CN110458551A - Data interaction system - Google Patents

Data interaction system Download PDF

Info

Publication number
CN110458551A
CN110458551A CN201910477280.8A CN201910477280A CN110458551A CN 110458551 A CN110458551 A CN 110458551A CN 201910477280 A CN201910477280 A CN 201910477280A CN 110458551 A CN110458551 A CN 110458551A
Authority
CN
China
Prior art keywords
cutting ferrule
connection
truth cards
random factor
factor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910477280.8A
Other languages
Chinese (zh)
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Corp
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Publication of CN110458551A publication Critical patent/CN110458551A/en
Pending legal-status Critical Current

Links

Abstract

The present invention provides a kind of data interaction systems, comprising: simulation card, cutting ferrule and Truth cards manager;Cutting ferrule, for obtaining cutting ferrule end Truth cards information list;Prompt cutting ferrule end Truth cards information list;Truth cards selection instruction is received, determines the Truth cards chosen;Card is simulated, for receiving the first data of transaction terminal transmission, and Truth cards manager is sent to by cutting ferrule;Truth cards manager, the first data sent for receiving simulation card, and it is sent to the Truth cards chosen;The second data that the Truth cards chosen are sent are received, and simulation card is sent to by cutting ferrule;Card is simulated, is also used to receive the second data of Truth cards manager transmission, and sends the easy terminal of best friend.Simulation card, the data interaction between cutting ferrule and Truth cards manager may be implemented in data interaction system through the invention, with provide it is a kind of it is novel both user is facilitated to carry, and the higher trading solution of safety.

