CN107038571A - For inserting the encrypted card in mobile terminal - Google Patents
For inserting the encrypted card in mobile terminal Download PDFInfo
- Publication number
- CN107038571A CN107038571A CN201710245447.9A CN201710245447A CN107038571A CN 107038571 A CN107038571 A CN 107038571A CN 201710245447 A CN201710245447 A CN 201710245447A CN 107038571 A CN107038571 A CN 107038571A
- Authority
- CN
- China
- Prior art keywords
- user
- mobile terminal
- signal
- card
- encrypted card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of encrypted card for inserting in mobile terminal, the structure of encrypted card is ferrule structure or membrane structure, and encrypted card is inserted into the same SIM card neck of mobile terminal simultaneously with SIM card;Wherein, encrypted card includes:Wireless communication module, sensor, safety chip and power interface;Wireless communication module, for setting up communication port between encrypted card and mobile terminal;Sensor, user's confirmation signal for detecting user;Safety chip is connected with wireless communication module and sensor respectively, for detecting obtained user's confirmation signal according to sensor, user profile is encrypted operation or decryption oprerations;The power interface of encrypted card is connected with the power interface of the SIM card neck of mobile terminal, and the power interface for the SIM card neck by mobile terminal provides electric energy for encrypted card.The technical scheme facilitates user to obtain, carry and use encrypted card, improves the security of transactional operation.
Description
Technical field
The present invention relates to communication technical field, and in particular to a kind of encrypted card for inserting in mobile terminal.
Background technology
Mobile payment refers to that user carries out account payment using mobile terminals such as mobile phones to the commodity consumed or service.By
There is the advantage such as convenient, fast in mobile payment, increasing user likes being paid by way of mobile payment, so
And the transactional operation safety problem in thing followed mobile payment is also increasingly protruded.For example, in mobile terminal by bank's account
Number, during the user profile such as password transmitted to far-end servers such as bank servers, it is easy to by Trojan attack, be hacked
The illegal molecule malicious intercepted such as visitor, so as to threaten the account safety of user.
Therefore, it is necessary to take encrypted transmission mode in data transmission procedure.In the prior art, people have developed
Some are used for the technical scheme encrypted for communication of mobile terminal, for example, using external encryption device or by SIM card
The mode of built-in security chip is encrypted for communication of mobile terminal.Prior art has the disadvantage that:External encryption device is needed
User is wanted individually to carry, and it is aperiodically its charging to need user, it has not been convenient to user is used;And it is built-in in SIM card
Although the mode of safety chip is easy to user to carry, but needs to cooperate hair fastener with SIM card operator, hair fastener flow compared with
Long, user is difficult easily to obtain, in addition, safety chip is built in SIM card, is chronically at working condition, it is impossible to had
The user of effect confirms, exists by the risk of Trojan attack.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on
State problem for the encrypted card that inserts in mobile terminal.
The invention provides a kind of encrypted card for inserting in mobile terminal, the structure of encrypted card for ferrule structure or
Membrane structure, encrypted card is inserted into the same SIM card neck of mobile terminal simultaneously with SIM card;
Wherein, encrypted card includes:Wireless communication module, sensor, safety chip and power interface;
Wireless communication module, for setting up communication port between encrypted card and mobile terminal, line number is entered with mobile terminal
According to communication;
Sensor, user's confirmation signal for detecting user;
Safety chip is connected with wireless communication module and sensor respectively, for detecting obtained user according to sensor
Confirmation signal, user profile is encrypted operation or decryption oprerations;
The power interface of encrypted card is connected with the power interface of the SIM card neck of mobile terminal, for by mobile whole
The power interface of the SIM card neck at end provides electric energy for encrypted card.
Further, safety chip is additionally operable to:The user profile operation from mobile terminal is received from wireless communication module
Instruction, generates random goal verification signal, and compare the obtained user's confirmation signal of sensor detection and the target generated
Whether confirmation signal is consistent, if comparing, to obtain user's confirmation signal consistent with goal verification signal, and user profile is added
Close operation or decryption oprerations.
Further, when the structure of encrypted card is ferrule structure, the appearance and size of encrypted card and the SIM card of mobile terminal
The appearance and size of neck matches, and the groove of encrypted card is embedded in SIM of the geomery less than or equal to the geomery of groove
Card;When the structure of encrypted card is membrane structure, encrypted card is attached to SIM card and is provided with the surface of hard contact.
Further, sensor is additionally operable to:Detect the user control signal of user;
Safety chip is additionally operable to:Obtained user control signal is detected according to sensor, starts or closes radio communication mold
The communication function of block.
Further, user profile operational order includes personal recognition code;
Safety chip is additionally operable to:According to the personal recognition code that prestores, the individual in checking user profile operational order recognizes
The legitimacy of password.
Further, goal verification signal includes target gesture behavior signal, and user's confirmation signal includes user gesture row
For signal;And/or, goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal.
Further, safety chip is additionally operable to:When goal verification signal includes target gesture behavior signal, user's confirmation letter
When number including user gesture behavior signal, judge the sensor obtained user gesture behavior signal of detection and target gesture behavior letter
Whether number time being consistent exceedes prefixed time interval, if judging to obtain user gesture behavior signal and target gesture behavior
The time that signal is consistent exceedes prefixed time interval, then operation or decryption oprerations user profile are encrypted.
Further, safety chip is additionally operable to:Pass through set up communication port respectively to believe the goal verification generated
Number and sensor detect that obtained user's confirmation signal is sent to mobile terminal.
Further, sensor includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sound wave sensing
Device.
Further, wireless communication module includes:Bluetooth communication and/or WIFI communication modules.
Communication port is set up in the bluetooth module connection of bluetooth communication and mobile terminal, realizes mobile terminal and encrypted card
Communication, further realize interconnecting between encrypted card, mobile terminal and far-end computer information system three.
WIFI communication modules and the WIFI module or external routes equipment of mobile terminal are connected, and realize that encrypted card is set with outside
Standby connection, external equipment includes mobile terminal or far-end computer information system, by the connection of WIFI communication modules, realizes
Interconnecting between encrypted card, mobile terminal and far-end computer information system three.
According to the technical scheme that provides of the present invention, encryption card issuing with the third party such as SIM card operator without being closed
Make hair fastener, be easy to user to obtain;The structure of encrypted card is ferrule structure or membrane structure, and encrypted card can be inserted simultaneously with SIM card
Enter to the same SIM card neck of mobile terminal, can not only be encryption by the power interface of the SIM card neck of mobile terminal
Card provides electric energy, and is also convenient for user's carrying with using;Wireless communication module in encrypted card can be in encrypted card and movement
Communication port is set up between terminal, the data communication between encrypted card and mobile terminal is realized, some shiftings are efficiently solved
Dynamic terminal is difficult the problem of entering row data communication with encrypted card due to various limitations;Sensor in encrypted card, which is used to detect, to be used
User's confirmation signal at family, the sensor is independently of mobile terminal so that mobile terminal can not directly invoke the sensor, eradicates
The risk that sensor is remotely maliciously called;Safety chip detects obtained user's confirmation signal according to sensor, to user
Operation or decryption oprerations are encrypted in information, so as to prevent the Trojan attack in process of exchange, improve transactional operation
Security.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows according to an embodiment of the invention for the structural representation of the encrypted card inserted in mobile terminal
Figure;
Fig. 2 shows according to an embodiment of the invention for the functional structure frame of the encrypted card inserted in mobile terminal
Figure;
Fig. 3 shows according to an embodiment of the invention for the method for work of encrypted card inserted in mobile terminal
Schematic flow sheet;
Fig. 4 shows in accordance with another embodiment of the present invention for the method for work of the encrypted card inserted in mobile terminal
Schematic flow sheet.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
The invention provides a kind of encrypted card for inserting in mobile terminal, the structure of the encrypted card for ferrule structure or
Person's membrane structure, encrypted card is inserted into the same SIM card neck of mobile terminal simultaneously with SIM card, facilitates user to carry with making
With, and solve the problems, such as the carrying of encrypted card.Specifically, mobile terminal can have the terminal of SIM card neck for mobile phone etc..Need
, it is emphasized that encrypted card and SIM card described in the present invention is two independent products, it is not the composition portion of identical product
Point, the work of encrypted card is independently of the work of SIM card, is that, when user is wanted using encrypted card, user needs to add
Close card and SIM card are inserted into the same SIM card neck of mobile terminal together again after being assembled, so as to not influence to use
Family utilizes the power interface of the SIM card neck of mobile terminal to be encrypted card in the case of normally using the SIM card in mobile terminal
Electric energy is provided.
