WO2016066026A1 - 一种借助外部终端验证的安全智能卡及其验证方法 - Google Patents

一种借助外部终端验证的安全智能卡及其验证方法 Download PDF

Info

Publication number
WO2016066026A1
WO2016066026A1 PCT/CN2015/092053 CN2015092053W WO2016066026A1 WO 2016066026 A1 WO2016066026 A1 WO 2016066026A1 CN 2015092053 W CN2015092053 W CN 2015092053W WO 2016066026 A1 WO2016066026 A1 WO 2016066026A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification
module
card
sub
external terminal
Prior art date
Application number
PCT/CN2015/092053
Other languages
English (en)
French (fr)
Inventor
冯晓
郑建宾
吕旭峰
褚红梅
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Publication of WO2016066026A1 publication Critical patent/WO2016066026A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips

Definitions

  • the present invention relates to a smart card, and in particular to a secure smart card that can be used after verification by an external terminal and a verification method thereof.
  • bank cards are used as payment tools commonly used by consumers, and the frequency of practical use is getting higher and higher. Therefore, there are more and more types of risks due to cards, as follows:
  • Card Copy Risk At present, for magnetic stripe cards, the technology of reading magnetic stripe cards on the market is no longer a secret; for IC cards, although the encryption level is higher than that of magnetic stripe cards, there is also a risk of being read. After being read, in general, the user is unaware of the risk of being stolen.
  • the present invention is directed to providing a secure smart card capable of further improving the security of a smart card by means of an external terminal and a verification method thereof.
  • a security chip module for storing card information of the smart card
  • a card verification sub-module configured to trigger a verification function of the smart card and issue a startup or shutdown work request to the security chip module according to the verification result, and only if a startup work request is issued to the security chip module Trigger the following timing sub-module;
  • the Token submodule is used to generate a verification code for verification when the card needs to be verified
  • An I/O communication submodule configured to perform data transmission with the external terminal
  • the timing sub-module is configured to time the available time of the smart card according to the trigger of the card verification sub-module.
  • the method further includes: an opening key disposed outside the security smart card for starting the card verification submodule.
  • the power sub-module is in a sleep state in the default mode, and the power is in an active state when verification is required.
  • the I/O communication sub-module is configured to send a verification code generated by the Token sub-module to the external terminal by using a communication interaction manner, and to receive a verification result from the external terminal.
  • the communication interaction manner includes: ultrasound, Bluetooth, and NFC.
  • the verification method for verifying the above-mentioned secure smart card verified by the external terminal of the present invention comprises the following steps:
  • the verification code transmission step the Token sub-module generates a verification code and transmits to the external terminal through communication interaction;
  • the external terminal verification step after receiving the verification code, the external terminal verifies the verification code and sends the verification result back to the card verification sub-module;
  • the card activation/shutdown step if the verification result is successful, the card verification sub-module activates the security chip startup working state and simultaneously activates the timing sub-module, and if the verification result is a failure, the card verification sub-module does not activate the security chip;
  • the timing sub-module starts counting after being activated by the card verification sub-module, and notifies the security chip to close the working state after reaching a preset time.
  • the verification code is a Token serial number.
  • the communication interaction manner includes: ultrasound, Bluetooth, and NFC.
  • the manner in which the external terminal verifies the verification code includes local verification and cloud verification.
  • the security smart card verified by the external terminal of the present invention and the verification method thereof can further improve the security of the card by performing mutual authentication with the external terminal. This In this case, even if the user loses the card, since the user other than the user has no external terminal, the unlocking will not be possible, and the card will be in the closed state and cannot be used. Therefore, the security smart card verified by the external terminal of the present invention and the verification method thereof can more securely secure the funds of the user security smart card.
  • FIG. 1 is a block diagram showing the construction of a secure smart card verified by an external terminal of the present invention.
  • FIG. 2 is a flow chart showing a verification method of a secure smart card verified by an external terminal according to the present invention.
  • FIG. 1 is a block diagram showing the construction of a secure smart card verified by an external terminal of the present invention.