Description

Data interaction system
Technical field
The present invention relates to electronic information security technical field more particularly to a kind of data interaction systems.
Background technique
In existing transaction flow, such as: it withdraws the money or shopping is swiped the card, usual user needs to carry to handle from bank Bank card, user carries bank card, and there is a certain security risk, once losing, then is easy to cause to damage to the assets of user It loses.In addition, a user may possess the bank card of multiple different banks simultaneously since bank card type is varied, if you need to The bank card of multiple different banks is carried, it is also not portable enough, if only carried in multiple bank cards to be convenient for carrying Certain bank cards when, withdrawn the money or done shopping using these bank cards swipe the card when, it is understood that there may be inter-bank transaction, cause to hand over Unnecessary expense occurs in easily.
Therefore, be badly in need of providing in the prior art it is a kind of both user was facilitated to carry, and the higher trading solution of safety.
Summary of the invention
Present invention seek to address that the above problem.
The main purpose of the present invention is to provide a kind of data interaction systems.
In order to achieve the above objectives, technical solution of the present invention is specifically achieved in that
One aspect of the present invention provides a kind of data interaction system, comprising: simulation card, cutting ferrule and Truth cards management Device;Cutting ferrule, for obtaining cutting ferrule end Truth cards information list;Prompt cutting ferrule end Truth cards information list;Receive true card Piece selection instruction determines the Truth cards chosen;Wherein, Truth cards information list in cutting ferrule end is cutting ferrule from Truth cards management The Truth cards manager end Truth cards information list obtained in device, Truth cards manager end Truth cards information list packet Include the Truth cards information for the Truth cards connecting with Truth cards manager;Card is simulated, is sent for receiving transaction terminal The first data, and Truth cards manager is sent to by cutting ferrule;Truth cards manager is sent for receiving simulation card The first data, and be sent to the Truth cards chosen;The second data that the Truth cards chosen are sent are received, and pass through cutting ferrule It is sent to simulation card;Card is simulated, is also used to receive the second data of Truth cards manager transmission, and it is easily whole to send best friend End.
In addition, cutting ferrule, is also used to establish secure connection with simulation card, obtains and carry out data between cutting ferrule and simulation card Cutting ferrule end the first safe transmission key of safe transmission;Simulate card, be also used to establish secure connection with cutting ferrule, obtain cutting ferrule with Simulate the simulation Card-terminal safe transmission key that data security transmission is carried out between card.
In addition, cutting ferrule, it is used to indicate the first secure connection for establishing secure connection specifically for being sent to simulation card and refers to It enables, wherein the instruction of the first secure connection includes: that cutting ferrule utilizes the simulation card public key in simulation card certificate to cutting ferrule end first Binding factor and the first connection random factor of generation carry out the first connection ciphertext of encryption acquisition, and cutting ferrule utilizes cutting ferrule private key The first connection signature of signature acquisition is carried out to the first binding factor of cutting ferrule end and the first connection random factor;Card is simulated, Specifically for receiving the instruction of the first secure connection, the first connection ciphertext is decrypted using simulation card private key, obtains cutting ferrule The first binding decryption factor of end and the first connection decryption random factor;Utilize the cutting ferrule public key in cutting ferrule certificate, cutting ferrule end One binding decryption factor and the first connection connection signature of decryption random factor pair first are verified;Verifying the first connection signature After correct, decryption factor is bound at verifying cutting ferrule end first and whether simulation Card-terminal binding factor is identical;Verify cutting ferrule end first After binding decryption factor is identical as simulation Card-terminal binding factor, the second connection random factor is generated;Using in cutting ferrule certificate Cutting ferrule public key carries out encryption to the first connection decryption random factor and the second connection random factor and obtains the second connection ciphertext, benefit Signature is carried out to the first connection decryption random factor and the second connection random factor with simulation card private key and obtains the second connection Signature;The response of the first secure connection is sent to cutting ferrule, wherein the response of the first secure connection includes: the second connection ciphertext and the Two connection signatures;Cutting ferrule is specifically also used to receive the response of the first secure connection, is carried out using cutting ferrule private key to the second connection ciphertext Decryption, the first connection decryption random factor and the second connection decryption random factor after being decrypted;Utilize simulation card certificate In simulation card public key, the first connection decryption random factor after decryption and the second connection decryption random factor pair second connect Signature is verified;After verifying the second connection signature is correct, the first connection decryption random factor after verifying decryption connects with first Whether identical connect random factor;Verifying decryption after first connection the decryption random factor with first connect random factor it is identical after, Cutting ferrule is generated at least with the second connection decryption random factor and simulates cutting ferrule end the first safe transmission key between card;Simulation Card, the simulation Card-terminal that is specifically also used to generate cutting ferrule at least with the second connection random factor and simulate between card pass safely Defeated key.
In addition, cutting ferrule, specifically for receive the third connection random factor that the simulation card that simulation card is sent generates with And simulation card unique identification;It is sent to simulation card and is used to indicate the second secure connection for establishing secure connection instruction, wherein Second secure connection instruction include: cutting ferrule unique identification, cutting ferrule using simulation card certificate in simulation card public key to third Connection random factor and the 4th connection random factor of generation carry out the third connection ciphertext of encryption acquisition, cutting ferrule utilizes cutting ferrule Private key connects random factor to third and the 4th connection random factor carries out the third connection signature of signature acquisition;Analog card Whether piece is specifically used for receiving the instruction of the second secure connection, judge cutting ferrule unique identification in simulation Card-terminal list of bindings;Such as Fruit cutting ferrule unique identification is decrypted third connection ciphertext in simulation Card-terminal list of bindings, using simulation card private key, Obtain the third connection decryption random factor and the 4th connection decryption random factor;Using in cutting ferrule certificate cutting ferrule public key, The three connection decryption random factors and the 4th connection decryption random factor pair third connection signature are verified;Verify third connection After signature is correct, whether the verifying third connection decryption random factor connect random factor with third identical;If third connection with Machine decryption factor and third connection random factor are identical, connect the decryption random factor and the to third using simulation card private key The four connection decryption random factors carry out signature and obtain the 4th connection signature;The response of the second secure connection is sent to cutting ferrule, wherein the The response of two secure connections includes: the 4th connection signature;Cutting ferrule is specifically also used to receive the response of the second secure connection, utilizes simulation Simulation card public key, third connection random factor and the 4th connection random factor in card certificate carry out the 4th connection signature Verifying;It is raw at least with the 4th connection random factor and the first binding factor of cutting ferrule end after verifying the 4th connection signature correctly At cutting ferrule end the first safe transmission key between cutting ferrule and simulation card;Card is simulated, is specifically also used to connect at least with the 4th It connects the decryption random factor and simulates Card-terminal binding factor and generate cutting ferrule and simulate the simulation Card-terminal safe transmission between card Key;Cutting ferrule is specifically also used to utilize the first safe transmission of cutting ferrule end key pair third connection random factor and the 4th connection Random factor is sent to simulation card after carrying out the first processing;Card is simulated, is specifically also used to pass safely using simulation Card-terminal The defeated key pair third connection decryption random factor and the 4th connection decryption random factor are sent to cutting ferrule after carrying out the first processing; Cutting ferrule is specifically also used to receive the data that simulation card is sent, and received using cutting ferrule end the first safe transmission key pair Data carry out second processing, and the data after comparing second processing connect random factor with third and the 4th connection random factor is It is no identical;Card is simulated, is specifically also used to receive the data of cutting ferrule transmission, and dock using simulation Card-terminal safe transmission key The data received carry out second processing, and the data after comparing second processing connect the decryption random factor and the 4th connection with third Whether the decryption random factor is identical.
In addition, cutting ferrule, is also used to establish secure connection with Truth cards manager, cutting ferrule and Truth cards manager are obtained Between carry out data security transmission cutting ferrule end the second safe transmission key;Truth cards manager is also used to establish with cutting ferrule Secure connection obtains the Truth cards manager end safety biography that data security transmission is carried out between cutting ferrule and Truth cards manager Defeated key.
In addition, cutting ferrule, is used to indicate the third for establishing secure connection safety specifically for sending to Truth cards manager Link order, wherein the instruction of third secure connection includes: that cutting ferrule utilizes the Truth cards management in Truth cards manager certificate The 5th connection that device public key carries out encryption acquisition to the 5th connection random factor of the second binding factor of cutting ferrule end and generation is close Text, cutting ferrule carry out the 5th of signature acquisition to the second binding factor of cutting ferrule end and the 5th connection random factor using cutting ferrule private key Connection signature;Truth cards manager is specifically used for receiving the instruction of third secure connection, utilizes Truth cards manager private key pair 5th connection ciphertext is decrypted, and obtains cutting ferrule end second and binds decryption factor and the 5th connection decryption random factor;It utilizes Cutting ferrule public key, cutting ferrule end second in cutting ferrule certificate bind decryption factor and the 5th connection decryption random factor pair the 5th connects Signature is verified;After verifying the 5th connection signature correctly, decryption factor and Truth cards management are bound in verifying cutting ferrule end second Whether device end binding factor is identical;It is identical as Truth cards manager end binding factor to verify the binding decryption factor of cutting ferrule end second Afterwards, the 6th connection random factor is generated;Using the cutting ferrule public key in cutting ferrule certificate to the 5th connection decryption random factor and the Six connection random factors carry out encryption and obtain the 6th connection ciphertext, using Truth cards manager private key to the 5th connection RANDOM SOLUTION The close factor and the 6th connection random factor carry out signature and obtain the 6th connection signature;Third secure connection is sent to cutting ferrule to ring It answers, wherein the response of third secure connection includes: the 6th connection ciphertext and the 6th connection signature;Cutting ferrule is specifically also used to receive The response of third secure connection is decrypted the 6th connection ciphertext using cutting ferrule private key, and the 5th connection after being decrypted is random Decryption factor and the 6th connection decryption random factor;Using in Truth cards manager certificate Truth cards manager public key, The 5th connection decryption random factor and the 6th connection connection signature of decryption random factor pair the 6th after decryption are verified;Verifying After 6th connection signature is correct, the 5th connection decryption random factor after verifying decryption with the 5th connect random factor whether phase Together;Verifying decryption after the 5th connection the decryption random factor with the 5th connection random factor it is identical after, at least with the 6th connect The decryption random factor generates cutting ferrule end the second safe transmission key between cutting ferrule and Truth cards manager;Truth cards management Device is specifically also used to generate the Truth cards management between cutting ferrule and Truth cards manager at least with the 6th connection random factor Device end safe transmission key.
In addition, cutting ferrule, the 7th generated specifically for receiving the Truth cards manager that Truth cards manager is sent connects Connect random factor and Truth cards manager unique identification;It is used to indicate to the transmission of Truth cards manager and establishes secure connection 4th secure connection instruction, wherein the instruction of the 4th secure connection includes: cutting ferrule unique identification, cutting ferrule using Truth cards management Truth cards manager public key in device certificate carries out the 7th connection random factor and the 8th connection random factor of generation 7th connection ciphertext of encryption acquisition, cutting ferrule utilize cutting ferrule private key to the 7th connection random factor and the 8th connection random factor Carry out the 7th connection signature of signature acquisition;Truth cards manager is specifically used for receiving the instruction of the 4th secure connection, judges card Unique identification is covered whether in the list of bindings of Truth cards manager end;If cutting ferrule unique identification is at Truth cards manager end In list of bindings, the 7th connection ciphertext is decrypted using Truth cards manager private key, obtains the 7th connection decryption random The factor and the 8th connection decryption random factor;Using in cutting ferrule certificate cutting ferrule public key, the 7th connection the decryption random factor with And the 8th connection decryption random factor pair the 7th connection signature verified;After verifying the 7th connection signature correctly, verifying the 7th Whether connecting the decryption random factor, with the 7th to connect random factor identical;If the 7th connection decryption random factor is connect with the 7th Random factor is identical, using Truth cards manager private key to the 7th connection decryption random factor and the 8th connection decryption random The factor carries out signature and obtains the 8th connection signature;The response of the 4th secure connection is sent to cutting ferrule, wherein the response of the 4th secure connection It include: the 8th connection signature;Cutting ferrule is specifically also used to receive the response of the 4th secure connection, utilizes Truth cards manager certificate In Truth cards manager public key, the 7th connection random factor and the 8th connection random factor to the 8th connection signature test Card;After verifying the 8th connection signature correctly, generated at least with the 8th connection random factor and the second binding factor of cutting ferrule end Cutting ferrule end the second safe transmission key between cutting ferrule and Truth cards manager;Truth cards manager is specifically also used at least Cutting ferrule and Truth cards manager are generated using the 8th connection decryption random factor and Truth cards manager end binding factor Between Truth cards manager end safe transmission key;Cutting ferrule is specifically also used to utilize the second safe transmission of cutting ferrule end key pair 7th connection random factor and the 8th connection random factor are sent to Truth cards manager after carrying out the first processing;True card Piece manager, be specifically also used to using Truth cards manager end safe transmission key pair the 7th connect the decryption random factor and The 8th connection decryption random factor is sent to cutting ferrule after carrying out the first processing;Cutting ferrule is specifically also used to receive Truth cards management The data that device is sent, and second processing is carried out using the data that cutting ferrule end the second safe transmission key pair receives, compare second Data that treated connect random factor with the 7th and whether the 8th connection random factor is identical;Truth cards manager, tool Body is also used to receive the data of cutting ferrule transmission, and the data received using Truth cards manager end safe transmission key pair into Row second processing, the data after comparing second processing connect the decryption random factor and the 8th connection decryption random factor with the 7th It is whether identical.
In addition, cutting ferrule, is also used to before cutting ferrule and simulation card establish secure connection, binding behaviour is executed with simulation card Make.
In addition, cutting ferrule, specifically for receiving the trigger command for being used to indicate and being bound with simulation card;To simulation card Send first binding instruction, wherein first binding instruction include: cutting ferrule generate first binding random factor, cutting ferrule certificate with And cutting ferrule unique identification;Card is simulated, is specifically used for receiving the first binding instruction, cutting ferrule certificate is tested using root certificate Card;After verifying cutting ferrule certificate is legal, the second binding random factor is generated;It is bound using the cutting ferrule public key in cutting ferrule certificate to first Random factor and the second binding random factor carry out encryption and obtain the first binding ciphertext, are tied up using simulation card private key to first Determine random factor and the second binding random factor carries out signature and obtains the first binding signature;The first binding is sent to cutting ferrule to ring It answers, wherein the first binding response includes: the first binding ciphertext, the first binding signature, simulation card certificate and simulates card only One mark;Cutting ferrule is specifically also used to receive the first binding response, is verified using root certificate to simulation card certificate;Verifying Simulate card certificate it is legal after, using cutting ferrule private key to first binding ciphertext be decrypted, obtain first binding decryption random because Son and the second binding decryption random factor;Using simulation card certificate in simulation card public key, first binding decryption random because Son and the second binding binding signature of decryption random factor pair first are verified;After verifying the first binding signature is correct, verifying Whether the first binding decryption random factor and the first binding random factor are identical;The first binding decryption random factor of verifying and first After binding random factor is identical, simulation card unique identification is prompted;It receives for confirming that simulation card unique identification is correctly touched It says the word, is signed using cutting ferrule private key to the first binding random factor and the second binding decryption random factor, obtain the Two binding signatures, and storage simulate card unique identification, simulation card certificate and the first binding factor of cutting ferrule end to cutting ferrule Hold the first list of bindings, wherein the first binding factor of cutting ferrule end is the second binding decryption random factor;The is sent to simulation card Two binding signatures;Simulate card, be specifically also used to receive the second binding signature, using in cutting ferrule certificate cutting ferrule public key, first Binding random factor and the second binding random factor verify the second binding signature;Verifying the second binding signature is correct Afterwards, cutting ferrule unique identification, cutting ferrule certificate and simulation Card-terminal binding factor are stored to simulation Card-terminal list of bindings, wherein Simulating Card-terminal binding factor is the second binding random factor.
In addition, cutting ferrule, is also used to before cutting ferrule and Truth cards manager establish secure connection, with Truth cards management Device executes bindings.
As seen from the above technical solution provided by the invention, mould may be implemented in data interaction system through the invention Quasi- data interaction between card, cutting ferrule and Truth cards manager, with provide it is a kind of it is novel both user is facilitated to carry, and pacify The higher trading solution of full property.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the structural schematic diagram of data interaction system provided in an embodiment of the present invention;
Fig. 2 is that data interaction system provided in an embodiment of the present invention realizes that cutting ferrule and simulation card establish safe connection mode One flow chart;
Fig. 3 is that data interaction system provided in an embodiment of the present invention realizes that cutting ferrule and simulation card establish safe connection mode Two flow chart;
Fig. 4 is that data interaction system provided in an embodiment of the present invention realizes that cutting ferrule is established safety with Truth cards manager and connected Connect the flow chart of mode one;
Fig. 5 is that data interaction system provided in an embodiment of the present invention realizes that cutting ferrule is established safety with Truth cards manager and connected Connect the flow chart of mode two;
Fig. 6 is that data interaction system provided in an embodiment of the present invention realizes cutting ferrule and simulates the stream that card executes bindings Cheng Tu;
Fig. 7 is that data interaction system provided in an embodiment of the present invention realizes that cutting ferrule and Truth cards manager execute binding behaviour The flow chart of work.
Specific embodiment
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, belongs to protection scope of the present invention.
In the description of the present invention, it is to be understood that, term " center ", " longitudinal direction ", " transverse direction ", "upper", "lower", The orientation or positional relationship of the instructions such as "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outside" is It is based on the orientation or positional relationship shown in the drawings, is merely for convenience of description of the present invention and simplification of the description, rather than instruction or dark Show that signified device or element must have a particular orientation, be constructed and operated in a specific orientation, therefore should not be understood as pair Limitation of the invention.In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply opposite Importance or quantity or position.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with attached drawing.
The present invention provides a kind of frameworks of data interaction, both user are facilitated to carry to provide, and the higher friendship of safety Easy solution.The data interaction framework includes: simulation card, cutting ferrule and Truth cards manager.
Wherein:
Card is simulated, may include one or more, and the simulation card can may be for separately fabricated card It is reserved with the Truth cards of simulation card function.The simulation card is identical as existing bank's card dimensions, in notebook data interaction frame In structure, substitution Truth cards complete transaction.Simulating card has contact and/or non-contact interface, existing to cooperate Transaction terminal (such as ATM machine, POS machine, bus card top-up machines etc.) completes transaction.Simulation card also has wireless interface, simulates Card can carry out data interaction by the wireless interface and cutting ferrule.Wherein, contact interface can be contact etc., contactless Interface can for NFC interface etc., the wireless interface can for blue tooth interface, infrared interface, 2.4GHz interface, WIFI interface, RFID interface etc..
Cutting ferrule may include one or more cutting ferrules, and the cutting ferrule can manage one or more simulation card, every mould Quasi- card can only belong to a cutting ferrule and be managed by it.The cutting ferrule can for it is separately fabricated be card envelope shape equipment, Can be the mobile device with the cutting ferrule function of being provided in notebook data framework, comprising: smart phone, tablet computer (PAD), PDA (such as palm PC, learning machine), laptop, E-book reading device, wearable device (such as intelligent wristwatch, intelligence Energy glasses etc.) etc..Cutting ferrule can have contact and/or non-contact interface, so as to cooperate simulation card contact and/or Non-contact interface carries out data interaction, and cutting ferrule also can have wireless interface, will pass through the wireless interface and simulation card Corresponding interface carries out data interaction, wherein contact interface can be contact etc., and non-contact interface can be NFC interface It can be blue tooth interface, infrared interface, 2.4GHz interface, WIFI interface, RFID interface etc. Deng, the wireless interface;Cutting ferrule also has There is network interface, carry out data interaction will pass through network interface network interface corresponding with Truth cards manager, wherein The network interface can be WIFI interface, mobile interchange network interface (such as 3G, 4G network) etc..In addition, cutting ferrule can also be shifting The combination of dynamic equipment and electronic signature equipment, wherein the network interface of cutting ferrule is realized by means of the network interface of mobile device, He can be respectively positioned in electronic signature equipment interface (such as wireless interface, contact and/or non-contact interface etc.), or should Other interfaces can also be respectively positioned in mobile device or other interfaces in part of interface be located in electronic signature equipment, portion Tap mouth is located in mobile device;The processing operation that cutting ferrule executes executes in electronic signature equipment;Cutting ferrule can moreover be only Electronic signature equipment.Wherein, electronic signature equipment can be key equipment, such as industrial and commercial bank's U-shield, agricultural bank's K treasured etc..
Truth cards manager, can manage multiple cutting ferrules, and the Truth cards manager have multiple contacts (such as Card slot etc.) interface and/or contactless (such as NFC etc.) interface, to facilitate Truth cards manager that can pass through different modes Connect different types of Truth cards, wherein Truth cards manager is connected at least one Truth cards, and is stored with true Real card management device end Truth cards information list, Truth cards manager end Truth cards information list include and Truth cards The Truth cards information of the Truth cards of manager connection, which may include: card number, card authentication information etc. Information, the card authentication information be authenticate Truth cards whether be regular channel (such as bank, public transport company etc.) distribution card Piece information;The Truth cards can be function card (such as bus card, mess card, purchase card, member card, accumulating card etc.) or bank The bank card issued;Optionally, Truth cards manager can be set to save whole in Truth cards connected to it or The Truth cards information of part Truth cards, so that user makes different settings, example according to the security requirement to Truth cards The Truth cards information for allowing to obtain certain Truth cards can be such as set not on Truth cards manager, to guarantee these The safety of Truth cards.Truth cards manager also has network interface, corresponding with cutting ferrule will pass through the network interface Network interface carries out data interaction, wherein the network interface can be WIFI interface, mobile interchange network interface (such as 3G, 4G net Network) etc..
In notebook data interworking architecture, simulates card and Truth cards are smart chip card.
Hereinafter, being illustrated to the term in the present invention:
First processing includes: encryption, and second processing includes: decryption processing;Specifically, simple encryption guarantees that data pass Defeated safety can be handled when data to be transmitted security level required is higher using such mode.Or
First processing includes: verification calculation processing, and second processing includes: verification verifying calculation processing;Specifically, simple school Test guarantee data transfer integrity, prevent from distorting, treat integrity of data transmission it is more demanding when, such mode can be used It is handled.Or
First processing includes: encryption and verification calculation processing, and second processing includes: decryption and verification verifying calculation processing. Specifically, it using encryption and verification hybrid mode guarantee data transmission security and completely, is wanted to data security levels to be transmitted When seeking highest, it can be handled using such mode.
Based on above-mentioned data interaction framework, the embodiment of the present invention provides a kind of data interaction system, passes through the data interaction The data interaction between simulation card, cutting ferrule and Truth cards manager may be implemented in system, to provide a kind of novel both sides Just user carries, and the higher trading solution of safety.
Fig. 1 shows the structural schematic diagram of data interaction system provided in an embodiment of the present invention, of the invention referring to Fig. 1 Data interaction system, comprising: simulation card, cutting ferrule and Truth cards manager;
Cutting ferrule, for obtaining cutting ferrule end Truth cards information list;Prompt cutting ferrule end Truth cards information list;It receives true Real card selection instruction determines the Truth cards chosen;Wherein, Truth cards information list in cutting ferrule end is cutting ferrule from Truth cards The Truth cards manager end Truth cards information list obtained in manager, Truth cards manager end Truth cards information column Table includes the Truth cards information for the Truth cards connecting with Truth cards manager;
Card is simulated, for receiving the first data of transaction terminal transmission, and Truth cards management is sent to by cutting ferrule Device;
Truth cards manager, the first data sent for receiving simulation card, and it is sent to the Truth cards chosen; The second data that the Truth cards chosen are sent are received, and simulation card is sent to by cutting ferrule;
Card is simulated, is also used to receive the second data of Truth cards manager transmission, and sends the easy terminal of best friend.
Hereinafter, being directed to above-mentioned data interaction system, it is described in detail, specifically, which may include The following aspects:
One, the Truth cards chosen are determined:
Cutting ferrule obtains cutting ferrule end Truth cards information list, wherein cutting ferrule end Truth cards information list is from true card The Truth cards manager end Truth cards information list obtained in piece manager;Specifically, optionally, before this step, The operation of cutting ferrule booting, cutting ferrule login Truth cards manager can also be performed, details are not described herein, specifically may refer to above-mentioned Related cutting ferrule booting and cutting ferrule log in the associated description of Truth cards manager.In this step, it is true to obtain cutting ferrule end for cutting ferrule Card image list can also include the steps that cutting ferrule updates cutting ferrule end Truth cards information list, also repeat no more herein, have Body may refer to the associated description that above-mentioned cutting ferrule updates cutting ferrule end Truth cards information list.Cutting ferrule is from Truth cards manager After the Truth cards manager end Truth cards information list of acquisition, store it in the storage region of cutting ferrule, as cutting ferrule Truth cards information list is held, needs to prompt (such as display or voice broadcasting etc.) cutting ferrule end Truth cards information column in cutting ferrule When table, the cutting ferrule end Truth cards information list can be directly acquired from local, improve the processing speed of cutting ferrule.
Cutting ferrule prompts cutting ferrule end Truth cards information list;Specifically, cutting ferrule using itself display device or by Exterior display device show cutting ferrule end Truth cards information list or cutting ferrule using the voice playing device of itself or by External voice playing device voice, which plays (such as loudspeaker play or by headset earpiece broadcasting etc.) cutting ferrule end Truth cards, to be believed List is ceased, so that user needs Truth cards to be used according to cutting ferrule end Truth cards information list when selecting to trade, Facilitate user to select, enhances user experience.
Cutting ferrule receives Truth cards selection instruction, determines the Truth cards chosen;Specifically, the received Truth cards of cutting ferrule Selection instruction can be that the selection physical button being provided separately on cutting ferrule generates, or can be the choosing on the touch screen of cutting ferrule Virtual key generation is selected, or can be to choose the menu item for indicating selection function raw in the menu shown on cutting ferrule screen At.Cutting ferrule receives Truth cards selection instruction, determines the Truth cards chosen, cutting ferrule via Truth cards manager with choose Truth cards realize data transmission.Furthermore it is possible to realize the Truth cards for determining and choosing in the following way: cutting ferrule receives true Mark is chosen in real card selection instruction, acquisition, wherein mark is chosen to be used to indicate the Truth cards chosen;Cutting ferrule will choose mark Knowledge is sent to Truth cards manager;Truth cards manager according to choose mark it is true from being connect with Truth cards manager In card, the Truth cards chosen corresponding with mark is chosen are determined;Wherein, choose mark can be in Truth cards information Part or all of information, such as: card number and/or Truth cards manager reading-writing port mark;Truth cards manager receives After choosing mark, it can be found in the Truth cards information list of Truth cards manager end corresponding with mark is chosen true Card management device reading-writing port mark, so that Truth cards manager determines its reading-writing port, thus by the reading-writing port with The Truth cards chosen carry out data interaction.
Two, data interaction:
It simulates card and receives the first data that transaction terminal is sent, and Truth cards manager is sent to by cutting ferrule;Tool Body, in data exchange process, will simulation card and transaction terminal (such as ATM machine, POS machine, bus card top-up machines etc.) into Row connection (contact interface or non-contact interface), simulation card receive the first data that transaction terminal is sent, this first Data can be data (such as withdrawal amount, deducted amount, Truth cards information acquisition request etc.) to be processed.In addition, In After cutting ferrule receives the first data that simulation card is sent, first data can also be prompted, and receives and is used to indicate first number After correct confirmation instruction, the first data are sent to Truth cards manager;Based on this, cutting ferrule can also show the first number According to, can also be played with voice (such as loudspeaker play or by headset earpiece play etc.) first data, for user confirm this Whether the first data are correct, only after correct, after the first data of instruction of reception user's input correctly confirm instruction, just will First data are sent to Truth cards manager;If user confirms that first data are incorrect, it can directly cancel this Secondary data interaction improves the safety of data interaction with this.Received first data that are used to indicate of cutting ferrule correctly confirm instruction It can be that the confirmation physical button being provided separately on cutting ferrule generates, or can virtually press for the confirmation on the touch screen of cutting ferrule Key generate, in the menu perhaps shown on cutting ferrule screen select confirmation function generate or can be cutting ferrule voice The confirmation of voice that acquisition device (such as Mike) receives is indicated and is generated when being verified rear, or can be the finger of cutting ferrule Line acquisition device receives fingerprint identification and indicates and generate after being verified, or can connect for the iris collection device of cutting ferrule Iris confirmation is received to indicate and generate after being verified, it is, of course, also possible to generated for other any modes, in the present invention And with no restriction.
Truth cards manager receives the first data that simulation card is sent, and is sent to the Truth cards chosen;Specifically First data are sent to the Truth cards chosen by ground, Truth cards manager, so that the Truth cards chosen are to the first data It is handled.
Truth cards manager receives the second data that the Truth cards chosen are sent, and is sent to analog card by cutting ferrule Piece;Specifically, the Truth cards chosen receive the first data that Truth cards manager end is sent, and will handle after being handled The second data obtained afterwards are sent to Truth cards manager, wherein the Truth cards chosen handle the first data, should Processing is the scheme of the processing of existing smart card, and details are not described herein.Truth cards manager receives the Truth cards hair chosen The second data sent, and it is sent to cutting ferrule, which is sent to simulation card by cutting ferrule.
It simulates card and receives the second data that Truth cards manager is sent, and send the easy terminal of best friend.Specifically, it simulates Card is sent to transaction terminal after receiving the second data that cutting ferrule is sent, and transaction terminal receives that treated the by Truth cards After two data, it can be handled according to the demand of specific implementation scene, such as withdrawal note output, transfer accounts, swipe the card and withhold, supplement behaviour with money Make etc..
Based on above-mentioned data interaction process, a variety of different types of true cards can be may be implemented by a simulation card The function of piece when user carries out data interaction, need to only carry simulation card and cutting ferrule, can be complete without carrying Truth cards At raising convenience and safety.
Cutting ferrule can prompt the information for needing to confirm in data exchange process, and user can hand over data as a result, The information that needs during mutually confirm executes interaction after being confirmed again, to guarantee the authenticity of data interaction, improves peace Quan Xing.
Further, since can choose use and the matched Truth cards of transaction terminal, user in the prior art can solve It does not carry with the matched Truth cards of transaction terminal and unnecessary expense expenditure (such as bank's inter-bank withdrawal service charge for generating Deng).
Certainly, above-mentioned specific implementation is only disclosed from transaction terminal to Truth cards, the list of Truth cards to transaction terminal Secondary data interaction, in practical applications, it is understood that there may be multiple data interaction, interaction flow is similar to above-mentioned single data interaction, In multiple data interaction, whether can be needed to confirm according to interactive data the number for whether prompting interaction at cutting ferrule is arranged in According to come the authenticity that guarantees interaction data.
Three, secure connection is established:
Before cutting ferrule obtains cutting ferrule end Truth cards information list, the present invention can also include that cutting ferrule and simulation card are established Secure connection obtains cutting ferrule and simulates cutting ferrule end the first safe transmission key and the simulation for carrying out data security transmission between card The process of Card-terminal safe transmission key.
It is of course also possible to establish secure connection including cutting ferrule and Truth cards manager, cutting ferrule and Truth cards pipe are obtained It manages cutting ferrule end the second safe transmission key for carrying out data security transmission between device and Truth cards manager end safe transmission is close The process of key.
Certainly, above-mentioned two process may be performed simultaneously, execution when can also be different, and can only execute a process, Can two processes be performed both by.
1, cutting ferrule and simulation card establish secure connection, obtain cutting ferrule and simulate progress data security transmission between card Cutting ferrule end the first safe transmission key and simulation Card-terminal safe transmission key:
In the present invention, cutting ferrule and simulation card can establish in the following way secure connection:
Mode one, cutting ferrule and simulation card mutual authentication other side identity (such as mutual authentication other side signed data), and During mutual authentication other side's identity, whether the binding factor for comparing both sides' storage is identical, in the binding of relatively both sides storage After the factor is identical and mutual authentication other side's identity passes through, generates cutting ferrule and simulate the safety for carrying out data security transmission between card Transmission key (cutting ferrule end the first safe transmission key and simulation Card-terminal safe transmission key).
It is worth noting that if performing above-mentioned cutting ferrule and mould before cutting ferrule and simulation card establish secure connection Quasi- card mutual authentication other side certificate and other side's identity, and after both sides authenticate and pass through, it is respectively stored in verification process raw At binding factor bindings, then in the method one, cutting ferrule and simulation card mutual authentication other side's identity be cutting ferrule With simulation card mutual authentication other side identity again.
Hereinafter, a kind of specific implementation of presentation mode one of the present invention:
Fig. 2 shows data interaction systems provided in an embodiment of the present invention to realize that cutting ferrule and simulation card establish secure connection The flow chart of mode one, referring to fig. 2, cutting ferrule establish secure connection with simulation card and include:
Cutting ferrule sends to simulation card and is used to indicate the first secure connection for establishing secure connection instruction, wherein the first peace Full link order includes: that cutting ferrule utilizes the simulation card public key in simulation card certificate to the first binding factor of cutting ferrule end and life At the first connection random factor carry out the first connection ciphertext of encryption acquisition, cutting ferrule ties up cutting ferrule end first using cutting ferrule private key Determine the factor and the first connection random factor carries out the first connection signature of signature acquisition;Specifically, cutting ferrule and simulation are being used Before card carries out data interaction, optionally, secure connection is established between cutting ferrule and simulation card, to improve follow-up data friendship Mutual safety.Wherein, cutting ferrule it is received be used to indicate establish the first secure connection instruction of secure connection can be individually to set Set what the connection physical button on cutting ferrule generated, or can be generated for the connection virtual key on the touch screen of cutting ferrule, or Person can correctly generate afterwards for start-up password verification, perhaps can will simulate generated after card is extracted from cutting ferrule or It can be selection linkage function generation in the menu shown on cutting ferrule screen, or can be true to obtain cutting ferrule end in cutting ferrule Real card image list, what user therefrom selected to generate after Truth cards.It is, of course, also possible to generated for other any modes, In the present invention and with no restriction.Wherein, first the random number, random character or its that random factor can be cutting ferrule generation are connected Combination after generation first connects random factor, can also verify the randomness of the first connection random factor certainly, To improve the randomness of the first connection random factor, prevent from being cracked;Specifically, cutting ferrule is using simulation card public key to cutting ferrule end First binding factor and the first connection random factor carry out being encrypted to ensure that the first binding factor of cutting ferrule end and the first connection The safety of random factor transmission, cutting ferrule is using cutting ferrule private key to the first binding factor of cutting ferrule end and the first connection random factor It signs, to guarantee that subsequent simulation card can authenticate the legitimacy of cutting ferrule identity.By cutting ferrule end first binding because Son is sent to simulation card, the binding factor phase whether stored with it so as to subsequent simulation card to the first binding factor of cutting ferrule end It is same to be judged, to judge whether the cutting ferrule is bound with the simulation card.Optionally, before this step, cutting ferrule inspection After measuring simulation card, cutting ferrule, which may determine that, simulates card whether in the first list of bindings of cutting ferrule end, such as: it can be by such as Under type is judged: being fastened in after detecting simulation card, is received the simulation card image that simulation card is sent and (such as simulate Card unique identification and/or simulation card certificate etc.), according to the simulation card image received, whether judge the simulation card In the first list of bindings of cutting ferrule end;And/or cutting ferrule can also be judged whether in simulation Card-terminal list of bindings by simulation card In, such as: it can be judged in the following way: be fastened in after detecting simulation card, (such as cutting ferrule is unique by cutting ferrule information Mark and/or cutting ferrule certificate etc.) it is sent to simulation card, card is simulated according to the cutting ferrule information received, judges that the cutting ferrule is It is no simulation Card-terminal list of bindings in;Only after judging other side in the list of bindings of itself, follow-up process is just executed, it is excellent Change process, improves efficiency.
It simulates card and receives the instruction of the first secure connection, the first connection ciphertext is decrypted using simulation card private key, It obtains cutting ferrule end first and binds decryption factor and the first connection decryption random factor;Specifically, simulation card private key pair is utilized First connection ciphertext is decrypted, if data transmission fault has occurred in the data transmission, or occurs in the data transmission Distort, then will lead to can not successful decryption, or the cutting ferrule end first that decrypts bind decryption factor and the first connection with Machine decryption factor is different from the first binding factor of cutting ferrule end and the first connection random factor.And it is carried out by simulation card public key Encryption, only simulation card private key can be with successful decryption, thus it is also ensured that the safety of data deciphering.
Simulate card using the cutting ferrule public key in cutting ferrule certificate, cutting ferrule end first bind decryption factor and the first connection with Machine decryption factor verifies the first connection signature;Specifically, the signature that simulation card utilizes cutting ferrule public key to send cutting ferrule It is verified, to ensure the legitimate origin of data.
After simulating the first connection of card verifying signature correctly, decryption factor and simulation Card-terminal are bound in verifying cutting ferrule end first Whether binding factor is identical;Specifically, simulation card also verify the cutting ferrule end first that decrypts bind decryption factor whether with mould Whether the simulation Card-terminal binding factor of quasi- card itself storage is identical, if identical, illustrates that this is fastened in and simulation card Establish before secure connection, have been completed the operation of binding, be based on this, simulation card may determine that cutting ferrule whether with analog card Piece is bound.
After simulation card verifying cutting ferrule end first binding decryption factor is identical as simulation Card-terminal binding factor, second is generated Connect random factor;Specifically, random number, random character or its group that the second connection random factor can generate for analog card piece It closes, certainly, after generation second connects random factor, the randomness of the second connection random factor can also be verified, with The randomness for improving the second connection random factor, prevents from being cracked.
Simulate card using the cutting ferrule public key in cutting ferrule certificate to the first connection decryption random factor and the second connection with The machine factor carries out encryption and obtains the second connection ciphertext, using simulation card private key to the first connection decryption random factor and second Connection random factor carries out signature and obtains the second connection signature;Specifically, simulation card using cutting ferrule public key to first connection with Machine decryption factor and the second connection random factor carry out being encrypted to ensure that the first connection decryption random factor and the second connection The safety of random factor transmission, simulation card connect the first connection decryption random factor and second using simulation card private key It connects random factor to sign, to guarantee that subsequent cutting ferrule can authenticate the legitimacy of simulation card identity.
It simulates card and sends the response of the first secure connection to cutting ferrule, wherein the response of the first secure connection includes: the second connection Ciphertext and the second connection signature;Specifically, the second connection ciphertext and the second connection signature are sent to cutting ferrule by simulation card, with Just cutting ferrule is decrypted and verifies to the data received.
Cutting ferrule receives the response of the first secure connection, is decrypted, is decrypted to the second connection ciphertext using cutting ferrule private key The first connection decryption random factor and the second connection decryption random factor afterwards;Specifically, it is connected using cutting ferrule private key to second Ciphertext is decrypted, if data transmission fault has occurred in the data transmission, or is distorted in the data transmission, then Will lead to can not the first connection decryption random factor and the second connection decryption random factor and the after successful decryption, or decryption One connection random factor and the second connection random factor are different.And encrypted by cutting ferrule public key, only cutting ferrule private key can be with Successful decryption, thus it is also ensured that the safety of data deciphering.
Cutting ferrule utilizes the simulation card public key in simulation card certificate, the first connection decryption random factor after decryption and the The two connection connection signatures of decryption random factor pair second are verified;Specifically, cutting ferrule is using simulation card public key to analog card The signature that piece is sent is verified, to ensure the legitimate origin of data.
After cutting ferrule verifying the second connection signature is correct, the first connection decryption random factor after verifying decryption is connect with first Whether random factor is identical;Specifically, the first connection random factor that cutting ferrule verifies itself generation is connect with first after decryption The decryption random factor is identical, it is ensured that data are simultaneously not tampered with, and the data source encrypted is that cutting ferrule sends the first company really Connect the object of random factor.
Cutting ferrule verifying decryption after first connection the decryption random factor with first connect random factor it is identical after, at least with The second connection decryption random factor generates cutting ferrule and simulates cutting ferrule end the first safe transmission key between card;Simulate card at least Cutting ferrule is generated using the second connection random factor and simulates the simulation Card-terminal safe transmission key between card.Specifically, cutting ferrule It can use the second connection decryption random factor to generate cutting ferrule and simulate cutting ferrule end the first safe transmission key between card, it can also Pacified with generating cutting ferrule using the first connection random factor, the second connection decryption random factor and simulating the cutting ferrule end first between card Full transmission key can also be bound using the first connection random factor, the second connection decryption random factor and cutting ferrule end first The factor generates cutting ferrule and simulates cutting ferrule end the first safe transmission key between card;Likewise, simulation card also can use the Two connection random factors generate cutting ferrule and simulate the simulation Card-terminal safe transmission key between card, also can use the first connection The decryption random factor, the second connection random factor generate cutting ferrule and simulate the simulation Card-terminal safe transmission key between card, also Can use the first connection decryption random factor, second connection random factor and simulation Card-terminal binding factor generate cutting ferrule with Simulate the simulation Card-terminal safe transmission key between card;As long as cutting ferrule and simulation card use the identical algorithm of identical parameter Generate safe transmission key.It can be seen that in the present invention, safe transmission cryptographic key factor can connect at cutting ferrule end for second Connect the decryption random factor or the second connection decryption random factor and the first connection random factor;Safe transmission cryptographic key factor Simulation Card-terminal can for second connection random factor or second connection random factor and first connection decryption random because Son.In addition, safe transmission key may include encryption and decryption key and/or check key, number can be participated in using encryption and decryption key The safety that can guarantee data transmission according to transmission, the complete of data transmission can be guaranteed by participating in data transmission using check key Property, in the present invention it is possible to safe transmission key is selectively used according to the safety grades of transmission data.
Certainly, in the present invention, simulation card generates between cutting ferrule and simulation card at least with the second connection random factor The step of simulating Card-terminal safe transmission key is not limited to step in the method one, can also generate the in simulation card Simulation Card-terminal safe transmission key is generated after two connection random factors, it can also be in the first connection after cutting ferrule verifies decryption After the decryption random factor is identical as the first connection random factor, simulation Card-terminal peace is generated after receiving the successful information that cutting ferrule is sent Full transmission key.
It can be seen that the safety of data transmission can be improved based on the secure connection that above-mentioned cutting ferrule and simulation card are established Property, whether bound at the same time it can also verify both sides, further improves safety.
If cutting ferrule and simulation card are established before secure connection, perform above-mentioned manual binding and store binding factor etc. Operation, then in the method one, cutting ferrule and simulation card are other than mutual authentication other side's identity, it is also necessary to mutual authentication other side Certificate.
In addition, the invention is not limited to above-mentioned cutting ferrules to initiate the foundation of secure connection, it can also be triggered and be simulated by cutting ferrule Card initiate secure connection foundation, at this point, by simulation card send the first secure connection instruct to cutting ferrule, other processes with it is upper State flow implementation main body can be realized on the contrary, and this is no longer going to repeat them.
Mode two, cutting ferrule and simulation card mutual authentication other side identity (such as mutual authentication other side signed data), and Safe transmission cryptographic key factor is generated during mutual authentication other side identity, after mutual authentication other side's identity passes through, at least with The binding factor and safe transmission cryptographic key factor of storage generate cutting ferrule and simulate the safety for carrying out data security transmission between card Transmission key (cutting ferrule end the first safe transmission key and simulation Card-terminal safe transmission key), and verify the safety of both sides' generation Whether transmission key is identical.
It is worth noting that if performing above-mentioned cutting ferrule and mould before cutting ferrule and simulation card establish secure connection Quasi- card mutual authentication other side certificate and other side's identity, and after both sides authenticate and pass through, it is respectively stored in verification process raw At binding factor bindings, then in the method two, cutting ferrule and simulation card mutual authentication other side's identity be cutting ferrule With simulation card mutual authentication other side identity again.
Hereinafter, a kind of specific implementation of presentation mode two of the present invention:
Fig. 3 shows data interaction system provided in an embodiment of the present invention and realizes that cutting ferrule and simulation card establish secure connection The flow chart of mode two, referring to Fig. 3, cutting ferrule establishes secure connection with simulation card and includes:
Cutting ferrule receives the third connection random factor that the simulation card that simulation card is sent generates and simulation card is unique Mark;Specifically, third connection random factor can be random number that analog card piece generates, random character or combinations thereof, certainly, After generating third connection random factor, the randomness that can also connect random factor to third is verified, to improve third The randomness for connecting random factor, prevents from being cracked.Before this step, simulation card generates third and connects random factor, In After cutting ferrule detects the simulation card, the third is connected random factor with simulation card and simulation card unique identification is sent to Cutting ferrule.
Cutting ferrule sends to simulation card and is used to indicate the second secure connection for establishing secure connection instruction, wherein the second peace Full link order include: cutting ferrule unique identification, cutting ferrule using the simulation card public key in simulation card certificate to third connection with The machine factor and the 4th connection random factor of generation carry out the third connection ciphertext of encryption acquisition, cutting ferrule utilizes cutting ferrule private key pair Third connection random factor and the 4th connection random factor carry out the third connection signature of signature acquisition;Specifically, it is using Before cutting ferrule and simulation card carry out data interaction, optionally, secure connection is established between cutting ferrule and simulation card, to improve The safety of follow-up data interaction.Wherein, cutting ferrule it is received be used to indicate establish secure connection the second secure connection instruction can Think what the connection physical button being provided separately on cutting ferrule generated, or can be the connection virtual key on the touch screen of cutting ferrule Generation perhaps can be that start-up password verification correctly generates afterwards or can be raw after cutting ferrule extraction for that will simulate card At, it is can perhaps being generated for selection linkage function in the menu that is shown on cutting ferrule screen or can be to be obtained in cutting ferrule Cutting ferrule end Truth cards information list, what user therefrom selected to generate after Truth cards.It is, of course, also possible to be other any sides What formula generated, in the present invention and with no restriction.Specifically, cutting ferrule using simulation card public key to third connect random factor with And the 4th connection random factor generated carries out being encrypted to ensure that the 4th connection of third connection random factor and generation is random The safety of factor transmission, cutting ferrule connect the 4th connection random factor of random factor and generation using cutting ferrule private key to third It signs, to guarantee that subsequent simulation card can authenticate the legitimacy of cutting ferrule identity.In addition, the 4th connection it is random because Son can be that random number, random character of cutting ferrule generation or combinations thereof after generating the 4th connection random factor, may be used also certainly It is verified with the randomness to the 4th connection random factor, to improve the randomness of the 4th connection random factor, prevents from being broken Solution;Optionally, before this step, after cutting ferrule receives simulation card unique identification, cutting ferrule can be according to simulation card only One mark judges to simulate card whether in the first list of bindings of cutting ferrule end, only ties up in judgement simulation card at cutting ferrule end first After determining in list, follow-up process is just executed, process is optimized, improves efficiency.
It simulates card and receives the instruction of the second secure connection, judge cutting ferrule unique identification whether in simulation Card-terminal list of bindings In;Specifically, whether simulation card judges the cutting ferrule in simulation Card-terminal list of bindings according to the cutting ferrule unique identification received In;Only after judgement is fastened in simulation Card-terminal list of bindings, follow-up process is just executed, process is optimized, improves effect Rate.
If cutting ferrule unique identification, in simulation Card-terminal list of bindings, simulation card is using simulation card private key to third Connection ciphertext is decrypted, and obtains the third connection decryption random factor and the 4th connection decryption random factor;Specifically, it utilizes Third connection ciphertext is decrypted in simulation card private key, if data transmission fault has occurred in the data transmission, Huo Zhe Data transmission in distorted, then will lead to can not successful decryption, or obtain third connection the decryption random factor and The 4th connection decryption random factor connects random factor from third and the 4th connection random factor is different.And pass through simulation card Public key is encrypted, and only simulation card private key can be with successful decryption, thus it is also ensured that the safety of data deciphering.
It simulates card and connects the decryption random factor and the 4th connection at random using the cutting ferrule public key in cutting ferrule certificate, third Decryption factor verifies third connection signature;Specifically, the signature that simulation card sends cutting ferrule using cutting ferrule public key into Row verifying, to ensure the legitimate origin of data.
After simulating card verifying third connection signature correctly, the verifying third connection decryption random factor is connect at random with third Whether the factor is identical;Specifically, the third connection random factor that simulation card verifies itself generation connect decryption random with third The factor is identical, it is ensured that data are simultaneously not tampered with, and encrypt data source really be simulation card send third connection with The object of the machine factor.
If it is identical as third connection random factor that third connects the decryption random factor, simulation card is private using simulation card Key connects the decryption random factor to third and the 4th connection decryption random factor carries out the 4th connection of signature acquisition and signs;Specifically Ground, simulation card connects the decryption random factor to third using simulation card private key and the 4th connection decryption random factor carries out Signature, to guarantee that subsequent cutting ferrule can authenticate the legitimacy of simulation card identity.
It simulates card and sends the response of the second secure connection to cutting ferrule, wherein the response of the second secure connection includes: the 4th connection Signature;Specifically, the 4th connection signature is sent to cutting ferrule by simulation card, so that cutting ferrule verifies the data received.
Cutting ferrule receive the second secure connection response, using simulation card certificate in simulation card public key, third connection with The machine factor and the 4th connection random factor verify the 4th connection signature;Specifically, cutting ferrule utilizes simulation card public key pair The signature that simulation card is sent is verified, to ensure the legitimate origin of data.
After the 4th connection signature of cutting ferrule verifying is correct, bound at least with the 4th connection random factor and cutting ferrule end first The factor generates cutting ferrule and simulates cutting ferrule end the first safe transmission key between card;It is random at least with the 4th connection to simulate card Decryption factor and simulation Card-terminal binding factor generate cutting ferrule and simulate the simulation Card-terminal safe transmission key between card;Tool Body, cutting ferrule can use the 4th connection random factor and the first binding factor of cutting ferrule end generates between cutting ferrule and simulation card Cutting ferrule end the first safe transmission key also can use third connection random factor, the 4th connection random factor and cutting ferrule end First binding factor generates cutting ferrule and simulates cutting ferrule end the first safe transmission key between card;Likewise, simulation card can also To generate cutting ferrule using the 4th connection decryption random factor and simulation Card-terminal binding factor and simulate the analog card between card Bit end safe transmission key also can use third connection random factor, the 4th connection decryption random factor and simulation card It holds binding factor to generate cutting ferrule and simulates the simulation Card-terminal safe transmission key between card;As long as cutting ferrule and simulation card use The identical algorithm of identical parameter generates safe transmission key.It can be seen that in the present invention, safe transmission cryptographic key factor At cutting ferrule end random factor and the 4th connection random factor can be connected for the 4th connection random factor or third;Safety The transmission key factor can connect random factor and the in simulation Card-terminal for the 4th connection decryption random factor or third The four connection decryption random factors.In addition, safe transmission key may include encryption and decryption key and/or check key, solved using adding Key, which can participate in data transmission, can guarantee the safety of data transmission, and participating in data transmission using check key can protect Demonstrate,prove the integrality of data transmission, in the present invention it is possible to selectively use safe biography according to the safety grades of transmission data Defeated key.
Cutting ferrule utilizes the first safe transmission of cutting ferrule end key pair third connection random factor and the 4th connection random factor Simulation card is sent to after carrying out the first processing;Card is simulated to connect at random using simulation Card-terminal safe transmission key pair third Decryption factor and the 4th connection decryption random factor are sent to cutting ferrule after carrying out the first processing;Specifically, both sides are using respectively The safe transmission data key of generation is sent to other side after carrying out the first processing, passes so that other side verifies the safety that both sides generate Whether defeated key is identical.
Cutting ferrule receives the data that simulation card is sent, and the data received using cutting ferrule end the first safe transmission key pair Carry out second processing, the data after comparing second processing connect with third random factor and the 4th connect random factor whether phase Together;It simulates card and receives the data that cutting ferrule is sent, and carried out using the data that simulation Card-terminal safe transmission key pair receives Second processing, the data after comparing second processing connect the decryption random factor with third and the 4th connection decryption random factor is It is no identical.Specifically, after both sides carry out second processing using the data that the safe transmission key pair of each self-generating receives, respectively Whether the data after comparing second processing are identical as the data respectively sent, if identical, the safety for illustrating that both sides generate is passed Defeated key is identical, to guarantee that the subsequent safe transmission key that can use each self-generating of both sides carries out data security transmission.Separately Outside, the safe transmission key generated in verifying both sides is identical it is also possible to verify the binding factor that respectively stores identical, into It is true bound object that one step, which demonstrate,proves other side, further increases the safety of subsequent data transmission.
Certainly, in the present invention, simulation card generates the step of simulating Card-terminal safe transmission key and is not limited to we It is close can also to generate simulation Card-terminal safe transmission after decryption obtains the 4th connection decryption random factor for step in formula two Key, can also be after the 4th connection signature that cutting ferrule verifies simulation card transmission be errorless, after receiving the successful information that cutting ferrule is sent Generate simulation Card-terminal safe transmission key;The step of cutting ferrule generation the first safe transmission of cutting ferrule end key, is also not limited to we Step in formula two can also generate the first safe transmission of cutting ferrule end key after cutting ferrule generates the 4th connection random factor.
It can be seen that the safety of data transmission can be improved based on the secure connection that above-mentioned cutting ferrule and simulation card are established Property, whether bound at the same time it can also verify both sides, further improves safety.
If cutting ferrule and simulation card are established before secure connection, perform above-mentioned manual binding and store binding factor etc. Operation, then in the method two, cutting ferrule and simulation card are other than mutual authentication other side's identity, it is also necessary to mutual authentication other side Certificate.
In addition, the invention is not limited to above-mentioned cutting ferrules to initiate the foundation of secure connection, it can also be triggered and be simulated by cutting ferrule Card initiate secure connection foundation, at this point, by simulation card send the second secure connection instruct to cutting ferrule, other processes with it is upper State flow implementation main body can be realized on the contrary, and this is no longer going to repeat them.
Certainly, cutting ferrule is being generated in aforesaid way one and mode two and is simulating the peace of progress data security transmission between card During full transmission key, the binding factor used is cutting ferrule and the binding simulating card and generate and save in binding procedure The factor, the binding factor can be for by above-mentioned cutting ferrules and simulation card mutual authentication other side certificate and other side's identity, and double After just certification passes through, it is respectively stored in the binding factor generated in verification process, or can be to pass through the side bound manually The binding factor that formula is inputted and stored.
In addition, being adopted in aforesaid way one and mode two if being not carried out bindings between cutting ferrule and simulation card Binding factor can be the random value being manually entered during establishing secure connection;Or establishing secure connection process In, safe transmission key is only generated by random factor, not binding factor verify or does not use binding factor raw At safe transmission key.
2, cutting ferrule and Truth cards manager establish secure connection, obtain and are counted between cutting ferrule and Truth cards manager According to cutting ferrule end the second safe transmission key and Truth cards manager end safe transmission key of safe transmission:
In the present invention, cutting ferrule and Truth cards manager can establish in the following way secure connection:
Mode one, cutting ferrule and Truth cards manager mutual authentication other side's identity, and in the mistake of mutual authentication other side's identity Cheng Zhong, whether the binding factor for comparing both sides' storage is identical, and mutual authentication pair identical in the binding factor of relatively both sides storage After square identity passes through, the safe transmission key (cutting ferrule that data security transmission is carried out between cutting ferrule and Truth cards manager is generated Hold the second safe transmission key and Truth cards manager end safe transmission key).
It is worth noting that if performing above-mentioned card before cutting ferrule and Truth cards manager establish secure connection Set and Truth cards manager mutual authentication other side certificate and other side's identity, and after both sides authenticate and pass through, respectively it is stored in The bindings of the binding factor generated in verification process, then in the method one, cutting ferrule is recognized mutually with Truth cards manager Card other side's identity is cutting ferrule and Truth cards manager mutual authentication other side identity again.
Cutting ferrule and Truth cards manager employing mode one establish the scheme of secure connection and cutting ferrule is used with simulation card The scheme difference that mode one establishes secure connection is only that:
First is that executing subject is different: establishing the scheme of secure connection in cutting ferrule and Truth cards manager employing mode one In, executing subject is cutting ferrule and Truth cards manager;The side of secure connection is established in cutting ferrule and simulation card employing mode one In case, executing subject is cutting ferrule and simulation card.Wherein, it is fastened in execute in the two schemes and operates identical, Truth cards pipe It reason device and simulates card to execute operation in the two schemes identical.
Second is that the generating mode of secure connection instruction is different: establishing and pacify in cutting ferrule and Truth cards manager employing mode one In the scheme connected entirely, the instruction of third secure connection can be that the connection physical button being provided separately on cutting ferrule generates, or What person can generate for the connection virtual key on the touch screen of cutting ferrule, or can correctly be generated afterwards for start-up password verification, Perhaps being generated when can be cutting ferrule send logging request to Truth cards manager or can be to be shown on cutting ferrule screen Menu in selection linkage function generate.
Hereinafter, the scheme for only establishing secure connection with Truth cards manager employing mode one to cutting ferrule is briefly described As follows, this will not be detailed here.
Fig. 4 shows data interaction system provided in an embodiment of the present invention and realizes that cutting ferrule and Truth cards manager establish peace The flow chart of full connection type one, referring to fig. 4, cutting ferrule establishes secure connection with Truth cards manager and includes:
Cutting ferrule is sent to Truth cards manager is used to indicate the third secure connection for establishing secure connection instruction, wherein The instruction of third secure connection includes: that cutting ferrule utilizes the Truth cards manager public key in Truth cards manager certificate to cutting ferrule end Second binding factor and the 5th connection random factor of generation carry out the 5th connection ciphertext of encryption acquisition, and cutting ferrule utilizes cutting ferrule The 5th connection that private key carries out signature acquisition to the second binding factor of cutting ferrule end and the 5th connection random factor is signed;
Truth cards manager receives the instruction of third secure connection, close to the 5th connection using Truth cards manager private key Text is decrypted, and obtains cutting ferrule end second and binds decryption factor and the 5th connection decryption random factor;
Truth cards manager binds decryption factor and the 5th using the cutting ferrule public key in cutting ferrule certificate, cutting ferrule end second The connection connection signature of decryption random factor pair the 5th is verified;
After the 5th connection signature of Truth cards manager verifying is correct, decryption factor and true is bound at verifying cutting ferrule end second Whether card management device end binding factor is identical;
Truth cards manager verifies cutting ferrule end second and binds decryption factor and Truth cards manager end binding factor phase With after, the 6th connection random factor is generated;
Truth cards manager is using the cutting ferrule public key in cutting ferrule certificate to the 5th connection decryption random factor and the 6th Connection random factor carries out encryption and obtains the 6th connection ciphertext, using Truth cards manager private key to the 5th connection decryption random The factor and the 6th connection random factor carry out signature and obtain the 6th connection signature;
Truth cards manager sends the response of third secure connection to cutting ferrule, wherein the response of third secure connection includes: the Six connection ciphertexts and the 6th connection signature;
Cutting ferrule receives the response of third secure connection, is decrypted, is decrypted to the 6th connection ciphertext using cutting ferrule private key The 5th connection decryption random factor and the 6th connection decryption random factor afterwards;
Cutting ferrule is random using the Truth cards manager public key in Truth cards manager certificate, the 5th connection after decryption Decryption factor and the 6th connection connection signature of decryption random factor pair the 6th are verified;
After the 6th connection signature of cutting ferrule verifying is correct, the 5th connection decryption random factor after verifying decryption is connect with the 5th Whether random factor is identical;
Cutting ferrule verifying decryption after the 5th connection the decryption random factor with the 5th connect random factor it is identical after, at least with The 6th connection decryption random factor generates cutting ferrule end the second safe transmission key between cutting ferrule and Truth cards manager;True card Piece manager generates the Truth cards manager end between cutting ferrule and Truth cards manager at least with the 6th connection random factor Safe transmission key.
Certainly, in the present invention, Truth cards manager generates cutting ferrule and true card at least with the 6th connection random factor The step of Truth cards manager end safe transmission key between piece manager, is not limited to the step in the method one, may be used also To generate Truth cards manager end safe transmission key after Truth cards manager generates the 6th connection random factor, Cutting ferrule hair can be received after the 5th connection decryption random factor after cutting ferrule verifies decryption is identical as the 5th connection random factor Truth cards manager end safe transmission key is generated after the successful information sent.
It can be seen that data transmission can be improved based on the secure connection that above-mentioned cutting ferrule and Truth cards manager are established Safety further improve safety at the same time it can also verify whether both sides are bound.
If cutting ferrule and Truth cards manager are established before secure connection, performs above-mentioned manual binding and store binding The operation such as factor, then in the method one, cutting ferrule and Truth cards manager are other than mutual authentication other side's identity, it is also necessary to Mutual authentication other side's certificate.
In addition, the invention is not limited to above-mentioned cutting ferrules to initiate the foundation of secure connection, can also be triggered by cutting ferrule true Card management device initiates the foundation of secure connection, instructs at this point, sending third secure connection by Truth cards manager to cutting ferrule, Other processes are opposite with above-mentioned flow implementation main body to be can be realized, and this is no longer going to repeat them.
Mode two, cutting ferrule and Truth cards manager mutual authentication other side's identity, and in mutual authentication other side's identity process Middle generation safe transmission cryptographic key factor, after mutual authentication other side's identity passes through, at least with the binding factor and safety of storage The transmission key factor generates safe transmission key (the cutting ferrule end that data security transmission is carried out between cutting ferrule and Truth cards manager Second safe transmission key and Truth cards manager end safe transmission key), and verify the safe transmission key of both sides' generation It is whether identical.
It is worth noting that if performing above-mentioned card before cutting ferrule and Truth cards manager establish secure connection Set and Truth cards manager mutual authentication other side certificate and other side's identity, and after both sides authenticate and pass through, respectively it is stored in The bindings of the binding factor generated in verification process, then in the method two, cutting ferrule is recognized mutually with Truth cards manager Card other side's identity is cutting ferrule and Truth cards manager mutual authentication other side identity again.
Cutting ferrule and Truth cards manager employing mode two establish the scheme of secure connection and cutting ferrule is used with simulation card The scheme difference that mode two establishes secure connection is only that:
First is that executing subject is different: establishing the scheme of secure connection in cutting ferrule and Truth cards manager employing mode two In, executing subject is cutting ferrule and Truth cards manager;The side of secure connection is established in cutting ferrule and simulation card employing mode two In case, executing subject is cutting ferrule and simulation card.Wherein, it is fastened in execute in the two schemes and operates identical, Truth cards pipe It reason device and simulates card to execute operation in the two schemes identical.
Second is that the generating mode of secure connection instruction is different: establishing and pacify in cutting ferrule and Truth cards manager employing mode two In the scheme connected entirely, the instruction of the 4th secure connection can be that the connection physical button being provided separately on cutting ferrule generates, or What person can generate for the connection virtual key on the touch screen of cutting ferrule, or can correctly be generated afterwards for start-up password verification, Perhaps being generated when can be cutting ferrule send logging request to Truth cards manager or can be to be shown on cutting ferrule screen Menu in selection linkage function generate.
Hereinafter, the scheme for only establishing secure connection with Truth cards manager employing mode two to cutting ferrule is briefly described As follows, this will not be detailed here.
Fig. 5 shows data interaction system provided in an embodiment of the present invention and realizes that cutting ferrule and Truth cards manager establish peace The flow chart of full connection type two, referring to Fig. 5, cutting ferrule establishes secure connection with Truth cards manager and includes:
Cutting ferrule receives the 7th connection random factor that the Truth cards manager that Truth cards manager is sent generates and true Real card management device unique identification;
Cutting ferrule is sent to Truth cards manager is used to indicate the 4th secure connection for establishing secure connection instruction, wherein The instruction of 4th secure connection includes: that cutting ferrule unique identification, cutting ferrule utilize the Truth cards management in Truth cards manager certificate Device public key to the 7th connection random factor and generation the 8th connection random factor carry out encryption acquisition the 7th connection ciphertext, Cutting ferrule carries out the 7th connection of signature acquisition using cutting ferrule private key to the 7th connection random factor and the 8th connection random factor Signature;
Whether Truth cards manager receives the instruction of the 4th secure connection, judge cutting ferrule unique identification in Truth cards management In the list of bindings of device end;
If cutting ferrule unique identification, in the list of bindings of Truth cards manager end, Truth cards manager utilizes true card The 7th connection ciphertext is decrypted in piece manager private key, obtains the 7th connection decryption random factor and the 8th connection RANDOM SOLUTION The close factor;
Truth cards manager utilizes cutting ferrule public key, the 7th connection decryption random factor and the 8th company in cutting ferrule certificate The connection signature of decryption random factor pair the 7th is connect to be verified;
After the 7th connection signature of Truth cards manager verifying is correct, the 7th connection decryption random factor of verifying connects with the 7th Whether identical connect random factor;
