a schematic diagram of a key distribution communication subsystem according to an embodiment of the present invention
  • FIG. 8 is a block diagram showing a structure of a user equipment according to an embodiment of the present invention
  • FIG. 9 is a flowchart of a key distribution method according to an embodiment of the present invention.
  • FIG. A flowchart of a method for using a key in an embodiment of the present invention.
  • BEST MODE FOR CARRYING OUT THE INVENTION the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
  • the present invention provides a key interaction method, device and system for the problem that the user equipment is cumbersome to operate and obtain the online consumer transaction key, the key is difficult to find, the key is easy to be lost, and the security factor is low. .
  • the key interaction scheme of the embodiment of the present invention integrates OTA, BIP, and NFC technologies, and the remote server can distribute the key to the user equipment through the BIP channel supported by the OTA mode, thereby avoiding the use of a short message, a verification code, or the like as a key. inconvenient.
  • the user equipment can store the key as an FC tag in the UICC card, so that the acquired key is not easily lost.
  • the user equipment touches the service processing device, establishes an FC channel for transmitting the key, and sends the key to the service processing device through the FC channel, so that the user does not need to manually find the key and present it to the key authenticator.
  • the service processing device receives the key sent by the user equipment, and requests the remote server to verify the received key, so that the authenticator does not need to manually check the key of the authentication user equipment.
  • a key interaction system is provided. As shown in FIG. 1, the system may include: a remote server 1, a user equipment 2 (UE), and a service processing device 3.
  • the remote server 1 is configured to send a key to the user equipment 2.
  • the user equipment 2 is configured to receive the key sent by the remote server 1, and establish a near field communication (FC) channel with the service processing device 3, and use the established FC channel to the service, if the received key is needed.
  • the processing device 3 transmits the above key.
  • the service processing device 3 is configured to receive a key transmitted by the user equipment 2 through the FC.
  • the user equipment receives the key sent by the remote server, and establishes an FC channel with the service processing device, for example, between the user equipment 2 and the service processing device 3, if the received key is needed.
  • the FC P2P connects and transmits the key to the service processing device through the established FC channel.
  • the service processing device receives the key transmitted by the user equipment through the FC channel, so that the user does not need to manually find the key and present it to the key authenticator.
  • the remote server 1 can send a key to the user equipment 2 through a bearer-independent protocol (BIP) in the over-the-air (OTA) technology, thereby avoiding short messages, verification codes, and the like.
  • BIP bearer-independent protocol
  • OTA over-the-air
  • the embodiment of the present invention is not limited thereto, and the remote server 1 may also send a key to the user equipment 2 by using a short message, a multimedia message, an email, or the like, and the user equipment 2 stores the received key as an FC label.
  • the service processing device 3 can verify the received key after receiving the key sent by the user equipment 2.
  • the service processing device 3 may send the received key to the remote server, requesting the remote server 1 to verify the key. Therefore, the service processing device 3 is further arranged to transmit the received key to the remote server 1 after receiving the key.
  • the remote server 1 is further configured to receive the key sent by the service processing device 3, verify the received key, and return the verification result to the service processing device 3.
  • the service processing device requests the remote server to verify the received key, so that the authenticator does not need to manually check the key of the user equipment, thereby improving the user experience.
  • a key interaction device is further provided.
  • the user equipment 2 located in the foregoing embodiment of the present invention can receive a key sent by the remote server 1 through a BIP channel supported by the OTA mode, and process the service to the service.
  • the device 3 transmits the received key to implement a simple key interaction process.
  • FIG. 2 is a structural block diagram of a key interaction apparatus according to an embodiment of the present invention.
  • the apparatus may include: a communication processing module 202 and a near field communication module 204.
  • the communication processing module 202 is configured to receive a key sent by the remote server 1.
  • the near field communication module 204 is configured to establish a Near Field Communication (FC) channel with the service processing device 3 in the case where the received key is required to be used, and transmit the key to the service processing device 3 through the established NFC channel.
  • the communication processing module receives the key sent by the remote server.
  • the near field communication module establishes an FC channel with the service processing device, and provides the service through the established NFC channel.
  • the processing device transmits the received key, so that the user does not need to manually find the key and present it to the key authenticator, so that the key interaction operation is simple and the user experience is improved.
  • the remote server 1 can send a key to the user equipment 2 through a BIP manner in the OTA.
  • the communication processing module 202 is further configured to receive the remote server 1 through the OTA The key sent by the BIP method. Therefore, in the embodiment of the present invention, the communication processing module 202 is also referred to as a BIP communication processing module 202.
  • the remote server 1 may request the user terminal 2 to open the BIP channel, and the user terminal 2 opens the BIP channel in response to the request, and feeds back the BIP channel to open the successful information to the remote server 1.
  • the remote server 1 uses the OTA technology to transmit the key to the user equipment 2 through the opened BIP channel. Therefore, in a preferred embodiment of the present invention, as shown in FIG. 3, the foregoing apparatus may further include: a UICC module 206 coupled to the BIP communication processing module 202, configured to receive a BIP channel sent by the remote server 1. The request is opened, and the BIP communication processing module 202 is notified to open the BIP channel.
  • the BIP communication processing module 202 may include: an opening unit 2022, configured to enable a BIP channel according to a BIP channel open request; and an acknowledgment unit 2024 configured to send a confirmation message that the BIP channel is opened to the UICC module 206. Further, after receiving the confirmation message that the BIP channel is enabled, the UICC module 206 may feed back the BIP channel open success message to the remote server 1. In order to avoid the problem that the key is easily lost by using a short message, a verification code, etc. as a key, the user equipment can store the received key in the UICC, and read the stored content from the UICC when the key needs to be used. Key data.
  • the UICC module 206 is further configured to store the key received by the BIP communication processing module as an FC tag into the UICC.
  • the key is stored in the UICC to avoid confusion between the key data and other data, thereby avoiding the problem that the key data is lost due to user operation errors, making the key data use more secure and further improving the user.
  • the remote server 1 transmits a key by other means such as a short message, a multimedia message, an email, or the like
  • the UICC module 206 can convert the received key and store the received key as an FC tag.
  • the key data is obtained from the multimedia message, and the obtained key data is stored as an FC tag in the UICC card.
  • the apparatus may further include: a deleting module 208, configured to be dense after the near field communication module 204 transmits the key to the service processing device 3.
  • the key is removed from the UICC.
  • the embodiment of the present invention is not limited thereto. In an actual application, the used key stored in the UICC may also be deleted when the key is received next time. With the preferred embodiment, confusion between different keys is avoided, and UICC storage space is saved.
  • a user equipment which may include the interaction device of the key provided by the foregoing embodiment of the present invention.
  • the service processing device touches the FC channel that establishes the transmission key, and sends the key to the service processing device through the FC channel, so that the user does not need to manually find the key and present it to the key authenticator.
  • a key interaction method is also provided, and a key interaction process and system provided by the foregoing embodiment of the present invention can implement a convenient key interaction process.
  • FIG. 5 is a flowchart of a method for interacting a key according to an embodiment of the present invention.
  • the method may include the following steps (step S502 - step S506): Step S502, the user equipment (UE) receives the far The key sent by the end server.
  • Step S504 The user equipment establishes a Near Field Communication (FC) channel with the service processing device if the received key needs to be used.
  • Step S506 The user equipment transmits the received key to the service processing device by using the established NFC channel.
  • the user equipment receives the key sent by the remote server, and the user equipment establishes an FC channel with the service processing device and transmits the data to the service processing device through the established NFC channel.
  • the remote server 1 may send a key to the UE in a BIP manner in the OTA.
  • the remote server 1 may request the user terminal 2 before sending the key.
  • the user terminal 2 opens the BIP channel in response to the request, and feeds back the BIP channel open success message to the remote server 1.
  • the remote server 1 transmits the key to the user equipment 2 through the opened BIP channel by using OTA technology.
  • the remote server 2 Before the user equipment receives the key sent by the remote server, the remote server 2 sends a BIP channel open request to the user equipment 1, and the user equipment 1 receives the BIP channel open request sent by the remote server 2, and starts the BIP channel according to the BIP channel open request. And sending a BIP channel open confirmation message to the remote server 1.
  • the user equipment 1 receives the key sent by the remote server 2, in order to avoid the problem that the key is easily lost as a key by using a short message, a verification code, or the like.
  • the received key can be stored as an FC tag in the UICC, and when the key needs to be used, the user device 1 reads the stored key data from the UICC.
  • the user equipment 1 may encapsulate the received key to generate a DEF message format recognizable by the FC communication transmission.
  • the key is stored in the UICC to avoid confusion between the key data and other data (such as other short messages in the short message mode), thereby avoiding The problem that the key data is lost due to user operation errors makes the use of the key data more secure and further improves the user experience.
  • the user equipment 1 may use the used secret.
  • the key is removed from the UICC.
  • the embodiment of the present invention is not limited thereto.
  • the used key stored in the UICC may also be deleted when the key is received next time. With the preferred embodiment, confusion between different keys is avoided, and UICC storage space is saved.
  • the service processing device 3 receives the key transmitted by the user equipment 2, performs data analysis to extract the key transmitted by the user equipment 2, and verifies the received key.
  • the service processing device 3 transmits the key transmitted by the user equipment 2 to the remote server 1 , request remote server 1 to verify the key. After the remote server 1 verifies that the key is completed, it can return the audit result to the service processing device.
  • the service processing device 3 receives the audit result returned by the remote server 1 after the key audit.
  • the interaction system of the key in this embodiment is shown in FIG. 1 and includes a remote server 1, a user equipment 2, and a service processing device 3.
  • the remote server 1 is set to distribute and audit the user key.
  • the user equipment 2 is configured to receive and use the key distributed by the remote server 1;
  • the service processing device 3 is configured to receive the key sent by the user equipment 2, and interact with the remote server to request the remote server 1 to review the received Key.
  • the remote server 1 distributes the user key through the BIP channel, and the user device 2 receives the key distributed by the remote server 1 through the BIP channel, and stores the received key in the UICC for use by the user terminal 2.
  • the user equipment 2 When the user uses the key, the user equipment 2 is located close to the service processing device 3, and the FC channel between the user equipment 2 and the service processing device 3 is established. The user equipment 2 transmits the key to the service processing device through the established FC channel. 3. The service processing device 3 transmits the key to the remote server 1 through the network channel for the remote server 1 to audit. After the audit is completed, the remote server 1 returns the audit result to the service processing device 3. In a preferred embodiment of the embodiment of the present invention, the service processing device 3 can also feed back the audit result to the user equipment 2 through the FC channel.
  • the above system of the embodiment can be divided into two subsystems according to the distribution and use of the key, that is, the key distribution communication subsystem and the key usage communication subsystem, and the following two sub-substrates respectively
  • the system is described.
  • 6 is a schematic diagram of a distribution communication subsystem of a key according to an embodiment of the present invention, showing a structure of a communication system for key distribution.
  • the subsystem may include: a remote server 1, BIP communication Processing module 202 and UICC module 206.
  • the remote server 1 is configured to distribute the user key; the BIP communication processing module 202 (located on the user equipment side) is configured to open the BIP channel for the remote server 1 to transmit the key through the OTA; the UICC module 206 (located on the user equipment side) , set to store the key.
  • the remote server 1 requests the UICC module 206 to open the BIP channel, and the UICC module 206 notifies the BIP communication processing module 202 to open the BIP channel in response to the request.
  • the BIP communication processing module 202 feeds back the information that the BIP channel is successfully opened to the UICC module 206.
  • the UICC module 206 notifies the remote server 1 that the BIP channel has been successfully opened.
  • the remote server 1 uses OTA technology to transmit the key to the UICC module 206 through the opened BIP channel.
  • 7 is a schematic diagram of a communication subsystem using a key according to an embodiment of the present invention, showing a communication system structure for key usage.
  • the subsystem includes: a near field communication module 204, a UICC module 206.
  • the key management module 302 (located on the service processing device side) and the remote server 1.
  • the near field communication module 204 is configured to establish an NFC data channel connection;
  • the UICC module 206 is configured to store a key;
  • the key management module 302 is configured to manage a key read from the user device 2, and is responsible for interacting with the remote server 1 Communication;
  • Remote Server 1 set to audit whether the key used by the user is valid.
  • FIG. 8 is a structural block diagram of a user equipment according to this embodiment. As shown in FIG. 8, the user equipment includes: a BIP communication processing module 202, a near field communication module 204, a UICC module 206, and a service application processing module 210.
  • the BIP communication processing module 202 is configured to open the BIP channel, so that the mobile terminal can receive the key distributed by the remote server through the OTA technology; the near field communication module 204 is configured to establish an FC data channel connection; and the UICC module 206 is set to store the confidentiality. Key; business application processing module 210, configured to provide a user interface for viewing and using keys.
  • Embodiment 3 In the embodiment of the present invention, the key interaction process may be divided into two processes: key distribution and key usage. The distribution process of the key is described in this embodiment.
  • FIG. 9 is a flowchart of a key distribution method according to an embodiment of the present invention. As shown in FIG.
  • the method may include the following steps (step S902 to step S912): Step S902, a remote server of a service provider
  • Step S902 a remote server of a service provider
  • the UICC card of the user equipment sends a BIP channel open request.
  • Step S904 the user UICC card responds to the server request, and notifies the BIP communication processing module to open the BIP channel.
  • Step S906 the BIP communication processing module opens the BIP channel in response to the request notification of the UICC card.
  • the channel open message is fed back to the UICC card.
  • Step S910 After receiving the feedback information of the BIP channel opening, the remote server transmits the key to the UICC card through the opened BIP channel through the OTA technology.
  • Step S912 the user equipment receives the key data and stores it as an FC electronic tag in the UICC card for use by the user.
  • the key distribution process is completed, and the user can view and use the key through the user equipment.
  • Embodiment 4 This embodiment describes a procedure for using a key after the key is distributed to the UE.
  • FIG. 10 is a flowchart of a method for using a key according to an embodiment of the present invention. As shown in FIG. 10, the method may include the following steps (step S1002 - step S1012): Step S1002, the user first selects a key to be used.
  • Step S1004 The service processing device reads the key tag data from the user equipment by using the established FC data channel.
  • Step S1008 The user equipment sends a prompt tone, prompting the user that the key data is read.
  • the application automatically deletes the key label.
  • Step S1010 The service processing device communicates with the remote server, and notifies the remote server to review the key.
  • Step S1012 After the remote server is audited, the audit result is fed back to the service processing device.
  • the business processing device displays the audit results.
  • the process of using the key is completed, and the user can end the use of the key by using the user device to touch the service processing device, so that the key is safe and convenient to use.
  • the user equipment receives the key sent by the remote server, and the user equipment establishes an FC channel with the service processing device if the received key needs to be used. And transmitting the received key to the service processing device through the established NFC channel. Therefore, when the key is used, the user does not need to manually find the key and present it to the key verification party, so that the key interaction operation is convenient and fast, and the key is improved.
  • the remote server distributes the key to the user equipment through the BIP channel supported by the OTA mode, thereby avoiding the inconvenience of using a short message, a verification code, or the like as a key.
  • the user equipment can store the key in the UICC card so that the acquired key is not easily lost.
  • the service processing device receives the key sent by the user equipment, and requests the remote server to verify the received key, so that the authenticator does not need to manually check the key of the authentication user equipment.
  • the user equipment can delete the used key from the UICC, avoiding confusion between different keys, and saving UICC storage space.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé, un dispositif et un système pour une interaction de clé. Le procédé comprend les opérations suivantes : un équipement utilisateur (UE) reçoit une clé transmise par un serveur à distance; dans un scénario dans lequel l'utilisation de la clé reçue est requise, l'UE établit un canal de communication en champ proche (NFC) avec un dispositif de traitement de service; et l'UE transmet la clé reçue au dispositif de traitement de service par l'intermédiaire du canal NFC établi. Lors de l'utilisation de la clé, la présente invention rend inutile le besoin, pour un utilisateur, de rechercher manuellement la clé et de présenter celle-ci à une partie de vérification de clé, permettant ainsi des opérations d'interaction de clé commodes et expéditives, et une expérience d'utilisateur améliorée.
PCT/CN2012/072192 2011-12-27 2012-03-12 Procédé, dispositif et système pour une interaction de clé WO2013097351A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110445050.7 2011-12-27
CN2011104450507A CN103188206A (zh) 2011-12-27 2011-12-27 密钥的交互方法、装置及系统

Publications (1)

Publication Number Publication Date
WO2013097351A1 true WO2013097351A1 (fr) 2013-07-04

Family

ID=48679175

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/072192 WO2013097351A1 (fr) 2011-12-27 2012-03-12 Procédé, dispositif et système pour une interaction de clé

Country Status (2)

Country Link
CN (1) CN103188206A (fr)
WO (1) WO2013097351A1 (fr)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202621A (zh) * 2006-12-13 2008-06-18 联想(北京)有限公司 非接触设备间对数据进行安全验证的方法和系统
CN101958026A (zh) * 2010-09-15 2011-01-26 宇龙计算机通信科技(深圳)有限公司 一种用户认证模块的设置方法和设置系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7628322B2 (en) * 2005-03-07 2009-12-08 Nokia Corporation Methods, system and mobile device capable of enabling credit card personalization using a wireless network
CN101729246B (zh) * 2008-10-24 2012-02-08 中兴通讯股份有限公司 密钥分发方法和系统
CN101742478B (zh) * 2008-11-10 2013-06-05 中兴通讯股份有限公司 智能卡从安全域密钥更新分发方法、系统及移动终端
CN101540804B (zh) * 2009-05-06 2011-07-20 候万春 一种能够承载移动通信智能卡的增值业务智能卡
CN101883142A (zh) * 2010-06-22 2010-11-10 中兴通讯股份有限公司 一种终端用户信息备份方法
CN101997678A (zh) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 一种获取密码的方法及终端

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202621A (zh) * 2006-12-13 2008-06-18 联想(北京)有限公司 非接触设备间对数据进行安全验证的方法和系统
CN101958026A (zh) * 2010-09-15 2011-01-26 宇龙计算机通信科技(深圳)有限公司 一种用户认证模块的设置方法和设置系统

Also Published As

Publication number Publication date
CN103188206A (zh) 2013-07-03

Similar Documents

Publication Publication Date Title
US9628585B2 (en) Systems and methods for cross-layer secure connection set up
JP5415600B2 (ja) 近接さに基づいてダイナミック信用証明インフラストラクチャを配備する方法および装置
US9806558B2 (en) Wireless charging equipment, terminal, wireless charging system comprising the same, control method thereof and non-transitory computer readable storage medium having computer program recorded thereon
CN104137587B (zh) 一种发送、接收用户数据的方法及终端设备
US7965983B1 (en) Method and system for conveying medical information to a medical service person
KR101674903B1 (ko) 개인 네트워크를 이용한 서비스 제공 방법 및 장치
WO2011160584A1 (fr) Procédé de communication de données sécurisée à courte distance basé sur des ondes sonores ou audio, et appareil associé
CN104982021A (zh) 向无线对接服务认证无线对接方
WO2012091351A2 (fr) Système et procédé pour assurer la transmission de données confidentielles en liaison radio, sur des dispositifs de communication mobiles avec des éléments sécurisés non uicc
US9432364B2 (en) System and method for providing a service to end terminal that uses authentication information of another mobile communication terminal, service server, mobile communication terminal, end terminal, and storage medium
EP2583409B1 (fr) Appareil et procédé d'enregistrement d'un réseau personnel
CN101309143A (zh) 一种移动终端间互访共享数据的方法及系统
US20150006377A1 (en) Method and apparatus for transmitting wallets between mobile devices
CN112956155A (zh) Ssp设备和服务器协商数字证书的装置和方法
US20090015374A1 (en) User authentication system and method
US20110034149A1 (en) Method for releasing a mobile communication card for the use of a service of a mobile communication network and user equipment for interaction with a mobile communication network
CN102685704A (zh) 手机交易方法及系统
WO2013097351A1 (fr) Procédé, dispositif et système pour une interaction de clé
KR20120126468A (ko) 인증번호 중계 방법 및 시스템과 이를 위한 프로그램
CN102843658A (zh) 一种sim贴片卡及该贴片卡安全处理短消息的方法
KR20070039368A (ko) 휴대 인터넷 통신망을 이용한 카드결제 보안처리 방법 및시스템과 결제단말장치와 이를 위한 프로그램을 기록한것을 특징으로 하는 컴퓨터로 판독 가능한 기록매체
CN106533686B (zh) 加密通信方法和系统、通信单元、客户端
KR101952439B1 (ko) 역방향 다중 통신 제공 방법
JP2023128329A (ja) 通信認証の方法及び通信認証端末装置
KR101962471B1 (ko) 역방향 다중 통신 제어 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12862315

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12862315

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 12862315

Country of ref document: EP

Kind code of ref document: A1