When the structure of encrypted card is ferrule structure, the appearance and size of encrypted card and the SIM card neck of mobile terminal it is outer
Shape size matches, therefore, and encrypted card is inserted into the SIM card neck of mobile terminal, when specifically used, encrypted card
Groove is embedded in SIM card of the geomery less than or equal to the geomery of groove.Wherein, geomery is less than or equal to groove
The SIM card of geomery can be the less SIM card of geomery in the prior art, or chi obtained from clipped
Very little smaller SIM card.
Fig. 1 shows according to an embodiment of the invention for the structural representation of the encrypted card inserted in mobile terminal
Figure, wherein, the structure of the encrypted card 110 shown in Fig. 1 is ferrule structure, when specifically used, in the groove 111 of encrypted card 110
Embedded geomery is less than or equal to the SIM card of the geomery of groove 111.
In the prior art, SIM card has had evolved to three types, and specially size is 15mm × 25mm standard
The Micro-SIM cards that SIM card, size are 15mm × 12mm and the Nano-SIM cards that size is 12.3mm × 8.8mm.With movement
Exemplified by terminal is mobile phone, for the mobile phone that SIM card neck is Nano-SIM card necks, using the technical scheme that provides of the present invention,
Can be by the structure fabrication of encrypted card into the ferrule structure matched with Nano-SIM card necks, and due in the prior art
The geomery of SIM card chip inside Nano-SIM cards is less than the geomery of Nano-SIM cards, therefore using cutting card
Nano-SIM cards are further cut into smaller geomery by device, without being caused to the SIM card chip inside Nano-SIM cards
Damage, then clipped SIM card is embedded in the groove in the encrypted card of ferrule structure, so that by encrypted card and SIM card
It is inserted into simultaneously in the same SIM card neck of mobile phone.And for the mobile phone that SIM card neck is Micro-SIM card necks, utilize this
Invent provide technical scheme, can by the structure fabrication of encrypted card into the ferrule structure matched with Micro-SIM card necks, and
And the geomery of the groove in the encrypted card of ferrule structure is fabricated to can be embedded in the geomery of Nano-SIM cards, pass through
Nano-SIM cards can need to be only embedded in the encrypted card of ferrule structure by this set, user without being cut to SIM card
In groove, it then will be embedded with the encrypted card of the ferrule structure of Nano-SIM cards and be inserted into the Micro-SIM card necks of mobile phone,
So as to which encrypted card and SIM card are inserted into the same SIM card neck of mobile phone simultaneously.In addition, being standard for SIM card neck
The mobile phone of SIM card neck, using the technical scheme that provides of the present invention, can by the structure fabrication of encrypted card into standard SIM card card
The ferrule structure that groove matches, and the geomery of the groove in the encrypted card of ferrule structure is fabricated to and can be embedded in
The geomery of Micro-SIM cards or Nano-SIM cards, by this set, user can only need without being cut to SIM card
Micro-SIM cards or Nano-SIM cards are embedded in the groove in the encrypted card of ferrule structure, Micro- then will be embedded with
The encrypted card of the ferrule structure of SIM card or Nano-SIM cards is inserted into the SIM card neck of mobile phone, so that by encrypted card and SIM
Card is inserted into the same SIM card neck of mobile phone simultaneously.Furthermore it is possible to using Recovery card profile for Nano-SIM card shapes
Encrypted card becomes the profile of Micro-SIM cards or the profile of standard SIM card;It is Micro- profile that Recovery card, which can also be utilized,
The encrypted card of SIM card shape becomes the profile of standard SIM card.
When the structure of encrypted card is membrane structure, encrypted card is attached to SIM card and is provided with the surface of hard contact.Tool
Body, encrypted card can make the product form of film, and match with the power contact with the SIM card neck of mobile terminal
Power contact, encrypted card is in parallel with SIM card on mobile terminals so that the power contact of SIM card and the SIM card of mobile terminal
The power contact of neck remains able to normal connection without influenceing the normal of SIM card to use, so that by encrypted card and SIM card simultaneously
It is inserted into the same SIM card neck of mobile phone, the problem of carrying and power supply of encrypted card are solved well.
It should be noted that the encrypted card that the present invention is provided does not have the function of SIM card, different from of the prior art
SIM card.In electrical connection, the power contact of the encrypted card and the power contact of SIM cards of mobile phones neck simultaneously connect to solve encryption
The power supply powerup issue of card.The surface of encrypted card is additionally provided with ISO7816 docking interfaces, with bluetooth pasting card phase in the prior art
Than the ISO7816 docking interfaces in the present invention set by encrypted card surface are totally different from bluetooth pasting card in the prior art
Set principal and subordinate's ISO7816 interfaces, the effect of principal and subordinate's ISO7816 interfaces set in bluetooth pasting card in the prior art is
Realize the data communication of bluetooth pasting card and SIM card, bluetooth pasting card and mobile phone, and encrypted card surface in the present invention
The effect of ISO7816 docking interfaces is totally different from the effect of principal and subordinate's ISO7816 interfaces in bluetooth pasting card in the prior art, this
Mobile phone neck ISO7816 interfaces and SIM card are realized in the effect of the ISO7816 docking interfaces on encrypted card surface in invention
The electric docking of ISO7816 interfaces so that the ISO7816 interfaces of SIM cards of mobile phones neck and the ISO7816 interfaces of SIM card it is each
Contact is directly turned on.In addition, in the prior art it is developed that bluetooth SIM card, bluetooth SIM card is actually a tool
There is the SIM card of Bluetooth function, row data communication can be entered by ISO7816 interfaces and mobile phone.With bluetooth SIM card phase in the prior art
Than the encrypted card that the present invention is provided does not have the function of SIM card, does not move identification code, it is impossible to use as SIM card, not yet
With ISO7816 interfaces, it is impossible to enter row data communication by ISO7816 interfaces and mobile phone.Further, since the present invention provide plus
Without mobile identification code in close card, therefore encryption card issuing is cooperated hair without with the third party such as SIM card operator
Card, user can more easily obtain encrypted card.
Fig. 2 shows according to an embodiment of the invention for the functional structure frame of the encrypted card inserted in mobile terminal
Figure, as shown in Fig. 2 the encrypted card includes:Wireless communication module 210, sensor 220, safety chip 230 and power interface (figure
Not shown in).
