CN103634105A - Authentication system based on mobile intelligent mobile phone terminal - Google Patents
Authentication system based on mobile intelligent mobile phone terminal Download PDFInfo
- Publication number
- CN103634105A CN103634105A CN201210296967.XA CN201210296967A CN103634105A CN 103634105 A CN103634105 A CN 103634105A CN 201210296967 A CN201210296967 A CN 201210296967A CN 103634105 A CN103634105 A CN 103634105A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- authentication
- smart mobile
- file
- desktop computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention relates to an authentication system, particularly relates to a mobile authentication system based on an intelligent mobile phone application, and belongs to the technical field of communication. Digital signature and authentication are performed by a designed MobileKey technology combined with an intelligent mobile phone so that file encryption and decryption of the system are realized. The system is mainly composed of three parts of one intelligent mobile phone, a desktop computer software module and an intelligent mobile phone software module. Firstly, one MobileKey client terminal is designed and realized on a desktop computer, wherein the MobileKey client terminal comprises a file encryption and decryption tool and an Office signature and authentication plug-in piece. Then one digital signature is designed and realized on the intelligent mobile phone so that file encryption and decryption of the mobile authentication system are realized. With realization of the system, mobile authentication is more flexible and high-efficient. The system comprises multiple advantages of being high in operation speed, in favor of long secret keys and processing super-large files, great in sharing performance, higher in security, greater in extendibility, etc., which are not contained by a commonly used USBkey at present.
Description
Technical field
The present invention relates to a kind of Verification System, especially a kind of Verification System based on intelligent movable mobile phone terminal.The invention belongs to communication technical field.
Background technology
Along with the development of the Internet, increasing people start to attempt online transaction, yet virus, hacker, swindle etc. are threatening the fail safe of network trading always, to the fail safe of online transaction, have brought great challenge.Mechanism's investigation result shows according to investigations, last year the U.S. because how network becomes event, the direct losses that bank and consumer are suffered reach 2,400,000,000 dollars.According to another Hong Kong contract quotation message, Hong Kong connect because how network straightens the economic loss causing and reach 14,000,000,000 Hongkong dollars last year.The network model emerging in an endless stream is emerald green, has caused the trust crisis of people to network identity, how to prove " Who Am I " and how to prevent that the problems such as identity Mao Yong from becoming again the focus that the people pay close attention to.
At present, the mode that Verification System is taked has multiple, and USB KEY has received increasing concern therein.USB KEY relies on its cheap price, and the higher feature of fail safe becomes the maximum authentication mode of current use, but USB KEY also has some shortcomings, comprising:
1) speed is slower: USB KEY is due to self-condition, and wherein the arithmetic speed of single-chip microcomputer is slower, generates long key to the needs long period, cannot accomplish that a thing one is close.
2) key length is limited: its built-in memory space generally only has tens bytes, can only preserve the key information of minority, can not retain the senior keys such as digital certificate.
3) autgmentability is poor: a kind of cryptographic algorithm that general a kind of USB KEY is only embedded, when having some better cryptographic algorithm, cannot expand or upgrade.
Thus, the mobile authentication system based on smart mobile phone provided by the invention, has series of advantages portable higher, that autgmentability is better, security performance is stronger with respect to existing general USB KEY mode.
Summary of the invention
For above deficiency, in conjunction with the shortcoming and defect of USBKEY, we propose a kind of smart mobile phone that utilizes and carry out Mobile Key Verification System.It comprises digital signature on a Mobile Key client and smart mobile phone, authentication, encryption/deciphering system, Mobile Key client runs on computer, by digital signature on data wire or blue-tooth device and smart mobile phone, authentication, encryption/deciphering system communicates.
Mobile Key client comprises:
1) desktop computer and smart mobile phone communication module: with Transmission Control Protocol, realize, take the mode of asynchronous transmission to realize the transmission of data.This module is by setting up TCP monitor listening port, and when port has communication request, communication system takes asynchronous mode to transmit and receive data between smart mobile phone and desktop computer.First the data that communication system sends need to carry out data encapsulation before transmission, add type I D and data packet length, by this mode, reach piecemeal transfer files, and piecemeal is processed the object of file.
2) desktop computer file operation module: use this module, user can select desktop computer file, and according to the user-selected algorithm on Mobile Key that is arranged on, the file of selecting is carried out to respective handling.The algorithm of processing can comprise: encryption, deciphering, signature, authentication, camouflage, reconstruct etc.Desktop computer file operation system file type process class, file asynchronous process result class, file status class.The type of the information judgement file that first file operation system provides according to file type processing class, then confirms the processing procedure of file, and the result of processing is left in file asynchronous process result class according to file status class.