If the 7th connection decryption random factor is identical as the 7th connection random factor, Truth cards manager is using really Card management device private key carries out signature and obtains the 8th to the 7th connection decryption random factor and the 8th connection decryption random factor Connection signature;
Truth cards manager sends the response of the 4th secure connection to cutting ferrule, wherein the response of the 4th secure connection includes: the Eight connection signatures;
Cutting ferrule receives the response of the 4th secure connection, public using the Truth cards manager in Truth cards manager certificate Key, the 7th connection random factor and the 8th connection random factor verify the 8th connection signature;
After the 8th connection signature of cutting ferrule verifying is correct, bound at least with the 8th connection random factor and cutting ferrule end second The factor generates cutting ferrule end the second safe transmission key between cutting ferrule and Truth cards manager;Truth cards manager at least with The 8th connection decryption random factor and Truth cards manager end binding factor generate between cutting ferrule and Truth cards manager Truth cards manager end safe transmission key;
Cutting ferrule connects random factor and the 8th connection random factor using the second safe transmission of cutting ferrule end key pair the 7th Truth cards manager is sent to after carrying out the first processing;Truth cards manager utilizes Truth cards manager end safe transmission Key pair the 7th is sent to cutting ferrule after connecting the decryption random factor and the 8th connection decryption random factor the first processing of progress;
Cutting ferrule receives the data that Truth cards manager is sent, and is received using cutting ferrule end the second safe transmission key pair Data carry out second processing, data after comparing second processing connect random factor with the 7th and the 8th connect random factor It is whether identical;Truth cards manager receives the data that cutting ferrule is sent, and utilizes Truth cards manager end safe transmission key Second processing is carried out to the data received, the data after comparing second processing connect the decryption random factor and the 8th with the 7th Whether identical connect the decryption random factor.
It can be seen that data transmission can be improved based on the secure connection that above-mentioned cutting ferrule and Truth cards manager are established Safety further improve safety at the same time it can also verify whether both sides are bound.
Certainly, the present invention in, Truth cards manager generate Truth cards manager end safe transmission key the step of simultaneously The step being not limited in the method two can also generate Truth cards pipe after decryption obtains the 8th connection decryption random factor Device end safe transmission key is managed, can also be connect after the 8th connection signature that cutting ferrule verifies the transmission of Truth cards manager is errorless Truth cards manager end safe transmission key is generated after receiving the successful information that cutting ferrule is sent;Cutting ferrule generates the second safety of cutting ferrule end The step of transmission key, is also not limited to the step in the method two, can also be raw after cutting ferrule generates the 8th connection random factor At cutting ferrule end the second safe transmission key.
If cutting ferrule and Truth cards manager are established before secure connection, performs above-mentioned manual binding and store binding The operation such as factor, then in the method two, cutting ferrule and Truth cards manager are other than mutual authentication other side's identity, it is also necessary to Mutual authentication other side's certificate.
In addition, the invention is not limited to above-mentioned cutting ferrules to initiate the foundation of secure connection, can also be triggered by cutting ferrule true Card management device initiates the foundation of secure connection, instructs at this point, sending the 4th secure connection by Truth cards manager to cutting ferrule, Other processes are opposite with above-mentioned flow implementation main body to be can be realized, and this is no longer going to repeat them.
Certainly, progress data safety biography between cutting ferrule and Truth cards manager is being generated in aforesaid way one and mode two During defeated safe transmission key, the binding factor used generates in binding procedure for cutting ferrule and Truth cards manager And the binding factor saved, the binding factor can be to pass through above-mentioned cutting ferrule and Truth cards manager mutual authentication other side's certificate And other side's identity, and after both sides authenticate and pass through, it is respectively stored in the binding factor generated in verification process, or can be The binding factor for inputting and storing by way of binding manually.
In addition, if being not carried out bindings between cutting ferrule and Truth cards manager, aforesaid way one and mode The binding factor used in two can be the random value that is manually entered during establishing secure connection;Or connect establishing safety In termination process, safe transmission key is only generated by random factor, not binding factor is carried out to verify or do not use binding The factor generates safe transmission key.
In addition, establishing secure connection in cutting ferrule of the present invention and Truth cards manager, cutting ferrule and Truth cards management are obtained Cutting ferrule end the second safe transmission key and Truth cards manager end safe transmission key of data security transmission are carried out between device Before, cutting ferrule sends logging request to Truth cards manager;Specifically, logging request can be to be provided separately on cutting ferrule Log in physical button generate, perhaps can be on the touch screen of cutting ferrule logins virtual key generation or can be switched on What password authentification correctly generated afterwards, or can be that selection login function generates in the menu shown on cutting ferrule screen;It steps on Record request may include cutting ferrule unique identification, so that Truth cards manager knows which cutting ferrule request is logged in.
Logging request is sent to Truth cards manager in cutting ferrule, cutting ferrule and Truth cards manager establish secure connection, Obtain cutting ferrule end the second safe transmission key that data security transmission is carried out between cutting ferrule and Truth cards manager and true card After the safe transmission key of piece manager end:
The login password that cutting ferrule is received by cutting ferrule end the second safe transmission key pair is sent to after carrying out the first processing Truth cards manager;Specifically, cutting ferrule can also prompt user to input login password, after user has input login password, Truth cards manager, Ke Yiti are sent to after carrying out the first processing using cutting ferrule end the second safe transmission key pair login password The safety of high login password transmission.
Truth cards manager receives the data that cutting ferrule is sent, and is docked using Truth cards manager end safe transmission key The correctness of the data after second processing is verified after the data progress second processing received;Specifically, Truth cards manager benefit After carrying out second processing with the data that Truth cards manager end safe transmission key pair cutting ferrule is sent, stepping on for user's input is obtained Password is recorded, is compared with the legal login password that it is stored, it is legal only to store in the login password of user's input with it When login password is identical, just cutting ferrule is allowed to log in Truth cards manager, improves login security, guarantee subsequent data transmission Safety.If Truth cards manager has warning function in the present invention, can be set in Truth cards manager in advance Legal login password and legal alarm cipher are set, at this point, Truth cards manager utilizes Truth cards manager end safe transmission After the data that key pair receives carry out second processing, password to be verified is obtained;Truth cards manager judges password to be verified It whether is alarm cipher;If password to be verified is alarm cipher, Truth cards manager determines that password authentification to be verified is logical It crosses, and executes alarm operation;If password to be verified is not alarm cipher and is login password, Truth cards manager is determined Password authentification to be verified passes through.It is true to block when the login password of user's input is alarm cipher due to being provided with alarm cipher Piece manager can identify it is current log in that there are security risks, and execute alarm operation (such as Truth cards manager sent Alarm message is dialed the police emergency number to law enforcement agency etc.).
For Truth cards manager after verifying the data after second processing and passing through, cutting ferrule logs in Truth cards manager.
It can be seen that cutting ferrule initiates to log in advance before the secure connection established between cutting ferrule and Truth cards manager It requests, and triggers the foundation of secure connection while cutting ferrule sends logging request, and after secure connection foundation, it is close to logging in Code is verified, and process can be saved, and improves processing speed.
Four, it binds:
In order to further increase the safety of data interaction, before cutting ferrule and simulation card establish secure connection, may be used also To include: the process of cutting ferrule and simulation card execution bindings;
It can also include: cutting ferrule and Truth cards management before cutting ferrule and Truth cards manager establish secure connection The process of device execution bindings.
Certainly, above-mentioned two process may be performed simultaneously, execution when can also be different, and can only execute one of stream Journey, can also two processes be performed both by.
1, cutting ferrule and simulation card execute bindings:
In the present invention, cutting ferrule can be bound in the following way with simulation card:
Cutting ferrule and simulation card mutual authentication other side certificate and other side's identity, and after both sides authenticate and pass through, respectively deposit Store up the binding factor generated in verification process.
Hereinafter, providing the specific implementation of a kind of cutting ferrule and simulation card execution bindings:
Fig. 6 shows data interaction system provided in an embodiment of the present invention and realizes that cutting ferrule and simulation card execute bindings Flow chart, referring to Fig. 6, cutting ferrule with simulation card execute bindings include:
Cutting ferrule receives the trigger command for being used to indicate and being bound with simulation card;It specifically, can before cutting ferrule use To execute power-on operation to cutting ferrule in advance, at this point, optionally, cutting ferrule prompts user to input startup password, and user's input is received Startup password, verify user input startup password correctness, verifying user input startup password it is correct after, execute Power-on operation, cutting ferrule enter operating mode.Before carrying out data interaction using cutting ferrule and simulation card, optionally, by cutting ferrule It is bound with simulation card, to improve the safety of follow-up data interaction.Wherein, cutting ferrule is received is used to indicate cutting ferrule and mould The trigger command that quasi- card is bound can be that the binding physical key being provided separately on cutting ferrule generates, or can be What the binding virtual key on the touch screen of cutting ferrule generated, it is perhaps can correctly being generated afterwards for start-up password verification or can be with It will simulate after card is inserted into cutting ferrule and generate, or can be to select binding function in the menu shown on cutting ferrule screen It generates, it is, of course, also possible to generated for other any modes, in the present invention and with no restriction.
Cutting ferrule is instructed to the first binding of transmission of simulation card, wherein first, which binds instruction includes: cutting ferrule generation first, ties up Determine random factor, cutting ferrule certificate and cutting ferrule unique identification;Specifically, cutting ferrule can be connected by contact (passes through contact Interface) to simulation card send the first binding instruction, cutting ferrule can also by contactless connection (by non-contact interface or Person's wireless interface) to transmission the first binding instruction of simulation card, binding safety can be improved in the former, and binding can be improved in the latter Convenience.The first binding random factor is carried in first binding instruction can prevent Replay Attack, carry in the first binding instruction Cutting ferrule certificate authenticates to simulate card to cutting ferrule, carries cutting ferrule unique identification in the first binding instruction to simulate card Know which cutting ferrule is bound with it;Wherein, first the random number, random character or its that random factor can be cutting ferrule generation are bound Combination after random factor is bound in generation first, can also verify the randomness of the first binding random factor certainly, To improve the randomness of the first binding random factor, prevent from being cracked;Cutting ferrule unique identification can be known for cutting ferrule sequence number, equipment Other code, MAC Address etc. are any or combinations thereof with the mark of unique identification cutting ferrule.
It simulates card and receives the first binding instruction, cutting ferrule certificate is verified using root certificate;Specifically, card is simulated Root certificate is stored in advance, the verifying to cutting ferrule certificate is completed using the root certificate, to guarantee the subsequent safety using cutting ferrule certificate Property.
After simulation card verifying cutting ferrule certificate is legal, the second binding random factor is generated;Specifically, second binding it is random because Son can be random number, random character of the generation of analog card piece or combinations thereof;Certainly, after random factor is bound in generation second, The randomness of second binding random factor can also be verified, to improve the randomness of the second binding random factor, be prevented It is cracked.
Simulate card using the cutting ferrule public key in cutting ferrule certificate it is random to the first binding random factor and the second binding because Son carries out encryption and obtains the first binding ciphertext, random to the first binding random factor and the second binding using simulation card private key The factor carries out signature and obtains the first binding signature;Specifically, simulation card using cutting ferrule public key to first binding random factor with And second binding random factor be encrypted to ensure that the peace of the first binding random factor and the second binding random factor transmission Quan Xing, simulation card sign to the first binding random factor and the second binding random factor using simulation card private key, To guarantee that subsequent cutting ferrule can authenticate the legitimacy of simulation card identity.
It simulates card and sends the first binding response to cutting ferrule, wherein the first binding response includes: the first binding ciphertext, the One binding signature, simulation card certificate and simulation card unique identification;Specifically, the first binding response that simulation card is sent Middle carrying simulation card certificate authenticates simulation card so as to cutting ferrule, and simulation card is carried in the first binding response and is uniquely marked Know so that cutting ferrule knows which simulation card is bound with it;Wherein, simulation card unique identification can for analog card piece sequence number, Any or combinations thereof mark with unique identification simulation card such as EIC equipment identification code, MAC Address.
Cutting ferrule receives the first binding response, is verified using root certificate to simulation card certificate;Specifically, cutting ferrule is preparatory Root certificate is stored, completes the verifying to simulation card certificate using the root certificate, to guarantee that subsequent use simulates card certificate Safety.
After cutting ferrule verifying simulation card certificate is legal, the first binding ciphertext is decrypted using cutting ferrule private key, obtains the The one binding decryption random factor and the second binding decryption random factor;Specifically, using cutting ferrule private key to first binding ciphertext into Row decryption, if data transmission fault has occurred in the data transmission, or is distorted in the data transmission, then will lead to Can not successful decryption, or decrypt first binding the decryption random factor and second binding the decryption random factor tied up with first Determine random factor and the second binding random factor is different.And encrypted by cutting ferrule public key, only cutting ferrule private key can be at Function decryption, thus it is also ensured that the safety of data deciphering.
Cutting ferrule utilizes simulation card public key, the first binding decryption random factor and the second binding in simulation card certificate The binding signature of decryption random factor pair first is verified;Specifically, cutting ferrule utilizes the simulation card public key pair after being verified The signature that simulation card is sent is verified, to ensure the legitimate origin of data.
After cutting ferrule verifying the first binding signature is correct, the first binding decryption random factor of verifying and the first binding random factor It is whether identical;Specifically, cutting ferrule verifies the first binding random factor itself generated and the first binding decryption random factor is identical, The data source that can guarantee data and be not tampered with, and encrypt is the object that cutting ferrule sends the first binding random factor really.
After the first binding decryption random factor of cutting ferrule verifying is identical as the first binding random factor, prompt simulation card unique Mark;Specifically, cutting ferrule can show simulation card unique identification, can also be played with voice (such as loudspeaker play or pass through Headset earpiece broadcasting etc.) simulation card unique identification, so that authenticity of the user to simulation card confirms that raising binding is pacified Quan Xing.
Cutting ferrule is received for confirming the simulation correct trigger command of card unique identification, is bound using cutting ferrule private key to first Random factor and the second binding decryption random factor are signed, and obtain the second binding signature, and storage simulation card is only One mark simulates card certificate and the first binding factor of cutting ferrule end to the first list of bindings of cutting ferrule end, wherein cutting ferrule end first Binding factor is the second binding decryption random factor;Specifically, cutting ferrule is received for confirming that simulation card unique identification is correct Trigger command can be that the confirmation physical button being provided separately on cutting ferrule generates, or can be on the touch screen of cutting ferrule Confirm virtual key generate, in the menu perhaps shown on cutting ferrule screen select confirmation function generation or can be Voice that the voice acquisition device (such as Mike) of cutting ferrule receives confirmation indicates and generates when being verified rear, or can be with It receives fingerprint identification for the fingerprint acquisition device of cutting ferrule and indicates and generate after being verified, or can be the iris of cutting ferrule Acquisition device receives iris confirmation and indicates and generate after being verified, it is, of course, also possible to generated for other any modes, In the present invention and with no restriction;Using cutting ferrule private key to first binding random factor and second binding the decryption random factor into Row signature authenticates the identity of cutting ferrule so as to subsequent simulation card;Certainly, cutting ferrule can also store the binding of cutting ferrule end first List, first list of bindings of cutting ferrule end are used to record the relevant information with the simulation card of cutting ferrule binding, such as: simulation card Unique identification, simulation card certificate etc., in addition, the first list of bindings of cutting ferrule end is also used to store the first binding factor of cutting ferrule end, First binding factor of cutting ferrule end is the second binding random factor of ciphertext transmission, is that ciphertext passes based on the second binding random factor Defeated, therefore, which is safety and is not tampered with.
Cutting ferrule sends the second binding signature to simulation card;Specifically, cutting ferrule sends the second binding signature to simulation card, It is authenticated to simulate card to cutting ferrule identity.
Simulate card receive second binding signature, using in cutting ferrule certificate cutting ferrule public key, first binding random factor with And second binding random factor to second binding signature verify;Specifically, simulation card utilizes the cutting ferrule after being verified The signature that public key sends cutting ferrule is verified, to ensure the legitimate origin of data.
After simulating the second binding of card verifying signature correctly, storage cutting ferrule unique identification, cutting ferrule certificate and simulation card Hold binding factor to simulation Card-terminal list of bindings, wherein simulation Card-terminal binding factor is the second binding random factor.Specifically Ground, simulation card can also store simulation Card-terminal list of bindings, and the simulation Card-terminal list of bindings is for record and analog card The relevant information of the cutting ferrule of piece binding, such as: cutting ferrule unique identification, cutting ferrule certificate etc., in addition, simulation Card-terminal list of bindings is also For store simulate Card-terminal binding factor, the simulation Card-terminal binding factor be simulate card generate second bind it is random because Son.
It can be seen that based on above-mentioned cutting ferrule and simulation card bound, it is ensured that subsequent cutting ferrule and simulation card it Between data interaction safety.
In addition, the step of above-mentioned cutting ferrule and simulation card execute the operation of binding not necessarily, according to different application scene Demand, can choose do not execute above-mentioned cutting ferrule and simulate card execute binding operation.
Certainly, above-mentioned cutting ferrule and simulation card execute the operation of binding, it is not limited to the implementation of above-mentioned offer, example The mark of simulation card to be bound using binding manually, i.e., under trusted context, can also be such as inputted on cutting ferrule as card The first binding factor of end is covered, the mark of simulation card default simulation card is as simulation Card-terminal binding factor;Or by cutting ferrule Contact connection is carried out with simulation card, any random value is inputted on cutting ferrule as the first binding factor of cutting ferrule end, cutting ferrule is logical It crosses contact connection and the random value of input is sent to simulation card as simulation Card-terminal binding factor etc., as long as can make Cutting ferrule obtains identical binding factor and is within the scope of protection of the invention with card is simulated.
2, cutting ferrule and Truth cards manager execute bindings:
In the present invention, cutting ferrule can be bound in the following way with Truth cards manager:
Cutting ferrule and Truth cards manager mutual authentication other side certificate and other side's identity, and after both sides authenticate and pass through, Respectively it is stored in the binding factor generated in verification process.
Hereinafter, providing the specific implementation of a kind of cutting ferrule and Truth cards manager execution bindings:
Fig. 7 shows data interaction system provided in an embodiment of the present invention and realizes that cutting ferrule is tied up with the execution of Truth cards manager Surely the flow chart operated, referring to Fig. 7, cutting ferrule executes bindings with Truth cards manager and includes:
Cutting ferrule reception is used to indicate the trigger command bound with Truth cards manager;Specifically, it is used in cutting ferrule Before, power-on operation can be executed to cutting ferrule in advance, at this point, optionally, cutting ferrule prompts user to input startup password, and receives use The startup password of family input verifies the correctness of the startup password of user's input, correct in the startup password of verifying user's input Afterwards, power-on operation is executed, cutting ferrule enters operating mode.Before carrying out data interaction using cutting ferrule and Truth cards manager, Optionally, cutting ferrule and Truth cards manager are bound, to improve the safety of follow-up data interaction.Wherein, cutting ferrule connects The trigger command that cutting ferrule is bound with Truth cards manager that is used to indicate received can be to be provided separately within tying up on cutting ferrule Determine physical button generation, perhaps can be on the touch screen of cutting ferrule binding virtual key generation or can be switched on it is close It is generated after code verifying is correct, or can be generated for selection binding function in the menu that is shown on cutting ferrule screen, certainly, It can also be generated for other any modes, in the present invention and with no restriction.
Cutting ferrule sends the second binding instruction to Truth cards manager, wherein the second binding instruction includes: what cutting ferrule generated Third binds random factor, cutting ferrule certificate and cutting ferrule unique identification;Specifically, cutting ferrule (such as can move wirelessly Dynamic network, WIFI etc.) it is instructed to the second binding of Truth cards manager transmission.It is random that third binding is carried in second binding instruction The factor can prevent Replay Attack, carry cutting ferrule certificate so that Truth cards manager recognizes cutting ferrule in the second binding instruction It demonstrate,proves, carries cutting ferrule unique identification so that Truth cards manager knows which cutting ferrule is bound with it in the second binding instruction;Wherein, It can be random number that cutting ferrule generates, random character or combinations thereof that third, which binds random factor, certainly, generate third binding with After the machine factor, can also to third bind random factor randomness verify, with improve third binding random factor with Machine prevents from being cracked;Cutting ferrule unique identification can be any or combinations thereof for cutting ferrule sequence number, EIC equipment identification code, MAC Address etc. With the mark of unique identification cutting ferrule.
Truth cards manager receives the second binding instruction, is verified using root certificate to cutting ferrule certificate;Specifically, very Root certificate is stored in advance in real card management device, completes the verifying to cutting ferrule certificate using the root certificate, subsequent using card to guarantee Cover the safety of certificate.
After Truth cards manager verifying cutting ferrule certificate is legal, the 4th binding random factor is generated;Specifically, the 4th binding Random factor can be random number, random character of the generation of Truth cards manager or combinations thereof;Certainly, the 4th binding is being generated After random factor, the randomness of the 4th binding random factor can also be verified, to improve the 4th binding random factor Randomness prevents from being cracked.
Truth cards manager binds random factor and the 4th binding to third using the cutting ferrule public key in cutting ferrule certificate Random factor carry out encryption obtain second binding ciphertext, using Truth cards manager private key to third bind random factor and 4th binding random factor carries out signature and obtains third binding signature;Specifically, Truth cards manager utilizes cutting ferrule public key pair Third binding random factor and the 4th binding random factor be encrypted to ensure that third binding random factor and the 4th tie up Determine the safety of random factor transmission, Truth cards manager binds random factor to third using Truth cards manager private key And the 4th binding random factor sign, with guarantee subsequent cutting ferrule can legitimacy to Truth cards manager identity into Row certification.
Truth cards manager sends the second binding response to cutting ferrule, wherein the second binding response includes: that the second binding is close Text, third binding signature, Truth cards manager certificate and Truth cards manager unique identification;Specifically, Truth cards Truth cards manager certificate is carried in the second binding response that manager is sent so that cutting ferrule carries out Truth cards manager Certification, carry in the second binding response Truth cards manager unique identification so as to cutting ferrule know which Truth cards manager with It is bound;Wherein, Truth cards manager unique identification can be Truth cards manager sequence number, EIC equipment identification code, MAC Location etc. is any or combinations thereof with the mark of unique identification Truth cards manager.
