CN105025480B - The method and system of subscriber card digital signature authentication - Google Patents
The method and system of subscriber card digital signature authentication Download PDFInfo
- Publication number
- CN105025480B CN105025480B CN201410176006.4A CN201410176006A CN105025480B CN 105025480 B CN105025480 B CN 105025480B CN 201410176006 A CN201410176006 A CN 201410176006A CN 105025480 B CN105025480 B CN 105025480B
- Authority
- CN
- China
- Prior art keywords
- digital signature
- signed
- subscriber card
- data
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000004044 response Effects 0.000 claims abstract description 21
- 230000002452 interceptive effect Effects 0.000 claims abstract description 15
- 238000012790 confirmation Methods 0.000 claims abstract description 12
- 230000008569 process Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
This disclosure relates to a kind of method and system of subscriber card digital signature authentication.This method includes the request in response to application to digital signature, encrypts and is encoded to two dimensional code for signature request and data to be signed using backstage, be shown in application page;Client in mobile terminal is scanned the two dimensional code being shown in application page, and identifies the information that two dimensional code is carried;In response to the signature request carried in two dimensional code, the data to be signed carried in two dimensional code are sent to the subscriber card in mobile terminal by machine card interactive interface by client;Subscriber card shows data to be signed on mobile terminals;Confirmation in response to user to data to be signed, subscriber card are digitally signed data to be signed using the private key of digital signature, and are returned to signature result using backstage by client;Signature result is verified using backstage.The disclosure not only avoids using the unstable factor of short message receiving-transmitting between backstage and user but also reduces the cost being digitally signed.
Description
Technical field
Disclosure field of communication security is particularly related to a kind of method and system of subscriber card digital signature authentication.
Background technique
With becoming increasingly popular for internet business, in order to ensure the safety of transaction, the authentication in process of exchange becomes
It obtains particularly important.Digital signature can determine that message is strictly to be signed and issued by sender, while can determine that the complete of message
Whole property.In case of changing, the value of digital signature will also change signature contents.Different files will obtain different numbers
Signature, so that it is guaranteed that the integrality of information transmission, the legitimacy of identity of the sender, the generation for preventing transaction from denying.
Subscriber card digital signature is digital signature encryption mode safer at present.But in the reality of subscriber card digital signature
It is found in the use of border, when needing trade confirmation, needs to send from the backstage of entire digital signature system to user to be signed
Data SMS is digitally signed after user verification, and user returns to signature result just in a manner of upstream data short message again
Trade confirmation is completed, as shown in Figure 1.
Often cause digital signature business using unstable because short message is delayed in above-mentioned entire signature process,
Simultaneously for users, certain communication fee can also be generated by continually sending uplink short message, be unfavorable for digital signature business
Carry out.
Summary of the invention
The disclosure proposes new technical solution in view of at least one of problem above.
The disclosure provides a kind of method of subscriber card digital signature authentication in terms of one, after both avoiding application
The unstable factor of short message receiving-transmitting reduces the cost being digitally signed again between platform and user.
The disclosure provides a kind of system of subscriber card digital signature authentication in its another aspect, after both avoiding application
The unstable factor of short message receiving-transmitting reduces the cost being digitally signed again between platform and user.
According to the disclosure, a kind of method of subscriber card digital signature authentication is provided, comprising:
Request in response to application to digital signature, signature request and data to be signed using backstage encrypted and be encoded to
Two dimensional code is shown in application page;
Client in mobile terminal is scanned the two dimensional code being shown in application page, and identifies two dimensional code institute
The information of carrying;
In response to the signature request carried in two dimensional code, client in mobile terminal will be carried in two dimensional code to
Signed data is sent to the subscriber card in mobile terminal by machine card interactive interface;
Subscriber card shows data to be signed on mobile terminals;
Confirmation in response to user to data to be signed, subscriber card carry out data to be signed using the private key of digital signature
Digital signature, and returned to signature result using backstage by the client in mobile terminal;
Signature result is verified using backstage.
