CN102891753B - The initialized method and device of dynamic token - Google Patents

The initialized method and device of dynamic token Download PDF

Info

Publication number
CN102891753B
CN102891753B CN201210361019.XA CN201210361019A CN102891753B CN 102891753 B CN102891753 B CN 102891753B CN 201210361019 A CN201210361019 A CN 201210361019A CN 102891753 B CN102891753 B CN 102891753B
Authority
CN
China
Prior art keywords
key
data
dynamic token
protection
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210361019.XA
Other languages
Chinese (zh)
Other versions
CN102891753A (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Minghua Alliance Technology Co., Ltd.
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN201210361019.XA priority Critical patent/CN102891753B/en
Publication of CN102891753A publication Critical patent/CN102891753A/en
Application granted granted Critical
Publication of CN102891753B publication Critical patent/CN102891753B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A kind of open initialized method of dynamic token of the present invention, including: receive and preserve the first data including serial number, current time and protection key information, according to fixed key, protection key information is decrypted, obtain protecting key;Receive and include check key ciphertext and the second data of seeded dispersion key ciphertext, be decrypted according to the ciphertext in protection double secret key the second data, obtain check key and seeded dispersion key and preserve.Invention additionally discloses a kind of initialized device of dynamic token.The present invention includes the first data of serial number, current time and protection key information by receiving and preserving and is obtained protecting key, obtaining check key and seeded dispersion key the method preserved according to protection key by protection key information; have when dynamic token initializes without the beneficial effect being manually entered; improve the initialized efficiency of dynamic token and safety, the initialization procedure making dynamic token is more convenient.<!--1-->

