[go: up one dir, main page]

CN106909421B - Safe financial POS machine firmware upgrading method - Google Patents

Safe financial POS machine firmware upgrading method Download PDF

Info

Publication number
CN106909421B
CN106909421B CN201710096353.XA CN201710096353A CN106909421B CN 106909421 B CN106909421 B CN 106909421B CN 201710096353 A CN201710096353 A CN 201710096353A CN 106909421 B CN106909421 B CN 106909421B
Authority
CN
China
Prior art keywords
firmware
data
pos machine
reserved space
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710096353.XA
Other languages
Chinese (zh)
Other versions
CN106909421A (en
Inventor
赵进云
谢纯珀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Morefun Electronic Technology Co ltd
Original Assignee
Fujian Morefun Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Morefun Electronic Technology Co ltd filed Critical Fujian Morefun Electronic Technology Co ltd
Priority to CN201710096353.XA priority Critical patent/CN106909421B/en
Publication of CN106909421A publication Critical patent/CN106909421A/en
Application granted granted Critical
Publication of CN106909421B publication Critical patent/CN106909421B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a safe financial POS machine firmware upgrading method, which comprises the following steps: the POS machine uploads the unique information of the equipment to a background server; the background server generates a corresponding firmware image according to the received unique equipment information to realize one machine and one firmware; the firmware between different POS machines is not universal and can not be executed; the firmware image is subjected to security check operation on a plurality of execution branches and a plurality of points; when the POS updates the firmware, the POS machine needs to be networked to be programmed when being programmed, the POS machine cannot be programmed locally, the POS machine is connected to a PC client through a USB or a serial port, the PC client is connected to a background server through a network, and the background server transmits the firmware image to be programmed, so that the firmware can be updated one by one. The invention improves the safety of the POS machine and can effectively prevent the cutting machine and the firmware from cracking.