Wherein, wireless communication module 210 is used to set up communication port between encrypted card and mobile terminal, with mobile terminal
Enter row data communication.Wireless communication module 210 is additionally operable to set up communication port between encrypted card and external routes equipment, and outer
Portion's routing device enters row data communication.Therefore, wireless communication module 210 can be in encrypted card, mobile terminal and external routes equipment
Between set up communication port, enter row data communication with mobile terminal or external routes equipment.Wireless communication module 210 includes:
Bluetooth communication and/or WIFI communication modules.Specifically, when wireless communication module 210 includes bluetooth communication, encryption
Bluetooth communication in card is connected with the bluetooth module of mobile terminal, so as to be established between encrypted card and mobile terminal
Bluetooth communication channel, can enter row data communication with the bluetooth module in mobile terminal;When wireless communication module 210 includes WIFI
During communication module, the WIFI communication modules in encrypted card can both be connected with the WIFI module of mobile terminal, can also with it is outer
Portion's routing device sets up WIFI connections.Set up in encrypted card and external routes equipment after WIFI is connected, pass through external routes equipment
Achieve that and communication port is set up between encrypted card and far-end computer information system, and far-end computer information system also may be used
Communicated with mobile terminal, so as to be established between encrypted card, mobile terminal and far-end computer information system three mutually
Join the communication port of intercommunication;When wireless communication module 210 both includes bluetooth communication, includes WIFI communication modules again, use
Family can select to enter row data communication by bluetooth approach or WIFI modes according to actual needs.In the present invention, indigo plant is passed through
Tooth mode or WIFI modes can conveniently realize the number between encrypted card, mobile terminal and far-end computer information system three
According to communication, it is difficult the problem of entering row data communication with encrypted card to efficiently solve some mobile terminals due to various limitations.
Sensor 220 is used for the user's confirmation signal for detecting user.Specifically, sensor 220 includes:Acceleration sensing
Device, geomagnetic sensor, gyro sensor and/or sonic sensor.Those skilled in the art can be according to actual needs to sensing
Device is combined and selected, and does not limit herein.Sensor 220 in encrypted card is independently of mobile terminal, the behaviour of mobile terminal
Sensor 220 can not be called by making system, so as to eradicate the risk that sensor is remotely maliciously called, improve transactional operation
Security.
Safety chip 230 is connected with wireless communication module 210 and sensor 220 respectively, for being examined according to sensor 220
The user's confirmation signal measured, user profile is encrypted operation or decryption oprerations.Safety chip 230 be further used for from
Wireless communication module 210 receives user profile operational order, generates random goal verification signal, and compares sensor 220 and examines
Whether the user's confirmation signal measured is consistent with the goal verification signal generated, and user's confirmation signal and mesh are obtained if comparing
Mark confirmation signal consistent, then operation or decryption oprerations user profile are encrypted.When wireless communication module 210 in encrypted card and
When setting up communication port between mobile terminal, safety chip 230 can receive the use from mobile terminal from wireless communication module 210
Family information operational order;When wireless communication module 210 sets up communication port between encrypted card and far-end computer information system
When, safety chip 230 can be received from wireless communication module 210 from far-end computer information system user profile operation refer to
Order;When wireless communication module 210 sets up communication port between encrypted card, mobile terminal and far-end computer information system three
When, safety chip 230 can receive the user from mobile terminal or far-end computer information system from wireless communication module 210
Information operational order.
For example, when user is traded payment using mobile terminal, mobile terminal sends user profile to encrypted card and grasped
Instruct, the wireless communication module 210 in encrypted card receives the user profile operational order, and safety chip 230 is according to the user
Information operational order, using random algorithm, generates random goal verification signal, and pass through the use of the detection user of sensor 220
Family confirmation signal, the target that then safety chip 230 compares the obtained user's confirmation signal of the detection of sensor 220 and generated is true
Whether consistent signal is recognized, to obtain user's confirmation signal consistent with goal verification signal if comparing, using being stored in safety chip
Key and algorithm in 230, user profile are encrypted operation or decryption oprerations.Those skilled in the art can be according to actual need
Random algorithm is selected, is not limited herein.
Wherein, goal verification signal includes target gesture behavior signal, and user's confirmation signal is believed including user gesture behavior
Number;And/or, goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal.For example, when biography
When sensor 220 includes acceleration transducer, geomagnetic sensor and/or gyro sensor, goal verification signal includes target hand
Gesture behavior signal, user's confirmation signal includes user gesture behavior signal, then safety chip 230 compares sensor 220 and detected
Whether obtained user gesture behavior signal is consistent with the target gesture behavior signal generated;When sensor 220 passes for sound wave
During sensor, goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal, then safety chip
230 compare sensor 220 using speech recognition technology detects obtained user voice signal and the targeted voice signal generated
It is whether consistent;When sensor 220 is included outside acceleration transducer, geomagnetic sensor and/or gyro sensor, in addition to sound
During wave sensor, goal verification signal includes target gesture behavior signal and targeted voice signal, and user's confirmation signal includes using
Family gesture behavior signal and user voice signal, then safety chip 230 compares sensor 220 and detects obtained user gesture row
It is whether consistent by signal and the target gesture behavior signal that generates, and compare sensor 220 and detect obtained user speech letter
It is number whether consistent with the targeted voice signal that is generated.
In addition, when also including personal recognition code in the user profile operational order that safety chip 230 is received, example
Such as PIN code, safety chip 230 verifies that individual's identification in the user profile operational order is close according to the personal recognition code that prestores
The legitimacy of code.Specifically, if safety chip 230 verifies the PIN code obtained in user profile operational order and the PIN code that prestores
Unanimously, then it is legal PIN code to illustrate the PIN code, then safety chip 230 is according to user profile operational order, and generation is random
Goal verification signal;If safety chip 230 verifies the PIN code obtained in user profile operational order and prestores PIN code not
Unanimously, then it is illegal PIN code to illustrate the PIN code, then safety chip 230 need not generate random goal verification signal,
The result of personal recognition code authentication failed can directly be returned.
Further, when personal recognition code checking identification number of times exceedes default maximum times, what the present invention was provided
Encrypted card is locked, it is necessary to can be unlocked by the external authentication instruction of higher authority automatically.
Goal verification signal in the present invention is not changeless goal verification signal, but by safety chip 230
Generate at random, so as to efficiently reduce the risk that goal verification signal is remotely maliciously cracked;In addition, safety chip
230 need to detect whether obtained user's confirmation signal and the goal verification signal generated unanimously come really according to sensor 220
It is fixed whether user profile to be encrypted operation or decryption oprerations, so as to prevent the Trojan attack in process of exchange, enter one
Step improves the security of transactional operation.
Wherein, user profile operational order can be divided into but be not limited to user profile encrypted instruction or user profile decryption refer to
Order.When user profile operational order is user profile encrypted instruction, the comparison of safety chip 230 obtains sensor 220 and detected
To real-time user's confirmation signal it is consistent with the goal verification signal generated at random after, then using being stored in safety chip 230
Interior key and algorithm user profile is encrypted operation;When user profile operational order is user profile decryption instructions,
Safety chip 230, which is compared, obtains the obtained real-time user's confirmation signal of the detection of sensor 220 and the goal verification generated at random
After signal is consistent, then user profile is decrypted operation using the key and algorithm that are stored in safety chip 230.It is above-mentioned to add
Close or decryption oprerations results, are returned by wireless communication module 210.
Specifically, safety chip 230 detects sensor 220 obtained user's confirmation letter in predetermined registration operation time interval
Number and goal verification signal be analyzed, calculate the similarity of user's confirmation signal and goal verification signal.If pre-
If obtained similarity is calculated in operating time interval exceedes default similarity threshold, then safety chip 230 determines that user confirms
Signal is consistent with goal verification signal, illustrates that user successfully confirms this time to operate, then right according to user profile operational order
Operation or decryption oprerations are encrypted in user profile;If calculated in predetermined registration operation time interval obtained similarity not less than
Default similarity threshold, then the determination user's confirmation signal of safety chip 230 and goal verification signal are inconsistent, illustrate operation overtime
User is caused to confirm this time to operate not successfully, then not carry out any operation, and the result returned operation failure to user profile.
