China Unionpay Co., Ltd Patent applications |
Patent application number | Title | Published |
20160140342 | METHOD FOR INDICATING OPERATING ENVIRONMENT OF MOBILE DEVICE AND MOBILE DEVICE CAPABLE OF INDICATING OPERATING ENVIRONMENT - The invention discloses a method for indicating an operating environment of a mobile device and a mobile device capable of indicating an operating environment. The method comprises the following steps: generating personalized information and storing the personalized information in a storage area that can be only accessed by a secure operating system, and displaying the personalized information on a display area of the mobile device when the mobile device enters the secure operating system so as to inform the user of the currently running operating system | 05-19-2016 |
20160119786 | MOBILE DEVICE-BASED AUTHENTICATION METHOD AND AUTHENTICATION APPARATUS - The invention discloses an authentication method based on mobile. The method comprises the following steps: providing an authentication apparatus in a mobile device; using the authentication apparatus to conduct authentication on an application and/or secure element in the mobile device in a secure operating system of the mobile device. | 04-28-2016 |
20160119334 | ESTABLISHMENT OF COMMUNICATION CONNECTION BETWEEN MOBILE DEVICE AND SECURE ELEMENT - The invention relates to communication technology, and in particular, to a method of establishing communication connection between a mobile device and a secure element as well as a mobile device for implementing the method. The method comprises the following steps: when the mobile device detects that there is a secure element which establishes a physical connection with it, the mobile device performs a secure authentication on the secure element; if the secure authentication passes, the mobile device determines whether there is configuration information inside it which is required for establishing the communication connection between the mobile device and the secure element; and if there is the required configuration information inside the mobile device, the mobile device uses the configuration information to establish the communication connection with the secure element; otherwise, the mobile device obtains required configuration information from the secure element to establish the communication connection with the secure element. | 04-28-2016 |
20160112874 | SECURE ELEMENT OPERATING SYSTEM AND METHOD - The invention discloses a secure element (SE) operating system and method. The system comprises a SE configurator and a protocol converter disposed inside a mobile communication device, wherein the SE configurator communicates with one or more SEs on the mobile communication device via the protocol converter, and the SE configurator comprises a SE list for storing information on said one or more SEs. | 04-21-2016 |
20160080503 | SECURITY INFORMATION INTERACTION SYSTEM, DEVICE AND METHOD - The invention discloses a security information interaction system, apparatus and method, the method comprising the following steps: establishing a first communication channel and a second communication channel between a security information interaction terminal and a security carrier; the security carrier actively sending a command to the security information interaction terminal via the first communication channel and the second communication channel so as to complete a corresponding security information interaction procedure. With the security information interaction system, apparatus and method disclosed by the invention, the security carrier can send a command to the security information interaction terminal flexibly and actively on its own, and thus greatly improving the efficiency of the security information interaction system. | 03-17-2016 |
20160062784 | METHOD FOR IMPLEMENTING VIRTUAL SECURE ELEMENT - The invention discloses a method for realizing virtual secure element (VSE), which comprises the following steps: a secure element manager (SEM) generates a request which comprises virtualized configuration information; and a virtual machine monitor in a hypervisor allocates an address space for the VSE according to the above request. | 03-03-2016 |
20160055552 | GENERATING METHOD, VERIFYING METHOD FOR ELECTRONIC BILL WITH ANTI-FAKE TWO DIMENSION (2D) CODE AND SYSTEM FOR SAME - The present invention relates to methods for generating and verifying an electronic bill with an anti-counterfeiting two-dimensional code and systems of the same. The method of generating an electronic bill with an anti-counterfeiting two-dimensional code of the present invention comprises reading an original electronic bill picture and generating a temporary electronic bill picture with a determined region for embedding two-dimensional code; calculating digest data for the temporary electronic bill picture by using an information digest algorithm and encrypting the obtained digest data to generate an anti-counterfeiting two-dimensional code; and embedding the anti-counterfeiting two-dimensional code into said region of the original electronic bill picture to obtain an electronic bill with the anti-counterfeiting two-dimensional code. Using the present invention can effectively avoid the electronic bill being tampered and forged, and also can greatly enhancing style diversification and practicability of the electronic bill. | 02-25-2016 |