In some embodiments of the present disclosure, this method further include:
The public key for digital signature is prestored in application backstage, and the private for digital signature is prestored in subscriber card
Key.
In some embodiments of the present disclosure, machine card interactive interface is open mobile API.
In some embodiments of the present disclosure, subscriber card loads digital signature unit with hardware bearing mode.
In some embodiments of the present disclosure, the client in mobile terminal is returned to signature result by data network
Using backstage.
According to the disclosure, a kind of system of subscriber card digital signature authentication is additionally provided, including whole using backstage and movement
End, wherein mobile terminal includes client and subscriber card,
Signature request and data to be signed are encrypted simultaneously for the request in response to application to digital signature using backstage
It is encoded to two dimensional code, is shown in application page, and signature result is verified;
Client in mobile terminal for being scanned to the two dimensional code being shown in application page, and identifies two
The information that dimension code is carried, in response to the signature request carried in two dimensional code, the data to be signed that will be carried in two dimensional code
It is sent to the subscriber card in mobile terminal by machine card interactive interface, the signature result that the subscriber card in mobile terminal returns is returned
Back to application backstage;
Subscriber card in mobile terminal shows data to be signed for receiving on mobile terminals, treats in response to user
The confirmation of signed data, subscriber card are digitally signed data to be signed using the private key of digital signature, and by signature result
Return to the client in mobile terminal.
In some embodiments of the present disclosure, using the public key also prestored from the background for digital signature, subscriber card is also prestored
Private key for digital signature.
In some embodiments of the present disclosure, machine card interactive interface is open mobile API.
In some embodiments of the present disclosure, subscriber card loads digital signature unit with hardware bearing mode.
In some embodiments of the present disclosure, the client in mobile terminal is returned to signature result by data network
Using backstage.
In the technical solution of the disclosure, application backstage with no longer need to interact by short message mode wait sign between user
Name data, but data to be signed are interacted between subscriber card on application backstage by scanning the two-dimensional code mode.Therefore, because abandoning
With short message mode, on the one hand eliminates and send use cost brought by short message, on the other hand also avoid prolonging due to short message
The influence of the unstable factors to digital signature authentication such as slow.
Detailed description of the invention
Attached drawing described herein is used to provide further understanding of the disclosure, constitutes part of this application.Attached
In figure:
Fig. 1 is the schematic diagram that the prior art realizes subscriber card digital signature authentication.
Fig. 2 is the schematic diagram that the disclosure realizes subscriber card digital signature authentication.
Fig. 3 is the flow diagram of the method for the subscriber card digital signature authentication of an embodiment of the present disclosure.
Fig. 4 is the message schematic diagram of the method for the subscriber card digital signature authentication of another embodiment of the disclosure.
Fig. 5 is the structural schematic diagram of the system of the subscriber card digital signature authentication of an embodiment of the present disclosure.
Specific embodiment
The disclosure is described below with reference to accompanying drawings.It should be noted that description below is only explanatory in itself and shows
Example property, never as to the disclosure and its application or any restrictions used.Unless stated otherwise, otherwise, implementing
Component described in example and the positioned opposite and numerical expression and numerical value of step are not intended to limit the scope of the present disclosure.In addition,
Technology well known by persons skilled in the art, method and apparatus may not be discussed in detail, but be meant as in appropriate circumstances
Part of specification.
In order to be more convenient, stablize and at low cost using digital signature business, the disclosure utilizes two-dimensional code scanning, knowledge
Not Ying Yong and the technologies such as machine card interactive interface realize the digital signature to critical data.
Two dimensional code (that is, 2D barcode) is using certain specific geometric figure according to certain rules in plane (that is, two dimension
Direction) distribution chequered with black and white figure identifying recording layer symbolic information.In code compilation, bit stream is dexterously utilized
Concept, indicate the information such as text and numerical value using several geometrical bodies corresponding with binary system, inputted by image
Equipment or photoelectric scanning device are automatically distinguished to realize automatically processing for information.There is two dimensional code high density coding, information to hold
The features such as amount is big, coding range is wide, open ended information is tens times higher than common bar code.