Description

The initialized method and device of dynamic token
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of initialized method and device of dynamic token.
Background technology
Dynamic token is used to generate the terminal of dynamic password, and dynamic password can confirm that the legal identity of user, thus ensures the safety that customer service accesses with legal identity on the basis of user logs in.Dynamic password authentication technology be considered as at present can one of the mode of most effective solution authenticating user identification, thus be widely used in the various information system scenarios such as bank, security, Third-party payment, big business are internal.
Dynamic token of the prior art uses symmetric key system mostly, and the key of the encryption of this key code system and deciphering is identical;Therefore, the safety of this dynamic token places one's entire reliance upon key, and once Key Exposure means that user profile can be encrypted and decrypted by anyone.In order to avoid the leakage of key, when dynamic token initializes, typically use and key is generated factor input dynamic token, inside dynamic token, generate the factor according to this key calculate generation key rather than directly key inputted dynamic token.Key generate the factor generally comprise dynamic token serial number, current time, mackey(check key), seedkey(seeded dispersion key) etc..Prior art typically uses the mode being manually entered to input dynamic token serial number and current time, and is stored in inside dynamic token before dynamic token initializes by mackey and seedkey;Prior art uses and is manually entered mode and initializes, very inconvenient and to initialize efficiency the lowest when operation, is also easy to make mistakes, and mackey and seedkey is stored in inside dynamic token existing great potential safety hazard before an initialization.
Summary of the invention
The main object of the present invention is to provide a kind of initialized method and device of dynamic token, it is intended to solve manually to input dynamic token initializes brought series of problems.
The invention discloses a kind of initialized method of dynamic token, comprise the following steps:
Receive and preserve the first data including serial number, current time and protection key information, according to fixed key, described protection key information is decrypted, obtain protecting key;
Receive and include check key ciphertext and the second data of seeded dispersion key ciphertext, be decrypted according to the described ciphertext in the second data described in described protection double secret key, obtain check key and seeded dispersion key and preserve.
Preferably, described reception preservation include the first data of serial number, current time and protection key information, are decrypted described protection key information according to fixed key, further comprise the steps of: before obtaining the step of protection key
Preset described fixed key.
Preferably, after described first data of described reception, described first data are verified;If verification is passed through, then preserve described first data and carry out follow-up associative operation.
Preferably, after described second data of described reception, described second data are verified;If verification is passed through, then described second data are utilized to carry out follow-up associative operation.
Preferably, described first data and/or the second data are received by serial ports, USB interface or communication.
Invention additionally discloses a kind of initialized device of dynamic token, including:
First initialization module, includes the first data of serial number, current time and protection key information, is decrypted described protection key information according to fixed key for reception preservation, obtains protecting key;
Second initialization module, includes check key ciphertext and the second data of seeded dispersion key ciphertext for receiving, is decrypted according to the described ciphertext in the second data described in described protection double secret key, obtains check key and seeded dispersion key and preserves.
Preferably, the initialized device of described dynamic token, also include:
Fixed key arranges module, for preset described fixed key.
Preferably, described first initialization module is additionally operable to, and after receiving described first data, verifies described first data;If verification is passed through, then preserve described first data and carry out follow-up associative operation.
Preferably, described second initialization module is additionally operable to, and after receiving described second data, verifies described second data;If verification is passed through, then described second data are utilized to carry out follow-up associative operation.
Preferably, described first initialization module and/or the second initialization module receive corresponding data by serial ports, USB interface or communication.
The present invention includes serial number by receiving and preserving, current time and the first data of protection key information, according to fixed key, described protection key information is decrypted, obtain protecting key, receive and include check key ciphertext and the second data of seeded dispersion key ciphertext, it is decrypted according to the described ciphertext in the second data described in described protection double secret key, obtain check key and seeded dispersion key the method preserved, have when dynamic token initializes without the beneficial effect being manually entered, improve the initialized efficiency of dynamic token and safety, the initialization procedure making dynamic token is more convenient.
Accompanying drawing explanation
Fig. 1 is dynamic token of the present invention initialized method first embodiment schematic flow sheet;
Fig. 2 is dynamic token of the present invention initialized method the second embodiment schematic flow sheet;
Fig. 3 is dynamic token of the present invention initialized device first embodiment structural representation;
Fig. 4 is dynamic token of the present invention initialized device the second example structure schematic diagram.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further referring to the drawings.
Detailed description of the invention
Technical scheme is further illustrated below in conjunction with Figure of description and specific embodiment.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
It is dynamic token of the present invention initialized method first embodiment schematic flow sheet with reference to Fig. 1, Fig. 1;As it is shown in figure 1, the initialized method of dynamic token of the present invention comprises the following steps:
Step S01, receive and preserve the first data including serial number, current time and protection key information, according to fixed key, described protection key information is decrypted, obtain protecting key;
When dynamic token initializes, receive the first data at least including serial number, current time and protection key information, and use the fixed key pre-set that the protection key information in the first data is decrypted, obtain protection key.Described protection key can be a random number, and protection key original text encryption is obtained by described protection key information by fixed key.
In a preferred embodiment, dynamic token passes through serial ports, USB(UniversalSerialBus, USB (universal serial bus)) interface or communication receive corresponding data.
In a preferred embodiment, described first data also include the first check code MAC1, after dynamic token receives the first data, will verify the first data, and verification is by rear, then carries out these first data preserving or the operation such as deciphering;If verification is not passed through, then wait the first new data again received.Described checking procedure is particularly as follows: dynamic token uses described fixed key that the first data carry out MAC(MessageAuthenticationCode, informed source correctness authentication data) yardage calculation, obtain the second check code MAC2;Judge that MAC1 and MAC2 is the most equal, if the two is equal, then uses described fixed key that protection key information is decrypted, obtain protecting key, and be saved in dynamic token, such as the RAM(RandomAccessMemory of dynamic token, random access memory) in;Meanwhile, current time is write dynamic token, described serial number is saved in dynamic token, in the RAM of dynamic token.
Step S02, reception include check key ciphertext and the second data of seeded dispersion key ciphertext, are decrypted according to the described ciphertext in the second data described in described protection double secret key, obtain check key and seeded dispersion key also preserves.
After dynamic token obtains protection key, receive and include at least check key ciphertext i.e. MAC key ciphertext and the second data of seeded dispersion key ciphertext.Described seeded dispersion key ciphertext is obtained by the encryption of described protection double secret key seeded dispersion key original text, and described seeded dispersion key original text can be obtained with dynamic token serial number computing by seeded dispersion root key;Described MAC key ciphertext is by protecting the encryption of double secret key MAC key original text to obtain, and described MAC key original text can be obtained with dynamic token serial number computing by seeded dispersion root key.