Wherein, those skilled in the art can be configured to default similarity threshold and predetermined registration operation time interval according to actual needs,
Do not limit herein.For example, default similarity threshold can be set into 0.9.
If the wireless communication module 210 in encrypted card is chronically at opening, then do not only exist power consumption problem, and
And also there is the risk maliciously connected by other people.In order to solve the above problems, in the present invention, sensor 220 is additionally operable to inspection
The user control signal of user is surveyed, safety chip 230 is additionally operable to detect obtained user control signal according to sensor 220, opened
Communication function that is dynamic or closing wireless communication module 210.Specifically, safety chip 230 compares sensor 220 and detects obtained use
Whether family control signal is consistent with default control signal, if comparing, to obtain user control signal consistent with default control signal,
Start or close the communication function of wireless communication module 210.
Specifically, sensor 220 includes sonic sensor, and default control signal is default audio controls, specifically may be used
Including default speech onset signal and default voice shutdown signal.Safety chip 230 utilizes speech recognition technology, compares sound wave and passes
Whether the obtained user control signal of sensor detection consistent with default speech onset signal, if compare obtain user control signal and
Default speech onset signal is consistent, then starts the communication function of wireless communication module 210;Safety chip 230 utilizes speech recognition
Technology, compares sonic sensor and detects whether obtained user control signal is consistent with default voice shutdown signal, if comparing
It is consistent with default voice shutdown signal to user control signal, then close the communication function of wireless communication module 210.
Assuming that the voice messaging corresponding with default speech onset signal is " opening encrypted card communication function ", with default language
The corresponding voice messaging of sound shutdown signal is " closing encrypted card communication function ", if user wants to open the nothing in encrypted card
The communication function of line communication module 210, then need to only say against the mobile terminal for being provided with encrypted card and " open encryption cartoon letters work(
Sensor 220 in these words of energy ", encrypted card detects " opening encrypted card communication function " corresponding voice signal, this
When, the voice signal is user control signal, and safety chip 230 obtains the user control signal through comparison and opened with default voice
Dynamic signal is consistent, then starts the communication function of wireless communication module 210., it is necessary to close wireless after user completes transaction payment
During the communication function of communication module 210, it similarly need to only be said against the mobile terminal for being provided with encrypted card and " close encryption cartoon letters
Sensor 220 in these words of function ", encrypted card detects " closing encrypted card communication function " corresponding voice signal,
Now, the voice signal is user control signal, and safety chip 230 obtains the user control signal and default voice through comparing
Shutdown signal is consistent, then closes the communication function of wireless communication module 210.
Alternatively, default control signal can be also default gesture Behavior- Based control signal, specifically may include default gesture behavior
Enabling signal and default gesture behavior shutdown signal, wherein, default gesture behavior enabling signal can be closed with default gesture behavior
Signal is identical or different, and those skilled in the art can be configured according to actual needs, not limit herein.
Alternatively, when encrypted card completes the operation of user or during user's operation overtime, safety chip 230 is then automatic
The communication function for closing wireless communication module 210 is actively closed without user.
Safety chip 230 detects obtained user control signal and default gesture Behavior- Based control signal according to sensor 220
Detected the mode of communication function that starts or close wireless communication module 210 with above-mentioned safety chip 230 according to sensor 220
Obtained user control signal with default audio controls come start or close wireless communication module 210 communication function side
Formula is similar, and here is omitted.
When goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture behavior signal
When, in order to avoid there is the situation for making safety chip 230 perform operation due to the false triggering of user, safety chip 230 is also used
In:Judging the time that sensor 220 detects that obtained user gesture behavior signal is consistent with target gesture behavior signal is
It is no to exceed prefixed time interval, if judging to obtain the time that user gesture behavior signal is consistent with target gesture behavior signal
More than prefixed time interval, then operation or decryption oprerations user profile are encrypted.
Those skilled in the art can set prefixed time interval according to actual needs, not limit herein.For example, when default
When time interval is 1s, if safety chip 230 judges that obtain user gesture behavior signal keeps with target gesture behavior signal
More than 1s, then operation or decryption oprerations user profile are encrypted in the consistent time;If safety chip 230 judges to be used
The time that family gesture behavior signal is consistent with target gesture behavior signal not less than 1s, is not then carried out any to user profile
Operation, and the result returned operation failure is to mobile terminal.
User's confirmation signal is sent for the ease of the goal verification signal that user is generated according to safety chip 230, safety
Chip 230 is additionally operable to:Pass through set up communication port respectively to detect the goal verification signal generated and sensor 220
To user's confirmation signal send to mobile terminal.Specifically, when goal verification signal includes target gesture behavior signal, user
When confirmation signal includes user gesture behavior signal, the target gesture row generated for the ease of user according to safety chip 230
Gesture is made for signal and gesture is adjusted, and safety chip 230 passes through set up communication port respectively by the target hand generated
The user gesture behavior signal that gesture behavior signal and sensor detection are obtained is sent to mobile terminal, so that mobile terminal is in screen
Middle display and the corresponding target gesture of target gesture behavior signal and the user gesture corresponding with user gesture behavior signal.
By the position relationship of display target gesture and user gesture, the man-machine interface for having provided a user close friend guides gesture operation.
The technical scheme make use of the screen of mobile terminal to user's display target gesture and user gesture, facilitate user according to target
Gesture makes required gesture.
So that mobile terminal is mobile phone as an example, mobile phone is after it have received target gesture behavior signal, in the screen of mobile phone
The middle display target gesture corresponding with target gesture behavior signal, the hand-holdable mobile phone of user and according to shown by mobile phone screen
Target gesture make required gesture.When the user gesture behavior signal that sensor 220 is detected, safety chip 230
Sensor 220 is detected that obtained user gesture behavior signal is also sent to mobile phone, mobile phone have received user gesture behavior
After signal, the user gesture corresponding with user gesture behavior signal is shown in the screen of mobile phone, user can be according to mobile phone
Shown target gesture and current user gesture are made adjustment to the gesture of oneself in time in screen, so as to make institute
The gesture made is consistent with target gesture.
For example, the target gesture corresponding with target gesture behavior signal is to carry out gesture shifting along certain mobile route
Dynamic, then shown target gesture can be target mobile route in mobile phone, user can be according to shown in mobile phone screen
Target mobile route cell phone, and it is timely according to target mobile route shown in mobile phone screen and current mobile route
Ground adjusts the moving direction of mobile phone so that the mobile route of mobile phone can be overlapped with target mobile route, so as to facilitate user
Gesture is made according to target gesture.
And for example, when goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal, peace
Full chip 230 passes through set up communication port and sends the targeted voice signal generated to mobile terminal, and mobile terminal exists
The target voice information corresponding with targeted voice signal is shown in screen, such as target voice information is " payment ", then carried out
When implementing, can be shown in the screen of mobile terminal " please read following word:The prompt message of payment ", then user
According to target voice delivering user voice signal, the sonic sensor in sensor 220 detects user voice signal, safety
Chip 230 utilizes speech recognition technology, compare user voice signal that sonic sensor detection obtains whether with target language message
It is number consistent, obtain that user voice signal is consistent with targeted voice signal if comparing, it is close in safety chip 230 using being stored in
Key and algorithm, user profile are encrypted operation or decryption oprerations.
When encrypted card is installed in the SIM card neck of mobile terminal, the power interface of encrypted card and the SIM of mobile terminal
The power interface of card neck is connected, and the power interface for the SIM card neck by mobile terminal provides electric energy for encrypted card.
The encrypted card provided according to embodiments of the present invention, encryption card issuing with the third party such as SIM card operator without entering
Row cooperation hair fastener, is easy to user to obtain;The structure of encrypted card is ferrule structure or membrane structure, and encrypted card can be same with SIM card
When be inserted into the same SIM card neck of mobile terminal, can not only be by the power interface of the SIM card neck of mobile terminal
Encrypted card provides electric energy, and is also convenient for user's carrying with using;Wireless communication module in encrypted card can be in encrypted card, shifting
It is dynamic to set up the communication port interconnected between terminal and far-end computer information system three, realize encrypted card, movement eventually
Data communication between end and far-end computer information system three, efficiently solves some mobile terminals due to various limitations
And be difficult the problem of entering row data communication with encrypted card;Sensor in encrypted card is used for the user's confirmation signal for detecting user,
The sensor is independently of mobile terminal so that mobile terminal can not directly invoke the sensor, has eradicated sensor and has remotely been disliked
The risk that meaning is called;The goal verification signal that safety chip is generated is random goal verification signal, can be efficiently reduced
The risk that goal verification signal is remotely maliciously cracked, in addition, safety chip is believed always according to the random goal verification generated
Number detecting whether obtained user's confirmation signal is consistent with sensor determines whether user profile is encrypted operation or solves
Close operation, so as to effectively prevent the Trojan attack in process of exchange, improves the security of transactional operation.
Fig. 3 shows according to an embodiment of the invention for the method for work of encrypted card inserted in mobile terminal
Schematic flow sheet, wherein, encrypted card is inserted into the same SIM card neck of mobile terminal simultaneously with SIM card, passes through mobile terminal
The power interface of SIM card neck provide electric energy for encrypted card.As shown in figure 3, this method comprises the following steps:
Step S300, by the wireless communication module in encrypted card, in encrypted card, mobile terminal and far-end computer information
The communication port interconnected is set up between system three.
Specifically, wireless communication module is used to set up communication port between encrypted card and mobile terminal, with mobile terminal
Enter row data communication.Wireless communication module is additionally operable to set up communication port between encrypted card and external routes equipment, with outside
Routing device enters row data communication.Therefore, wireless communication module can be built between encrypted card, mobile terminal and external routes equipment
Vertical communication port, row data communication is entered with mobile terminal or external routes equipment.
Wireless communication module includes:Bluetooth communication and/or WIFI communication modules.Specifically, wireless communication module is worked as
During including bluetooth communication, the bluetooth communication in encrypted card is connected with the bluetooth module of mobile terminal, so as to add
Bluetooth communication channel is established between close card and mobile terminal, row data communication can be entered with the bluetooth module in mobile terminal;
When wireless communication module includes WIFI communication modules, the WIFI that the WIFI communication modules in encrypted card both can be with mobile terminal
Module is connected, and can also set up WIFI with external routes equipment and be connected.WIFI is set up in encrypted card and external routes equipment to connect
After connecing, achieved that by external routes equipment and communication port is set up between encrypted card and far-end computer information system, and it is remote
End computer information system can also be communicated with mobile terminal, so that in encrypted card, mobile terminal and far-end computer information
The communication port interconnected is established between system three;When wireless communication module both includes bluetooth communication, include again
During WIFI communication modules, user can select to enter row data communication by bluetooth approach or WIFI modes according to actual needs.
In the present invention, encrypted card, mobile terminal and far-end computer can be conveniently realized by bluetooth approach or WIFI modes to believe
Data communication between breath system three, it is difficult to be sticked into encryption to efficiently solve some mobile terminals due to various limitations
The problem of row data communication.
When encrypted card only establishes communication port with mobile terminal, and do not set up and communicate with far-end computer information system
During road, this method also can continue to perform.
Step S301, receives user profile operational order.
When wireless communication module sets up communication port between encrypted card and mobile terminal, it can be received in step S301
From the user profile operational order of mobile terminal;When wireless communication module is between encrypted card and far-end computer information system
When setting up communication port, the user profile operational order from far-end computer information system can be received in step S301;When
When wireless communication module sets up communication port between encrypted card, mobile terminal and far-end computer information system three, in step
The user profile operational order from mobile terminal or far-end computer information system can be received in rapid S301.
When user is traded payment using mobile terminal, mobile terminal sends user profile operation to encrypted card and referred to
Order, encrypted card receives the user profile operational order that mobile terminal is sent.
Step S302, according to user profile operational order, generates random goal verification signal.
After step S301 receives user profile operational order, in step s 302, referred to according to user profile operation
Order, using random algorithm, generates random goal verification signal.Those skilled in the art can select random calculation according to actual needs
Method, is not limited herein.
Step S303, passes through user's confirmation signal of the sensor senses user in encrypted card.
Wherein, the sensor in encrypted card includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sound
Wave sensor.Those skilled in the art can be combined and select to sensor according to actual needs, not limit herein.Encryption
Sensor in card is independently of mobile terminal, and the operating system of mobile terminal can not call sensor, so as to eradicate sensor
The risk remotely maliciously called, improves the security of transactional operation.
Step S304, compare the sensor obtained user's confirmation signal of detection and the goal verification signal generated whether one
Cause;If so, then performing step S305;If it is not, then this method terminates.
Wherein, goal verification signal includes target gesture behavior signal, and user's confirmation signal is believed including user gesture behavior
Number;And/or, goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal.For example, working as mesh
Marking confirmation signal includes target gesture behavior signal, when user's confirmation signal includes user gesture behavior signal, in step S304
The middle sensor that compares detects whether obtained user gesture behavior signal is consistent with the target gesture behavior signal generated;Work as mesh
Marking confirmation signal includes targeted voice signal, when user's confirmation signal includes user voice signal, compares pass in step s 304
Whether the user voice signal that sensor detection is obtained is consistent with the targeted voice signal generated;When goal verification signal includes mesh
Gesture behavior signal and targeted voice signal are marked, user's confirmation signal includes user gesture behavior signal and user voice signal
When, the obtained user gesture behavior signal of sensor detection and the target gesture behavior signal generated are compared in step s 304
It is whether consistent, and whether compare the user voice signal that sensor detection obtains consistent with the targeted voice signal generated.Should
Method detects whether obtained user's confirmation signal and the goal verification signal that is generated unanimously determine whether according to sensor
Operation or decryption oprerations are encrypted to user profile, so as to prevent the Trojan attack in process of exchange, further improve
The security of transactional operation.
Specifically, sensor is detected to obtained user's confirmation signal and goal verification letter in predetermined registration operation time interval
Number it is analyzed, calculates the similarity of user's confirmation signal and goal verification signal.If in predetermined registration operation time interval
The interior obtained similarity that calculates exceedes default similarity threshold, it is determined that user's confirmation signal is consistent with goal verification signal, says
Bright user successfully confirms this time to operate, then perform step S305;If calculating what is obtained in predetermined registration operation time interval
Similarity is not less than default similarity threshold, it is determined that user's confirmation signal and goal verification signal are inconsistent, illustrates that operation is super
When cause user to confirm this time to operate not successfully, then any operation is not carried out to user profile, this method terminates.
Alternatively, in the case of it is determined that user's confirmation signal and goal verification signal are inconsistent, this method may also include:
The step of result returned operation failure.Wherein, those skilled in the art can according to actual needs to default similarity threshold and
Predetermined registration operation time interval is configured, and is not limited herein.