With popularizing for smart phone, more and more mobile phones have the function of camera-shooting scanning, thus can use two dimension
Code scanning realizes number with interacting between user mobile phone card to obtain data to be signed, in conjunction with mobile terminal client terminal or application
Word signature, avoids the unstable factor using short message receiving-transmitting between backstage and user, and reduce to digital signature service
Use cost, implementation process is as shown in Figure 2.
Fig. 3 is the flow diagram of the method for the subscriber card digital signature authentication of an embodiment of the present disclosure.
As shown in figure 3, the embodiment may comprise steps of:
S302, the request in response to application to digital signature encrypt signature request and data to be signed simultaneously using backstage
It is encoded to two dimensional code, is shown in application page;
Specifically, using backstage when handling the certification request of some application, if necessary to the critical data to the application
It is digitally signed confirmation, then application backstage generates two using planar bar code technology for after signature request and data to be signed encryption
Code is tieed up, be shown in application page and prompts the client scan two dimensional code in user's mobile terminal.
S304, the client in mobile terminal is scanned the two dimensional code being shown in application page, and identifies two
The information that dimension code is carried;
Specifically, general mobile terminal all has camera function, and the client in mobile terminal can star the function at this time
The two dimensional code being shown in application page can be scanned.It, can be by the client in mobile terminal to this after scanning through two dimensional code
Two dimensional code is decoded, and identifies decoded information.
S306, in response to the signature request carried in two dimensional code, the client in mobile terminal will be held in two dimensional code
The data to be signed of load are sent to the subscriber card in mobile terminal by machine card interactive interface;
Specifically, if shown using background request to two including signature request in the decoded information of two dimensional code
The data to be signed carried in dimension code are digitally signed.At this point, client in mobile terminal according to the signature request from
Dynamic triggering digital signature procedure.That is, the data to be signed carried in two dimensional code are passed through mobile terminal client terminal and subscriber card
Between machine card interactive interface data to be signed are sent to subscriber card.
S308, subscriber card show data to be signed on mobile terminals;
Specifically, subscriber card is true for the ease of user after the data to be signed for receiving mobile terminal client terminal transmission
Recognize, pops up the text information of data to be signed on a display screen.
S310, the confirmation in response to user to data to be signed, subscriber card treat number of signature using the private key of digital signature
Signature result is returned to using backstage according to being digitally signed, and by the client in mobile terminal;
Specifically, if the data to be signed shown on mobile terminal are correct, user can with input validation information,
At this point, subscriber card is treated after the confirmation message for detecting user's input using the digital signature private key being pre-stored in subscriber card
Signed data is digitally signed.After the completion of digital signature, signature result is returned to mobile terminal client terminal by subscriber card, visitor
Family end is then forwarded to by data network using backstage, and the participation of user is during which not necessarily to.
S312 verifies signature result using backstage;
Required public affairs are digitally signed for each user it should be pointed out that being stored in advance in application backstage
Key.Using backstage receive subscriber card transmission digital signature result after, using storage public key to digital signature result into
Row verifying.
In this embodiment, application backstage with no longer need to interact data to be signed by short message mode between user,
But data to be signed are interacted between subscriber card on application backstage by scanning the two-dimensional code mode.Therefore, because having abandoned short
On the one hand letter mode eliminates and sends use cost brought by short message, on the other hand also avoids due to short message delay etc. no
Influence of the ballast to digital signature authentication.
Wherein, the machine card interactive interface in mobile terminal can be open mobile API, make in mobile terminal
Using or client be able to access that a variety of different security modules in mobile terminal, for example, user mobile phone card and embedded peace
Full module.
In addition, in order to make user's fixture have digital signature function number can be loaded in subscriber card with hardware bearing mode
Word signature unit.
