CN103634105A - Authentication system based on mobile intelligent mobile phone terminal - Google Patents

Authentication system based on mobile intelligent mobile phone terminal Download PDF

Info

Publication number
CN103634105A
CN103634105A CN201210296967.XA CN201210296967A CN103634105A CN 103634105 A CN103634105 A CN 103634105A CN 201210296967 A CN201210296967 A CN 201210296967A CN 103634105 A CN103634105 A CN 103634105A
Authority
CN
China
Prior art keywords
mobile phone
authentication
smart mobile
file
desktop computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210296967.XA
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhenjiang Yction Software Co Ltd
Original Assignee
Zhenjiang Yction Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhenjiang Yction Software Co Ltd filed Critical Zhenjiang Yction Software Co Ltd
Priority to CN201210296967.XA priority Critical patent/CN103634105A/en
Publication of CN103634105A publication Critical patent/CN103634105A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to an authentication system, particularly relates to a mobile authentication system based on an intelligent mobile phone application, and belongs to the technical field of communication. Digital signature and authentication are performed by a designed MobileKey technology combined with an intelligent mobile phone so that file encryption and decryption of the system are realized. The system is mainly composed of three parts of one intelligent mobile phone, a desktop computer software module and an intelligent mobile phone software module. Firstly, one MobileKey client terminal is designed and realized on a desktop computer, wherein the MobileKey client terminal comprises a file encryption and decryption tool and an Office signature and authentication plug-in piece. Then one digital signature is designed and realized on the intelligent mobile phone so that file encryption and decryption of the mobile authentication system are realized. With realization of the system, mobile authentication is more flexible and high-efficient. The system comprises multiple advantages of being high in operation speed, in favor of long secret keys and processing super-large files, great in sharing performance, higher in security, greater in extendibility, etc., which are not contained by a commonly used USBkey at present.