Description

Safe financial POS machine firmware upgrading method
Technical Field
The invention relates to the technical field of financial POS machines, in particular to a safe financial POS machine firmware upgrading method.
Background
With the development of financial payment industry and the popularization of informatization technology, the application range of the POS machine is wider and wider, and the POS machine is the standard matching of merchants such as supermarkets, shopping malls, convenience stores and the like nowadays. POS machines are closely related to the life of people. Therefore, the POS machine becomes one of the targets of 3047230472of lawless people's tiger vision. Recent media has exposed many POS problems to the event of a fraudulent swipe of a bank card. All strengthening the security of the POS machine is not trivial.
At present, the upgrading mode of the firmware of the general POS machine is to directly issue the firmware image or the signed firmware image. These firmware images may flow into the hands of a lawbreaker through various routes. Or a lawless person directly disassembles the firmware content of the whole chip from the equipment. After the firmware mirror image exists, illegal operations such as cracking, cutting and the like can be performed.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a safe financial POS machine firmware upgrading method, which improves the safety of the POS machine and can effectively prevent the cutting machine and the firmware from being cracked.
The invention is realized by the following steps: a secure financial POS machine firmware upgrading method is as follows: the POS machine uploads the unique information of the equipment to a background server;
the background server generates a corresponding firmware image according to the received unique equipment information to realize one machine and one firmware; the firmware between different POS machines is not universal and can not be executed; the firmware mirror image sets several address reserved data storage spaces through a link script, and the spaces can store parameters for program operation, marks or data required by program operation; when the program runs, the data on the set address is verified, and the data on different addresses need to be verified in a plurality of different places in the program; some parameters required by the normal operation of the program are acquired from the set address, and the parameters are stored in an encryption mode;
the firmware image is subjected to security check operation on a plurality of execution branches and a plurality of points;
when the POS updates the firmware, the POS machine needs to be networked to be programmed when being programmed, the POS machine cannot be programmed locally, the POS machine is connected to a PC client through a USB or a serial port, the PC client is connected to a background server through a network, and the background server transmits the firmware image to be programmed, so that the firmware can be updated one by one.
Further, the unique device information includes the MAC address of the CPUID, the WIFI or BT chip, and the IMEI number of the wireless GSM module.
Furthermore, communication encryption and identity authentication mechanisms are arranged among the POS machine, the PC client and the background server; a dongle is used to restrict and protect the execution of the PC client.
Furthermore, the background server stores the programming record, so that subsequent tracking and processing are facilitated.
Further, the background service program is responsible for generating a firmware image which can be operated for each device, and the firmware image is a binary program; when the firmware is programmed, the background server receives the CPUID, the MAC address of the WIFI or BT chip and the IMEI number information of the wireless GSM module which are sent by the equipment, the background service program generates a corresponding data identifier by taking the unique identification information of the equipment as a basis, encrypts data by taking the data identifier as a secret key, and covers the contents on the specified position of the original binary file.
Further, the firmware image is further specifically: the firmware image reserves a data space with a specified size on a specific address of the firmware image by using a compiling option of a compiler or an instruction of a link script through the link script; specific data is written by a background service program, and fields of 'codes', 'reserved spaces' and 'data' are arranged in the structure of the program; when downloading, the background service program needs to generate a final binary file, namely a firmware image, according to the received CPUID, MAC address and IMEI number information; the program needs to check the data at the designated address in the same way or decrypt the data from the designated address.
Further, the program structure is as follows: the code 1+ the reserved space 1+ the code 2+ the reserved space 2+ the code 3+ the data 1+ the reserved space 3+ the data 2+ the reserved space 4, or the code 1+ the reserved space 1+ the code 2+ the reserved space 2+ the code 3+ the reserved space 3+ the data 1+ the data 2+ the reserved space 4; the number, the position and the size of the reserved space can be freely defined according to requirements; when downloading, the background service program needs to generate a final binary file, namely a firmware image, according to the received CPUID, MAC address and IMEI number information; performing XOR operation on the CPUID and the IMEI number, and writing the result into the position of the reserved space 1; then writing the CPUID in the reserved space 2 position in a negation way; adding a fixed data into the CPUID as a key to encrypt and write the data into the position of the reserved space 3; the CPUID and another fixed data are used as keys to encrypt and write the data into the position of a reserved space 4, and a filling mechanism of the data in the reserved space can also be freely set; the program needs to check the data at the designated address in the same way or decrypt the data from the designated address.
The invention has the following advantages: the background server generates a corresponding firmware image according to the received unique information of the equipment, so that one machine can realize one firmware; the firmware between different POS machines is not universal and can not be executed; the firmware mirror image sets several address reserved data storage spaces through a link script, and the spaces can store parameters for program operation, marks or data required by program operation; when the program runs, the data on the set address is verified, and the data on different addresses need to be verified in a plurality of different places in the program; some parameters required by the normal operation of the program are acquired from the set address, and the parameters are stored in an encryption mode; the firmware image is subjected to security check operation on a plurality of execution branches and a plurality of points; thus, a one-machine-one-firmware mechanism is realized, and a system platform dynamically generates a firmware image aiming at each device. Copying the firmware of one device into another device is not executable, thereby improving the security of the POS machine.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
FIG. 1 is a schematic view of the process of the present invention.
FIG. 2 is a schematic diagram of the interaction structure of the POS machine, the PC client and the background server.
Detailed Description
Referring to fig. 1 and fig. 2, a secure method for upgrading firmware of a financial POS device includes: the POS machine uploads the unique information of the equipment to a background server;
