A method of unlocking an application
A technology of application unlocking and application identification, which is applied in the field of information security, can solve problems such as low security and chaotic operation, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0012] The present invention provides an application unlocking method. The HSAM is inserted into the consumer application system, and after the consumer application system and the background management system are connected through the network, the following steps are executed. The flowchart is as follows: figure 1 Shown:
[0013] Step 11, the consumption application system sends an application unlocking connection request to the background management system.
[0014] Step 12: After receiving the application unlocking connection request command, the background management system generates a first random number R1, and returns an application unlocking connection request response carrying the first random number to the consumer application system.
[0015] Step 13: The consumption application system carries the first random number, the application identification to be unlocked, together with the first time factor T1 made by the consumption application system at the current time, a...
Embodiment 2
[0035] The HSAM of the present invention has multiple channels, which are used to ensure the security of multiple applications and multiple terminals concurrent consumption transactions, and different applications and different terminals are independent of each other and do not interfere with each other. In the present invention, the HSAM is no longer like the prior art, where the PSAM card is installed in one terminal, but the HSAM can be connected with multiple terminals through the back-end service of the consumption application system, and each terminal is only used to read IC card information, and the HSAM Used for safe computing. One HSAM can support multiple terminals in parallel and support multiple applications, such as parking lots, highways, etc. One application can correspond to multiple terminals.
[0036]Therefore, the present invention maintains a security processing channel for each application of each terminal in the HSAM, and each application of each termina...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