3) desktop computer information operating module: other application programs that this module is mainly on computer provide digital signature energy.Verification System that other application programs on desktop computer can be used for word, Web bank etc. need to be used traditional USBKEY to carry out the application program of authentication or digital signature.First information operating module is extracted in word document and is needed information to be processed, waits for that user selects signature standard, and the signature standard of then automatically notifying Mobile Key smart mobile phone end module user to select is signed to information or verifies.
Digital signature on smart mobile phone, authentication, encrypt/decrypt comprises:
1) smart mobile phone and desktop computer communication module: the implementation similar to desktop computer end.
2) algorithm management device: algorithm management device provides series of standards, user only need to realize these given standards, can say that in theory Mobile Key supports any particular algorithms.
3) key management module: select according to user, key can be kept at any position of mobile phone, such as rom, expansion card or sim card, uim card etc.Support to the modification of key, check, the operation such as deletion.
4) smart mobile phone encryption and decryption module: this module is first by the type I D of evaluation algorithm, then realizes encryption and decryption according to the method that type I D is invoked at the encapsulation in the .Net Compact Framework on smart mobile phone.
5) signature, authentication module in smart mobile phone: on smart mobile phone, realize various signature standard, comprise: RSA ECSDA etc., the RSSASSA-PSS implementation of this module and encryption, deciphering implementation substantially similar, by calling the method for the encapsulation in .net Compact Framework, realize.
Embodiment
Embodiment mono-
One, system soft and hardware environment is described:
One, PC computer
One of smart mobile phone
Running environment: windows series operating system, windows mobile2003/5.0/6.0 windows Embed CE 5.0/6.0 etc.
Two, Mobile Key client
Mobile Key client comprises:
Desktop computer and smart mobile phone communication module: with Transmission Control Protocol, realize, take the mode of asynchronous transmission to realize the transmission of data.This module is by setting up TCP monitor listening port, and when port has communication request, communication system takes asynchronous mode to transmit and receive data between smart mobile phone and desktop computer.First the data that communication system sends need to carry out data encapsulation before transmission, add type I D and data packet length, by this mode, reach piecemeal transfer files, and piecemeal is processed the object of file.
Desktop computer file operation module: use this module, user can select desktop computer file, and according to the user-selected algorithm on Mobile Key that is arranged on, the file of selecting is carried out to respective handling.The algorithm of processing can comprise: encryption, deciphering, signature, authentication, camouflage, reconstruct etc.Desktop computer file operation system file type process class, file asynchronous process result class, file status class.The type of the information judgement file that first file operation system provides according to file type processing class, then confirms the processing procedure of file, and the result of processing is left in file asynchronous process result class according to file status class.
Desktop computer information operating module: other application programs that this module is mainly on computer provide digital signature energy.Verification System that other application programs on desktop computer can be used for word, Web bank etc. need to be used traditional USBKEY to carry out the application program of authentication or digital signature.First information operating module is extracted in word document and is needed information to be processed, waits for that user selects signature standard, and the signature standard of then automatically notifying Mobile Key smart mobile phone end module user to select is signed to information or verifies.
Three, smart mobile phone encryption, deciphering module:
Smart mobile phone and desktop computer communication module: the implementation similar to desktop computer end.
Algorithm management device: algorithm management device provides series of standards, user only need to realize these given standards, can say that in theory Mobile Key supports any particular algorithms.
Key management module: select according to user, key can be kept at any position of mobile phone, such as rom, expansion card or sim card, uim card etc.Support to the modification of key, check, the operation such as deletion.
Smart mobile phone encryption and decryption module: this module is first by the type I D of evaluation algorithm, then realizes encryption and decryption according to the method that type I D is invoked at the encapsulation in the .Net Compact Framework on smart mobile phone.
Signature, authentication module in smart mobile phone: on smart mobile phone, realize various signature standard, comprise: RSA ECSDA etc., the RSSASSA-PSS implementation of this module and encryption, deciphering implementation substantially similar, by calling the method for the encapsulation in .net Compact Framework, realize.
In addition to the implementation, the present invention can also have other execution modes.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection range of requirement of the present invention.