Description

A kind of Verification System based on intelligent movable mobile phone terminal
 
Technical field
The present invention relates to a kind of Verification System, especially a kind of Verification System based on intelligent movable mobile phone terminal.The invention belongs to communication technical field.
Background technology
Along with the development of the Internet, increasing people start to attempt online transaction, yet virus, hacker, swindle etc. are threatening the fail safe of network trading always, to the fail safe of online transaction, have brought great challenge.Mechanism's investigation result shows according to investigations, last year the U.S. because how network becomes event, the direct losses that bank and consumer are suffered reach 2,400,000,000 dollars.According to another Hong Kong contract quotation message, Hong Kong connect because how network straightens the economic loss causing and reach 14,000,000,000 Hongkong dollars last year.The network model emerging in an endless stream is emerald green, has caused the trust crisis of people to network identity, how to prove " Who Am I " and how to prevent that the problems such as identity Mao Yong from becoming again the focus that the people pay close attention to.
At present, the mode that Verification System is taked has multiple, and USB KEY has received increasing concern therein.USB KEY relies on its cheap price, and the higher feature of fail safe becomes the maximum authentication mode of current use, but USB KEY also has some shortcomings, comprising:
1) speed is slower: USB KEY is due to self-condition, and wherein the arithmetic speed of single-chip microcomputer is slower, generates long key to the needs long period, cannot accomplish that a thing one is close.
2) key length is limited: its built-in memory space generally only has tens bytes, can only preserve the key information of minority, can not retain the senior keys such as digital certificate.
3) autgmentability is poor: a kind of cryptographic algorithm that general a kind of USB KEY is only embedded, when having some better cryptographic algorithm, cannot expand or upgrade.
Thus, the mobile authentication system based on smart mobile phone provided by the invention, has series of advantages portable higher, that autgmentability is better, security performance is stronger with respect to existing general USB KEY mode.
Summary of the invention
For above deficiency, in conjunction with the shortcoming and defect of USBKEY, we propose a kind of smart mobile phone that utilizes and carry out Mobile Key Verification System.It comprises digital signature on a Mobile Key client and smart mobile phone, authentication, encryption/deciphering system, Mobile Key client runs on computer, by digital signature on data wire or blue-tooth device and smart mobile phone, authentication, encryption/deciphering system communicates.
Mobile Key client comprises:
1) desktop computer and smart mobile phone communication module: with Transmission Control Protocol, realize, take the mode of asynchronous transmission to realize the transmission of data.This module is by setting up TCP monitor listening port, and when port has communication request, communication system takes asynchronous mode to transmit and receive data between smart mobile phone and desktop computer.First the data that communication system sends need to carry out data encapsulation before transmission, add type I D and data packet length, by this mode, reach piecemeal transfer files, and piecemeal is processed the object of file.
2) desktop computer file operation module: use this module, user can select desktop computer file, and according to the user-selected algorithm on Mobile Key that is arranged on, the file of selecting is carried out to respective handling.The algorithm of processing can comprise: encryption, deciphering, signature, authentication, camouflage, reconstruct etc.Desktop computer file operation system file type process class, file asynchronous process result class, file status class.The type of the information judgement file that first file operation system provides according to file type processing class, then confirms the processing procedure of file, and the result of processing is left in file asynchronous process result class according to file status class.
3) desktop computer information operating module: other application programs that this module is mainly on computer provide digital signature energy.Verification System that other application programs on desktop computer can be used for word, Web bank etc. need to be used traditional USBKEY to carry out the application program of authentication or digital signature.First information operating module is extracted in word document and is needed information to be processed, waits for that user selects signature standard, and the signature standard of then automatically notifying Mobile Key smart mobile phone end module user to select is signed to information or verifies.
Digital signature on smart mobile phone, authentication, encrypt/decrypt comprises:
1) smart mobile phone and desktop computer communication module: the implementation similar to desktop computer end.
2) algorithm management device: algorithm management device provides series of standards, user only need to realize these given standards, can say that in theory Mobile Key supports any particular algorithms.
3) key management module: select according to user, key can be kept at any position of mobile phone, such as rom, expansion card or sim card, uim card etc.Support to the modification of key, check, the operation such as deletion.
4) smart mobile phone encryption and decryption module: this module is first by the type I D of evaluation algorithm, then realizes encryption and decryption according to the method that type I D is invoked at the encapsulation in the .Net Compact Framework on smart mobile phone.
5) signature, authentication module in smart mobile phone: on smart mobile phone, realize various signature standard, comprise: RSA ECSDA etc., the RSSASSA-PSS implementation of this module and encryption, deciphering implementation substantially similar, by calling the method for the encapsulation in .net Compact Framework, realize.
Embodiment
Embodiment mono-
One, system soft and hardware environment is described:
One, PC computer
One of smart mobile phone
Running environment: windows series operating system, windows mobile2003/5.0/6.0 windows Embed CE 5.0/6.0 etc.
Two, Mobile Key client
Mobile Key client comprises:
Desktop computer and smart mobile phone communication module: with Transmission Control Protocol, realize, take the mode of asynchronous transmission to realize the transmission of data.This module is by setting up TCP monitor listening port, and when port has communication request, communication system takes asynchronous mode to transmit and receive data between smart mobile phone and desktop computer.First the data that communication system sends need to carry out data encapsulation before transmission, add type I D and data packet length, by this mode, reach piecemeal transfer files, and piecemeal is processed the object of file.
Desktop computer file operation module: use this module, user can select desktop computer file, and according to the user-selected algorithm on Mobile Key that is arranged on, the file of selecting is carried out to respective handling.The algorithm of processing can comprise: encryption, deciphering, signature, authentication, camouflage, reconstruct etc.Desktop computer file operation system file type process class, file asynchronous process result class, file status class.The type of the information judgement file that first file operation system provides according to file type processing class, then confirms the processing procedure of file, and the result of processing is left in file asynchronous process result class according to file status class.
Desktop computer information operating module: other application programs that this module is mainly on computer provide digital signature energy.Verification System that other application programs on desktop computer can be used for word, Web bank etc. need to be used traditional USBKEY to carry out the application program of authentication or digital signature.First information operating module is extracted in word document and is needed information to be processed, waits for that user selects signature standard, and the signature standard of then automatically notifying Mobile Key smart mobile phone end module user to select is signed to information or verifies.
Three, smart mobile phone encryption, deciphering module:
Smart mobile phone and desktop computer communication module: the implementation similar to desktop computer end.
Algorithm management device: algorithm management device provides series of standards, user only need to realize these given standards, can say that in theory Mobile Key supports any particular algorithms.
Key management module: select according to user, key can be kept at any position of mobile phone, such as rom, expansion card or sim card, uim card etc.Support to the modification of key, check, the operation such as deletion.
Smart mobile phone encryption and decryption module: this module is first by the type I D of evaluation algorithm, then realizes encryption and decryption according to the method that type I D is invoked at the encapsulation in the .Net Compact Framework on smart mobile phone.
Signature, authentication module in smart mobile phone: on smart mobile phone, realize various signature standard, comprise: RSA ECSDA etc., the RSSASSA-PSS implementation of this module and encryption, deciphering implementation substantially similar, by calling the method for the encapsulation in .net Compact Framework, realize.
In addition to the implementation, the present invention can also have other execution modes.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection range of requirement of the present invention.