In a preferred embodiment, described second data also include MAC3, and after receiving described second data, described second data are verified by dynamic token, if verification is passed through, then utilize described second data to carry out follow-up associative operation;If verification is not passed through, then wait and again receive the second new data.Described checking procedure, particularly as follows: dynamic token uses described fixed key that described second data are carried out MAC calculating, obtains MAC4;Judging that MAC3 and MAC4 is the most equal, if the two is equal, then the second data check passes through.
MAC key ciphertext and seeded dispersion key ciphertext in the second data that the protection double secret key that dynamic token obtains according to step S01 receives are decrypted; obtain MAC key and seeded dispersion key; and described MAC key and seeded dispersion key are preserved, as being saved in the RAM of dynamic token.
The present invention includes serial number by receiving and preserving, current time and the first data of protection key information, according to fixed key, described protection key information is decrypted, obtain protecting key, receive and include check key ciphertext and the second data of seeded dispersion key ciphertext, it is decrypted according to the described ciphertext in the second data described in described protection double secret key, obtain check key and seeded dispersion key the method preserved, have when dynamic token initializes without the beneficial effect being manually entered, improve the initialized efficiency of dynamic token and safety, the initialization procedure making dynamic token is more convenient.
It is dynamic token of the present invention initialized method the second embodiment schematic flow sheet with reference to Fig. 2, Fig. 2;The difference of the present embodiment method initialized with dynamic token of the present invention first embodiment is to increase only step S00;Step S00 is only described specifically by the present embodiment, and other steps involved by the initialized method of dynamic token of the present invention refer to the specific descriptions of embodiment described in Fig. 1, does not repeats them here.
As shown in Figure 2; the initialized method of dynamic token of the present invention in step S01, receive and preserve and include the first data of serial number, current time and protection key information; according to fixed key, described protection key information is decrypted, further comprises the steps of: before obtaining protecting key
Step S00, preset described fixed key.
In a preferred embodiment; before dynamic token dispatches from the factory; being implanted into a fixing key such as MCU chip in dynamic token, i.e. described fixed key, for making the encryption and decryption process that MAC yardage is calculated and this dynamic token is protected key in dynamic token initialization procedure.
The present embodiment, by the method arranging fixed key inside dynamic token, has the beneficial effect improving dynamic token safety.
It is dynamic token of the present invention initialized device first embodiment structural representation with reference to Fig. 3, Fig. 3;As it is shown on figure 3, the initialized device of dynamic token of the present invention includes:
First initialization module 01, includes the first data of serial number, current time and protection key information, is decrypted described protection key information according to fixed key for reception preservation, obtains protecting key;
When dynamic token initializes; first initialization module 01 receives the first data at least including serial number, current time and protection key information; and use the fixed key pre-set that the protection key information in the first data is decrypted, obtain protection key.Described protection key can be a random number, and protection key original text encryption is obtained by described protection key information by fixed key.
In a preferred embodiment, dynamic token receives corresponding data by serial ports, USB interface or communication.
In a preferred embodiment, described first data also include the first check code MAC1, after the first initialization module 01 receives the first data, will verify the first data, and verification is by rear, then carries out these first data preserving or the operation such as deciphering;If verification is not passed through, then wait the first new data again received.Described checking procedure, particularly as follows: the first initialization module 01 uses described fixed key that the first data carry out MAC yardage calculation, obtains the second check code MAC2;Judging that MAC1 and MAC2 is the most equal, if the two is equal, then the first initialization module 01 uses described fixed key to be decrypted protection key information, obtains protecting key, and is saved in dynamic token, in the RAM of dynamic token;Meanwhile, current time is write dynamic token by the first initialization module 01, is saved in dynamic token by described serial number, in the RAM of dynamic token.
Second initialization module 02, includes check key ciphertext and the second data of seeded dispersion key ciphertext for receiving, is decrypted according to the described ciphertext in the second data described in described protection double secret key, obtains check key and seeded dispersion key and preserves.
After dynamic token obtains protection key by the first initialization module 01, the second initialization module 02 receives and includes at least check key ciphertext i.e. MAC key ciphertext and the second data of seeded dispersion key ciphertext.Described seeded dispersion key ciphertext is obtained by the encryption of described protection double secret key seeded dispersion key original text, and described seeded dispersion key original text can be obtained with dynamic token serial number computing by seeded dispersion root key;Described MAC key ciphertext is by protecting the encryption of double secret key MAC key original text to obtain, and described MAC key original text can be obtained with dynamic token serial number computing by seeded dispersion root key.
In a preferred embodiment, described second data also include MAC3, after the second initialization module 02 receives described second data, verify described second data, if verification is passed through, the second initialization module 02 then utilizes described second data to carry out follow-up associative operation;If verification is not passed through, then wait and again receive the second new data.Described checking procedure, particularly as follows: the second initialization module 02 uses described fixed key that described second data are carried out MAC calculating, obtains MAC4;Judging that MAC3 and MAC4 is the most equal, if the two is equal, then the second data check passes through.
MAC key ciphertext and seeded dispersion key ciphertext in the second data that the protection double secret key that second initialization module 02 obtains according to the first initialization module 01 receives are decrypted; obtain MAC key and seeded dispersion key; and described MAC key and seeded dispersion key are preserved, as being saved in the RAM of dynamic token.
The present invention includes serial number by receiving and preserving, current time and the first data of protection key information, according to fixed key, described protection key information is decrypted, obtain protecting key, receive and include check key ciphertext and the second data of seeded dispersion key ciphertext, it is decrypted according to the described ciphertext in the second data described in described protection double secret key, obtain check key and seeded dispersion key and preserve, have when dynamic token initializes without the beneficial effect being manually entered, improve the initialized efficiency of dynamic token and safety, the initialization procedure making dynamic token is more convenient.
It is dynamic token of the present invention initialized device the second example structure schematic diagram with reference to Fig. 4, Fig. 4.The difference of the present embodiment device initialized with invention dynamic token first embodiment is to increase only fixed key and arrange module 03;The present embodiment only arranges module 03 and is described specifically fixed key, and other modules involved by the initialized device of dynamic token of the present invention refer to the specific descriptions of dynamic token of the present invention initialized device first embodiment, does not repeats them here.
As shown in Figure 4, the initialized device of dynamic token of the present invention also includes:
Fixed key arranges module 03, for preset described fixed key.
In a preferred embodiment; before dynamic token dispatches from the factory; fixed key arranges module 03 in dynamic token as MCU chip is implanted into a fixing key; i.e. described fixed key, for making the encryption and decryption process that MAC yardage is calculated and this dynamic token is protected key in dynamic token initialization procedure.
The present embodiment, by arranging fixed key inside dynamic token, has the beneficial effect improving dynamic token safety.
The foregoing is only the preferred embodiments of the present invention; not thereby its scope of the claims is limited; every equivalent structure utilizing description of the invention and accompanying drawing content to be made or equivalence flow process conversion; directly or indirectly it is used in other relevant technical fields, is the most in like manner included in the scope of patent protection of the present invention.