the background server generates a corresponding firmware image according to the received unique equipment information to realize one machine and one firmware; the firmware between different POS machines is not universal and can not be executed; the firmware mirror image sets several address reserved data storage spaces through a link script, and the spaces can store parameters for program operation, marks or data required by program operation; when the program runs, the data on the set address is verified, and the data on different addresses need to be verified in a plurality of different places in the program; some parameters required by the normal operation of the program are acquired from the set address, and the parameters are stored in an encryption mode; the unique information of the equipment comprises the MAC address of the CPUID, the WIFI or BT chip and the IMEI number of the wireless GSM module.
The firmware image is subjected to security check operation on a plurality of execution branches and a plurality of points;
when the POS updates the firmware, the POS machine cannot be upgraded offline when being programmed, the POS machine is programmed to be networked and cannot be programmed locally, the POS machine is connected to a PC client through a USB or a serial port, the PC client is connected to a background server through a network, and the background server transmits the firmware image to be programmed, so that the firmware can be upgraded on one machine.
Communication encryption and identity authentication mechanisms are arranged among the POS machine, the PC client and the background server; a dongle is used to restrict and protect the execution of the PC client.
The background server stores the programming record, and is convenient for subsequent tracking and processing.
The background service program is responsible for generating a firmware image which can be operated for each device, and the firmware image is a binary program; when the firmware is programmed, the background server receives the CPUID, the MAC address of the WIFI or BT chip and the IMEI number information of the wireless GSM module which are sent by the equipment, the background service program generates a corresponding data identifier by taking the unique identification information of the equipment as a basis, encrypts data by taking the data identifier as a secret key, and covers the contents on the specified position of the original binary file.
The firmware image is further specifically: the link script of the program (firmware) is adjusted. Traditionally, a complete binary program is compiled. The program structure is as follows: code segment + data segment;
the firmware image of the invention reserves a data space with a specified size on a specific address of the firmware image by using a compiling option of a compiler or an instruction of a link script through the link script; specific data is written by a background service program, and fields of 'codes', 'reserved spaces' and 'data' are arranged in the structure of the program;
when downloading, the background service program needs to generate a final binary file, namely a firmware image, according to the received CPUID, MAC address and IMEI number information; the program needs to verify the data at the designated address according to the same check or decrypt the data from the designated address.
The link script program structure is as follows:
code 1+ reserved space 1+ code 2+ reserved space 2+ code 3+ data 1+ reserved space 3+ data 2+ reserved space 4,
or code 1+ reserved space 1+ code 2+ reserved space 2+ code 3+ reserved space 3+ data 1+ data 2+ reserved space 4;
and 4 intervals are reserved, and the size and the address of each interval can be adjusted according to needs. The compiled file is actually a template of a binary file.
When downloading, the background service program needs to generate a final binary file, namely a firmware image, according to the received CPUID, MAC address and IMEI number information; performing XOR operation on the CPUID and the IMEI number, and writing the result into the position of the reserved space 1; writing the CPUID in the reserved space 2 position in a negation mode; adding a fixed data into the CPUID as a key to encrypt and write the data into the position of the reserved space 3; the CPUID and another fixed data are used as keys to encrypt and write the data into the position of a reserved space 4, and a filling mechanism of the data in the reserved space can also be freely set; the program needs to check the data at the designated address in the same way or decrypt the data from the designated address.
In order to disturb the view, some useless space may be reserved and some random numbers inserted.
The program code should include a code for checking the reserved area according to the corresponding rule. An act of performing a check in a plurality of different branches is required. If it fails, execution is terminated. Some data, parameters, required by the program may also be decrypted from the reserved area.
The more times of detection, the more branches detected are safe, and the adjustment can be carried out according to the needs.
A simple program can be locally programmed in advance in the POS machine, and the simple program can also be a BOOT program. This program can interface and interact with the PC client. And transmitting the unique identifier of the equipment, such as the information of the CPUID, the MAC address, the IMEI number and the like to the PC client. The client sends the information to the background service program. After receiving the firmware program transmitted from the background. And sending the data to a POS machine for programming.
Further, the invention
The linking script compiled by the firmware image (i.e. program) is modified, and the space for data storage is reserved at specified several addresses. The data may be some indicia or content that is needed during the operation of the program.
Therefore, the compiled program is incomplete and cannot be started to run normally. Special post-processing is required, that is, the compiled binary file is processed to generate a final binary file.
When the program runs, the data on the designated address (reserved in the link script) needs to be checked, and if the data is not checked, the program stops running. The program needs to check the data at different addresses in a plurality of different places.
Some parameters required for the program to run normally need to be obtained from the specified address (reserved in the link script). This data may be encrypted and stopped if the decrypted data is incorrect. There may be a plurality of this area of encrypted data.
The program can use unique identifiers of the devices such as the CPUID, the MAC address of the WIFI/BT chip, the IMEI number of the wireless GSM module and the like, or combinations of the identifiers, or results of specific operations of the identifiers as verification or decryption keys.
The background service program is responsible for generating a binary program which can be run for each device. When the firmware is programmed, the background service receives information such as the CPUID, the MAC address of the WIFI/BT chip, the IMEI number of the wireless GSM module and the like sent by the equipment. The background service program generates corresponding data identification according to the unique device identifications, encrypts data as a key and overlays the content on the specified position of the original binary file.
And when the POS machine is programmed, networking programming is needed, and local programming cannot be carried out. The POS machine can be connected to a client program on a PC (personal computer) through a USB (universal serial bus) or a serial port, and the client program is connected to a server of a company background through a network. And the POS machine sends the unique identification information of the equipment, the background server generates an executable program, and the executable program is transferred to be programmed. Therefore, a mechanism of one machine and one firmware is realized.
Communication encryption, identity recognition and other mechanisms are needed between the PC client program and the background server. A mechanism for the dongle is required to restrict and control the operation of the PC client.
In a word, the invention realizes the safe upgrade of the firmware of the POS machine, and realizes one machine with one firmware. And the copying and cracking of the firmware of the POS machine are prevented. Effectively improve the security of POS machine and prevent illegal cutting machine operation.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.