Claims (3)

1. the Mobile Key Verification System based on smart mobile phone, it comprises a Mobile Key client and smart mobile phone digital signature, authentication, encrypting-decrypting module, Mobile Key client runs on computer, communicates by communications such as data wire, bluetooths with digital signature, authentication, encrypting and decrypting module on smart mobile phone.
2. the Mobile Key authentication module based on smart mobile phone according to claim 1, is characterized in that desktop computer and the smart mobile phone communication system of described client realizes with Transmission Control Protocol, takes the mode of asynchronous transmission to realize transfer of data.
3. the Mobile Key Verification System based on smart mobile phone according to claim 1, it is characterized in that, the desktop computer file operation modular design of described Mobile Key client file type process class, file asynchronous process result class and file status class.
CN201210296967.XA 2012-08-21 2012-08-21 Authentication system based on mobile intelligent mobile phone terminal Pending CN103634105A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210296967.XA CN103634105A (en) 2012-08-21 2012-08-21 Authentication system based on mobile intelligent mobile phone terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210296967.XA CN103634105A (en) 2012-08-21 2012-08-21 Authentication system based on mobile intelligent mobile phone terminal

Publications (1)

Publication Number Publication Date
CN103634105A true CN103634105A (en) 2014-03-12

Family

ID=50214765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210296967.XA Pending CN103634105A (en) 2012-08-21 2012-08-21 Authentication system based on mobile intelligent mobile phone terminal

Country Status (1)

Country Link
CN (1) CN103634105A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070011724A1 (en) * 2005-07-08 2007-01-11 Gonzalez Carlos J Mass storage device with automated credentials loading
CN1928930A (en) * 2006-09-28 2007-03-14 江苏恒宝股份有限公司 Multiple uses KEY device with NFC function
CN101304569A (en) * 2008-04-24 2008-11-12 中山大学 Mobile authentication system based on intelligent mobile phone
CN102547688A (en) * 2012-02-13 2012-07-04 江苏博智软件科技有限公司 Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070011724A1 (en) * 2005-07-08 2007-01-11 Gonzalez Carlos J Mass storage device with automated credentials loading
CN1928930A (en) * 2006-09-28 2007-03-14 江苏恒宝股份有限公司 Multiple uses KEY device with NFC function
CN101304569A (en) * 2008-04-24 2008-11-12 中山大学 Mobile authentication system based on intelligent mobile phone
CN102547688A (en) * 2012-02-13 2012-07-04 江苏博智软件科技有限公司 Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel

Similar Documents

Publication Publication Date Title
CN102768744B (en) A kind of remote safe payment method and system
CN101304569A (en) Mobile authentication system based on intelligent mobile phone
WO2019001061A1 (en) Payment verification method and system, and mobile device and security authentication device
CN102571702A (en) Key generation method, system and equipment in Internet of things
CN102254264A (en) Security control method and security control system of mobile payment
CN106327723B (en) A kind of mPOS transaction systems based on intelligent platform
CN205725829U (en) Cloud key authentication device
CN104281272B (en) Password Input processing method and processing device
CN105516180A (en) Cloud secret key authentication system based on public key algorithm
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN102710611A (en) Network security authentication method and system
CN101873583A (en) Mobile certificate device and control method thereof
CN102088349A (en) Personalized method and system of intelligent card
CN101605328A (en) Communication system, terminal, SIM and machine-card authentication method
CN104462949A (en) Method and device for calling plug-in
CN110046906A (en) A kind of the two-way authentication method of commerce and system of MPOS machine and server
CN107994995A (en) A kind of method of commerce, system and the terminal device of lower security medium
Zhou et al. Implementation of cryptographic algorithm in dynamic QR code payment system and its performance
CN208722256U (en) A kind of digital thermal wallet based on hardware encryption and the mobile phone based on the digital thermal wallet
Akram et al. A secure and trusted channel protocol for the user centric smart card ownership model
CN202008672U (en) E-commerce transaction safety terminal
CN103634105A (en) Authentication system based on mobile intelligent mobile phone terminal
CN202818328U (en) Security authentication and encryption communication module based on security processor
CN206195801U (en) A cloud platform, subscriber equipment and system for CPU card encryption authentication
CN105721160B (en) A kind of identification authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140312

WD01 Invention patent application deemed withdrawn after publication