Claims (6)

1. the initialized method of dynamic token, it is characterised in that comprise the following steps:
Preset fixed key;
Receive and preserve the first data including serial number, current time and protection key information, according to described fixed key, described protection key information is decrypted, obtain protecting key;Protection key original text encryption is obtained by described protection key information by fixed key;
Receive and include check key ciphertext and the second data of seeded dispersion key ciphertext, be decrypted according to the described ciphertext in the second data described in described protection double secret key, obtain check key and seeded dispersion key and preserve;Wherein, described first data and/or the second data are received by serial ports, USB interface or communication.
2. the method for claim 1, it is characterised in that after described first data of described reception, described first data are verified;If verification is passed through, then preserve described first data and carry out follow-up associative operation.
3. the method for claim 1, it is characterised in that after described second data of described reception, described second data are verified;If verification is passed through, then described second data are utilized to carry out follow-up associative operation.
4. the initialized device of dynamic token, it is characterised in that including:
Fixed key arranges module, for preset fixed key;
First initialization module, includes the first data of serial number, current time and protection key information, is decrypted described protection key information according to described fixed key for reception preservation, obtains protecting key;Protection key original text encryption is obtained by described protection key information by fixed key;
Second initialization module, includes check key ciphertext and the second data of seeded dispersion key ciphertext for receiving, is decrypted according to the described ciphertext in the second data described in described protection double secret key, obtains check key and seeded dispersion key and preserves;
Wherein, described first initialization module and/or the second initialization module receive corresponding data by serial ports, USB interface or communication.
5. device as claimed in claim 4, it is characterised in that described first initialization module is additionally operable to, and after receiving described first data, verifies described first data;If verification is passed through, then preserve described first data and carry out follow-up associative operation.
6. device as claimed in claim 4, it is characterised in that described second initialization module is additionally operable to, and after receiving described second data, verifies described second data;If verification is passed through, then described second data are utilized to carry out follow-up associative operation.
CN201210361019.XA 2012-09-25 2012-09-25 The initialized method and device of dynamic token Active CN102891753B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210361019.XA CN102891753B (en) 2012-09-25 2012-09-25 The initialized method and device of dynamic token

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210361019.XA CN102891753B (en) 2012-09-25 2012-09-25 The initialized method and device of dynamic token

Publications (2)

Publication Number Publication Date
CN102891753A CN102891753A (en) 2013-01-23
CN102891753B true CN102891753B (en) 2016-08-03

Family

ID=47535129

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210361019.XA Active CN102891753B (en) 2012-09-25 2012-09-25 The initialized method and device of dynamic token

Country Status (1)

Country Link
CN (1) CN102891753B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579680B (en) * 2014-12-19 2018-03-09 飞天诚信科技股份有限公司 A kind of method of secure distribution seed
CN105635114B (en) * 2015-12-18 2019-02-26 恒宝股份有限公司 A kind of password method of calibration and system
CN106936570B (en) * 2015-12-31 2021-08-20 华为技术有限公司 Key configuration method, key management center and network element
CN106850211B (en) * 2017-03-06 2020-03-27 深圳市同为数码科技股份有限公司 Encryption method and system based on MAC address
CN108454410B (en) * 2018-04-13 2020-06-23 安徽江淮汽车集团股份有限公司 Fuel cell diagnosis access method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN101719826A (en) * 2009-05-13 2010-06-02 北京宏基恒信科技有限责任公司 Dynamic token having function of updating seed key and updating method for seed key thereof
US7738660B2 (en) * 1998-02-13 2010-06-15 Tecsec, Inc. Cryptographic key split binding process and apparatus
CN102651743A (en) * 2012-05-02 2012-08-29 飞天诚信科技股份有限公司 Method for generating token seeds

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7738660B2 (en) * 1998-02-13 2010-06-15 Tecsec, Inc. Cryptographic key split binding process and apparatus
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN101719826A (en) * 2009-05-13 2010-06-02 北京宏基恒信科技有限责任公司 Dynamic token having function of updating seed key and updating method for seed key thereof
CN102651743A (en) * 2012-05-02 2012-08-29 飞天诚信科技股份有限公司 Method for generating token seeds

Also Published As

Publication number Publication date
CN102891753A (en) 2013-01-23

Similar Documents

Publication Publication Date Title
JP6646341B2 (en) Method and apparatus for authenticating a user and method and apparatus for registering a wearable device
Kim et al. A method of risk assessment for multi-factor authentication
CN102891753B (en) The initialized method and device of dynamic token
CN103065168A (en) Anti-fake method and system of radio frequency identification
CN106612180A (en) Method and device for realizing session identifier synchronization
CN105391695A (en) Terminal registration method and verification method
CN102938032A (en) Method and system for encrypting and decrypting application program on communication terminal as well as terminal
CN105391696A (en) Terminal registration method, terminal verification method, terminal registration system and terminal verification system
CN102202300A (en) System and method for dynamic password authentication based on dual channels
CN103152174B (en) It is applied to the data processing method in parking lot, device and managing system of car parking
CN106372531B (en) A kind of mandate obtains terminal attack warning message log approach and system
CN104008351A (en) System, method and device for Windows application program integrity checking
CN103888938A (en) PKI private key protection method of dynamically generated key based on parameters
CN104393993A (en) A security chip for electricity selling terminal and the realizing method
CN103684797B (en) User and the association authentication method and system of subscriber terminal equipment
US20170011393A1 (en) Personal identification and anti-theft system and method using disposable random key
CN103606223B (en) A kind of card authentication method and device
CN103596175A (en) Mobile intelligent terminal certification system and method based on near field communication technology
CN102983969B (en) Security login system and security login method for operating system
CN114760052A (en) Bank Internet of things platform key generation method and device, electronic equipment and medium
US9756044B2 (en) Establishment of communication connection between mobile device and secure element
CN103532961A (en) Method and system for authenticating identity of power grid website based on trusted crypto modules
CN205160564U (en) System security starting drive and intelligent terminal
CN105635103A (en) Network authentication method using card device
CN102655454A (en) Determination method and device for dynamic token trading

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170330

Address after: 100000 room 703-710, room B3, Huayuan Road, Haidian District, Beijing, 7

Patentee after: Beijing Minghua Alliance Technology Co., Ltd.

Address before: 518057 Guangdong city of Shenzhen province Nanshan District Ke Feng Lu No. 2 idiopathic information building A building unit seven floor South 701-709

Patentee before: Shenzhen Wendingchuang Data Technology Co., Ltd.