Cutting ferrule receives the second binding response, is verified using root certificate to Truth cards manager certificate;Specifically, block Root certificate is stored in advance in set, completes the verifying to Truth cards manager certificate using the root certificate, subsequent using true to guarantee The safety of real card management device certificate.
After cutting ferrule verifying Truth cards manager certificate is legal, the second binding ciphertext is decrypted using cutting ferrule private key, Obtain the third binding decryption random factor and the 4th binding decryption random factor;Specifically, it is bound using cutting ferrule private key to second Ciphertext is decrypted, if data transmission fault has occurred in the data transmission, or is distorted in the data transmission, then Will lead to can not successful decryption, or decrypt third binding the decryption random factor and the 4th binding the decryption random factor with Third binds random factor and the 4th binding random factor is different.And it is encrypted by cutting ferrule public key, only cutting ferrule private key It can be with successful decryption, thus it is also ensured that the safety of data deciphering.
Cutting ferrule binds the decryption random factor using the Truth cards manager public key in Truth cards manager certificate, third And the 4th binding decryption random factor pair third binding signature verified;Specifically, cutting ferrule utilizes true after being verified The signature that real card management device public key sends Truth cards manager is verified, to ensure the legitimate origin of data.
After cutting ferrule verifies third binding signature correctly, the verifying third binding decryption random factor and third bind random factor It is whether identical;Specifically, the third that cutting ferrule verifies itself generation binds random factor and the third binding decryption random factor is identical, The data source that can guarantee data and be not tampered with, and encrypt is the object that cutting ferrule sends third binding random factor really.
After the cutting ferrule verifying third binding decryption random factor is identical as third binding random factor, Truth cards management is prompted Device unique identification;Specifically, cutting ferrule can show Truth cards manager unique identification, can also be played with voice (such as loudspeaker Play or played by headset earpiece etc.) Truth cards manager unique identification, so that user is to Truth cards manager Authenticity is confirmed, binding safety is improved.
Cutting ferrule is received for confirming the correct trigger command of Truth cards manager unique identification, using cutting ferrule private key to the Three binding random factors and the 4th binding decryption random factor are signed, and are obtained the 4th binding and are signed, and storage is true Card management device unique identification, Truth cards manager certificate and the second binding factor of cutting ferrule end are bound to cutting ferrule end second and are arranged Table, wherein the second binding factor of cutting ferrule end is the 4th binding decryption random factor;Specifically, cutting ferrule is received true for confirming The real correct trigger command of card management device unique identification can be that the confirmation physical button being provided separately on cutting ferrule generates, Perhaps selection is true in menu can generating for the confirmation virtual key on the touch screen of cutting ferrule or showing on cutting ferrule screen Recognize function generation, or the voice confirmation that can be received for the voice acquisition device (such as Mike) of cutting ferrule is indicated and verified By it is rear when generate, or fingerprint identification can be received for the fingerprint acquisition device of cutting ferrule and indicate and generated after being verified , or iris confirmation can be received for the iris collection device of cutting ferrule and indicate and generate after being verified, certainly, may be used also Think what other any modes generated, in the present invention and with no restriction;Using cutting ferrule private key to third bind random factor with And the 4th binding the decryption random factor sign so that subsequent Truth cards manager authenticates the identity of cutting ferrule;When So, cutting ferrule can also store the second list of bindings of cutting ferrule end, which is used to record and cutting ferrule binding The relevant information of Truth cards manager, such as: Truth cards manager unique identification, Truth cards manager certificate etc., separately Outside, the second list of bindings of cutting ferrule end is also used to store the second binding factor of cutting ferrule end, which is ciphertext 4th binding random factor of transmission, is ciphertext transmission based on the 4th binding random factor, therefore, the cutting ferrule end second binding The factor is safety and is not tampered with.
Cutting ferrule sends the 4th binding signature to Truth cards manager;Specifically, cutting ferrule is sent to Truth cards manager 4th binding signature, so that Truth cards manager authenticates cutting ferrule identity.
Truth cards manager receives the 4th binding signature, is bound using the cutting ferrule public key in cutting ferrule certificate, third random The factor and the 4th binding random factor verify the 4th binding signature;Specifically, Truth cards manager utilizes verifying The signature that cutting ferrule public key after sends cutting ferrule is verified, to ensure the legitimate origin of data.
After the 4th binding signature of Truth cards manager verifying is correct, storage cutting ferrule unique identification, cutting ferrule certificate and true Real card management device end binding factor is to Truth cards manager end list of bindings, wherein the binding of Truth cards manager end because Son is the 4th binding random factor.Specifically, Truth cards manager can also store Truth cards manager end list of bindings, The Truth cards manager end list of bindings is used to record the relevant information with the cutting ferrule of Truth cards manager binding, such as: Cutting ferrule unique identification, cutting ferrule certificate etc., in addition, Truth cards manager end list of bindings is also used to store Truth cards manager Binding factor is held, which is the 4th binding random factor that Truth cards manager generates.
It can be seen that being bound based on above-mentioned cutting ferrule and Truth cards manager, it is ensured that subsequent cutting ferrule and true The safety of data interaction between card management device.
In addition, the step of above-mentioned cutting ferrule and Truth cards manager execute the operation of binding not necessarily, answers according to difference With the demand of scene, the operation for not executing above-mentioned cutting ferrule and the execution binding of Truth cards manager can choose.
Certainly, above-mentioned cutting ferrule and Truth cards manager execute the operation of binding, it is not limited to the realization of above-mentioned offer Mode, such as Truth cards manager to be bound that is, under trusted context, can also be inputted on cutting ferrule using binding manually Mark as the first binding factor of cutting ferrule end, Truth cards manager defaults the mark of Truth cards manager as true card Piece manager end binding factor;Or the mark of cutting ferrule to be bound is inputted on Truth cards manager as Truth cards pipe Device end binding factor is managed, cutting ferrule defaults the mark of cutting ferrule as the second binding factor of cutting ferrule end;Or it is inputted on cutting ferrule any Random value inputs identical random value as Truth cards pipe as the second binding factor of cutting ferrule end on Truth cards manager Device end binding factor etc. is managed, as long as cutting ferrule can be made, which to obtain identical binding factor with Truth cards manager, to be belonged to In protection scope of the present invention.
Certainly, above-mentioned cutting ferrule and simulation card execute the operation bound and above-mentioned cutting ferrule and execute binding with Truth cards Operation and it is non-required be performed simultaneously, according to the demand of different application scene, can choose and only execute cutting ferrule and simulate card Bindings, the bindings or above-mentioned bindings for perhaps only executing cutting ferrule and Truth cards manager not execute.
Five, data interaction:
After cutting ferrule and simulation card establish secure connection, the first data that simulation card is sent to cutting ferrule utilize simulation Card-terminal safe transmission key is sent after carrying out the first processing, and cutting ferrule receives first treated the first data, utilizes cutting ferrule Safe transmission key is held to carry out second processing;Cutting ferrule utilizes cutting ferrule end safe transmission key to the second data that simulation card is sent It is sent after carrying out the first processing, simulation card receives first treated the second data, utilizes simulation Card-terminal safe transmission Key carries out second processing.
After cutting ferrule and Truth cards manager establish secure connection, cutting ferrule sent to Truth cards manager first Data are sent after carrying out the first processing using cutting ferrule end safe transmission key, and Truth cards manager receives first, and treated First data carry out second processing using Truth cards manager end safe transmission key;Truth cards manager is sent out to cutting ferrule The second data sent are sent after carrying out the first processing using Truth cards manager end safe transmission key, and cutting ferrule receives first The second data that treated carry out second processing using cutting ferrule end safe transmission key.
Thereby guarantee that the safety of data interaction.
One kind presented below establishes secure connection in cutting ferrule and simulation card, and cutting ferrule and Truth cards manager establish peace After full connection, data interactive method of the invention, but the present invention is not limited thereto:
It simulates card and receives the data that transaction terminal is sent, and received using simulation Card-terminal safe transmission key pair Data are sent to cutting ferrule after carrying out the first processing;Specifically, in data exchange process, by simulation card and transaction terminal (example Such as ATM machine, POS machine, bus card top-up machines) it is attached (contact interface or non-contact interface), simulation card connects Receive the data that transaction terminal is sent, which can be data to be processed (such as withdrawal amount, deducted amount, Truth cards Information acquisition request etc.).
Cutting ferrule receives the data that simulation card is sent, and the data received using cutting ferrule end the first safe transmission key pair After carrying out second processing, sent after carrying out the first processing using the data after the second safe transmission key pair second processing of cutting ferrule end To Truth cards manager;Specifically, cutting ferrule receives the data that simulation card is sent, and close using the first safe transmission of cutting ferrule end After key carries out second processing to the data that receive, data after second processing can also be prompted, and receive and be used to indicate second After data that treated correctly confirm instruction, carried out using the data after the second safe transmission key pair second processing of cutting ferrule end Truth cards manager is sent to after first processing;Based on this, cutting ferrule can also show data to be processed, can also be broadcast with voice (such as loudspeaker play or by headset earpiece broadcasting etc.) data to be processed are put, so that user confirms the data to be processed It is whether correct, only after correct, after the instruction of reception user's input data to be processed correctly confirm instruction, just this is waited for The data of processing are sent to Truth cards manager;If user confirms that the data to be processed are incorrect, can directly take The secondary data interaction that disappears with this improves the safety of data interaction.Cutting ferrule is received to be used to indicate the data after second processing just True confirmation instruction can be that the confirmation physical button being provided separately on cutting ferrule generates, or can be on the touch screen of cutting ferrule Confirmation virtual key generate, selected in the menu perhaps shown on cutting ferrule screen confirmation function generation or can be with The voice confirmation that receives for the voice acquisition device (such as Mike) of cutting ferrule indicates and generates when being verified rear, Huo Zheke Think that the fingerprint acquisition device of cutting ferrule receives fingerprint identification and indicates and generate after being verified, or can be the rainbow of cutting ferrule Film acquisition device receives iris confirmation and indicates and generate after being verified, it is, of course, also possible to generate for other any modes , in the present invention and with no restriction.
Truth cards manager receives the data that cutting ferrule is sent, and utilizes Truth cards manager end safe transmission key pair The data received are sent to the Truth cards chosen after carrying out second processing;Specifically, Truth cards manager will be to be processed Data be sent to the Truth cards chosen, so that the Truth cards chosen handle data to be processed.
The Truth cards chosen receive the data that Truth cards manager end is sent, and will obtain after processing after being handled Data be sent to Truth cards manager;Specifically, the Truth cards chosen handle data to be processed, the processing For the scheme of the processing of existing smart card, details are not described herein.
Truth cards manager receives the data that the Truth cards chosen are sent, and utilizes Truth cards manager end safety Transmission key is sent to cutting ferrule after carrying out the first processing to the data received;
Cutting ferrule receives the data that Truth cards manager is sent, and is received using cutting ferrule end the second safe transmission key pair Data carry out second processing after, recycle the first safe transmission of cutting ferrule end key pair second processing after data carry out first at Simulation card is sent to after reason;
It simulates card and receives the data that cutting ferrule is sent, and the data received using simulation Card-terminal safe transmission key pair Transaction terminal is sent to after carrying out second processing.Specifically, transaction terminal receives after Truth cards treated data, can It is handled with the demand according to specific implementation scene, such as withdrawal note output is transferred accounts, and is swiped the card and is withholdd, supplements operation with money etc..
Based on above-mentioned data interaction process, a variety of different types of true cards can be may be implemented by a simulation card The function of piece when user carries out data interaction, need to only carry simulation card and cutting ferrule, can be complete without carrying Truth cards At raising convenience and safety.
Cutting ferrule can prompt the information for needing to confirm in data exchange process, and user can hand over data as a result, The information that needs during mutually confirm executes interaction after being confirmed again, to guarantee the authenticity of data interaction, improves peace Quan Xing.
In data transmission procedure, data interaction is carried out between simulation card, cutting ferrule and Truth cards manager and is passed through Safe transmission key carries out encryption and decryption and/or verification operation, to guarantee the safety and integrality of data transmission.
Further, since can choose use and the matched Truth cards of transaction terminal, user in the prior art can solve It does not carry with the matched Truth cards of transaction terminal and unnecessary expense expenditure (such as bank's inter-bank withdrawal service charge for generating Deng).
Certainly, above-mentioned specific implementation is only disclosed from transaction terminal to Truth cards, the list of Truth cards to transaction terminal Secondary data interaction, in practical applications, it is understood that there may be multiple data interaction, interaction flow is similar to above-mentioned single data interaction, In multiple data interaction, whether can be needed to confirm according to interactive data the number for whether prompting interaction at cutting ferrule is arranged in According to come the authenticity that guarantees interaction data.
Six, it trades:
Using data interaction framework of the invention, can also realizing transaction, (such as ATM machine withdrawal is transferred accounts, POS machine is swiped the card Deng) etc. operation, a variety of variety classes can be thus achieved and really block to facilitate user only to carry cutting ferrule of the invention and simulation card The transaction of piece, facilitates user to carry, and avoids loss of assets caused by Truth cards are lost.
The following provide a kind of particular transactions processes, but the present invention is not limited thereto:
Cutting ferrule obtains cutting ferrule end Truth cards information list, wherein cutting ferrule end Truth cards information list is from true card The Truth cards manager end Truth cards information list obtained in piece manager;Specifically, optionally, before this step, The operation of cutting ferrule booting, cutting ferrule login Truth cards manager can also be performed, details are not described herein, specifically may refer to above-mentioned Related cutting ferrule booting and cutting ferrule log in the associated description of Truth cards manager.In this step, it is true to obtain cutting ferrule end for cutting ferrule Card image list can also include the steps that cutting ferrule updates cutting ferrule end Truth cards information list, also repeat no more herein, have Body may refer to the associated description that above-mentioned cutting ferrule updates cutting ferrule end Truth cards information list.Cutting ferrule is from Truth cards manager After the Truth cards manager end Truth cards information list of acquisition, store it in the storage region of cutting ferrule, as cutting ferrule Truth cards information list is held, needs to prompt (such as display or voice broadcasting etc.) cutting ferrule end Truth cards information column in cutting ferrule When table, the cutting ferrule end Truth cards information list can be directly acquired from local, improve the processing speed of cutting ferrule.
Cutting ferrule prompts cutting ferrule end Truth cards information list;Specifically, cutting ferrule using itself display device or by Exterior display device show cutting ferrule end Truth cards information list or cutting ferrule using the voice playing device of itself or by External voice playing device voice, which plays (such as loudspeaker play or by headset earpiece broadcasting etc.) cutting ferrule end Truth cards, to be believed List is ceased, so that user needs Truth cards to be used according to cutting ferrule end Truth cards information list when selecting to trade, Facilitate user to select, enhances user experience.
Cutting ferrule receives Truth cards selection instruction, determines the Truth cards chosen;And simulation card receives transaction terminal The data of transmission, and card is sent to after carrying out the first processing using the data that simulation Card-terminal safe transmission key pair receives Set;Specifically, the received Truth cards selection instruction of cutting ferrule can be that the selection physical button being provided separately on cutting ferrule generates , it perhaps can be that selection virtual key on the touch screen of cutting ferrule generates or can be the dish that is shown on cutting ferrule screen The menu item for indicating selection function is chosen to generate in list.Cutting ferrule receives Truth cards selection instruction, determines the true card chosen Piece, cutting ferrule realize that data are transmitted with the Truth cards chosen via Truth cards manager.In addition, in process of exchange, by mould Quasi- card and transaction terminal (such as ATM machine, POS machine etc.) are attached (contact interface or non-contact interface), are simulated Card receives the data that transaction terminal is sent, which can be transaction data to be processed (such as withdrawal amount, deducted amount Deng), so that subsequent user confirms whether the transaction data to be processed is correct.In addition, receiving transaction terminal hair in simulation card Before the transaction data to be processed sent, simulation card can also receive the Truth cards that the acquisition that transaction terminal is sent is chosen Truth cards information request, cutting ferrule receives the data that simulation card is sent, and is docked using cutting ferrule end the first safe transmission key After the data that receive carry out second processing, the data after recycling the second safe transmission of cutting ferrule end key pair second processing carry out the Truth cards manager is sent to after one processing, Truth cards manager receives the data that cutting ferrule is sent, and utilizes Truth cards The data that manager end safe transmission key pair receives are sent to the Truth cards chosen after carrying out second processing, and that chooses is true Real card receives the data that Truth cards manager end is sent, and the Truth cards information that will acquire is sent to Truth cards management Device, Truth cards manager receives the data that the Truth cards chosen are sent, and utilizes Truth cards manager end safe transmission The data that key pair receives are sent to cutting ferrule after carrying out the first processing, and cutting ferrule receives the data that Truth cards manager is sent, And after the data received using cutting ferrule end the second safe transmission key pair carry out second processing, the first safety of cutting ferrule end is recycled Transmission key is sent to simulation card after carrying out the first processing to the data after second processing, and simulation card receives what cutting ferrule was sent Data, and it is sent to transaction terminal after carrying out second processing using the data that simulation Card-terminal safe transmission key pair receives, Transaction terminal gets the Truth cards information for the Truth cards chosen as a result, is handed over so as to subsequent for the Truth cards Easily.
Cutting ferrule receives the data that simulation card is sent, and the data received using cutting ferrule end the first safe transmission key pair After carrying out second processing, data after prompting second processing, and receive and be used to indicate the data after second processing and correctly confirm After instruction, true card is sent to after carrying out the first processing using the data after the second safe transmission key pair second processing of cutting ferrule end Piece manager;Specifically, cutting ferrule can show transaction data to be processed, can also be played with voice (such as loudspeaker play or Pass through headset earpiece to play etc.) transaction data to be processed, so that user confirms whether the transaction data to be processed is correct, only Have after correct, it is just that this is to be processed after the instruction of reception user's input transaction data to be processed correctly confirms instruction Transaction data is sent to Truth cards manager;If user confirms that the transaction data to be processed is incorrect, can be direct Cancel the transaction, with this, improves the safety of transaction.Cutting ferrule is received to be used to indicate the data after second processing correctly really Recognizing instruction can be that the confirmation physical button being provided separately on cutting ferrule generates, or can be the confirmation on the touch screen of cutting ferrule Virtual key generate, in the menu perhaps shown on cutting ferrule screen select confirmation function generation or can be cutting ferrule Voice acquisition device (such as Mike) the voice confirmation that receives indicate and while being verified rear generates, or can be card The fingerprint acquisition device of set receives fingerprint identification and indicates and generate after being verified, or can be the iris capturing of cutting ferrule Device receives iris confirmation and indicates and generate after being verified, it is, of course, also possible to generated for other any modes, at this In invention and with no restriction.
Truth cards manager receives the data that cutting ferrule is sent, and utilizes Truth cards manager end safe transmission key pair The data received are sent to the Truth cards chosen after carrying out second processing;Specifically, Truth cards manager will be to be processed Transaction data be sent to the Truth cards chosen, so that the Truth cards chosen handle transaction data to be processed.
The Truth cards chosen receive the data that Truth cards manager end is sent, and carrying out will be at transaction after trading processing The data obtained after reason are sent to Truth cards manager;Specifically, the Truth cards chosen to transaction data to be processed into Row trading processing, the trading processing are the scheme of the trading processing of existing smart card, and details are not described herein.
Truth cards manager receives the data that the Truth cards chosen are sent, and utilizes Truth cards manager end safety Transmission key is sent to cutting ferrule after carrying out the first processing to the data received;
Cutting ferrule receives the data that Truth cards manager is sent, and is received using cutting ferrule end the second safe transmission key pair Data carry out second processing after, recycle the first safe transmission of cutting ferrule end key pair second processing after data carry out first at Simulation card is sent to after reason;
It simulates card and receives the data that cutting ferrule is sent, and the data received using simulation Card-terminal safe transmission key pair Transaction terminal is sent to after carrying out second processing.Specifically, transaction terminal receives the data after Truth cards trading processing Afterwards, this transaction, such as withdrawal note output can be completed according to existing transaction flow, are transferred accounts, are swiped the card and withhold.
Based on above-mentioned transaction flow, a variety of different types of Truth cards can be may be implemented by a simulation card Function when user trades, need to only carry simulation card and cutting ferrule, can complete to trade without carrying Truth cards, mention Height transaction convenience and safety.
Cutting ferrule can prompt the information for needing to confirm in process of exchange, and user can be in process of exchange as a result, The information that confirms of needs confirmed after execute transaction again, to guarantee the authenticity of transaction, improve safety.
In data transmission procedure, data interaction is carried out between simulation card, cutting ferrule and Truth cards manager and is passed through Safe transmission key carries out encryption and decryption and/or verification operation, to guarantee the safety and integrality of data transmission.
Further, since can choose use and the matched Truth cards of transaction terminal, user in the prior art can solve It does not carry with the matched Truth cards of transaction terminal and unnecessary expense expenditure (such as bank's inter-bank withdrawal service charge for generating Deng).
Certainly, above-mentioned specific implementation is only disclosed from transaction terminal to Truth cards, the list of Truth cards to transaction terminal Secondary data interaction, in practical applications, it is understood that there may be multiple data interaction, interaction flow is similar to above-mentioned single data interaction, In multiple data interaction, whether can be needed to confirm according to interactive data the number for whether prompting interaction at cutting ferrule is arranged in According to come the authenticity that guarantees interaction data.
In all embodiments of the invention, normal data interactive process all between cutting ferrule and simulation card, simulation Card is respectively positioned within the scope of the efficient communication of cutting ferrule, if cutting ferrule detects that simulation card has exceeded the efficient communication model of cutting ferrule It encloses, then cutting ferrule can be prompted or cutting ferrule will be prompted to information and be sent to the user terminal (such as smart phone, tablet computer Deng) at prompted, so that the position for prompting user to simulate card occurs abnormal, thus improve simulation card safety in utilization.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiment or examples in can be combined in any suitable manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art are not departing from the principle of the present invention and objective In the case where can make changes, modifications, alterations, and variations to the above described embodiments within the scope of the invention.The scope of the present invention By appended claims and its equivalent limit.

Claims (10)

1. a kind of data interaction system characterized by comprising simulation card, cutting ferrule and Truth cards manager;
The cutting ferrule, for obtaining cutting ferrule end Truth cards information list;Prompt the cutting ferrule end Truth cards information list;It connects Truth cards selection instruction is received, determines the Truth cards chosen;Wherein, the cutting ferrule end Truth cards information list is the card Cover the Truth cards manager end Truth cards information list obtained from the Truth cards manager, the Truth cards pipe Reason device end Truth cards information list includes the Truth cards information for the Truth cards connecting with the Truth cards manager;
The simulation card, for receive transaction terminal transmission the first data, and by the cutting ferrule be sent to it is described really Card management device;
The Truth cards manager, first data sent for receiving the simulation card, and it is sent to the choosing In Truth cards;The second data that the Truth cards chosen described in reception are sent, and the mould is sent to by the cutting ferrule Quasi- card;
The simulation card is also used to receive second data that the Truth cards manager is sent, and is sent to described Transaction terminal.
2. system according to claim 1, which is characterized in that
The cutting ferrule is also used to establish secure connection with the simulation card, obtain between the cutting ferrule and the simulation card Carry out cutting ferrule end the first safe transmission key of data security transmission;
The simulation card is also used to establish secure connection with the cutting ferrule, obtains between the cutting ferrule and the simulation card Carry out the simulation Card-terminal safe transmission key of data security transmission.
3. system according to claim 2, which is characterized in that
The cutting ferrule is established the first secure connection of secure connection and is referred to specifically for sending to be used to indicate to the simulation card It enables, wherein the first secure connection instruction includes: that the cutting ferrule utilizes the simulation card public key in simulation card certificate to card Set the first binding factor of end and the first connection random factor of generation carry out the first connection ciphertext of encryption acquisition, the cutting ferrule The of signature acquisition is carried out to first binding factor of cutting ferrule end and the first connection random factor using cutting ferrule private key One connection signature;
The simulation card is specifically used for receiving the first secure connection instruction, using simulation card private key to described first Connection ciphertext is decrypted, and obtains cutting ferrule end first and binds decryption factor and the first connection decryption random factor;Utilize cutting ferrule Described in cutting ferrule public key, the cutting ferrule end first binding decryption factor and the first connection decryption random factor pair in certificate First connection signature is verified;Verify the first connection signature it is correct after, verify the binding of cutting ferrule end first decryption because Whether son and simulation Card-terminal binding factor are identical;It verifies the cutting ferrule end first and binds decryption factor and the simulation Card-terminal After binding factor is identical, the second connection random factor is generated;Using the cutting ferrule public key in the cutting ferrule certificate to described The one connection decryption random factor and the second connection random factor carry out encryption and obtain the second connection ciphertext, utilize analog card Piece private key carries out signature to the first connection decryption random factor and the second connection random factor and obtains the second connection Signature;The response of the first secure connection is sent to the cutting ferrule, wherein the first secure connection response includes: second company Connect ciphertext and the second connection signature;
The cutting ferrule, is specifically also used to receive the first secure connection response, is connected using the cutting ferrule private key to described second It connects ciphertext to be decrypted, the first connection decryption random factor and the second connection decryption random factor after being decrypted;Using institute State the simulation card public key in simulation card certificate, the first connection decryption random factor and described second after the decryption Second connection signature described in connection decryption random factor pair is verified;After verifying the second connection signature correctly, institute is verified Whether the first connection decryption random factor after stating decryption with described first connect random factor identical;After verifying the decryption After the first connection decryption random factor is identical as the first connection random factor, at least with the second connection decryption random The factor generates the first safe transmission of cutting ferrule end key between the cutting ferrule and the simulation card;
The simulation card is specifically also used to generate the cutting ferrule and the simulation at least with the second connection random factor The simulation Card-terminal safe transmission key between card.
4. system according to claim 2, which is characterized in that
The cutting ferrule connects random factor specifically for receiving the third that the simulation card that the simulation card is sent generates And simulation card unique identification;It sends to be used to indicate to the simulation card and establishes the second secure connection of secure connection and refer to It enables, wherein second secure connection instruction includes: that cutting ferrule unique identification, the cutting ferrule utilize the mould in simulation card certificate Quasi- card public key carries out the third of encryption acquisition to the 4th connection random factor of third connection random factor and generation Connect ciphertext, the cutting ferrule using cutting ferrule private key to the third connect random factor and it is described 4th connection random factor into The third that row signature obtains connects signature;
The simulation card is specifically used for receiving second secure connection instruction, judge the cutting ferrule unique identification whether It simulates in Card-terminal list of bindings;If the cutting ferrule unique identification utilizes simulation in the simulation Card-terminal list of bindings Third connection ciphertext is decrypted in card private key, obtains the third connection decryption random factor and the 4th connection RANDOM SOLUTION The close factor;At random using cutting ferrule public key, the third connection decryption random factor and the 4th connection in cutting ferrule certificate Decryption factor verifies third connection signature;After verifying the third connection signature correctly, verifies the third and connect Whether connecing the decryption random factor, with the third to connect random factor identical;If the third connection decryption random factor and institute It is identical to state third connection random factor, using the simulation card private key to the third connection decryption random factor and described The 4th connection decryption random factor carries out signature and obtains the 4th connection signature;The response of the second secure connection is sent to the cutting ferrule, Wherein, the second secure connection response includes: the 4th connection signature;
The cutting ferrule is specifically also used to receive the second secure connection response, described in the simulation card certificate Simulation card public key, third connection random factor and the 4th connection random factor test the 4th connection signature Card;After verifying the 4th connection signature correctly, bound at least with the 4th connection random factor and cutting ferrule end first The factor generates the first safe transmission of cutting ferrule end key between the cutting ferrule and the simulation card;
The simulation card is specifically also used at least with the 4th connection decryption random factor and simulation Card-terminal binding The factor generates the simulation Card-terminal safe transmission key between the cutting ferrule and the simulation card;
The cutting ferrule, be specifically also used to using the connection random factor of third described in the first safe transmission of cutting ferrule end key pair with And the simulation card is sent to after the first processing of the 4th connection random factor progress;
The simulation card is specifically also used to utilize the connection RANDOM SOLUTION of third described in the simulation Card-terminal safe transmission key pair The close factor and the 4th connection decryption random factor are sent to the cutting ferrule after carrying out the first processing;
The cutting ferrule is specifically also used to receive the data that the simulation card is sent, and is passed using first safety of cutting ferrule end Data that defeated key pair receives carry out second processing, the data after comparing second processing connect with the third random factor with And it is described 4th connection random factor it is whether identical;
The simulation card is specifically also used to receive the data that the cutting ferrule is sent, and is passed safely using the simulation Card-terminal Data that defeated key pair receives carry out second processing, the data after comparing second processing connect with the third decryption random because Whether the sub and described 4th connection decryption random factor is identical.
5. system according to claim 1, which is characterized in that
The cutting ferrule is also used to establish secure connection with the Truth cards manager, obtains the cutting ferrule and the true card Cutting ferrule end the second safe transmission key of data security transmission is carried out between piece manager;
The Truth cards manager is also used to establish secure connection with the cutting ferrule, obtains the cutting ferrule and the true card The Truth cards manager end safe transmission key of data security transmission is carried out between piece manager.
6. system according to claim 5, which is characterized in that
The cutting ferrule is established the third of secure connection and is connected safely specifically for sending to be used to indicate to the Truth cards manager Connect instruction, wherein the third secure connection instruction includes: that the cutting ferrule utilizes the true card in Truth cards manager certificate Piece manager public key carries out the 5th of encryption acquisition to the second binding factor of cutting ferrule end and the 5th connection random factor of generation Ciphertext is connected, the cutting ferrule is using cutting ferrule private key to second binding factor of cutting ferrule end and the 5th connection random factor Carry out the 5th connection signature of signature acquisition;
The Truth cards manager is specifically used for receiving the third secure connection instruction, private using Truth cards manager Key to it is described 5th connection ciphertext be decrypted, obtain cutting ferrule end second bind decryption factor and the 5th connection decryption random because Son;Utilize cutting ferrule public key, the cutting ferrule end second binding decryption factor and the 5th connection RANDOM SOLUTION in cutting ferrule certificate 5th connection signature described in close factor pair is verified;Verify the 5th connection signature it is correct after, verify the cutting ferrule end the Whether two binding decryption factors and Truth cards manager end binding factor are identical;Verify the cutting ferrule end second binding decryption because It is sub it is identical as Truth cards manager end binding factor after, generate the 6th connection random factor;Utilize the cutting ferrule certificate In the cutting ferrule public key to it is described 5th connection the decryption random factor and it is described 6th connection random factor carry out encryption obtain The 6th connection ciphertext, using the Truth cards manager private key to the 5th connection decryption random factor and described the Six connection random factors carry out signature and obtain the 6th connection signature;The response of third secure connection is sent to the cutting ferrule, wherein institute Stating the response of third secure connection includes: the 6th connection ciphertext and the 6th connection signature;
The cutting ferrule, is specifically also used to receive the third secure connection response, is connected using the cutting ferrule private key to the described 6th It connects ciphertext to be decrypted, the 5th connection decryption random factor and the 6th connection decryption random factor after being decrypted;Using institute State the Truth cards manager public key in Truth cards manager certificate, the 5th connection decryption random after the decryption because 6th connection signature described in the sub and described 6th connection decryption random factor pair is verified;Verify the 6th connection signature just After really, whether the 5th connection decryption random factor after verifying the decryption with the described 5th connect random factor identical;Verifying After the decryption the 5th connection the decryption random factor with it is described 5th connect random factor it is identical after, at least with the described 6th It is close that the connection decryption random factor generates second safe transmission of cutting ferrule end between the cutting ferrule and the Truth cards manager Key;
The Truth cards manager is specifically also used to generate the cutting ferrule and institute at least with the 6th connection random factor State the Truth cards manager end safe transmission key between Truth cards manager.
7. system according to claim 5, which is characterized in that
The cutting ferrule, the 7th generated specifically for receiving the Truth cards manager that the Truth cards manager is sent Connect random factor and Truth cards manager unique identification;Foundation safety is used to indicate to Truth cards manager transmission The 4th secure connection instruction of connection, wherein the 4th secure connection instruction includes: cutting ferrule unique identification, cutting ferrule benefit With the Truth cards manager public key in Truth cards manager certificate to the of the 7th connection random factor and generation Eight connection random factors carry out encryption acquisition the 7th connection ciphertext, the cutting ferrule using cutting ferrule private key to it is described 7th connection with The machine factor and the 8th connection random factor carry out the 7th connection signature of signature acquisition;
The Truth cards manager is specifically used for receiving the 4th secure connection instruction, judges the cutting ferrule unique identification Whether in the list of bindings of Truth cards manager end;If the cutting ferrule unique identification is tied up at Truth cards manager end Determine in list, the 7th connection ciphertext is decrypted using Truth cards manager private key, obtains the 7th connection RANDOM SOLUTION The close factor and the 8th connection decryption random factor;Utilize cutting ferrule public key, the 7th connection decryption random in cutting ferrule certificate 7th connection signature described in the factor and the 8th connection decryption random factor pair is verified;Verify the 7th connection label After name is correct, whether verifying the 7th connection decryption random factor, with the described 7th to connect random factor identical;If described The 7th connection decryption random factor is identical as the 7th connection random factor, using the Truth cards manager private key to institute It states the 7th connection decryption random factor and the 8th connection decryption random factor carries out signature and obtains the 8th connection signature;To The cutting ferrule sends the response of the 4th secure connection, wherein the 4th secure connection response includes: the 8th connection signature;
The cutting ferrule is specifically also used to receive the 4th secure connection response, using in the Truth cards manager certificate The Truth cards manager public key, the 7th connection random factor and it is described 8th connection random factor to it is described 8th connection Signature is verified;After verifying the 8th connection signature correctly, at least with the 8th connection random factor and cutting ferrule The second binding factor is held to generate the second safe transmission of cutting ferrule end key between the cutting ferrule and the Truth cards manager;
The Truth cards manager is specifically also used at least with the 8th connection decryption random factor and Truth cards Manager end binding factor generates the safety of the Truth cards manager end between the cutting ferrule and the Truth cards manager Transmission key;
The cutting ferrule, be specifically also used to using the 7th connection random factor described in the second safe transmission of cutting ferrule end key pair with And the Truth cards manager is sent to after the first processing of the 8th connection random factor progress;
The Truth cards manager is specifically also used to utilize described in the safe transmission key pair of Truth cards manager end the The seven connection decryption random factors and the 8th connection decryption random factor are sent to the cutting ferrule after carrying out the first processing;
The cutting ferrule is specifically also used to receive the data that the Truth cards manager is sent, and utilizes the cutting ferrule end second The data that safe transmission key pair receives carry out second processing, and the data after comparing second processing connect random with the described 7th Whether the factor and the 8th connection random factor are identical;
The Truth cards manager is specifically also used to receive the data that the cutting ferrule is sent, and utilizes the Truth cards pipe The data that reason device end safe transmission key pair receives carry out second processing, and the data and the described 7th after comparing second processing connect It connects the decryption random factor and whether the 8th connection decryption random factor is identical.
8. according to the described in any item systems of claim 2 to 4, which is characterized in that
The cutting ferrule is also used to before the cutting ferrule and the simulation card establish secure connection, holds with the simulation card Row bindings.
9. system according to claim 8, which is characterized in that
The cutting ferrule, specifically for receiving the trigger command for being used to indicate and being bound with the simulation card;To the simulation Card sends the first binding instruction, wherein the first binding instruction include: the first binding for generating of the cutting ferrule it is random because Son, cutting ferrule certificate and cutting ferrule unique identification;
The simulation card is specifically used for receiving the first binding instruction, be tested using root certificate the cutting ferrule certificate Card;Verify the cutting ferrule certificate it is legal after, generate second binding random factor;Utilize the cutting ferrule public key pair in the cutting ferrule certificate The first binding random factor and the second binding random factor carry out encryption and obtain the first binding ciphertext, utilize simulation Card private key carries out the first binding of signature acquisition to the first binding random factor and the second binding random factor and signs Name;The first binding response is sent to the cutting ferrule, wherein first binding response includes: the first binding ciphertext, described First binding signature, simulation card certificate and simulation card unique identification;
The cutting ferrule is specifically also used to receive first binding response, is carried out using root certificate to the simulation card certificate Verifying;Verify the simulation card certificate it is legal after, using the cutting ferrule private key to it is described first binding ciphertext be decrypted, obtain Obtain the first binding decryption random factor and the second binding decryption random factor;Utilize the simulation card in the simulation card certificate Public key, it is described first binding the decryption random factor and it is described second binding decryption random factor pair described in first binding sign into Row verifying;After verifying the first binding signature correctly, the first binding decryption random factor and first binding are verified Whether random factor is identical;Verify it is described first binding the decryption random factor with it is described first bind random factor it is identical after, mention Show the simulation card unique identification;It receives for confirming the correct trigger command of the simulation card unique identification, utilizes institute It states cutting ferrule private key to sign to the first binding random factor and the second binding decryption random factor, obtains second Binding signature, and the storage simulation card unique identification, the first binding factor of the simulation card certificate and cutting ferrule end To the first list of bindings of cutting ferrule end, wherein first binding factor of cutting ferrule end is the second binding decryption random factor;To The simulation card sends the second binding signature;
The simulation card is specifically also used to receive the second binding signature, utilizes the cutting ferrule in the cutting ferrule certificate Public key, the first binding random factor and the second binding random factor verify the second binding signature;Verifying After the second binding signature is correct, store the cutting ferrule unique identification, the cutting ferrule certificate and the binding of simulation Card-terminal because Son extremely simulation Card-terminal list of bindings, wherein the simulation Card-terminal binding factor is the second binding random factor.
10. according to the described in any item systems of claim 5 to 7, which is characterized in that
The cutting ferrule is also used to before the cutting ferrule and the Truth cards manager establish secure connection, and described true Card management device executes bindings.
CN201910477280.8A 2014-11-07 2015-02-03 Data interaction system Pending CN110458551A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2014106438768 2014-11-07
CN201410643876 2014-11-07
CN201510055586.6A CN105991536A (en) 2014-11-07 2015-02-03 Data interaction system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510055586.6A Division CN105991536A (en) 2014-11-07 2015-02-03 Data interaction system

Publications (1)

Publication Number Publication Date
CN110458551A true CN110458551A (en) 2019-11-15

Family

ID=57037069

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201510055586.6A Pending CN105991536A (en) 2014-11-07 2015-02-03 Data interaction system
CN201910477280.8A Pending CN110458551A (en) 2014-11-07 2015-02-03 Data interaction system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201510055586.6A Pending CN105991536A (en) 2014-11-07 2015-02-03 Data interaction system

Country Status (1)

Country Link
CN (2) CN105991536A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101490687A (en) * 2006-07-07 2009-07-22 桑迪士克股份有限公司 Control system and method using identity objects
CN101667240A (en) * 2009-08-20 2010-03-10 北京握奇数据系统有限公司 Intelligent card and card writing method, equipment and system thereof
CN103886455A (en) * 2012-12-19 2014-06-25 Nxp股份有限公司 Digital wallet device for virtual wallet
CN103944715A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data processing method based on agreement key
WO2014139406A1 (en) * 2013-03-15 2014-09-18 福建联迪商用设备有限公司 Method and system for safely downloading terminal master key (tmr)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102890794A (en) * 2011-07-21 2013-01-23 梁露露 Method and system for realizing integration of multiple cards for mobile terminal
CN102346861A (en) * 2011-09-16 2012-02-08 中兴通讯股份有限公司 Method and terminal for managing RFID (Radio Frequency Identification Device) card
CN102610043B (en) * 2012-02-09 2015-06-24 于梦媛 Mobile terminal with virtual card-swiping function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101490687A (en) * 2006-07-07 2009-07-22 桑迪士克股份有限公司 Control system and method using identity objects
CN101667240A (en) * 2009-08-20 2010-03-10 北京握奇数据系统有限公司 Intelligent card and card writing method, equipment and system thereof
CN103886455A (en) * 2012-12-19 2014-06-25 Nxp股份有限公司 Digital wallet device for virtual wallet
WO2014139406A1 (en) * 2013-03-15 2014-09-18 福建联迪商用设备有限公司 Method and system for safely downloading terminal master key (tmr)
CN103944715A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data processing method based on agreement key

Also Published As

Publication number Publication date
CN105991536A (en) 2016-10-05

Similar Documents

Publication Publication Date Title
CN104243451B (en) A kind of information interacting method, system and intelligent cipher key equipment
CN103532719B (en) Dynamic password generation method, dynamic password generation system, as well as processing method and processing system of transaction request
CN103516525B (en) Dynamic password generation method and system
CN104243162B (en) A kind of information interacting method, system and intelligent cipher key equipment
CN103116847B (en) Smart card, intelligent card transaction system and method with electronic signature functionality
CN105827656B (en) Identity identifying method and device based on NFC payment
CN105320891B (en) A kind of method and device of computer security loading system mirror image
CN104618114B (en) ID card information acquisition methods, apparatus and system
CN105635164B (en) The method and apparatus of safety certification
CN105989481B (en) Data interaction method and system
CN106027256B (en) A kind of identity card card reading response system
CN105991539B (en) Data interactive method and system
CN105989477A (en) Data interaction method
CN110458551A (en) Data interaction system
CN105991543B (en) Data interactive method
CN107292611B (en) Transaction method and system
CN105991530A (en) Data interaction system
CN105991527A (en) Data interaction system
CN110445748A (en) Data interactive method and system
WO2016124032A1 (en) Data exchange method
CN110417727A (en) Data interaction system
EP3217620A1 (en) Data interaction method and system
CN105989475A (en) Data interaction method
CN105991540A (en) Data interaction method and system
CN105991547A (en) Data interaction system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191115

RJ01 Rejection of invention patent application after publication