[go: up one dir, main page]

CN104301885A - Application cryptograph data processing method and system - Google Patents

Application cryptograph data processing method and system Download PDF

Info

Publication number
CN104301885A
CN104301885A CN201310303935.2A CN201310303935A CN104301885A CN 104301885 A CN104301885 A CN 104301885A CN 201310303935 A CN201310303935 A CN 201310303935A CN 104301885 A CN104301885 A CN 104301885A
Authority
CN
China
Prior art keywords
data
application
card
contact
predeterminable area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310303935.2A
Other languages
Chinese (zh)
Other versions
CN104301885B (en
Inventor
王欣
孟祥雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sumavision Technologies Co Ltd
Original Assignee
Sumavision Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sumavision Technologies Co Ltd filed Critical Sumavision Technologies Co Ltd
Priority to CN201310303935.2A priority Critical patent/CN104301885B/en
Publication of CN104301885A publication Critical patent/CN104301885A/en
Application granted granted Critical
Publication of CN104301885B publication Critical patent/CN104301885B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an application cryptograph data processing method and a system. According to the method, application cryptograph data of a server is received by a non-contact type IC card through a communication interface of a mobile terminal, the non-contact type IC card is arranged in or outside the mobile terminal, the application cryptograph data is analyzed by the non-contact type IC card in a first preset zone, and the application cryptograph data after analysis is loaded and maintained in a second preset zone. According to the method and the system, operation is simple and convenient, and cost is saved.

Description

The processing method of application cryptogram data and system
Technical field
The present invention relates to the communications field, in particular to a kind of processing method and system of application cryptogram data.
Background technology
So-called M1 chip, refer to the chip abbreviation of producing at Philips display drivers grace intelligence Pu, full name is NXP Mifare1 series, conventional has S50 and S70 two profiles number, all have homemade chip and its compatibility at present, utilize PVC to encapsulate M1 chip, induction antenna, then namely the compressing rear card made is the M1 card alleged by smart card industry, belong to contact-free integrated circuit (Integrated Circuit, referred to as IC) card.Non-contact IC card can be described as radio-frequency card again, and it successfully solves a difficult problem for passive (not arranging power supply in card) and contact-free, is the important breakthrough of field of electronic devices.M1 card is mainly used in the automatic fare collection system of public transport, ferry, subway, also can be applied in entrance guard management, proof of identification and stored value card.
M1 card relies on its cheap cost and conveniently experience, and the technical scheme having become a kind of maturation is widely applied at various industry service in hundreds of millions user groups.Meanwhile, central processing unit (the Central Processing Unit of all kinds of main flow, referred to as CPU) chip industry also supports to M1 function, support that the CPU card of M1 function becomes bank, telecom operators and other third-party primary card types just gradually, CPU card coordinates and loads M1 application and every profession and trade cooperation extensive use and achieve good commercial result at home.
But in actual application for many years, M1 application loads and adopts field personnel to operate all the time with the mode safeguarded or mode by specific facility has been come.M1 application data needs when hair fastener to be loaded on card by making specific facility, then transfers to user formally to use.User's card in use such as to supplement with money at the operation to be needed to transfer to staff to cabinet face or come by specific facility equally, and the process of abnormality and the maintenance of card then must be processed by staff.
As can be seen here, the technical scheme adopted in correlation technique has following defect:
The function singleness of defect one, card, when hair fastener, M1 application pre-add must be loaded into card, and now, its application purpose is determined, causes thus and cannot increase new application in the later stage or safeguard card;
The management work of defect two, card must be undertaken by cabinet face, uses inconvenience and wastes a large amount of human and material resources and financial resources.
Summary of the invention
The invention provides a kind of processing method and system of application cryptogram data, need the artificial problem participated in the loading at least solving application data in non-contact IC card in correlation technique with maintenance.
According to an aspect of the present invention, a kind of processing method of application cryptogram data is provided.
The processing method of application according to the present invention encrypt data comprises: non-contact IC card receives via the communication interface of mobile terminal the application cryptogram data coming from server, and wherein, non-contact IC card is built-in or be placed on mobile terminal; Non-contact IC is stuck in the first predeterminable area and resolves application encrypt data, and carries out loading at the second predeterminable area to the application cryptogram data after resolving and safeguard.
Preferably, before non-contact IC card reception comes from the application cryptogram data of server, also comprise: the operation information of acquisition for mobile terminal user; Mobile terminal sends a request message to server, and wherein, request message is used for obtaining application cryptogram data according to operation information to server.
Preferably, at mobile terminal to after server sends a request message, also comprise: server receives the request message coming from mobile terminal; Server determines the key corresponding with non-contact IC card, data encoding format and application data according to request message; Server carries out coded treatment according to data encoding format application data, and adopts double secret key application data to be encrypted, and obtains application cryptogram data.
Preferably, non-contact IC is stuck in the first predeterminable area and resolves application encrypt data, and to load and maintenance comprises the application cryptogram data after resolving at the second predeterminable area: non-contact IC card adopts key to be decrypted process at the first predeterminable area to applying encrypt data; Non-contact IC card to the application cryptogram decoding data process after deciphering, obtains application data according to data encoding format; Non-contact IC is stuck in the second predeterminable area application data to carry out loading and safeguards.
Preferably, the first predeterminable area comprises: CPU, and the second predeterminable area comprises: M1 logical memory space.
According to a further aspect in the invention, a kind for the treatment of system of application cryptogram data is provided.
The treatment system of application according to the present invention encrypt data comprises: non-contact IC card; Non-contact IC card comprises: the first receiver module, and receive for the communication interface via mobile terminal the application cryptogram data coming from server, wherein, non-contact IC card is built-in or be placed on mobile terminal; First processing module, for resolving application encrypt data at the first predeterminable area, and carries out loading at the second predeterminable area to the application cryptogram data after resolving and safeguards.
Preferably, said system also comprises: mobile terminal; Mobile terminal comprises: acquisition module, for obtaining the operation information of user; Sending module, for sending a request message to server, wherein, request message is used for obtaining application cryptogram data according to operation information to server.
Preferably, said system also comprises: server; Second receiver module, for receiving the request message coming from mobile terminal; Determination module, for determining the key corresponding with non-contact IC card, data encoding format and application data according to request message; Second processing module, for carrying out coded treatment according to data encoding format application data, and adopts double secret key application data to be encrypted, and obtains application cryptogram data.
Preferably, the first processing module comprises: decryption unit, is decrypted process for adopting key at the first predeterminable area to application encrypt data; Decoding unit, for according to data encoding format to deciphering after the process of application cryptogram decoding data, obtain application data; Processing unit, for carrying out loading in the second predeterminable area application data and safeguarding.
Preferably, the first predeterminable area comprises: CPU, and the second predeterminable area comprises: M1 logical memory space.
By the present invention, adopt non-contact IC card to receive via the communication interface of mobile terminal the application cryptogram data coming from server, wherein, non-contact IC card is built-in or be placed on mobile terminal; Non-contact IC is stuck in the first predeterminable area and resolves application encrypt data, and at the second predeterminable area, the application cryptogram data after resolving are carried out loading and safeguarded, it can thus be appreciated that, non-contact IC card directly can obtain application cryptogram data from server, then carry out loading to the application cryptogram data after parsing and safeguard, the loading solving application data in non-contact IC card in correlation technique needs the artificial problem participated in maintenance, and then reaches easy and simple to handle, cost-saving effect.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the processing method of application cryptogram data according to the embodiment of the present invention;
Fig. 2 is the structured flowchart of the treatment system of application cryptogram data according to the embodiment of the present invention;
Fig. 3 is the structured flowchart of the treatment system of application cryptogram data according to the preferred embodiment of the invention.
Embodiment
Hereinafter also describe the present invention in detail with reference to accompanying drawing in conjunction with the embodiments.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
In the following description, except as otherwise noted, the symbol otherwise with reference to the action performed by one or more computer and operation represents each embodiment describing the application.Wherein, computer comprises the various products such as personal computer, server, mobile terminal, employs the equipment that CPU, single-chip microcomputer, DSP etc. have a process chip and all can be called computer.Thus, be appreciated that processing unit that this kind of action performed sometimes referred to as computer and operation comprise computer is to the manipulation of the signal of telecommunication representing data with structured form.It is safeguarded in this manipulation transforms data or the position in the accumulator system of computer, and this reshuffles or changes the operation of computer in the mode that those skilled in the art understands.The data structure of service data is the physical location of the memory of the particular community that the form with data defines.But although describe the present invention in above-mentioned context, it does not also mean that restrictive, as understood by those skilled in the art, hereinafter described action and each side of operation also can realize with hardware.
Turn to accompanying drawing, wherein identical reference number refers to identical element, and the principle of the application is shown in a suitable computing environment and realizes.Below describe the embodiment based on described the application, and should not think about the alternative embodiment clearly do not described herein and limit the application.
Following examples can be applied in computer, such as: be applied in PC.Also can be applied in the mobile terminal that have employed at present in intelligent operating system, and be not limited to this.Operating system for computer or mobile terminal does not have particular/special requirement, as long as can detect contact, determine whether this contact is consistent with pre-defined rule, and realizes corresponding function according to the attribute of this contact.
Fig. 1 is the flow chart of the processing method of application cryptogram data according to the embodiment of the present invention.As shown in Figure 1, the method can comprise following treatment step:
Step S102: non-contact IC card receives via the communication interface of mobile terminal the application cryptogram data coming from server, and wherein, non-contact IC card is built-in or be placed on mobile terminal;
Step S104: non-contact IC is stuck in the first predeterminable area and resolves application encrypt data, and at the second predeterminable area, the application cryptogram data after resolving are carried out loading and safeguarded.
In correlation technique, in non-contact IC card, the loading of application data needs manually to participate in maintenance.If a kind of user can be designed self-service can complete the loading of application data (such as: M1 application data) and the technical scheme of maintenance whenever and wherever possible, the lifting of significantly saving and experience and the brand image of human and material resources and financial resources will be brought undoubtedly.Adopt method as shown in Figure 1, non-contact IC card receives via the communication interface of mobile terminal the application cryptogram data coming from server, and wherein, non-contact IC card is built-in or be placed on mobile terminal, non-contact IC is stuck in the first predeterminable area and resolves application encrypt data, and at the second predeterminable area, the application cryptogram data after resolving are carried out loading and safeguarded, it can thus be appreciated that, the present invention adopts non-contact IC card (external or be built in mobile terminal) and the co-operating mode of server, non-contact IC card directly can obtain application cryptogram data from server, then carry out loading to the application cryptogram data after parsing and safeguard, the loading solving application data in non-contact IC card in correlation technique needs the artificial problem participated in maintenance, and then reach easy and simple to handle, cost-saving effect.
In preferred implementation process, above-mentioned first predeterminable area can include but not limited to: CPU, and above-mentioned second predeterminable area can include but not limited to: M1 logical memory space.
As a preferred embodiment of the present invention, above-mentioned non-contact IC card can be Intelligent safe digital (the Secure Digital Memory supporting M1 application, referred to as SD) card, iPhone or standard financial IC card, it can be divided into CPU region (i.e. above-mentioned first predeterminable area) and M1 region (i.e. above-mentioned second predeterminable area), CPU region may be used for loading CPU application, such as: People's Bank of China (The People's Bank of China, referred to as PBOC) applies; M1 region may be used for loading existing all kinds of M1 application.
It should be noted that, in non-contact IC card, can exist simultaneously use the Ml(Mifare One of logical circuit) card and bury the CPU card of device with micro-place.Therefore it both can use Ml card to carry out non-contact IC card associative operation (such as: online transaction), also CPU card can be used to carry out non-contact IC card associative operation (such as: online transaction), it can be used for Ml card read-write equipment in other words, CPU card read-write equipment can be used for again, thus make its scope of application comparatively extensive, can be user-friendly.
Preferably, in step S102, non-contact IC card can also comprise following operation before receiving and coming from the application cryptogram data of server:
Step S1: the operation information of acquisition for mobile terminal user;
Step S2: mobile terminal sends a request message to server, wherein, request message is used for obtaining application cryptogram data according to operation information to server.
In a preferred embodiment, the loading of communication network support and cell-phone customer terminal can be provided as subscriber terminal equipment, not support that the smart mobile phone of near field communication (NFC) (NFC) can complete the M1 application operating to intelligent SD card and iPhone; And support that the smart mobile phone of NFC can also complete the M1 application operating to standard financial IC card.In an initial condition, M1 region is empty, and user can complete the self-help operation to M1 application by mobile terminal application interface according to actual needs, the process of the loading coordinating smart mobile phone and server to realize applying M1, inquiry, space transference and abnormality.
Preferably, in step S2, mobile terminal, to after server sends a request message, can also comprise the following steps:
Step S3: server receives the request message coming from mobile terminal;
Step S4: server determines the key corresponding with non-contact IC card, data encoding format and application data according to request message;
Step S5: server carries out coded treatment according to data encoding format application data, and adopt double secret key application data to be encrypted, obtain application cryptogram data.
In a preferred embodiment, server is that M1 application data loads and the core safeguarded, the data format definition of the key of the non-contact IC card of primary responsibility maintenance support M1 function, M1 application, distribution specify M1 to apply to load with the card space of service data, user profile stores and Information Statistics are inquired about.In addition, server can also respond the instruction that cell-phone customer terminal sends through mobile terminal simultaneously, carries out data interaction with the client that mobile terminal is installed, and operating data and instruction is transmitted with ciphertext form.Before server sends application cryptogram data, first the identification information of non-contact IC card, key dispersion factor etc. can be sent to server with the relevant information of non-contact IC card by mobile terminal, and then server determines according to the above-mentioned information of mobile terminal reporting the application data that the key corresponding with non-contact IC card, data encoding format and this non-contact IC card are to be received.Server can carry out coded treatment according to above-mentioned data encoding format to above-mentioned application data, and adopts above-mentioned double secret key application data to be encrypted, to obtain application cryptogram data.
Preferably, in step S104, non-contact IC is stuck in the first predeterminable area and resolves application encrypt data, and carries out loading at the second predeterminable area to the application cryptogram data after resolving and safeguard and can comprise following operation:
Step S6: non-contact IC card adopts key to be decrypted process at the first predeterminable area to application encrypt data;
Step S7: non-contact IC card to the application cryptogram decoding data process after deciphering, obtains application data according to data encoding format;
Step S8: non-contact IC is stuck in the second predeterminable area application data to carry out loading and safeguards.
In a preferred embodiment, be loaded into the function application of the first predeterminable area, for the process that is decrypted application encrypt data and decodes, and complete loading to M1 application data and attended operation at the second predeterminable area, now, aerial loading and maintenance function that the second predeterminable area could use M1 to apply is needed this application to be mounted to.
As a preferred embodiment of the present invention, user completes the self-help operation (such as: the loading bus card application of M1 region or the mess card application that to Current Content are sky) to M1 application at mobile terminal application interface, and sends request the request message of application data-downloading to server.First the identification information of non-contact IC card, key dispersion factor etc. can be sent to server with the relevant information of non-contact IC card by mobile terminal, and then server determines according to the above-mentioned information of mobile terminal reporting the application data that the key corresponding with non-contact IC card, data encoding format and this non-contact IC card are to be received.Server can carry out coded treatment according to above-mentioned data encoding format to above-mentioned application data, and adopts above-mentioned double secret key application data to be encrypted, to obtain application cryptogram data.Non-contact IC is stuck in communication interface via mobile terminal from after server gets application cryptogram data, to be decrypted and to decode process to application encrypt data at the first predeterminable area, and complete loading to M1 application data and attended operation at the second predeterminable area, now, aerial loading and maintenance function that the second predeterminable area could use M1 to apply is needed this application to be mounted to.
Fig. 2 is the structured flowchart of the treatment system of application cryptogram data according to the embodiment of the present invention.As shown in Figure 2, the treatment system of these application cryptogram data can comprise: non-contact IC card 10; Non-contact IC card 10 can comprise: the first receiver module 100, and receive for the communication interface via mobile terminal the application cryptogram data coming from server, wherein, non-contact IC card is built-in or be placed on mobile terminal; First processing module 102, for resolving application encrypt data at the first predeterminable area, and carries out loading at the second predeterminable area to the application cryptogram data after resolving and safeguards.
Adopt system as shown in Figure 2, the loading solving application data in non-contact IC card in correlation technique needs the artificial problem participated in maintenance, and then reaches easy and simple to handle, cost-saving effect.
In preferred implementation process, above-mentioned first predeterminable area can include but not limited to: CPU, and above-mentioned second predeterminable area can include but not limited to: M1 logical memory space.
Preferably, as shown in Figure 3, said system can also comprise: mobile terminal 20; Mobile terminal 20 can comprise: acquisition module 200, for obtaining the operation information of user; Sending module 202, for sending a request message to server, wherein, request message is used for obtaining application cryptogram data according to operation information to server.
Preferably, as shown in Figure 3, said system can also comprise: server 30; Second receiver module 300, for receiving the request message coming from mobile terminal; Determination module 302, for determining the key corresponding with non-contact IC card, data encoding format and application data according to request message; Second processing module 304, for carrying out coded treatment according to data encoding format application data, and adopts double secret key application data to be encrypted, and obtains application cryptogram data.
Preferably, as shown in Figure 3, the first processing module 102 can comprise: decryption unit (not shown), is decrypted process for adopting key at the first predeterminable area to application encrypt data; Decoding unit (not shown), for according to data encoding format to deciphering after the process of application cryptogram decoding data, obtain application data; Processing unit (not shown), for carrying out loading in the second predeterminable area application data and safeguarding.
From above description, can find out, above embodiments enable following technique effect (it should be noted that these effects are effects that some preferred embodiment can reach): adopt technical scheme provided by the present invention, non-contact IC card receives via the communication interface of mobile terminal the application cryptogram data coming from server, and non-contact IC card is built-in or be placed on mobile terminal; Non-contact IC is stuck in the first predeterminable area and resolves application encrypt data, and at the second predeterminable area, the application cryptogram data after resolving are carried out loading and safeguarded, it can thus be appreciated that, non-contact IC card directly can obtain application cryptogram data from server, then carry out loading to the application cryptogram data after parsing and safeguard, the loading solving application data in non-contact IC card in correlation technique needs the artificial problem participated in maintenance, and then reaches easy and simple to handle, cost-saving effect.
Obviously, those skilled in the art should be understood that, above-mentioned of the present invention each module or each step can realize with general calculation element, they can concentrate on single calculation element, or be distributed on network that multiple calculation element forms, alternatively, they can realize with the executable program code of calculation element, thus, they can be stored and be performed by calculation element in the storage device, and in some cases, step shown or described by can performing with the order be different from herein, or they are made into each integrated circuit modules respectively, or the multiple module in them or step are made into single integrated circuit module to realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a processing method for application cryptogram data, is characterized in that, comprising:
Contact-free integrated circuit IC-card receives via the communication interface of mobile terminal the application cryptogram data coming from server, and wherein, described non-contact IC card is built-in or be placed on described mobile terminal;
Described non-contact IC is stuck in the first predeterminable area and resolves described application cryptogram data, and carries out loading at the second predeterminable area to the application cryptogram data after resolving and safeguard.
2. method according to claim 1, is characterized in that, before described non-contact IC card reception comes from the described application cryptogram data of described server, also comprises:
The operation information of described acquisition for mobile terminal user;
Described mobile terminal sends a request message to described server, and wherein, described request message is used for obtaining described application cryptogram data according to described operation information to described server.
3. method according to claim 2, is characterized in that, at described mobile terminal to after described server sends described request message, also comprises:
Described server receives the described request message coming from described mobile terminal;
Described server determines the key corresponding with described non-contact IC card, data encoding format and application data according to described request message;
Described server carries out coded treatment according to described data encoding format to described application data, and adopts application data described in described double secret key to be encrypted, and obtains described application cryptogram data.
4. method according to claim 3, it is characterized in that, described non-contact IC is stuck in described first predeterminable area and resolves described application cryptogram data, and to load and maintenance comprises the application cryptogram data after resolving at described second predeterminable area:
Described non-contact IC card adopts described key at described first predeterminable area to the process of described application cryptogram decrypt data;
Described non-contact IC card to the application cryptogram decoding data process after deciphering, obtains described application data according to described data encoding format;
Described non-contact IC is stuck in described second predeterminable area to carry out loading to described application data and safeguards.
5. method according to any one of claim 1 to 4, is characterized in that, described first predeterminable area comprises: central processor CPU, and described second predeterminable area comprises: M1 logical memory space.
6. a treatment system for application cryptogram data, is characterized in that, comprising: contact-free integrated circuit IC-card;
Described non-contact IC card comprises:
First receiver module, receive for the communication interface via mobile terminal the application cryptogram data coming from server, wherein, described non-contact IC card is built-in or be placed on described mobile terminal;
First processing module, for resolving described application cryptogram data at the first predeterminable area, and carries out loading at the second predeterminable area to the application cryptogram data after resolving and safeguards.
7. system according to claim 6, is characterized in that, described system also comprises: described mobile terminal;
Described mobile terminal comprises:
Acquisition module, for obtaining the operation information of user;
Sending module, for sending a request message to described server, wherein, described request message is used for obtaining described application cryptogram data according to described operation information to described server.
8. system according to claim 7, is characterized in that, described system also comprises: described server;
Second receiver module, for receiving the described request message coming from described mobile terminal;
Determination module, for determining the key corresponding with described non-contact IC card, data encoding format and application data according to described request message;
Second processing module, for carrying out coded treatment according to described data encoding format to described application data, and adopting application data described in described double secret key to be encrypted, obtaining described application cryptogram data.
9. system according to claim 8, is characterized in that, described first processing module comprises:
Decryption unit, for adopting described key at described first predeterminable area to the process of described application cryptogram decrypt data;
Decoding unit, for according to described data encoding format to deciphering after the process of application cryptogram decoding data, obtain described application data;
Processing unit, for carrying out loading and safeguard to described application data at described second predeterminable area.
10. the system according to any one of claim 6 to 9, is characterized in that, described first predeterminable area comprises: central processor CPU, and described second predeterminable area comprises: M1 logical memory space.
CN201310303935.2A 2013-07-18 2013-07-18 The processing method and system of application cryptogram data Active CN104301885B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310303935.2A CN104301885B (en) 2013-07-18 2013-07-18 The processing method and system of application cryptogram data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310303935.2A CN104301885B (en) 2013-07-18 2013-07-18 The processing method and system of application cryptogram data