  • the security smart card verified by the external terminal of the present invention includes a security chip 100, a card verification submodule 200, a Token submodule, an I/O communication submodule, and a power submodule 500.
  • the secure smart card authenticated by the external terminal of the present invention performs communication verification with the external terminal 700 through communication interaction.
  • the security chip module 100 is a security chip module of an IC card for storing card information of a smart card.
  • the security chip module 100 is used to store the card number, expiration date, CVN, and the like of the bank card.
  • the card verification sub-module 200 is configured to trigger the verification function of the smart card and issue a startup or shutdown work request to the security chip module 100 according to the verification result, and trigger on the other hand only if a startup work request is issued to the security chip module 100.
  • the timing sub-module 600 is described.
  • the Token sub-module 300 is a verification code for generating a verification if the card needs to be verified.
  • the verification code it may be a Token sequence code.
  • the I/O communication sub-module 400 is used for data transmission with the external terminal 700.
  • the communication mode between the I/O communication sub-module 400 and the external terminal 700 is not particularly limited.
  • the communication method includes ultrasonic, low-power Bluetooth, and NFC.
  • the power submodule 500 is a power module of the security smart card for providing power to the security smart card.
  • the power supply In the default mode, the power supply is in a sleep state, and when verification is required, the power supply is in a working state.
  • the timing sub-module 600 counts the available time of the smart card under the trigger of the card verification sub-module 200.
  • the user can set the available time of the card. For example, if the time is set to 5 minutes, the timing sub-module 600 performs timing under the trigger of the card verification sub-module 200. When the card is reached for 5 minutes, the notification card verification sub-module is notified. 600 issues a closed job request to the security chip. In this way, within 5 minutes set by the user, the user can continuously swipe the card without re-authentication. If the set time is exceeded, the verification and unlocking need to be performed again.
  • the outside of the security smart card is also provided with an opening key for starting the card verification sub-module 100.
  • the user presses the switch key to initiate verification.
  • FIG. 2 is a flow chart showing a verification method of a secure smart card verified by an external terminal according to the present invention.
  • the verification method includes the following steps:
  • the card verification sub-module 200 is activated by the switch button, and the card verification sub-module 200 activates the Token sub-module.
  • the Token sub-module 200 generates a verification code and transmits it to the external terminal 700 through communication interaction.
  • the Token sub-module 200 generates a Token sequence number as a verification code, and the Token sub-module 200 transmits the generated Token sequence number to the I/O communication sub-module 400, and the I/O communication sub-module 400 passes ultrasound, Bluetooth, NFC, etc.
  • the communication interaction mode transmits the Token serial number to the external terminal 700.
  • the external terminal 700 verifies the verification code after receiving the verification code and sends the verification result back to the card verification sub-module 200.
  • the external terminal 700 calls the APP client in the external terminal 700 to verify whether the Token serial number is correct, and the verification manner includes, but is not limited to, local verification and cloud verification.
  • the so-called local authentication means that the verification logic is placed in the APP client of the external terminal 700, and the external terminal 700 directly authenticates locally after receiving the verification information.
  • the so-called cloud verification means that the verification logic will be placed. After being placed in the cloud server, the external terminal 700 sends the verification information to the cloud server after receiving the verification information. After receiving the verification information, the server verifies and returns the verification result to the external terminal 700.
  • the card verification sub-module 200 activates the security chip module 100 to start the working state and simultaneously activates the timing sub-module 600. If the verification result is a failure, the card verification sub-module 200 does not activate the security chip.
  • the timing sub-module 600 starts counting after being activated by the card verification sub-module 200, and notifies the security chip module 100 to turn off the working state after reaching a preset time.
  • the security smart card verified by the external terminal of the present invention and the verification method thereof can further improve the security of the card by performing mutual authentication with the external terminal.
  • the security smart card verified by the external terminal of the present invention and the verification method thereof can more securely secure the funds of the user security smart card.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Credit Cards Or The Like (AREA)
  • Telephone Function (AREA)
  • Lock And Its Accessories (AREA)

Abstract

本发明涉及一种借助外部终端验证的安全智能卡。该借助外部终端验证的安全智能卡包括:安全芯片模块,用于存储智能卡的卡片信息;卡验证子模块,用于触发智能卡的验证功能并且根据验证结果向所述安全芯片模块发出启动或者关闭的工作请求,另一方面仅在向所述安全芯片模块发出启动的工作请求的情况下才触发下述计时子模块;Token子模块,在卡片需要进行验证的情况下,用于生成验证用的验证码;I/O通信子模块,用于与所述外部终端之间进行数据传输;电源子模块,用于给安全智能卡提供电源;以及计时子模块,用于根据所述卡验证子模块的触发对智能卡的可用时间进行计时。根据本发明,能够更进一步提高智能卡的安全性。

Description

一种借助外部终端验证的安全智能卡及其验证方法
技术领域
本发明涉及智能卡,具体地涉及一种能够借助外部终端进行验证后使用的安全智能卡及其验证方法。
背景技术
目前,银行卡作为消费者常用的支付工具,实用的频率越来越高。因此,由于卡片而产生的风险类型也越来越多,具体如下:
卡片遗失风险:目前,多数用户将卡片放在钱包内,如果钱包遗失,由于钱包内常存有身份证、工作卡等私人信息,或因其他原因,用户的密码被通过其他渠道盗取,因此,卡片遗失后引起的资金风险较大。
卡片复制风险:目前,对于磁条卡,市面上读取磁条卡的技术已不再是秘密;对于IC卡,虽然加密水平比磁条卡高,但也存在被读取的风险。且被读取后,一般情况下,用户并不知情,被盗用的风险依然很高。
发明内容
鉴于上述问题,本发明旨在提供一种能够进一步提高智能卡的安全性的借助外部终端验证的安全智能卡及其验证方法。
本发明的借助外部终端验证的安全智能卡,其特在于,包括:
安全芯片模块,用于存储智能卡的卡片信息;
卡验证子模块,用于触发智能卡的验证功能并且根据验证结果向所述安全芯片模块发出启动或者关闭的工作请求,另一方面仅在向所述安全芯片模块发出启动的工作请求的情况下才触发下述计时子模块;
Token子模块,在卡片需要进行验证的情况下,用于生成验证用的验证码;
I/O通信子模块,用于与所述外部终端之间进行数据传输;
电源子模块,用于给安全智能卡提供电源;以及
计时子模块,用于根据所述卡验证子模块的触发对智能卡的可用时间进行计时。
优选地,还包括:设置在所述安全智能卡外部的、用于启动所述卡验证子模块的开关键。
优选地,所述电源子模块在默认模式下电源处于睡眠状态,当需要验证时电源处于工作状态。
优选地,所述I/O通信子模块用于将所述Token子模块产生的验证码利用通信交互方式发送到所述外部终端,并且用于接受来自所述外部终端的验证结果。
优选地,所述通信交互方式包括:超声波、蓝牙、NFC。
本发明的对上述借助外部终端验证的安全智能卡进行验证的验证方法包括下述步骤:
启动验证步骤,通过开关按键启动卡验证子模块,卡验证子模块激活Token子模块;
验证码传输步骤,Token子模块产生验证码并且通过通信交互方式传输至外部终端;
外部终端验证步骤,外部终端收到验证码后对验证码进行验证并且将验证结果发送回卡验证子模块;
卡激活/关闭步骤,如果验证结果为成功,则卡验证子模块激活安全芯片启动工作状态并同时激发计时子模块,如果验证结果为失败,卡验证子模块不激活安全芯片;
计时步骤,计时子模块在被所述卡验证子模块激活后开始计时,在达到预先设定的时间后通知安全芯片关闭工作状态。
优选地,所述验证码为Token序列号。
优选地,所述通信交互方式包括:超声波、蓝牙、NFC。
优选地,在外部终端验证步骤中,外部终端对验证码进行验证的方式包括本地验证、云端验证。
本发明的借助外部终端验证的安全智能卡及其验证方法相对目前的现有技术而言,能够通过与外部终端进行交互认证,进一步提高了卡片的安全性。这 样,用户即使遗失了卡片,由于除用户本人之外的其他使用者没有外部终端,将无法进行解锁,卡片将处于关闭状态,不能使用。因此,本发明的借助外部终端验证的安全智能卡及其验证方法能够更号地保证用户安全智能卡的资金安全。
附图说明
图1是表示本发明的借助外部终端验证的安全智能卡的构造示意图。
图2是表示本发明的借助外部终端验证的安全智能卡的验证方法的流程示意图。
_
具体实施方式
下面介绍的是本发明的多个实施例中的一些,旨在提供对本发明的基本了解。并不旨在确认本发明的关键或决定性的要素或限定所要保护的范围。
图1是表示本发明的借助外部终端验证的安全智能卡的构造示意图。
如图1所示,本发明的借助外部终端验证的安全智能卡包括安全芯片100、卡验证子模块200、Token子模块、I/O通信子模块、电源子模块500。本发明的借助外部终端验证的安全智能卡通过通信交互与外部终端700进行通信验证。
下面,对于安全智能卡的各组成单元进行说明。
安全芯片模块100是IC卡的安全芯片模块,它用于存储智能卡的卡片信息。例如,智能卡是银行卡的情况下,安全芯片模块100用于储存银行卡的卡号、有效期、CVN等。
卡验证子模块200用于触发智能卡的验证功能并且根据验证结果向安全芯片模块100发出启动或者关闭的工作请求,另一方面仅在向安全芯片模块100发出启动的工作请求的情况下才触发下述计时子模块600。
Token子模块300是在卡片需要进行验证的情况下用于生成验证用的验证码。作为验证码可以是Token序列码。
I/O通信子模块400用于与外部终端700之间进行数据传输。在本发明中不对I/O通信子模块400与外部终端700之间的通讯方式进行特别限定,优选地通讯方式有超声波、低功率蓝牙、NFC。
电源子模块500是安全智能卡的电源模块,用于给安全智能卡提供电源, 默认模式下电源处于睡眠状态,当需要验证时,电源处于工作状态。
计时子模块600在卡验证子模块200的触发下对于智能卡的可用时间进行计时。用户能够对卡片的可用时间进行设定,例如设定为5分钟的情况下,计时子模块600在卡验证子模块200的触发下进行计时,在达到5分钟的情况下,通知卡验证子模块600向安全芯片发出关闭的工作请求。这样在用户设定的5分钟时间内,用户可以连续刷卡而不需要重新进行验证,如果超过该设定的时间之后,则需要重新进行验证解锁。
进一步,安全智能卡的外部还设置有用于启动卡验证子模块100的开关键。在需要进行验证时,用户按下该开关键来启动验证。
下面,对于对上述的借助外部终端验证的安全智能卡进行验证的验证方法的过程进行具体说明。
图2是表示本发明的借助外部终端验证的安全智能卡的验证方法的流程示意图。
如图2所示,该验证方法包括下述步骤:
(1)启动验证步骤
用户如果需使用卡片,通过开关按键启动卡验证子模块200,卡验证子模块200激活Token子模块。
(2)验证码传输步骤
Token子模块200产生验证码并且通过通信交互方式传输至外部终端700。
具体地,Token子模块200生成作为验证码生成Token序列号,Token子模块200将生成的Token序列号传送到I/O通信子模块400,I/O通信子模块400通过超声波、蓝牙、NFC等通信交互方式将Token序列号传输至外部终端700。
(3)外部终端验证步骤
外部终端700收到验证码后对验证码进行验证并且将验证结果发送回卡验证子模块200。
具体地,外部终端700收到验证码后调用外部终端700中的APP客户端验证Token序列号是否正确,作为验证方式包括但不限于本地验证、云端验证。
所谓本地验证是指将验证逻辑放置于外部终端700的APP客户端内,外部终端700收到验证信息后,直接本地验证。所谓云端验证是指,将验证逻辑放 置于云端服务器,外部终端700收到验证信息后将验证信息发送到云端服务器,服务器收到验证信息后,进行验证并向外部终端700返回验证结果。
(4)卡激活/关闭步骤
如果验证结果为成功,则卡验证子模块200激活安全芯片模块100启动工作状态并同时激发计时子模块600,如果验证结果为失败,卡验证子模块200不激活安全芯片。
(5)计时步骤
计时子模块600在被所述卡验证子模块200激活后开始计时,在达到预先设定的时间后通知安全芯片模块100关闭工作状态。
本发明的借助外部终端验证的安全智能卡及其验证方法相对目前的现有技术而言,能够通过与外部终端进行交互认证,进一步提高了卡片的安全性。这样,用户即使遗失了卡片,由于除用户本人之外的其他使用者没有外部终端,将无法进行解锁,卡片将处于关闭状态,不能使用。因此,本发明的借助外部终端验证的安全智能卡及其验证方法能够更号地保证用户安全智能卡的资金安全。
以上例子主要说明了本发明的借助外部终端验证的安全智能卡及其验证方法。尽管只对其中一些本发明的具体实施方式进行了描述,但是本领域普通技术人员应当了解,本发明可以在不偏离其主旨与范围内以许多其他的形式实施。因此,所展示的例子与实施方式被视为示意性的而非限制性的,在不脱离如所附各权利要求所定义的本发明精神及范围的情况下,本发明可能涵盖各种的修改与替换。

Claims (9)

  1. 一种借助外部终端验证的安全智能卡,其特在于,包括:
    安全芯片模块,用于存储安全智能卡的卡片信息;
    卡验证子模块,用于触发安全智能卡的验证功能并且根据验证结果向所述安全芯片模块发出启动或者关闭的工作请求,另一方面仅在向所述安全芯片模块发出启动的工作请求的情况下才触发下述的计时子模块;
    Token子模块,在安全智能卡需要进行验证的情况下,用于生成验证用的验证码;
    I/O通信子模块,用于与所述外部终端之间进行数据传输;
    电源子模块,用于对安全智能卡提供电源;以及
    计时子模块,用于根据所述卡验证子模块的触发对智能卡的可用时间进行计时。
  2. 如权利要求1所述的借助外部终端验证的安全智能卡,其特在于,还包括:
    设置在所述安全智能卡外部的、用于启动所述卡验证子模块的开关键。
  3. 如权利要求1所述的借助外部终端验证的安全智能卡,其特在于,
    所述电源子模块在默认模式下电源处于睡眠状态,当需要验证时电源处于工作状态。
  4. 如权利要求1所述的借助外部终端验证的安全智能卡,其特在于,
    所述I/O通信子模块用于将所述Token子模块产生的验证码利用通信交互方式发送到所述外部终端并且用于接受来自所述外部终端的验证结果。
  5. 如权利要求4所述的借助外部终端验证的安全智能卡,其特在于,
    所述通信交互方式包括:超声波、蓝牙、NFC。
  6. 一种对权利要求2~5所述的借助外部终端验证的安全智能卡进行验证的验证方法,其特征在于,包括下述步骤:
    启动验证步骤,通过开关按键启动卡验证子模块,卡验证子模块激活Token子模块;
    验证码传输步骤,Token子模块产生验证码并且通过通信交互方式传输至外部终端;
    外部终端验证步骤,外部终端收到验证码后对验证码进行验证并且将验证结果发送回卡验证子模块;
    卡激活/关闭步骤,如果验证结果为成功,则卡验证子模块激活安全芯片启动工作状态并同时激发计时子模块,如果验证结果为失败,卡验证子模块不激活安全芯片;
    计时步骤,计时子模块在被所述卡验证子模块激活后开始计时,在达到预先设定的时间后通知安全芯片关闭工作状态。
  7. 如权利要求6所述的验证方法,其特征在于,
    所述验证码为Token序列号。
  8. 如权利要求6所述的验证方法,其特征在于,
    所述通信交互方式包括:超声波、蓝牙、NFC。
  9. 如权利要求6所述的验证方法,其特征在于,
    在外部终端验证步骤中,外部终端对验证码进行验证的方式包括本地验证、云端验证。
PCT/CN2015/092053 2014-10-27 2015-10-16 一种借助外部终端验证的安全智能卡及其验证方法 WO2016066026A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410579028.5 2014-10-27
CN201410579028.5A CN105590124B (zh) 2014-10-27 2014-10-27 一种借助外部终端验证的安全智能卡及其验证方法

Publications (1)

Publication Number Publication Date
WO2016066026A1 true WO2016066026A1 (zh) 2016-05-06