Step S305, user profile is encrypted operation or decryption oprerations.
User's confirmation signal that sensor detection is obtained and the goal verification letter generated are obtained being compared through step S304
In the case of number consistent, in step S305, according to user profile operational order, user is believed using the key and algorithm prestored
Operation or decryption oprerations are encrypted in breath.Wherein, user profile operational order can be divided into but be not limited to user profile encrypted instruction
Or user profile decryption instructions.Specifically, when user profile operational order is user profile encrypted instruction, in step S305
User profile is encrypted operation using the key and algorithm that prestore;When user profile operational order is that user profile decryption refers to
When making, user profile is decrypted operation using the key and algorithm that prestore in step S305.Alternatively, above-mentioned encryption or
The result of decryption oprerations, can be returned by wireless communication module.
The method of work of the encrypted card provided according to embodiments of the present invention, can be counted in encrypted card, mobile terminal and distal end
The communication port interconnected is set up between calculation machine information system three, encrypted card, mobile terminal and far-end computer is realized
Data communication between information system three, efficiently solve some mobile terminals is difficult and encrypted card due to various limitations
The problem of entering row data communication;Sensor in encrypted card is independently of mobile terminal so that mobile terminal can not directly invoke this
Sensor, has eradicated the risk that sensor is remotely maliciously called;The goal verification signal generated is random goal verification
Signal, can efficiently reduce the risk that goal verification signal is remotely maliciously cracked, in addition, according to the random mesh generated
Mark confirmation signal and sensor detect whether obtained user's confirmation signal is consistent and determine whether user profile is encrypted
Operation or decryption oprerations, so as to effectively prevent the Trojan attack in process of exchange, improve the security of transactional operation.
Fig. 4 shows in accordance with another embodiment of the present invention for the method for work of the encrypted card inserted in mobile terminal
Schematic flow sheet, wherein, encrypted card and SIM card are inserted into the same SIM card neck of mobile terminal simultaneously, pass through it is mobile eventually
The SIM card interface at end provides electric energy for encrypted card.As shown in figure 4, this method comprises the following steps:
Step S400, by the wireless communication module in encrypted card, in encrypted card, mobile terminal and far-end computer information
The communication port interconnected is set up between system three.
Specifically, the structure of encrypted card is ferrule structure or membrane structure.When the structure of encrypted card is ferrule structure,
The appearance and size of encrypted card and the appearance and size of the SIM card neck of mobile terminal match, and the groove of encrypted card is embedded in shape
Size is less than or equal to the SIM card of the geomery of groove, wherein, geomery is less than or equal to the geomery of groove
SIM card can be the less SIM card of geomery in the prior art, or clipped SIM card.When the structure of encrypted card
During for membrane structure, encrypted card is attached to SIM card and is provided with the surface of hard contact.
Wherein, the power interface of encrypted card is connected with the power interface of the SIM card neck of mobile terminal.Radio communication mold
Block includes:Bluetooth communication and/or WIFI communication modules.When wireless communication module includes bluetooth communication, encrypted card
In bluetooth communication be connected with the bluetooth module of mobile terminal, so as to establish indigo plant between encrypted card and mobile terminal
Tooth communication port, can enter row data communication with the bluetooth module in mobile terminal;When wireless communication module communicates including WIFI
During module, the WIFI communication modules in encrypted card can both be connected with the WIFI module of mobile terminal, can also be with outside road
WIFI connections are set up by equipment.Set up in encrypted card and external routes equipment after WIFI is connected, can by external routes equipment
Communication port is set up in realization between encrypted card and far-end computer information system, and far-end computer information system also can be with shifting
Dynamic terminal is communicated, so that it is mutual that interconnection is established between encrypted card, mobile terminal and far-end computer information system three
Logical communication port;When wireless communication module both includes bluetooth communication, includes WIFI communication modules again, user can basis
It is to enter row data communication by bluetooth approach or WIFI modes to be actually needed selection.
When encrypted card only establishes communication port with mobile terminal, and do not set up and communicate with far-end computer information system
During road, this method also can continue to perform.
Step S401, receives user profile operational order.
When wireless communication module sets up communication port between encrypted card and mobile terminal, it can be received in step S401
From the user profile operational order of mobile terminal;When wireless communication module is between encrypted card and far-end computer information system
When setting up communication port, the user profile operational order from far-end computer information system can be received in step S401;When
When wireless communication module sets up communication port between encrypted card, mobile terminal and far-end computer information system three, in step
The user profile operational order from mobile terminal or far-end computer information system can be received in rapid S401.Wherein, user
Information operational order includes personal recognition code.
Step S402, according to the personal recognition code that prestores, the personal recognition code in checking user profile operational order is
It is no legal;If so, then performing step S403;If it is not, then this method terminates.
This method is verified to the legitimacy of the personal recognition code in user profile operational order, is further increased
The security of transactional operation.So that personal recognition code is PIN code as an example, if checking is obtained in user profile operational order
PIN code is consistent with the PIN code that prestores, then it is legal PIN code to illustrate the PIN code, then then perform step S403;If checking
The PIN code and the PIN code that prestores obtained in user profile operational order is inconsistent, then it is illegal PIN code to illustrate the PIN code,
So this method terminates.Alternatively, the illegal situation of personal recognition code in checking obtains user profile operational order
Under, it also can return to the result of personal recognition code authentication failed.
Further, when personal recognition code checking identification number of times exceedes default maximum times, what the present invention was provided
Encrypted card is locked, it is necessary to can be unlocked by the external authentication instruction of higher authority automatically.
Step S403, according to user profile operational order, generates random goal verification signal.
Specifically, according to user profile operational order, using random algorithm, random goal verification signal is generated.
Step S404, passes through user's confirmation signal of the sensor senses user in encrypted card.
Wherein, the sensor in encrypted card includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sound
Wave sensor.Goal verification signal includes target gesture behavior signal, and user's confirmation signal includes user gesture behavior signal;
And/or, goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal.
Step S405, passes through set up communication port and respectively detects the goal verification signal and sensor that are generated
To user's confirmation signal send to mobile terminal.
User's confirmation signal is sent according to the goal verification signal generated for the ease of user, in step S405, led to
Cross set up communication port and the goal verification signal and sensor that are generated being detected to, obtained user's confirmation signal is sent out respectively
Deliver to mobile terminal.
Specifically, when goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture row
During for signal, gesture is made according to the target gesture behavior signal generated for the ease of user and gesture is adjusted, encrypt cartoon
Cross set up communication port and the target gesture behavior signal and sensor that are generated are detected to obtained user gesture row respectively
Sent for signal to mobile terminal, so that mobile terminal shows the target hand corresponding with target gesture behavior signal in screen
Gesture and the user gesture corresponding with user gesture behavior signal.By the position relationship of display target gesture and user gesture,
The man-machine interface for having provided a user close friend guides gesture operation.
So that mobile terminal is mobile phone as an example, mobile phone is after it have received target gesture behavior signal, in the screen of mobile phone
The middle display target gesture corresponding with target gesture behavior signal, the hand-holdable mobile phone of user and according to shown by mobile phone screen
Target gesture make specific gesture.When the user gesture behavior signal that sensor is detected, encrypted card examines sensor
The user gesture behavior signal measured is also sent to mobile phone, and mobile phone is after it have received user gesture behavior signal, in hand
The user gesture corresponding with user gesture behavior signal is shown in the screen of machine, what user can be according in mobile phone screen
Target gesture and current user gesture are made adjustment to the gesture of oneself in time.
Step S406, compares sensor and detects whether obtained user's confirmation signal is consistent with goal verification signal;If so,
Then perform step S407;If it is not, then this method terminates.
Alternatively, sensor is detected to obtained user's confirmation signal and goal verification letter in predetermined registration operation time interval
Number it is analyzed, calculates the similarity of user's confirmation signal and goal verification signal.If in predetermined registration operation time interval
The interior obtained similarity that calculates exceedes default similarity threshold, it is determined that user's confirmation signal is consistent with goal verification signal, says
Bright user successfully confirms this time to operate, then perform step S407;If calculating what is obtained in predetermined registration operation time interval
Similarity is not less than default similarity threshold, it is determined that user's confirmation signal and goal verification signal are inconsistent, illustrates that operation is super
When cause user to confirm this time to operate not successfully, then any operation is not carried out to user profile, this method terminates.Alternatively,
In the case of it is determined that user's confirmation signal and goal verification signal are inconsistent, this method may also include:Return operation failure
As a result the step of.Wherein, those skilled in the art can be according to actual needs to default between similarity threshold and predetermined registration operation time
It is configured, does not limit herein every value.
Step S407, user profile is encrypted operation or decryption oprerations.
User's confirmation signal that sensor detection is obtained and the goal verification letter generated are obtained being compared through step S406
In the case of number consistent, in step S 407, according to user profile operational order, user is believed using the key and algorithm prestored
Operation or decryption oprerations are encrypted in breath.Specifically, when user profile operational order is user profile encrypted instruction, in step
User profile is encrypted operation using the key and algorithm that prestore in S407;When user profile operational order is user profile
During decryption instructions, user profile is decrypted operation using the key and algorithm that prestore in step S 407.
Alternatively, when goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture row
During for signal, in order to avoid there is the situation for making encrypted card perform operation due to the false triggering of user, sensed in comparison
In the case that device detects that obtained user gesture behavior signal is consistent with target gesture behavior signal, this method may also include:Sentence
It is pre- whether the time that the user gesture behavior signal that link sensor detection is obtained is consistent with target gesture behavior signal exceedes
If the step of time interval.If it is determined that obtaining the time that user gesture behavior signal is consistent with target gesture behavior signal
More than prefixed time interval, then operation or decryption oprerations user profile are encrypted;If it is determined that obtaining user gesture behavior
The time that signal is consistent with target gesture behavior signal not less than prefixed time interval, is not then carried out any to user profile
Operation.
If the wireless communication module in encrypted card is chronically at opening, then do not only exist power consumption problem, and
It also there is the risk maliciously connected by other people.In order to solve the above problems, alternatively, this method also includes:Pass through encrypted card
In sensor senses user user control signal, obtained user control signal is detected according to sensor, starts or closes
The step of communication function of wireless communication module.Specifically, user control signal and default control that sensor detection is obtained are compared
Whether signal processed is consistent, if comparing obtain user control signal, startup or closing radio communication consistent with default control signal
The communication function of module.
Alternatively, when encrypted card completes the operation of user or during user's operation overtime, encrypted card is then closed automatically
The communication function of wireless communication module in encrypted card is actively closed without user.
The method of work of the encrypted card provided according to embodiments of the present invention, by the goal verification signal and sensor that are generated
Detect that obtained user's confirmation signal is sent to mobile terminal, be easy to user to send user according to the goal verification signal generated
Confirmation signal, the man-machine interface for having provided a user close friend guides operation;In addition, when goal verification signal includes target gesture row
For signal, when user's confirmation signal includes user gesture behavior signal, obtained user gesture behavior signal is detected in sensor
In the case of exceeding prefixed time interval with the time that target gesture behavior signal is consistent and is consistent, just user is believed
Operation or decryption oprerations are encrypted in breath, so as to avoid the occurrence of the feelings for making encrypted card perform operation due to the false triggering of user
Condition, effectively prevent the Trojan attack in process of exchange, improve the security of transactional operation.
Wireless communication module, sensor, the safety chip being previously mentioned in the present invention are by hard-wired, for example, blue
Tooth communication module is the chip basic circuit set of integrated Bluetooth function, and safety chip may include operational amplifier, encryption chip
With deciphering chip etc..Although some of which module or integrated chip software, the claimed present invention is integrated software pair
The hardware circuit for the function of answering, and not exclusively software is in itself.
So far, although those skilled in the art will appreciate that detailed herein have shown and described multiple showing for the present invention
Example property embodiment, still, still can be directly true according to disclosure of invention without departing from the spirit and scope of the present invention
Determine or derive many other variations or modifications for meeting the principle of the invention.Therefore, the scope of the present invention is it should be understood that and recognize
It is set to and covers other all these variations or modifications.
Although it should be noted that some modules of encrypted card, this stroke are described in detail in superincumbent explanation
Divide what is be merely exemplary, be not enforceable.It will be understood to those skilled in the art that indeed, it is possible to embodiment
In module adaptively changed, also can be by a module by multiple block combiners in embodiment into a module
It is divided into multiple modules.
Although implementing to operate in addition, describing the present invention in the accompanying drawings with particular order, this is not required that or secretly
These operations must be performed according to the particular order by showing, or the operation having to carry out shown in whole could realize desired knot
Really.Some steps can be omitted, multiple steps are merged into a step execution, or a step is divided into multiple steps and are held
OK.
In summary, using the technical scheme that provides of the present invention, encryption card issuing without with SIM card operator etc. the 3rd
Side cooperates hair fastener, is easy to user to obtain;The structure of encrypted card is ferrule structure or membrane structure, encrypted card and SIM card
Can be inserted into simultaneously in the same SIM card neck of mobile terminal, can facilitate user carry and use, in addition, encrypted card according to
The random goal verification signal generated and sensor detect whether obtained user's confirmation signal is consistent and determined whether pair
Operation or decryption oprerations are encrypted in user profile, so as to effectively prevent the Trojan attack in process of exchange, improve
The security of transactional operation.
The method and specific implementation method to the present invention are described in detail above, and give corresponding implementation
Example.Certainly, in addition to the implementation, the present invention can also have other embodiment, all use equivalent substitution or equivalent transformation shape
Into technical scheme, all fall within invention which is intended to be protected.
Claims (10)
1. a kind of encrypted card for inserting in mobile terminal, it is characterised in that the structure of the encrypted card be ferrule structure or
Person's membrane structure, the encrypted card is inserted into the same SIM card neck of the mobile terminal simultaneously with SIM card;
Wherein, the encrypted card includes:Wireless communication module, sensor, safety chip and power interface;
The wireless communication module, for setting up communication port between the encrypted card and the mobile terminal, is moved with described
Dynamic terminal enters row data communication;
The sensor, user's confirmation signal for detecting user;
The safety chip is connected with the wireless communication module and the sensor respectively, for being examined according to the sensor
The user's confirmation signal measured, user profile is encrypted operation or decryption oprerations;
The power interface of the encrypted card is connected with the power interface of the SIM card neck of the mobile terminal, for passing through institute
The power interface for stating the SIM card neck of mobile terminal provides electric energy for the encrypted card.
2. the encrypted card according to claim 1 for inserting in mobile terminal, it is characterised in that the safety chip is also
For:The user profile operational order from the mobile terminal is received from the wireless communication module, random target is generated
Confirmation signal, and compare the obtained user's confirmation signal of sensor detection and the goal verification signal generated whether one
Cause, if comparing, to obtain user's confirmation signal consistent with the goal verification signal, user profile is encrypted operation
Or decryption oprerations.