Specifically, subscriber card digital signature is loading digital signature list using user mobile phone card as a kind of hardware bearing mode
Digital signature private key is integrated in user mobile phone card by member, has advantage safely and conveniently.Client in mobile terminal or
It can be completed by open mobile API using the communication between user mobile phone card, to realize entire digital signature
Process.
In addition, mobile terminal can be returned to signature result by data network after subscriber card completes digital signature
Using backstage, for example, the mobile networks such as the wireless networks such as WiFi, 3G and 4G.
Next, being described further by technical solution of the specific example to the disclosure.
Fig. 4 is the message schematic diagram of the method for the subscriber card digital signature authentication of another embodiment of the disclosure.
As shown in figure 4, digital signature authentication process the following steps are included:
Step 1 can be to such as signature request and number to be signed using backstage when application needs to be digitally signed
After being encrypted according to equal critical data relevant to digital signature, is encoded using planar bar code technology, generate corresponding two dimensional code, and
The two dimensional code is shown in application page, while user being prompted to be scanned it.
Further, user information and application message can also be carried in two dimensional code and is sent to mobile terminal client terminal,
To help mobile application or client to carry out information judgement or information processing in process.
Wherein, data to be signed refer to the information for needing user to confirm, can include but is not limited to transfer information, using product
Divide, modify the information such as account.
User information can be determined by login is each using required information.For example, can be user account, user mobile phone
Number, user log in IP etc..
Step 2, user by being scanned using security software to the two dimensional code that application page is shown in mobile phone, and
Whether identification wherein carries signature request information.
Specifically, bit string entrained by two dimensional code can be identified by image recognition technology, then to being identified
Bit string (for example, character string) be decrypted, inquire and identify wherein whether there is signature request information.
Step 3 after carrying signature request information in inquiring two dimensional code, passes through the interaction of machine card using security software
Interface open mobile API is interacted with subscriber card, transmits data to be signed, accesses the digital signature list in subscriber card
Member, request are digitally signed.
Data to be signed are presented to the user by step 4, subscriber card, after receiving the confirmation message of user, utilize storage
Private key in subscriber card is digitally signed data to be signed, and signature result is returned to using security software.
The verify datas such as user information, signing messages are returned to using security software by data network and are answered by step 5
With backstage.
It is communicated it should be pointed out that existing way multi-pass crosses data SMS (that is, OTA short message) with subscriber card, often
Biggish time delay is had, leads to that information can not receive or information is expired, while subscriber card needs to send multiple uplink short message, also can
Bring additional short-message fee.As long as and then data network is unobstructed for the disclosure, at least for user experience angle, does not deposit substantially
In time delay.
Step 6 is decrypted and verifies to user's signature data using backstage.
Specifically, digital signature result is carried out using the public key corresponding with user information stored in it using backstage
Decoding, can confirm with used public key according to decoding result and verify whether to pass through to relative users.If simultaneously will
User information is returned to using backstage, can directly be looked into according to the corresponding relationship of user information and user information and public key using backstage
Corresponding public key is looked for be decrypted and verify.
Step 7 completes whole process after digital signature authentication is legal.
Two dimensional code is scanned using security software it can be seen that whole process user need to only open, does not need to apply
Backstage sends the data SMS containing data to be signed to user, and user's signature, which does not need to send to application backstage after completing, yet to be contained
The data SMS of signature result, it is therefore prevented that influence of the short message delay to digital signature, simultaneously because without sending short message, therefore
Reduce the cost that user uses digital signature business.
Disclosure signature request and data to be signed, which are directly parsed by two dimensional code, to be obtained, caused by avoiding short message delay
Fail Transaction risk.By the interaction of open mobileAPI machine card interface, subscriber card is directly right for mobile phone application software and subscriber card
Data to be signed are digitally signed, and are submitted to by application security software and are verified using backstage automatically, avoid line number
According to the delay of short message bring and cost issues.
It will appreciated by the skilled person that realizing that the whole of above method embodiment and part steps can pass through
The relevant hardware of program instruction is completed, and program above-mentioned can store in a compute device readable storage medium, the journey
Sequence when being executed, executes step including the steps of the foregoing method embodiments, and storage medium above-mentioned may include ROM, RAM, magnetic disk
With the various media that can store program code such as CD.
Fig. 5 is the structural schematic diagram of the system of the subscriber card digital signature authentication of an embodiment of the present disclosure.
As shown in figure 5, the system 50 in the embodiment may include using backstage 502 and mobile terminal 504.Wherein, institute
Stating mobile terminal 504 includes client 504a and subscriber card 504b,
Signature request and data to be signed are encrypted for the request in response to application to digital signature using backstage 502
It is encoded to two dimensional code and is shown in application page, and signature result is verified using backstage;
Client 504a in mobile terminal for being scanned to the two dimensional code being shown in application page, and is identified
The information that two dimensional code is carried out, it is to be signed by what is carried in two dimensional code in response to the signature request carried in two dimensional code
Data are sent to the subscriber card 504b in mobile terminal by machine card interactive interface, and the subscriber card 504b in mobile terminal is returned
Signature result return to using backstage;
Subscriber card 504b in mobile terminal, for receiving and showing data to be signed on mobile terminals, in response to
Confirmation of the family to data to be signed, is digitally signed data to be signed using the private key of digital signature, and by signature result
Return to the client 504a in mobile terminal.
In this embodiment, application backstage with no longer need to interact data to be signed by short message mode between user,
But data to be signed are interacted between subscriber card on application backstage by scanning the two-dimensional code mode.Therefore, because having abandoned short
On the one hand letter mode eliminates and sends use cost brought by short message, on the other hand also avoids due to short message delay etc. no
Influence of the ballast to digital signature authentication.
Further, using the public key also prestored from the background for digital signature, subscriber card is also prestored for digital signature
Private key.
Further, machine card interactive interface is open mobile API.
In addition, subscriber card loads digital signature unit with hardware bearing mode.
In addition, the client in mobile terminal is returned to signature result using backstage by data network.
Above-described embodiment simplifies the process of existing digital signature authentication by planar bar code technology and machine cartoon letters technology, mentions
The high success rate of digital signature authentication enhances the safety of verification process.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with its
The difference of his embodiment, identical and similar part can be with cross-reference between each embodiment.For Installation practice
For, since it is basically similar to the method embodiment, so being described relatively simple, related place may refer to embodiment of the method
Partial explanation.
Disclosure above-described embodiment must be received and be sent out back and forth using when subscriber card digital signature business for current user
Data SMS is sent, when note system is there are the delay easily caused when unstable situation to digital signature authentication, may be influenced whole
A process of exchange.It sends data SMS simultaneously and also brings certain expense, there are stability not strong, tranaction costs increased costs to ask
Topic proposes and applies security software scanning recognition two dimensional code using in terminal, by obtaining application page information two dimensional code
Mode directly acquires data to be signed, then machine cartoon letters is carried out by open mobile API and subscriber card, in user couple
After data to be signed are confirmed, subscriber card is again digitally signed the data to be signed, and digital signature result is returned to
Using security software, it is submitted to by application security software by data network and completes signature authentication process, entire number using backstage
Word signature process stability is improved, while reducing the use cost to the business.
Although describing the disclosure with reference to exemplary embodiment, it should be appreciated that the present disclosure is not limited to above-mentioned exemplary
Embodiment.It will be obvious to those skilled in the art that can be modified under conditions of without departing substantially from the scope of the present disclosure and spirit
Exemplary embodiments mentioned above.The range of the attached claims should be endowed widest explanation, such to repair comprising all
Change and equivalent structure and function.
Claims (8)
1. a kind of method of subscriber card digital signature authentication characterized by comprising
Request in response to application to digital signature, signature request and data to be signed are encrypted and be encoded to two dimension using backstage
Code, is shown in application page, to prompt the client in user's mobile terminal to the two dimensional code being shown in application page
It is scanned;
Client in mobile terminal is scanned the two dimensional code being shown in application page, and identifies that two dimensional code is carried
Information;
It include signature request and data to be signed in response to the information carried in two dimensional code, the client in mobile terminal is by two
The data to be signed carried in dimension code are sent to the subscriber card in mobile terminal by machine card interactive interface;
Subscriber card shows data to be signed on mobile terminals;
Confirmation in response to user to data to be signed, subscriber card carry out number to data to be signed using the private key of digital signature
Signature, and returned to signature result using backstage by data network by the client in mobile terminal;
Signature result is verified using backstage.
2. the method for subscriber card digital signature authentication according to claim 1, which is characterized in that the method also includes:
The public key for digital signature is prestored in application backstage, and the private key for digital signature is prestored in subscriber card.
3. the method for subscriber card digital signature authentication according to claim 1, which is characterized in that the machine card interactive interface
For open mobile API.
4. the method for subscriber card digital signature authentication according to claim 1, which is characterized in that the subscriber card is with hardware
Bearing mode loads digital signature unit.
5. a kind of system of subscriber card digital signature authentication, which is characterized in that including application backstage and mobile terminal, wherein move
Dynamic terminal includes client and subscriber card,
The application backstage encrypts signature request and data to be signed simultaneously for the request in response to application to digital signature
It is encoded to two dimensional code, is shown in application page, to prompt the client in user's mobile terminal to being shown in application page
On two dimensional code be scanned;And signature result is verified;
Client in the mobile terminal for being scanned to the two dimensional code being shown in application page, and identifies two
The information that dimension code is carried;It include signature request and data to be signed in response to the information carried in two dimensional code, by two dimensional code
Middle carried data to be signed are sent to the subscriber card in mobile terminal by machine card interactive interface;By the use in mobile terminal
The signature result that family card returns is returned to by data network using backstage;
Subscriber card in the mobile terminal, for receiving and showing data to be signed on mobile terminals;In response to user couple
The confirmation of data to be signed is digitally signed data to be signed using the private key of digital signature, and signature result is returned
To the client in mobile terminal.
6. the system of subscriber card digital signature authentication according to claim 5, which is characterized in that the application backstage is also pre-
The public key for digital signature is deposited, the subscriber card also prestores the private key for digital signature.
7. the system of subscriber card digital signature authentication according to claim 5, which is characterized in that the machine card interactive interface
For open mobile API.
8. the system of subscriber card digital signature authentication according to claim 5, which is characterized in that the subscriber card is with hardware
Bearing mode loads digital signature unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410176006.4A CN105025480B (en) | 2014-04-29 | 2014-04-29 | The method and system of subscriber card digital signature authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410176006.4A CN105025480B (en) | 2014-04-29 | 2014-04-29 | The method and system of subscriber card digital signature authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105025480A CN105025480A (en) | 2015-11-04 |
CN105025480B true CN105025480B (en) | 2019-04-05 |
Family
ID=54415103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410176006.4A Active CN105025480B (en) | 2014-04-29 | 2014-04-29 | The method and system of subscriber card digital signature authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105025480B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104158668A (en) * | 2014-09-09 | 2014-11-19 | 北京数字认证股份有限公司 | Method and system for realizing electronic signature |