20150339660 | METHOD AND SYSTEM FOR OFF-LINE CREDIT FOR LOAD - The invention discloses an offline credit loading method and system. The offline credit loading method comprises the following steps: (A) a terminal performs update of credit loading limit of a terminal by communicating with a backstage system, wherein the credit loading limit of the terminal is a sum of capital that allows for offline credit loading; (B) an electronic card performs update of the account of electronic cash card by communicating with the terminal, wherein some capital of the credit loading limit of the terminal is transferred to the account of electronic cash card; and (C) the backstage system enables the credit loading account associated with the account of electronic cash card to be updated according to information on offline credit loading received from the terminal. | 11-26-2015 |
20150026770 | SAFETY INFORMATION TRANSFER SYSTEM, DEVICE AND METHOD BASED ON EXTENDED PARAMETER SET - The present invention proposes a security information interaction system, device and method based on the extended parameter set. Said security information interaction system based on the extended parameter set comprises a security information interaction device and a security information interaction terminal, wherein said security information interaction device may execute the operations related to the transfer of a resource by means of performing the security information interaction with said security information interaction terminal via a communication interface based on one of a primary parameter set and the extended parameter set. The security information interaction system, device and method based on the extended parameter set disclosed in the present invention may realize the transfer operations of multiple kinds of resource having different attributes, the cost is lower, and the flexible configuration and extension can be realized according to the requirements. | 01-22-2015 |
20150020159 | THIN TERMINAL MODE-BASED SECURITY INFORMATION EXCHANGE SYSTEM, TERMINAL, SERVER AND METHOD - The present invention proposes a security information interaction system, terminal, server and method based on the thin terminal mode. Said system comprises an access server which is capable of transferring the application service address associated with the target application service back to said security information interaction terminal based on the security information interaction request from the corresponding security information interaction terminal. The security information interaction system, terminal, server and method based on the thin terminal mode disclosed in the present invention possess the flexible expansibility, can compatibly use multiple servers providing different application services, and have higher work efficiency and higher performance. | 01-15-2015 |
20140355618 | SYSTEM AND METHOD FOR SUPPORTING BOTH BULK STORAGE AND ETHERNET COMMUNICATIONS - The invention provides a master MMC/SD apparatus for simultaneously supporting bulk storage and Ethernet communication, a slave MMC/SD apparatus for simultaneously supporting bulk storage and Ethernet communication, a system composed of these two apparatuses as well as a method of operating the system. The apparatuses, system and method which simultaneously support bulk storage and Ethernet communication and which are based on MMC/SD interface enable a master apparatus with MMC/SD interface to support network function while maintaining bulk storage function as well, thus greatly expanding applicable areas of such embedded terminal apparatus with the MMC/SD interface that has bulk storage function. | 12-04-2014 |
20140344898 | STAND-IN AUTHORIZATION SYSTEM AND STAND-IN AUTHORIZATION METHOD - The invention provides an entrusted-authorization system and an entrusted-authorization method. The entrusted-authorization system comprises an accounting system, a switch module and an entrusted-authorization module, wherein the entrusted-authorization module stores entrusted-authorization parameters determined by the accounting system, the switch module is connected with the accounting system and the entrusted-authorization module for transmitting transaction request messages from the client terminal to the entrusted-authorization module for processing in case that the accounting system is unavailable, wherein the entrusted-authorization module verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, the messages are sent to the accounting system for processing. The transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount. With the entrusted-authorization system and entrusted-authorization method of the invention, a normal processing of transaction request can be ensured when the accounting system is unavailable. | 11-20-2014 |
20140172741 | METHOD AND SYSTEM FOR SECURITY INFORMATION INTERACTION BASED ON INTERNET - The present invention discloses a system and method for security information interaction. The system for security information interaction comprises a device for security information interaction configured to obtain the security information input by a user and the information data read from an external information carrier, and configured to establish a secure channel between it and a security information processing gateway through an internet terminal to perform a business function. The device for security information interaction is able to perform business functions that do not require online processing. The system and method for security information interaction disclosed herein improves the flexibility and efficiency of the information processing system and enhances the balance of the operating load, and increases the security of the information processing system. | 06-19-2014 |