Publications (2)

Publication Number Publication Date
CN104301885A true CN104301885A (en) 2015-01-21
CN104301885B CN104301885B (en) 2019-03-01

Family

ID=52321407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310303935.2A Active CN104301885B (en) 2013-07-18 2013-07-18 The processing method and system of application cryptogram data

Country Status (1)

Country Link
CN (1) CN104301885B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848051A (en) * 2018-04-27 2018-11-20 北京奇艺世纪科技有限公司 Using the acquisition methods and device of data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1934545A (en) * 2004-06-11 2007-03-21 株式会社Ntt都科摩 Mobile device and access control method
CN1933351A (en) * 2006-09-27 2007-03-21 上海复旦微电子股份有限公司 Mobile telephone apparatus realizing method with non-contact IC card or electronic label and non-contact IC card or electronic label read/write device application
CN101304597A (en) * 2007-05-08 2008-11-12 上海中策工贸有限公司 Mobile internet equipment reader-writer and uses thereof
US20120149302A1 (en) * 2010-12-08 2012-06-14 Felica Networks, Inc. Information processing apparatus, information processing method, program, and information processing system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1934545A (en) * 2004-06-11 2007-03-21 株式会社Ntt都科摩 Mobile device and access control method
CN1933351A (en) * 2006-09-27 2007-03-21 上海复旦微电子股份有限公司 Mobile telephone apparatus realizing method with non-contact IC card or electronic label and non-contact IC card or electronic label read/write device application
CN101304597A (en) * 2007-05-08 2008-11-12 上海中策工贸有限公司 Mobile internet equipment reader-writer and uses thereof
US20120149302A1 (en) * 2010-12-08 2012-06-14 Felica Networks, Inc. Information processing apparatus, information processing method, program, and information processing system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848051A (en) * 2018-04-27 2018-11-20 北京奇艺世纪科技有限公司 Using the acquisition methods and device of data
CN108848051B (en) * 2018-04-27 2021-01-05 北京奇艺世纪科技有限公司 Application data acquisition method and device

Also Published As

Publication number Publication date
CN104301885B (en) 2019-03-01

Similar Documents

Publication Publication Date Title
EP2924640A1 (en) Mobile payment system and mobile payment method using dynamic track 2 information
EP3259741B1 (en) Method and system for credential management
CN104495545B (en) Electronic elevator maintenance supervision and management system and method for elevator maintenance based on dynamic two-dimensional codes
CA2955454C (en) Point of sale system with secure and unsecure modes
US8600863B2 (en) Financial services card that provides visual indicator according to available balance defined policies
CN103415017A (en) Method, device and mobile terminal of virtual SIM card
HK1218454A1 (en) Wireless signal generating cards and methods and system of using such cards
CN113140079B (en) Intelligent cabinet opening method, data processing method and device and intelligent cabinet application system
CN104299017A (en) Identity card network decoding system based on mobile phone NFC
CN103500400A (en) Multi-application mobile payment system and safety method
CN101604404A (en) A kind of Updatable universal smart card and system and method thereof
CN109582320A (en) Write yard method and terminal device
CN108711228B (en) Network payment data communication processing method, device and system of IC card gas meter
CN104166917A (en) NFC transaction event informing method and system
CN114626855A (en) Service processing method and device on intelligent terminal
CN105101259B (en) A method for identifying WIFI and an intelligent terminal
CN113596095B (en) Fast Internet of things method, fast Internet of things device, computer equipment and computer readable storage medium
CN104301885A (en) Application cryptograph data processing method and system
CN201590829U (en) Updateable universal smart card and system thereof
CN105553976A (en) Data processing method, device and system
CN104661220B (en) A method and device for realizing authentication processing
US20140180940A1 (en) Real time product verification by use of NFC technology
CN109525395B (en) Signature information transmission method and device, storage medium and electronic device
US20220245581A1 (en) Method and apparatus for sharing delivery box
CN106599724B (en) Method and system for accessing sector data of smart card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant