Terminal working method and device
A terminal and data recovery technology, applied in the field of information security, can solve the problems of reduced terminal transaction security, inability to prevent information theft and IC card duplication, and inability to discover duplicated cards, etc., so as to prevent duplication, prevent tampering, and improve security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] In this embodiment, a method for terminal work is provided, such as Figure 1-2 Shown, described method, steps are as follows:
[0045] Step 101, the IC card is powered on and initialized;
[0046] Before this step, it also includes: the terminal performs transaction preprocessing and obtains the authorized amount.
[0047] Step 102, the terminal sends an instruction to select the proximity payment system environment to the IC card;
[0048] In this embodiment, the proximity payment system environment is a list consisting of application identifiers, application labels and application priority indicators supported by the IC card, that is, a non-contact application list, which can be accessed through a non-contact interface. This list includes the entries of all directories, and is returned by the IC card in the file control information of the selection proximity payment system environment response.
[0049] Step 103, the IC card returns the contactless application lis...
Embodiment 2
[0103] In this embodiment, a method for terminal work is provided, such as image 3 As shown, the steps are as follows:
[0104] Step 201: the terminal sends a command to select an application to the IC card, and after receiving the response data of the selection command, generates a command to acquire processing options;
[0105] Specifically, the terminal sends an instruction to select the proximity payment system environment to the IC card, receives the contactless application list supported by the IC card returned by the IC card, and selects an application from the contactless application list as the current application. The identifier generates a select application command, and sends the select application command to the IC card.
[0106] In this embodiment, the proximity payment system environment is a list consisting of application identifiers, application labels and application priority indicators supported by the IC card, that is, a non-contact application list, whic...
Embodiment 3
[0200]In this embodiment, a terminal working method is provided, and the steps are as follows:
[0201] Step S1: After obtaining the authorized amount, the terminal sends an application selection command to the IC card, and after receiving the response data of the application selection command returned by the IC card, generates an acquisition processing option command according to the response data of the application selection instruction;
[0202] Step S2: The terminal sends the command to obtain the processing option to the IC card, and obtains the signed dynamic application data and the dynamic data of the IC card from the response to the command to obtain the processing option returned by the IC card; the command to obtain the processing option includes the authorized amount;
[0203] Step S3: The terminal determines the location information of the IC card record to be read according to the command response of the acquisition processing option, and reads the IC card record ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