20140164252 | USER TERMINAL AND PAYMENT SYSTEM - The invention provides a user terminal and a payment system. The user terminal comprises an input device, a multi-channel selection switch, an application module, a processor, a password processing module, and a security IC chip containing information on user's ID and/or banking card therein, wherein the multi-channel selection switch is coupled with the input device, the password processing module and the processor, the password processing module is coupled with the processor, and the security IC chip is coupled with the password processing module; the application module controls the multi-channel selection switch via the processor so as to place the user terminal in a password input mode or in a normal input mode. The invention ensures the safety in entering the user's password in hardware configuration so that even when software system of the user terminal is not safe in itself, the safety of input password can be ensured. | 06-12-2014 |
20140052710 | DEVICE AND METHOD OF MASS DATA STORAGE BASED ON TREE STRUCTURE - The present invention proposes a device and method of mass data storage based on tree structure, wherein the device of mass data storage based on tree structure includes an input/output module, a data creating module, a data query module, a data maintenance module, a memory and a main control module. The device and method of mass data storage based on tree structure disclosed in the present invention is easy to be extended, saving storage space, and can significantly improve the query efficiency. | 02-20-2014 |
20140019463 | DATA FILTERING SYSTEM AND METHOD - The invention provides a data filtering system and method, wherein the data filtering system comprises: an extracting unit for extracting property characteristic of source data and sending it to a selecting unit; the selecting unit for selecting at least one property characteristic based on which data filtering is performed and for sending the selected property characteristic to a filtering condition generating unit; the filtering condition generating unit which, according to the selected at least one property characteristic, generates at least one filtering module that corresponds to the at least one property characteristic respectively and combines the at least one filtering module to generate filtering conditions; a data filter analysis unit which performs the filtering on source data according to the filtering conditions to thereby generate target data. With the invention, it is ensured that when characteristic of data changes, filtering modules can be recombined freely so as to adapt to the change of data characteristic efficiently. | 01-16-2014 |
20140006247 | SYSTEM, DEVICE AND METHOD FOR THE INTERACTION OF SECURITY INFORMATION | 01-02-2014 |
20130290718 | MOBILE STORAGE DEVICE AND THE DATA PROCESSING SYSTEM AND METHOD BASED THEREON - The present invention relates to network security technology, and particularly relates to a mobile storage device for data processing in security, and a data processing system comprising the mobile storage device, and a data processing method using the data processing system. According to the present invention, the mobile storage device for data processing in security comprising: at least one memory for storing a secret key; an interface circuit; and a processing unit for communicating with a remote device via the interface circuit and performing security processing and application processing, the security processing including data encryption and decryption with the secret key. Compared with the prior art, the mobile storage device according to the embodiments of the present invention stores not only confidential information such as secret key and digital certificate but also applications for executing transaction processes, whereby providing security protection for the applications at the same level as the confidential information. In addition, where the mobile storage device has a capability of simulating a network interface, a client terminal, such as a personal computer, previously used for executing the applications now can function as a bridge connector between the mobile storage device and a remote server, and the packeting and unpacketing of the transaction data can be performed inside the mobile storage device. This greatly improves the security performance of the transaction processes. | 10-31-2013 |
20120158594 | TRANSFER METHOD OF ELECTRONIC CASH - A card to card transfer method used in the financial system is provided in the present invention, and comprises an initializing step, a transferring step and a transaction confirming step, wherein the initializing step includes the steps of calculating and obtaining the public key certificate and checking the amount of the transaction and so on, and the transferring step includes the steps of performing the transaction and so on. The present invention can achieve the function of transferring the electronic cash between two cards and can prevent the risk of repeatedly transferring the money into the card for transfer-in by using the card for transfer-out and so on. | 06-21-2012 |