Claims (3)
1. the Mobile Key Verification System based on smart mobile phone, it comprises a Mobile Key client and smart mobile phone digital signature, authentication, encrypting-decrypting module, Mobile Key client runs on computer, communicates by communications such as data wire, bluetooths with digital signature, authentication, encrypting and decrypting module on smart mobile phone.
2. the Mobile Key authentication module based on smart mobile phone according to claim 1, is characterized in that desktop computer and the smart mobile phone communication system of described client realizes with Transmission Control Protocol, takes the mode of asynchronous transmission to realize transfer of data.
3. the Mobile Key Verification System based on smart mobile phone according to claim 1, it is characterized in that, the desktop computer file operation modular design of described Mobile Key client file type process class, file asynchronous process result class and file status class.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210296967.XA CN103634105A (en) | 2012-08-21 | 2012-08-21 | Authentication system based on mobile intelligent mobile phone terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210296967.XA CN103634105A (en) | 2012-08-21 | 2012-08-21 | Authentication system based on mobile intelligent mobile phone terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103634105A true CN103634105A (en) | 2014-03-12 |
Family
ID=50214765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210296967.XA Pending CN103634105A (en) | 2012-08-21 | 2012-08-21 | Authentication system based on mobile intelligent mobile phone terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103634105A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070011724A1 (en) * | 2005-07-08 | 2007-01-11 | Gonzalez Carlos J | Mass storage device with automated credentials loading |
CN1928930A (en) * | 2006-09-28 | 2007-03-14 | 江苏恒宝股份有限公司 | Multiple uses KEY device with NFC function |
CN101304569A (en) * | 2008-04-24 | 2008-11-12 | 中山大学 | Mobile authentication system based on intelligent mobile phone |
CN102547688A (en) * | 2012-02-13 | 2012-07-04 | 江苏博智软件科技有限公司 | Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel |
-
2012
- 2012-08-21 CN CN201210296967.XA patent/CN103634105A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070011724A1 (en) * | 2005-07-08 | 2007-01-11 | Gonzalez Carlos J | Mass storage device with automated credentials loading |
CN1928930A (en) * | 2006-09-28 | 2007-03-14 | 江苏恒宝股份有限公司 | Multiple uses KEY device with NFC function |
CN101304569A (en) * | 2008-04-24 | 2008-11-12 | 中山大学 | Mobile authentication system based on intelligent mobile phone |
CN102547688A (en) * | 2012-02-13 | 2012-07-04 | 江苏博智软件科技有限公司 | Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102768744B (en) | A kind of remote safe payment method and system | |
CN101304569A (en) | Mobile authentication system based on intelligent mobile phone | |
WO2019001061A1 (en) | Payment verification method and system, and mobile device and security authentication device | |
CN102571702A (en) | Key generation method, system and equipment in Internet of things | |
CN102254264A (en) | Security control method and security control system of mobile payment | |
CN106327723B (en) | A kind of mPOS transaction systems based on intelligent platform | |
CN205725829U (en) | Cloud key authentication device | |
CN104281272B (en) | Password Input processing method and processing device | |
CN105516180A (en) | Cloud secret key authentication system based on public key algorithm | |
CN107465665A (en) | A kind of file encryption-decryption method based on fingerprint identification technology | |
CN102710611A (en) | Network security authentication method and system | |
CN101873583A (en) | Mobile certificate device and control method thereof | |
CN102088349A (en) | Personalized method and system of intelligent card | |
CN101605328A (en) | Communication system, terminal, SIM and machine-card authentication method | |
CN104462949A (en) | Method and device for calling plug-in | |
CN110046906A (en) | A kind of the two-way authentication method of commerce and system of MPOS machine and server | |
CN107994995A (en) | A kind of method of commerce, system and the terminal device of lower security medium | |
Zhou et al. | Implementation of cryptographic algorithm in dynamic QR code payment system and its performance | |
CN208722256U (en) | A kind of digital thermal wallet based on hardware encryption and the mobile phone based on the digital thermal wallet | |
Akram et al. | A secure and trusted channel protocol for the user centric smart card ownership model | |
CN202008672U (en) | E-commerce transaction safety terminal | |
CN103634105A (en) | Authentication system based on mobile intelligent mobile phone terminal | |
CN202818328U (en) | Security authentication and encryption communication module based on security processor | |
CN206195801U (en) | A cloud platform, subscriber equipment and system for CPU card encryption authentication | |
CN105721160B (en) | A kind of identification authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140312 |
|
WD01 | Invention patent application deemed withdrawn after publication |