3. the encrypted card according to claim 1 or 2 for inserting in mobile terminal, it is characterised in that when the encryption
When the structure of card is ferrule structure, the appearance and size of the encrypted card and the appearance and size of the SIM card neck of the mobile terminal
Match, the groove of the encrypted card is embedded in SIM card of the geomery less than or equal to the geomery of the groove;Work as institute
When the structure for stating encrypted card is membrane structure, the encrypted card is attached to SIM card and is provided with the surface of hard contact.
4. according to claim any one of 1-3 for the encrypted card that inserts in mobile terminal, it is characterised in that the biography
Sensor is additionally operable to:Detect the user control signal of user;
The safety chip is additionally operable to:Obtained user control signal is detected according to the sensor, starts or closes the nothing
The communication function of line communication module.
5. according to claim any one of 1-4 for the encrypted card that inserts in mobile terminal, it is characterised in that the use
Family information operational order includes personal recognition code;
The safety chip is additionally operable to:According to the personal recognition code that prestores, the individual in the user profile operational order is verified
The legitimacy of recognition code.
6. according to claim any one of 1-5 for the encrypted card that inserts in mobile terminal, it is characterised in that the mesh
Marking confirmation signal includes target gesture behavior signal, and user's confirmation signal includes user gesture behavior signal;And/or, institute
Stating goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal.
7. the encrypted card according to claim 6 for inserting in mobile terminal, it is characterised in that the safety chip is also
For:When the goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture behavior
During signal, judge that the user gesture behavior signal that the sensor detection is obtained is consistent with the target gesture behavior signal
Time whether exceed prefixed time interval, if judging, obtaining the user gesture behavior signal and the target gesture behavior believes
Number time being consistent exceedes prefixed time interval, then operation or decryption oprerations user profile are encrypted.
8. according to claim any one of 1-7 for the encrypted card that inserts in mobile terminal, it is characterised in that the peace
Full chip is additionally operable to:Pass through set up communication port respectively to detect the goal verification signal generated and the sensor
To user's confirmation signal send to the mobile terminal.
9. according to claim any one of 1-8 for the encrypted card that inserts in mobile terminal, it is characterised in that the biography
Sensor includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sonic sensor.
10. according to claim any one of 1-9 for the encrypted card that inserts in mobile terminal, it is characterised in that it is described
Wireless communication module includes:Bluetooth communication and/or WIFI communication modules.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710245447.9A CN107038571B (en) | 2017-04-14 | 2017-04-14 | For being inserted into the encrypted card in mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710245447.9A CN107038571B (en) | 2017-04-14 | 2017-04-14 | For being inserted into the encrypted card in mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107038571A true CN107038571A (en) | 2017-08-11 |
CN107038571B CN107038571B (en) | 2018-07-03 |
Family
ID=59536367
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710245447.9A Active CN107038571B (en) | 2017-04-14 | 2017-04-14 | For being inserted into the encrypted card in mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107038571B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109949466A (en) * | 2019-04-28 | 2019-06-28 | 桂林微网互联信息技术有限公司 | A kind of intelligent entrance guard control system and method |
CN110312236A (en) * | 2019-07-02 | 2019-10-08 | 桂林微网互联信息技术有限公司 | A kind of communication channel construction method |
CN111797379A (en) * | 2020-07-15 | 2020-10-20 | 上海瀚之友信息技术服务有限公司 | Processing method and device for improving information security |
CN112714109A (en) * | 2020-12-22 | 2021-04-27 | 北京握奇数据股份有限公司 | Key service system and key service method for smart card |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101594611A (en) * | 2009-06-29 | 2009-12-02 | 钱袋网(北京)信息技术有限公司 | The method of authentication and portable terminal, server and identity authorization system |
CN101599298A (en) * | 2009-06-29 | 2009-12-09 | 方秀芹 | Security certification memory, terminal device and terminal device safety certifying method |
CN104504563A (en) * | 2014-12-30 | 2015-04-08 | 山东中孚信息产业股份有限公司 | Mobile information safety equipment and working method thereof |
US20150237046A1 (en) * | 2014-02-19 | 2015-08-20 | Samsung Electronics Co., Ltd. | Method and apparatus for user authentication |
-
2017
- 2017-04-14 CN CN201710245447.9A patent/CN107038571B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101594611A (en) * | 2009-06-29 | 2009-12-02 | 钱袋网(北京)信息技术有限公司 | The method of authentication and portable terminal, server and identity authorization system |
CN101599298A (en) * | 2009-06-29 | 2009-12-09 | 方秀芹 | Security certification memory, terminal device and terminal device safety certifying method |
US20150237046A1 (en) * | 2014-02-19 | 2015-08-20 | Samsung Electronics Co., Ltd. | Method and apparatus for user authentication |
CN104504563A (en) * | 2014-12-30 | 2015-04-08 | 山东中孚信息产业股份有限公司 | Mobile information safety equipment and working method thereof |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109949466A (en) * | 2019-04-28 | 2019-06-28 | 桂林微网互联信息技术有限公司 | A kind of intelligent entrance guard control system and method |
CN110312236A (en) * | 2019-07-02 | 2019-10-08 | 桂林微网互联信息技术有限公司 | A kind of communication channel construction method |
CN111797379A (en) * | 2020-07-15 | 2020-10-20 | 上海瀚之友信息技术服务有限公司 | Processing method and device for improving information security |
CN112714109A (en) * | 2020-12-22 | 2021-04-27 | 北京握奇数据股份有限公司 | Key service system and key service method for smart card |
Also Published As
Publication number | Publication date |
---|---|
CN107038571B (en) | 2018-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107038571B (en) | For being inserted into the encrypted card in mobile terminal | |
CA2554300C (en) | System and method for encrypted smart card pin entry | |
EP0223122B1 (en) | Secure component authentication system | |
CN107016541B (en) | Encrypted card | |
KR101264791B1 (en) | Security certification and storage combined device having wireless communication function | |
CN105308898B (en) | For executing system, the method and apparatus of password authentification | |
CN105978907A (en) | Decrypting method, device and system | |
CN105631655A (en) | HCE-based mobile payment method, device and mobile terminal | |
CN104065648B (en) | A kind of data processing method of voice call | |
US11521034B2 (en) | Dual communication channel smart card | |
US8915428B1 (en) | Wireless-enabled card reader | |
CN206788918U (en) | Encrypted card | |
CN107026735A (en) | Method and managed devices that a kind of password is automatically entered | |
CN107038572B (en) | Encrypted card and its working method | |
CN206863807U (en) | For inserting the encrypted card in mobile terminal | |
KR20150043696A (en) | Method for Providing One Time Password Based on Media Identification by using Code Image | |
US11449860B2 (en) | Specialized keypad for pre-staging complex transactions | |
CN206863808U (en) | Encrypted card | |
CN107437997A (en) | A kind of frequency communication devices and method | |
CN101296080B (en) | Authorized consumer affirmation method and related device thereof | |
CN107026817B (en) | System for automatically inputting password | |
US11164169B2 (en) | Card pre-staging automated teller machine (“ATM”) technology | |
CN107124515A (en) | A kind of intelligent unlocking method and device | |
KR102193696B1 (en) | Method for Providing Safety Login based on One Time Code by using User’s Card | |
JP5207654B2 (en) | Communication device, pairing method between communication devices, method for pairing wearable key and IC card, and system comprising wearable key and IC card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180529 Address after: 541004 1 buildings of D-08 Industrial Park, high-tech industrial park, Qixing District, Guilin, the Guangxi Zhuang Autonomous Region Applicant after: Guilin Micro Interconnection Information Technology Co., Ltd. Address before: 517336 Jixiang village, 69 Town, Longchuan, Heyuan, Guangdong Applicant before: Wen Yong |
|
GR01 | Patent grant | ||
GR01 | Patent grant |