Claims (7)

1. A secure financial POS machine firmware upgrading method is characterized in that: the method comprises the following steps: the POS machine uploads the unique information of the equipment to a background server;
the background server generates a corresponding firmware image according to the received unique equipment information to realize one machine and one firmware; the firmware between different POS machines is not universal and can not be executed; the firmware mirror image sets several address reserved data storage spaces through a link script, and the spaces can store parameters for program operation, marks or data required by program operation; when the program runs, the data on the set address is verified, and the data on different addresses need to be verified in a plurality of different places in the program; some parameters required by the normal operation of the program are acquired from the set address, and the parameters are stored in an encryption mode;
the firmware image is subjected to security check operation on a plurality of execution branches and a plurality of points;
when the POS machine is used for upgrading the firmware, the POS machine needs to be networked to be programmed when being programmed, the POS machine cannot be programmed locally, the POS machine is connected to a PC client through a USB or a serial port, the PC client is connected to a background server through a network, and the background server transmits the firmware image to be programmed, so that the firmware can be upgraded one by one.
2. The secure financial POS machine firmware upgrade method of claim 1, wherein: the unique information of the equipment comprises a CPUID, an MAC address of a WIFI or BT chip, an IMEI number of a wireless GSM module and the like.
3. The secure financial POS machine firmware upgrade method of claim 1, wherein: communication encryption and identity authentication mechanisms are arranged among the POS machine, the PC client and the background server; a dongle is used to restrict and protect the execution of the PC client.
4. The secure financial POS machine firmware upgrade method of claim 1, wherein: the background server stores the programming record, and is convenient for subsequent tracking and processing.
5. The secure financial POS machine firmware upgrade method of claim 2, wherein: the background server is responsible for generating a firmware image which can be operated for each device, and the firmware image is a binary file; when the firmware is programmed, the background server receives the CPUID, the MAC address of the WIFI or BT chip and the IMEI number information of the wireless GSM module, which are sent by the equipment, generates a corresponding data identifier by taking the unique identifier information of the equipment as a basis, encrypts data by taking the data identifier as a secret key, and covers the contents on the specified position of the original binary file.
6. The secure financial POS machine firmware upgrade method of claim 1, wherein: the firmware image is further specifically: the firmware image reserves a data space with a specified size on a specific address of the firmware image through a compiling option of a compiler or an instruction of a link script; specific data is written by the program, and fields of 'code', 'reserved space' and 'data' are arranged in the structure of the program; when downloading, the program needs to generate a final binary file, namely a firmware mirror image, according to the received CPUID, MAC address and IMEI number information; the program needs to check the data at the designated address in the same way or decrypt the data from the designated address.
7. The secure financial POS machine firmware upgrade method of claim 6, wherein: the program structure is as follows: the code 1+ the reserved space 1+ the code 2+ the reserved space 2+ the code 3+ the data 1+ the reserved space 3+ the data 2+ the reserved space 4, or the code 1+ the reserved space 1+ the code 2+ the reserved space 2+ the code 3+ the reserved space 3+ the data 1+ the data 2+ the reserved space 4; the number, the position and the size of the reserved space can be freely defined according to requirements; when downloading, the background service program needs to generate a final binary file, namely a firmware image, according to the received CPUID, MAC address and IMEI number information; performing XOR operation on the CPUID and the IMEI number, and writing the result into the position of the reserved space 1; writing the CPUID in the reserved space 2 position in a negation mode; adding a fixed data into the CPUID as a key to encrypt and write the data into the position of the reserved space 3; the CPUID and another fixed data are used as keys to encrypt and write the data into the position of the reserved space 4, and the filling mechanisms of the data in the reserved space 1, the reserved space 2, the reserved space 3 and the reserved space 4 can also be freely set; the program needs to check the data at the designated address in the same way or decrypt the data from the designated address.
CN201710096353.XA 2017-02-22 2017-02-22 Safe financial POS machine firmware upgrading method Active CN106909421B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710096353.XA CN106909421B (en) 2017-02-22 2017-02-22 Safe financial POS machine firmware upgrading method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710096353.XA CN106909421B (en) 2017-02-22 2017-02-22 Safe financial POS machine firmware upgrading method

Publications (2)

Publication Number Publication Date
CN106909421A CN106909421A (en) 2017-06-30
CN106909421B true CN106909421B (en) 2020-05-12

Family

ID=59208863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710096353.XA Active CN106909421B (en) 2017-02-22 2017-02-22 Safe financial POS machine firmware upgrading method

Country Status (1)

Country Link
CN (1) CN106909421B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107479915A (en) * 2017-08-03 2017-12-15 福建新大陆支付技术有限公司 A kind of method for upgrading POS terminal firmware patch bag by USB flash disk off line
CN107567014A (en) * 2017-08-24 2018-01-09 深圳天珑无线科技有限公司 A kind of method, system and mobile terminal for realizing IMEI programmings
CN108306970A (en) * 2018-02-02 2018-07-20 浙江德景电子科技有限公司 A kind of download of firmware safety and calibration equipment and method based on safety chip
CN108418893A (en) * 2018-03-20 2018-08-17 深圳市闪联信息技术有限公司 A kind of method of smart machine firmware safety upgrade
CN109254789B (en) * 2018-09-30 2023-06-20 美的集团股份有限公司 Intelligent device electric control firmware programming method and system, intelligent device and server
CN109669705B (en) * 2018-12-19 2021-09-03 四川虹美智能科技有限公司 Method and system for programming firmware
CN109901851B (en) * 2019-02-28 2022-07-12 广州小鹏汽车科技有限公司 Firmware burning system and method
CN112447014B (en) * 2020-11-25 2022-10-14 惠尔丰信息系统有限公司 Control method applied to safe payment POS machine
CN114237642A (en) * 2021-12-16 2022-03-25 展讯通信(天津)有限公司 Secure data deployment method, device, terminal, server, and storage medium
CN117075958B (en) * 2023-10-16 2024-01-23 广东优力普物联科技有限公司 Firmware generation method suitable for multiple models, storage medium and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546576A (en) * 2013-10-31 2014-01-29 中安消技术有限公司 Remote automatic updating method and system of embedded equipment
CN103646082A (en) * 2013-12-12 2014-03-19 北京奇虎科技有限公司 Method and device for checking files
CN103458030B (en) * 2013-09-02 2017-01-11 唐山松下产业机器有限公司 welding machine control program upgrading system and upgrading method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9189224B2 (en) * 2013-07-11 2015-11-17 Oracle International Corporation Forming an upgrade recommendation in a cloud computing environment
CN105373404A (en) * 2015-11-25 2016-03-02 青岛海信宽带多媒体技术有限公司 Software mirror image burning method and equipment
CN105744000B (en) * 2016-04-08 2018-11-20 中国农业银行股份有限公司 A kind of mirror image dispositions method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458030B (en) * 2013-09-02 2017-01-11 唐山松下产业机器有限公司 welding machine control program upgrading system and upgrading method
CN103546576A (en) * 2013-10-31 2014-01-29 中安消技术有限公司 Remote automatic updating method and system of embedded equipment
CN103646082A (en) * 2013-12-12 2014-03-19 北京奇虎科技有限公司 Method and device for checking files

Also Published As

Publication number Publication date
CN106909421A (en) 2017-06-30

Similar Documents

Publication Publication Date Title
CN106909421B (en) Safe financial POS machine firmware upgrading method
US9734091B2 (en) Remote load and update card emulation support
US10460314B2 (en) Pre-generation of session keys for electronic transactions and devices that pre-generate session keys for electronic transactions
CN107111500B (en) Wireless provisioning of application libraries
US8843757B2 (en) One time PIN generation
US8640203B2 (en) Methods and systems for the authentication of a user
CA2948481C (en) Establishment of a secure session between a card reader and a mobile device
US12284183B2 (en) URL-based authentication for payment cards
US10114953B2 (en) Method and system for upgrading firmware of a card reader
US10701061B2 (en) Methods for blocking unauthorized applications and apparatuses using the same
US20170068955A1 (en) Verification and provisioning of mobile payment applications
CN105678192A (en) Smart card based secret key application method and application apparatus
CN101414913A (en) Computer network authentication system and method based on virtual technology
CN113595714A (en) Contactless card with multiple rotating security keys
US11551220B2 (en) Method for processing transaction data, corresponding communications terminal, card reader and program
CN108460597B (en) A key management system and method
KR102122555B1 (en) System and Method for Identification Based on Finanace Card Possessed by User
KR102348823B1 (en) System and Method for Identification Based on Finanace Card Possessed by User
WO2018156382A1 (en) Security architecture for device applications
EP2985724B1 (en) Remote load and update card emulation support
KR101957885B1 (en) Method of payment processing and security card reader device performing the same
KR101906484B1 (en) Method for application security and system for executing the method
JP6801448B2 (en) Electronic information storage media, authentication systems, authentication methods, and authentication application programs
JP7516133B2 (en) Payment Device
KR20200103615A (en) System and Method for Identification Based on Finanace Card Possessed by User

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant