Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of unlocking an application

A technology of application unlocking and application identification, which is applied in the field of information security, can solve problems such as low security and chaotic operation, and achieve the effect of improving security

Active Publication Date: 2020-04-17
北京速通科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, after the PSAM card is lost or stolen, the illegal owner can still use it, which brings chaos to the operation order, so the security is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of unlocking an application
  • A method of unlocking an application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0012] The present invention provides an application unlocking method. The HSAM is inserted into the consumer application system, and after the consumer application system and the background management system are connected through the network, the following steps are executed. The flowchart is as follows: figure 1 Shown:

[0013] Step 11, the consumption application system sends an application unlocking connection request to the background management system.

[0014] Step 12: After receiving the application unlocking connection request command, the background management system generates a first random number R1, and returns an application unlocking connection request response carrying the first random number to the consumer application system.

[0015] Step 13: The consumption application system carries the first random number, the application identification to be unlocked, together with the first time factor T1 made by the consumption application system at the current time, a...

Embodiment 2

[0035] The HSAM of the present invention has multiple channels, which are used to ensure the security of multiple applications and multiple terminals concurrent consumption transactions, and different applications and different terminals are independent of each other and do not interfere with each other. In the present invention, the HSAM is no longer like the prior art, where the PSAM card is installed in one terminal, but the HSAM can be connected with multiple terminals through the back-end service of the consumption application system, and each terminal is only used to read IC card information, and the HSAM Used for safe computing. One HSAM can support multiple terminals in parallel and support multiple applications, such as parking lots, highways, etc. One application can correspond to multiple terminals.

[0036]Therefore, the present invention maintains a security processing channel for each application of each terminal in the HSAM, and each application of each termina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an application unlocking method. The method comprises a step of receiving an application unlocking request carrying a first random number, an application identifier to be unlocked, and a first time factor, a step of calculating and obtaining a request identification number by using a stored application unlocking key and the received first random number, application identifier to be unlocked and first time factor, a step of generating a second random number, a step of sending the request identification number, the second random number and a unique identifier in an application unlocking response out such that an opposite end verifies the unique identifier and the request identification number, and calculating and obtaining an authorization identification code according to the second random number, the application identifier to be unlocked, and a second time factor after the verification is passed, a step of receiving application unlocking authorization carrying the authorization identification code and the second time factor, and a step of verifying the authorization identification code, and carrying an application unlocking success message in sent application unlocking authorization response after the verification is passed. By using the method, the safety of a consumption transaction can be improved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an application unlocking method. Background technique [0002] At present, the offline consumption transactions of IC cards are inseparable from the support of each terminal with a consumption security access module (PSAM) card. PSAM cards are used to store key files and encryption algorithms to Perform security calculations to ensure that IC card consumption transactions are completed safely. [0003] The PSAM card is installed in the terminal, and can be used directly when the IC card is used for consumption transactions without unlocking. Therefore, after the PSAM card is lost or stolen, the illegal owner can still use it, which brings confusion to the operation order, so the security is relatively low. Contents of the invention [0004] The purpose of the present invention is to provide an application unlocking method, which can improve the security o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40G06Q20/34
CPCG06Q20/341G06Q20/4014
Inventor 王梅王占军高军安徐鑫史骏靳军高清柳苗增芳祁欣杨威
Owner 北京速通科技有限公司