Family

ID=55856584

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/092053 WO2016066026A1 (zh) 2014-10-27 2015-10-16 一种借助外部终端验证的安全智能卡及其验证方法

Country Status (2)

Country Link
CN (1) CN105590124B (zh)
WO (1) WO2016066026A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900490B (zh) * 2018-06-21 2021-04-20 咪付(广西)网络技术有限公司 一种基于蓝牙和声波的安全认证方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101004797A (zh) * 2007-01-25 2007-07-25 上海柯斯软件有限公司 大容量智能卡中数据安全存储的方法
US20080011859A1 (en) * 2006-07-17 2008-01-17 Simon Phillips Method and apparatus for personalizing contactless card with switch
US20120256004A1 (en) * 2011-04-07 2012-10-11 Redbud Systems, LLC Selectively enabled rfid tag

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5021522B2 (ja) * 2008-02-26 2012-09-12 株式会社東海理化電機製作所 カード型電子キー
CN102695170A (zh) * 2011-03-25 2012-09-26 国民技术股份有限公司 一种具有身份认证功能的移动平台和身份认证方法
CN103095460B (zh) * 2013-01-22 2015-07-22 飞天诚信科技股份有限公司 一种智能卡安全通讯的方法
CN103580872B (zh) * 2013-11-11 2016-12-07 北京华大智宝电子系统有限公司 一种用于密钥生成与管理的系统及方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080011859A1 (en) * 2006-07-17 2008-01-17 Simon Phillips Method and apparatus for personalizing contactless card with switch
CN101004797A (zh) * 2007-01-25 2007-07-25 上海柯斯软件有限公司 大容量智能卡中数据安全存储的方法
US20120256004A1 (en) * 2011-04-07 2012-10-11 Redbud Systems, LLC Selectively enabled rfid tag

Also Published As

Publication number Publication date
CN105590124B (zh) 2018-08-07
CN105590124A (zh) 2016-05-18

Similar Documents

Publication Publication Date Title
JP6629952B2 (ja) モバイルアプリケーションの安全性を確保する方法および装置
CN102315942B (zh) 一种带蓝牙的安全终端及其与客户端的通信方法
US20050182971A1 (en) Multi-purpose user authentication device
Busold et al. Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer
US20070223685A1 (en) Secure system and method of providing same
US20100277278A1 (en) Contactless biometric authentication system and authentication method
EP3480718B1 (en) System and method for facilitating authentication via a shortrange wireless token
CN109075965B (zh) 使用口令码验证的前向安全密码技术的方法、系统和装置
JP2004506361A (ja) デバイスの検証ステータスを提供することによる電子通信におけるエンティティ認証
CN103198247B (zh) 一种计算机安全保护方法和系统
WO2013123453A1 (en) Data storage devices, systems, and methods
CN103701977A (zh) 便捷式电子设备、通信系统以及信息认证方法
JP2015138545A (ja) 電子支払システム及び電子支払方法
CN101714216B (zh) 半导体元件、生物体认证方法和系统、便携式终端
EP3403368B1 (en) 2-factor authentication for network connected storage device
WO2015055120A1 (zh) 用于安全性信息交互的装置
CN205788194U (zh) 一种云端和本地安全存储数据和文件的装置
WO2019205590A1 (zh) 电池认证方法、设备电池、无人机及存储介质
WO2016066026A1 (zh) 一种借助外部终端验证的安全智能卡及其验证方法
KR101103189B1 (ko) 범용 가입자 식별 모듈 정보를 이용한 공인 인증서 발급방법 및 시스템과 이를 위한 기록매체
TW201725529A (zh) 供個人以行動裝置進行網路交易之攜帶裝置及其應用方法
US20240211929A1 (en) Method for controlling a smart card
US20240056305A1 (en) Method for managing a one-time-password
JP2004186913A (ja) 利用者認証方法、情報端末装置、情報記憶媒体
WO2007092429A2 (en) Secure system and method for providing same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15855027

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 01/09/2017)

122 Ep: pct application non-entry in european phase

Ref document number: 15855027

Country of ref document: EP

Kind code of ref document: A1