CN106888089B (en) * | 2015-12-16 | 2019-12-13 | 卓望数码技术(深圳)有限公司 | method and system for electronic signature and mobile communication terminal for electronic signature |
CN107846663B (en) * | 2016-09-21 | 2021-01-12 | 中国电信股份有限公司 | Method, device and system for realizing remote management of user subscription data set |
EP3684004A1 (en) * | 2019-01-21 | 2020-07-22 | Ngrave bvba | Offline interception-free interaction with a cryptocurrency network using a network-disabled device |
CN114268445B (en) * | 2020-09-15 | 2024-12-27 | 中国电信股份有限公司 | Authentication method, device, system, authentication module and terminal for cloud phone application |
CN112202794A (en) * | 2020-09-30 | 2021-01-08 | 中国工商银行股份有限公司 | Transaction data protection method and device, electronic equipment and medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1764296A (en) * | 2004-10-22 | 2006-04-26 | 北京握奇数据系统有限公司 | Dynamic password identification system and method |
CN101222333A (en) * | 2007-12-24 | 2008-07-16 | 北京握奇数据系统有限公司 | Data transaction processing method and apparatus |
EP2426873A1 (en) * | 2009-06-01 | 2012-03-07 | ZTE Corporation | Method for implementing the real time data service and real time data service system |
CN103581907A (en) * | 2012-08-03 | 2014-02-12 | 北京中创智信科技有限公司 | Mobile electronic signature method, service platform, equipment and system |
CN103617531A (en) * | 2013-12-16 | 2014-03-05 | 信雅达系统工程股份有限公司 | Safety payment method and device based on credible two-dimension code |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6951801B2 (en) * | 2003-01-27 | 2005-10-04 | Freescale Semiconductor, Inc. | Metal reduction in wafer scribe area |
-
2014
- 2014-04-29 CN CN201410176006.4A patent/CN105025480B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1764296A (en) * | 2004-10-22 | 2006-04-26 | 北京握奇数据系统有限公司 | Dynamic password identification system and method |
CN101222333A (en) * | 2007-12-24 | 2008-07-16 | 北京握奇数据系统有限公司 | Data transaction processing method and apparatus |
EP2426873A1 (en) * | 2009-06-01 | 2012-03-07 | ZTE Corporation | Method for implementing the real time data service and real time data service system |
CN103581907A (en) * | 2012-08-03 | 2014-02-12 | 北京中创智信科技有限公司 | Mobile electronic signature method, service platform, equipment and system |
CN103617531A (en) * | 2013-12-16 | 2014-03-05 | 信雅达系统工程股份有限公司 | Safety payment method and device based on credible two-dimension code |
Also Published As
Publication number | Publication date |
---|---|
CN105025480A (en) | 2015-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105099692B (en) | Security verification method and device, server and terminal | |
CN105025480B (en) | The method and system of subscriber card digital signature authentication | |
CN104765999B (en) | Method, terminal and server for processing user resource information | |
CN106559783B (en) | Authentication method, device and system for WIFI network | |
CN105306211B (en) | A kind of identity identifying method of client software | |
CN106936792A (en) | Safety certifying method and system and the mobile terminal for safety certification | |
CN104820944A (en) | Method and system for bank self-service terminal authentication, and device | |
CN103825734A (en) | Sensitive operation verification method, terminal equipment, server and verification system | |
CN102394887A (en) | OAuth protocol-based safety certificate method of open platform and system thereof | |
CN103929402A (en) | Sensitive operation verification method, terminal device, servers and verification system | |
CN105678365A (en) | Two-dimensional code e-ticket generation method and system, two-dimensional code e-ticket verification method and verification terminal | |
CN102026180A (en) | M2M transmission control method, device and system | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
CN104464117A (en) | Automatic tell machine money withdrawing method and system based on dynamic two-dimensional code | |
CN110472426B (en) | Method for scanning, encrypting and decrypting bid document instead of real object U shield | |
CN107733838A (en) | A kind of mobile terminal client terminal identity identifying method, device and system | |
CN101662458A (en) | Authentication method | |
CN102801724A (en) | Identity authentication method combining graphic image with dynamic password | |
CN106162641B (en) | A kind of safe public WiFi authentication method and system | |
CN106789841A (en) | Method for processing business, terminal, server and system | |
JP2019510316A (en) | Method and device for providing account linking and service processing | |
CN103854061A (en) | Method and system for applying, generating and checking electronic tickets | |
CN104253689A (en) | User identity module card generated dynamic password authentication method and system based on QR (quick response) code | |
CN104660401A (en) | Authentication method, authentication system and terminal | |
US20200351264A1 (en) | Method and System for Securely Authenticating a User by an Identity and Access Service Using a Pictorial Code and a One-Time Code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |