TWI224455B - End-to-end encryption procedure and module of M-commerce WAP data transport layer - Google Patents

End-to-end encryption procedure and module of M-commerce WAP data transport layer Download PDF

Info

Publication number
TWI224455B
TWI224455B TW90101316A TW90101316A TWI224455B TW I224455 B TWI224455 B TW I224455B TW 90101316 A TW90101316 A TW 90101316A TW 90101316 A TW90101316 A TW 90101316A TW I224455 B TWI224455 B TW I224455B
Authority
TW
Taiwan
Prior art keywords
encryption
key
server
wml
wap
Prior art date
Application number
TW90101316A
Other languages
Chinese (zh)
Inventor
Hung-Je Chiou
Original Assignee
Mitake Data Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitake Data Co Ltd filed Critical Mitake Data Co Ltd
Priority to TW90101316A priority Critical patent/TWI224455B/en
Priority to JP2001151632A priority patent/JP2002232415A/en
Application granted granted Critical
Publication of TWI224455B publication Critical patent/TWI224455B/en

Links

Abstract

The invention relates to an end-to-end encryption procedure and module of M-commerce WAP data transport layer, which are characterized by using wireless application protocol (WAP) as the technical platform to add an information password security system in compliance with a public key infrastructure at the current mobile information WML server end in the wireless content provider (WCP). The system comprises handset software encryption/decryption module, the cipher server of the WML server and key management subsystem. The added cipher server can go through the HTTP service of the WML server to dynamically download the public key generated by the handset software encryption/decryption module and the key management subsystem to customer premise equipment such as mobile phone or PDA through WAN and the WAP gateway of GSM/GPRS/CDMA digital mobile system. When user intends to proceed personal commerce, input commerce information based on the WML sent out by WML server and proceed encryption procedure through the handset encryption/decryption module and then upload it. After the information gets to the WML server, then proceed the reverse decryption with the corresponding private key from the cipher server. Further forward the plain text to WML server to execute the subsequent function test. By means of the added mechanism capable of realizing the end-to-end security of WAP M-commerce information exchange, simply improve the loophole of the 2-phase security of current WAP structure overnight.

Description

1224455 經濟部智慧財產局員工消費合作社印製 A7 B7_ 五、發明說明(1) 發明領域 本發明係一種行動商務(M-Commerce)WAP資料傳輸段 之端對端即時加密程序與模組,其特點為以無線通訊協定 (Wireless Application Protocol)為技術平台,於無線内 容服務提供者(WCP)之現有行動資訊伺服器WML Server端 增設一符合公開金錄架構(Public Key Infrastructure)之 資訊密碼安全系統。由此增設機制可實現WAP行動商務資 訊交換之端對端(End to End)安全性。 習知技術說明 WAP 無線軟體協定(Wireless Application Protocol) 制定了無線設備,如行動電話及PDA上執行網路資料傳輸 之規格。WAP主要是針對無線設備特性所開發,蓋其運作環 境不同於其他的設備,因而需專門制定之軟體協定以支 援。WAP的優良設計使其與現有大部分通信網路相容,包括 了 GSM、GPRS、PDC、CDPD、CDMA、TDMA、PHS、DECT 和第 三代行動電話(3G)標準等通信網路。在GSM系統下,WAP 可以藉由短訊服務(SMS)或 Circuit Switched Data (CSD) 執行,惟CSD之頻寬升級空間使其商務化應用成為可能。 WAP在無線網路上的操作模式有兩種,一種是作為客戶端 (Client)和網頁伺服器端(Web Server)之間的WAP閘道 (WAP Gateway);另一種是直接内嵌為客戶端所連接之WAp 資訊伺服斋(WAP Application Server)。在此客戶端 本紙張尺度適用中國國家鮮(CNS)A4規格(210 X 297公爱) " --------------------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 1224455 ί f Α7 Β7 五、發明說明(>) (Client)是指支援WAP的無線通訊設備’而網路伺服器(Web Server)則是指架設於網際網路上的網站伺服器。WAP閘道 器為安裝在GSM網路與WAN廣域網路之中介軟體,負責轉 換WAP及WTLS加密協定至HTTP及SSL/TLS加密協定,以 協助WML格式文件能自現有網際網路世界中取得;它包含 了 WML Encoder、WML Script Compi ler、Protocol Adapters 等元件(如圖1)。而WAP資訊伺服器(WAP Application Server)則内嵌WAP閘道(WAP Gateway)之功能,以直接提 供内容予客戶端。 然而由於兩段式安全機制(2-Phase Security)之架構 漏洞,使得行動商務資訊傳輸經WAP閘道器轉換為明文 (Plain Text)時面臨極大威脅。蓋現行兩段式機制分為 (l)Handset 至 WAP Gateway 傳輸段之 WTLS 加密及(2)WAP Gateway 至 WML Server 傳輸段之 SSL/TLS 加密,由於 WTLS 與TLS介面規格有異,因而WAP Gateway須將WTLS密文 還原為明文後再以TLS加密,此乃造成資料需在行動電話 系統業者處還原為明文後再加密之安全漏洞。緣此,本發 明致力於完成端對端(END TO END)之資料加密技術,以彌 補現有架構之不足並應用於WAP平台之商務交易中(如銀行 理財、股票交易、企業内部資訊流通及商業交易等),此 為本發明主要目標。 發明概述 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 1224455 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(4 ) 本發明係一種行動商務(M-C⑽merce)WAP資料傳輸段 之端對端即時加密程序與模組,其特點為以無線通訊協定 (Wireless Application Protocol)為技術平台,於無線内 容服務提供者(WCP)之現有行動資訊伺服器WML Server端 增设一符合公開金鑰架構(Public Key Infrastructure)之 資訊密碼安全系統,此系統含手機端(Handset)軟體加解密 模組’行動資訊祠服端加解密伺服程式(Cipher Server)及 金鑰管理子系統(Key Management)三者。增設之加解密祠 服程式可透過WML Server現有超本文傳輸協定之服務 (HTTP SERVICE),經廣域網路(WAN)及 GSM/GPRS/CDMA 等 數位行動系統之無線協定閘道器(WAP Gateway),動態下 傳Handset軟體加解密模組與金鑰管理子系統產生之公鑰 (PublicKey)至行動電話或數位助理等用戶端設備。值使 用者欲進行個人商務時,可依WML Server送出之無線標 記文件(WML)指示輸入商務資訊,並經該Handset加解密模 組進行加密程序後始上傳。待該資訊至WML Server端甫 由加解密倚服程式(Cipher Server)以對應之私鎗(Private Key)進行反向解密動作,再將明文交由WML Server執行後 續功能性程序。由此增設機制可實現WAP行動商務資訊交 換之端對端(End to End)安全性,一舉改善規行WAP(1.1 版)架構之兩段式安全機制(2-Phase Security)之漏洞。 依WAP論壇組織(WAP Forum)制定之WAP通訊協定層可 分為六層(如圖2),為求本發明之安全機制能得到最大執 行還境相容性及後續升級容易考量,本發明採用無線應用 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 1224455 A7 B7 五、發明說明(4*) (請先閱讀背面之注意事項再填寫本頁) 層(WAE)之頂層為開發平台及執行環境,此有別於現有之 WTLS機制建立於第三層安全層。由於WAE層乃植基於安全 層之上,故可使本發明除自身提供之安全性外,尚可享受 WTLS機制保護之雙重效果,此為本發明特色之一。 因此本發明中提供一種行動商務WAP資料傳輸段之端 對端加密模組,係採用無線應用層(WAE)之頂層為開發平台 及執行環境;該模組係用於無線内容服務提供者(WCP)之現 有行動資訊祠服器WML Server端增設資訊密碼安全系統, 含手機端(Handset)軟體加解密模組,行動資訊伺服端加解 密伺服程式(Cipher Server)及金鑰管理子系統(Key Management) 〇 本發明中尚提供一種行動商務WAP資料傳輸段之端對 端加密程序,係採用無線應用層(WAE)之頂層為開發平台及 執行環境;該程序包含步驟為: 無線内容服務提供者(WCP)之現有行動資訊伺服器WML Server端增設資訊密碼安全系統,含手機端(Handset)軟體 加解密程序,行動資訊伺服端加解密祠服程式(C i pher Server)及金鑰管理子系統(Key Management)。1224455 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7_ V. Description of the Invention (1) Field of the Invention The present invention is an end-to-end real-time encryption program and module for mobile commerce (M-Commerce) WAP data transmission segments. In order to use the Wireless Application Protocol as a technology platform, an existing information security system that complies with the Public Key Infrastructure is added to the existing mobile information server WML Server of the Wireless Content Service Provider (WCP). The additional mechanism can realize end-to-end security of WAP mobile business information exchange. Known technical description WAP The Wireless Application Protocol (WAP) specifies the specifications for wireless data transmission on wireless devices such as mobile phones and PDAs. WAP is mainly developed for the characteristics of wireless devices, and its operating environment is different from other devices, so it needs a specially developed software agreement to support it. The good design of WAP makes it compatible with most existing communication networks, including communication networks such as GSM, GPRS, PDC, CDPD, CDMA, TDMA, PHS, DECT, and the third generation mobile phone (3G) standards. Under the GSM system, WAP can be implemented by short message service (SMS) or Circuit Switched Data (CSD), but the bandwidth upgrade space of CSD makes commercial application possible. There are two modes of operation of WAP on the wireless network. One is to act as the WAP gateway between the client and the web server; the other is to be embedded directly into the client. Connected WAP Application Server (WAP Application Server). In this client, the paper size is applicable to China National Fresh (CNS) A4 specification (210 X 297 public love) " -------------------- Order ---- ----- line (Please read the notes on the back before filling this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 1224455 ί f Α7 Β7 V. Description of Invention (>) (Client) refers to the support of WAP 'Wireless communication equipment' and Web server refers to a web server installed on the Internet. WAP gateway is an intermediary software installed on GSM network and WAN wide area network. It is responsible for converting WAP and WTLS encryption protocols to HTTP and SSL / TLS encryption protocols to help WML format documents be obtained from the existing Internet world. It Contains WML Encoder, WML Script Compiler, Protocol Adapters and other components (see Figure 1). The WAP Application Server has a built-in WAP Gateway function to provide content directly to the client. However, due to the structural loophole of the 2-Phase Security mechanism, mobile business information transmission is faced with a great threat when it is converted to plain text by WAP gateway. Covering the current two-stage mechanism, it is divided into (l) WTLS encryption from the Handset to the WAP Gateway transmission section and (2) SSL / TLS encryption from the WAP Gateway to the WML Server transmission section. Because the WTLS and TLS interface specifications are different, the WAP Gateway must WTLS ciphertext is restored to plaintext and then encrypted with TLS. This is a security vulnerability that causes data to be restored to plaintext at the mobile phone system operator. For this reason, the present invention is committed to completing the end-to-end (END TO END) data encryption technology to make up for the shortcomings of the existing structure and apply it to business transactions on the WAP platform (such as bank wealth management, stock trading, enterprise internal information circulation and business Transactions, etc.), which is the main objective of this invention. SUMMARY OF THE INVENTION The paper size is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) -------------------- Order -------- -Line (Please read the precautions on the back before filling this page) 1224455 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Invention Description (4) This invention is a mobile business (M-C⑽merce) WAP data transmission section The end-to-end real-time encryption program and module is characterized by using the Wireless Application Protocol as the technology platform and adding a public funding in the existing mobile information server WML Server of the wireless content service provider (WCP) Public Key Infrastructure information password security system, this system contains the mobile phone (Handset) software encryption and decryption module 'mobile information temple server encryption and decryption server (Cipher Server) and key management subsystem (Key Management) Three. The added encryption and decryption service program can pass the existing WML Server HTTP protocol service, through the wide area network (WAN) and wireless protocol gateway (WAP Gateway) of digital mobile systems such as GSM / GPRS / CDMA, Dynamically download the public key generated by the Handset software encryption and decryption module and the key management subsystem (PublicKey) to client devices such as mobile phones or digital assistants. When users want to conduct personal business, they can input business information according to the wireless markup file (WML) instructions sent by WML Server, and upload the encrypted information through the Handset encryption and decryption module. After the information is transmitted to the WML Server, the encryption and decryption server (Cipher Server) performs the reverse decryption operation with the corresponding Private Key, and then the plaintext is sent to the WML Server for subsequent functional procedures. The added mechanism can realize the end-to-end security of WAP mobile business information exchange, and improve the loopholes of the 2-Phase Security mechanism that regulates the WAP (version 1.1) architecture in one fell swoop. The WAP communication protocol layer formulated according to the WAP Forum can be divided into six layers (as shown in Figure 2). In order to achieve the maximum security of the security mechanism of the present invention and compatibility with subsequent upgrades, the present invention adopts Wireless application This paper size applies to China National Standard (CNS) A4 specification (210 X 297 mm) -------------------- Order -------- -Line (please read the notes on the back before filling this page) 1224455 A7 B7 V. Description of the invention (4 *) (please read the notes on the back before filling this page) The top layer of the (WAE) is the development platform and implementation Environment, which is different from the existing WTLS mechanism built on the third layer of security. Since the WAE layer is based on the security layer, the present invention can enjoy the dual effects of WTLS mechanism protection in addition to the security provided by itself, which is one of the features of the present invention. Therefore, the present invention provides an end-to-end encryption module for the mobile business WAP data transmission segment, which uses the top layer of the wireless application layer (WAE) as the development platform and execution environment; the module is used for wireless content service providers (WCP) ) The existing mobile information temple server WML Server adds an information password security system, which includes a mobile phone (Handset) software encryption and decryption module, a mobile information server encryption and decryption server (Cipher Server) and a key management subsystem (Key Management Subsystem). ) 〇 The present invention also provides an end-to-end encryption program for the mobile business WAP data transmission segment, which uses the top layer of the wireless application layer (WAE) as the development platform and execution environment; the program includes steps: a wireless content service provider ( The existing mobile information server WML Server has added an information password security system, including a mobile phone (Handset) software encryption and decryption process, a mobile information server encryption and decryption server (Cipher Server), and a key management subsystem ( Key Management).

經濟部智慧財產局員工消費合作社印!M 發明說明 本發明係一種行動商務(M-C⑽merce)WAP資料傳輸段 之端對端即時加密程序與模組,其特點為以無線通訊協定 (Wireless Application Protocol)為技術平台,於無線内 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 1224455 A7 B7 __ 五、發明說明(< ) (請先閱讀背面之注意事項再填寫本頁) 容服務提供者(WCP)之現有行動資訊伺服器WML Server端 增設一符合公開金鎗架構(Public Key Infrastructure)之 資訊密碼安全系統(如圖3),由所增設之手機端(Handset) 軟體加解密模組、行動資訊伺服端加解密伺服程式(Cipher Server)及金鑰管理子系統(Key Management)三者可實現 WAP行動商務之端對端(End to End)安全性,一舉改善現行 WAP兩段式安全機制(2-Phase Security)之漏洞。再者本發 明採用公開金鑰機制之加解密原理,交互運用金鑰管理子 系統所產生之公鑰及私输不僅應用於加密目的,亦可達到 身份認證(CA)之不可否認性功能,由是使行動商務 (M-Commerce)實現的可能性朝前邁進一步。另外為解決公 開金鑰加解密效率偏低之缺點,本發明尚且於手機端 (Handset)軟體加解密模組中,增設一壓縮前置模組 (Pre-Compressor),以趨近於1/3之高壓縮比率及〇失真 率來處理原始明文資料,藉此以大幅提高手機端(Handset) 之執行效率,而提高本發明應用於行動商務之實用價值。 ❿本發明之開發平及作業平台 經濟部智慧財產局員工消費合#社印製 依WAP論壇組織(WAP Forum)制定之WAP通訊協定層可分為 六層(如圖2),茲將各層功能簡述於後: 1· WAE(Wireless Application Environment) : WAE 定義了 應用層 (ApplicationLayer)的通訊規約,是融合了 WWW的技術,並且針對無 線通訊的特性所發展的無線應用環境。WAE使得網路系統及内容提供 者,能透過微劉覽器(Micro Browser)來提供應用内容及服務。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消作社印製 1224455 A7 B7 五、發明說明(A ) 2. WSP(Wireless Session Protocol)' WSP是會議層(Session Layer)的通訊規約,提供兩種服務,包括架 構在WTP之上的持續連接服務,和架構在WDP之上的不持續連接服務。 3. WTP(Wireless Transaction Protocol): WTP是架設在WDP之上的交易層(Transaction Layer)的通訊規約, 其乃為了小型客戶端界面(如行動電話)所設計的。 4. WTLS(Wireless Transport Layer Security) · WTLS 是根據工業標準 TLS Protocol (即 Secure Sockets Layer,,SSL) 而制定的安全協定。WTLS是設計使用在傳輸層(Transport Layer)之 上的安全層(Security Layer),並針對較小頻寬之通訊環境作修正。 5. WDP(Wireless Datagram Protocol) · WDP是傳輸層(Transport Layer)的通訊協定,它適用於架設不同通訊技 術的數據月时务之上,都能提供WAP之上層通訊協定一共同之通訊介面。 而使包括應用層,會議層,安全層的通訊規約都能直接在WDP上運作。 6. Bearer(底層的數據服務): WAP被設計為針對國際上不同通訊技術均能支援之通訊協定,因此它能 架设於不同數據月时务上,包含短訊月呀务(SMS,Short Message Service), Packet Data,Circuit-switched Data 等。 ΐ 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ---------------------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 1224455 經濟部智慧財產局員工^費合作社印製 A7 B7 五、發明說明(9) 為求本發明之安全機制能得到最大執行還境相容性及 後續升級容易考量’本發明採用無線應用層(ME)之頂層 為開發平台及執行環境’此有別於現有之WTls機制建立於 第四層安全層。由於WAE層乃植基於安全層之上,故可使 本發明除自身提供之安全性外,尚可享受WTLS機制保護之 雙重效果,此為本發明特色之一。 WAE應用層執行環境可解譯WML標籤語言(Wireless Markup Language)及 WMLScript 描述語言(Wireless Markup Script Language),而為本發明安全機制所採用以 實作手機端(Handset)軟體加解密模組。行動電話端 WMLScr i pt語言之解譯器架構能夠透過堆疊記憶體(stack) 直接存取WML格式文件之資料變數(如圖4),由是使用者於 WML文件輸入之資料可由(Handset)加解密模組處理運算後 再上傳至遠端行動資訊伺服器WML Server,使得傳輸過程 受到加密保護。 籲本發明之資料壓縮機制 由於公開金输演算法演算流程煩複耗時,為促進行動 電話WAE執行環境效率並增進使用者便利性,本發明於 (Handset)軟體加解密模組中,增設一壓縮前置模組 (Pre-Compressor),以趨近1/3之高壓縮比率及〇失真率 處理WML文件之資料變數,藉此以大幅提高加Handset 加密程序之執行效率,亦提高本發明應用於行動商務之實 用價值’此亦為本發明重要特色之一。壓縮前置模組 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------------訂---------線 (請先閱讀背面之注意事項再填寫本寊) 經濟部智慧財產局負i消費合作社印製 1224455 A7 _B7_ 五、發明說明(Κ ) (Pre-Compressor)之基本原理乃是透過數碼--字碼轉換原 則搭配進位數制選擇技巧,將WML文字變數作高效率之精 巧轉換,以祈使產生最高壓縮比率。(如圖5)所示,為本壓 縮前置模組(Pre-Compressor)之壓縮流程釋例,該圖以行 動銀行轉帳交易為例,將原始總長度24字元之個人帳號資 料,以簡潔之流程壓縮為8字元長度之ANSI(美國國家標 準字集)字集,因此可在高壓縮速率下達成高壓縮比之目 標。 茲將壓縮前置模組(Pre-C⑽pressor)壓縮程序條列如下: 1) 將原始資料長度以8/9為單位分組為各單位字串 (UnitBuf) 2) 將每一單位字串轉為其所表示之十進位數值 (UnitVal) 3) 將各單位數值轉為十六進位單位字串(oxUni tBuf) 4) 將各十六進位單位字串(oxUni tBuf )之字元兩兩分 組為單位字組(oxCharBuf ) 5) 將各單位字組(oxCharBuf)轉為介於0〜255間之十 進位字碼值 6) 將各字碼值直接轉為對應之ANSI字集 上述步驟1)中原始資料長度以8/9為單位分組,乃是 基於行動電話WAE執行環境所之支援之最大資料型態長度 I 〇 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------I--I --------— — — — — —--· (請先閱讀背面之注意事項再填寫本頁) 1224455 A7 B7 五 ___ 經濟部智慧財產局員工消費合作社印製 發明說明(?) 為64位元,換算10進位值即為-2147483647〜2147483647 (請先閱讀背面之注意事項再填寫本頁) 之間,若以10進位文字資料表示須長度1 〇,因此原始資料 分組時為避免較耗時之溢位(Over Flow)運算故取8/9為單 位字串長。 籲本發明加密機制之理論基礎 如前所述,本發明乃於無線内容服務提供者(WCP)之現 有行動資訊伺服器WML Server端增設一符合公開金錄架構 (Public Key Infrastructure)之資訊密碼安全系統,此系 統含手機端(Handset)軟體加解密模組,行動資訊伺服端加 解密伺服程式(Cipher Server)及金餘管理子系統(Key Management)三者。考量現今密碼學技術,有二大類主流密 碼系統。第一類為對稱金输(Symmetric Key)密碼系統,第 二類為非對稱金餘(Asymmetric Key)或簡稱公開金输 (Public Key)密碼系統。對稱金鑰密碼系統加解密速度快 為其優點,但因其加密金鑰與解密金鑰為相同一把金鑰, 資訊的傳送方如何在加密之後,將該把加密金鍮以安全的 方式傳送給接收方,如何使雙方能共享該把秘密金錄,以 利其解密,是此密碼系統的一大問題(如圖6),因此對稱金 鑰密碼系統並不適用於多人登入之行動資訊伺服器WML Server,亦即並不適用於主從式(cl ient-Server)行動商務 之架構。 公開金鑰密碼系統則改善了對稱金鑰密碼系統的缺 點,其加密金餘與解密金输並非同把,每一對金输(Key Pair) 包含兩把相互對應的金输—可以公開的加密金錄(Pub 1 i c (ί 本紙張尺度適用中國國家標準(CNS)A4規格(210 χ 297公釐) ^4455 A7 五、發明說明( 須保持機密的解密金鑰(ρ_ 道,备任仞人…’f 讓可能與其通信的人知 _:方所公二::== 夺’可將訊息使用 後T,只有既定接收方所擁有,與: 幻又万不而要事先交換金鑰即可從畜 密通訊的特性。相反的,當&卩^事秘 之後,任何擁有與該「密;」;; ;:: =密餘」加密 將之解密,但因「密餘」!;:=::公鑰」者均可以 …… 有傳达方擁有,且保持機密不 ί /匕,以密餘所加密之訊息可視為傳送對m 之簽早。14 #公開金鎗密碼系統與數位簽章演曾Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs! M Description of the invention The invention is an end-to-end real-time encryption program and module for mobile business (M-C⑽merce) WAP data transmission segments, which is characterized by the Wireless Application Protocol ) Is a technology platform, and this paper standard is applicable to China National Standard (CNS) A4 specification (210 X 297 mm) 1224455 A7 B7 __ V. Description of the invention (<) (Please read the notes on the back before filling in this Page) The existing mobile information server WML Server of the Content Service Provider (WCP) adds an information password security system (see Figure 3) that complies with the Public Key Infrastructure, and the added mobile set (Handset) Software encryption / decryption module, mobile information server-side encryption / decryption server (Cipher Server) and key management subsystem (Key Management) can realize the end-to-end security of WAP mobile commerce and improve the current Vulnerabilities in WAP Two-Phase Security. Furthermore, the present invention uses the encryption and decryption principle of the public key mechanism, and the public key and private input generated by the key management subsystem are used not only for encryption purposes, but also to achieve the non-repudiation function of identity authentication (CA). It is the possibility of making M-Commerce a step forward. In addition, in order to solve the shortcomings of low encryption and decryption efficiency of the public key, the present invention also adds a Pre-Compressor to the Handset software encryption and decryption module to approach 1/3. The high compression ratio and zero distortion rate are used to process the original plaintext data, thereby greatly improving the execution efficiency of the mobile phone (Handset), and increasing the practical value of the invention applied to mobile commerce.开发 The development level and operating platform of the present invention are based on the consumption of employees of the Intellectual Property Bureau of the Ministry of Economic Affairs. The company prints the WAP communication protocol layers formulated according to the WAP Forum, which can be divided into six layers (see Figure 2). The brief description is as follows: 1. WAE (Wireless Application Environment): WAE defines the communication protocol of the Application Layer (ApplicationLayer), which is a wireless application environment that integrates WWW technology and is developed for the characteristics of wireless communication. WAE enables network systems and content providers to provide application content and services through the Micro Browser. This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) Printed by the Consumers 'Bureau of Intellectual Property Bureau of the Ministry of Economic Affairs 1224455 A7 B7 V. Invention Description (A) 2. WSP (Wireless Session Protocol)' WSP It is the communication protocol of the Session Layer. It provides two types of services, including a continuous connection service based on WTP and a discontinuous connection service based on WDP. 3. WTP (Wireless Transaction Protocol): WTP is a communication protocol built on top of WDP for the Transaction Layer. It is designed for small client interfaces (such as mobile phones). 4. WTLS (Wireless Transport Layer Security) · WTLS is a security protocol based on the industry standard TLS Protocol (ie, Secure Sockets Layer, SSL). WTLS is a security layer designed to be used on top of the Transport Layer, and is modified for smaller bandwidth communication environments. 5. WDP (Wireless Datagram Protocol) · WDP is a transport layer (Transport Layer) protocol. It is suitable for setting up monthly data services of different communication technologies. It can provide a common communication interface for WAP upper layer protocols. The communication protocols including the application layer, conference layer, and security layer can all operate directly on WDP. 6. Bearer (bottom data service): WAP is designed to be a communication protocol that can be supported by different communication technologies in the world, so it can be set up on different data month services, including short message service (SMS, Short Message Service) ), Packet Data, Circuit-switched Data, etc. ΐ This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) --------------------- Order -------- -Line (please read the notes on the back before filling this page) 1224455 Printed by the staff of the Intellectual Property Bureau of the Ministry of Economic Affairs ^ A7 B7 by the cooperative Fifth, the description of the invention (9) In order to achieve the maximum implementation of the security mechanism of the present invention Capacitive and subsequent upgrades are easy to consider 'the invention uses the top layer of the wireless application layer (ME) as the development platform and execution environment', which is different from the existing WTls mechanism and is built on the fourth layer of security layer. Since the WAE layer is based on the security layer, the present invention can enjoy the dual effects of WTLS mechanism protection in addition to the security provided by itself, which is one of the features of the present invention. The WAE application layer execution environment can interpret WML tag language (Wireless Markup Language) and WMLScript description language (Wireless Markup Script Language), and is used in the security mechanism of the present invention to implement a mobile phone (Handset) software encryption and decryption module. The WMLScr i pt language interpreter architecture of the mobile phone can directly access the data variables of the WML format file through the stack (see Figure 4). The data entered by the user in the WML file can be added by (Handset) The decryption module processes the calculation and uploads it to the remote mobile information server WML Server, so that the transmission process is protected by encryption. The data compression mechanism of the present invention is called to be complicated and time-consuming due to the calculation process of the open gold algorithm. In order to promote the environmental efficiency of mobile phone WAE execution and improve user convenience, the present invention adds a new one to the (Handset) software encryption and decryption module. The Pre-Compressor handles the data variables of WML files with a high compression ratio approaching 1/3 and a distortion rate of 0, thereby greatly improving the execution efficiency of the encryption program with Handset, and also improving the application of the present invention. 'Practical value in mobile commerce' This is also one of the important features of the invention. Compression front module This paper size applies to China National Standard (CNS) A4 specification (210 X 297 mm) -------------------- Order ----- ---- Line (Please read the notes on the back before filling in this card) Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs 1224455 A7 _B7_ V. The basic principle of the Pre-Compressor is through The digital-to-code conversion principle is combined with the decimal place selection technique to make WML text variables a highly efficient and exquisite conversion to pray for the highest compression ratio. (As shown in Figure 5), this is an example of the compression process of the Pre-Compressor. The figure uses mobile bank transfer transactions as an example, and the personal account information with a total length of 24 characters is simplified. The process is compressed to an 8-character ANSI (American National Standard Character Set) character set, so the goal of high compression ratio can be achieved at a high compression rate. The compression program of the Pre-C⑽pressor is as follows: 1) The original data length is grouped into unit strings (UnitBuf) in units of 8/9 2) Each unit string is converted to The decimal value indicated (UnitVal) 3) Convert each unit value to a hexadecimal unit string (oxUni tBuf) 4) Group the characters of each hexadecimal unit string (oxUni tBuf) into unit words Group (oxCharBuf) 5) Convert each unit block (oxCharBuf) to decimal word code values between 0 and 255 6) Convert each word code value directly to the corresponding ANSI character set The length of the original data in step 1) above is 8/9 is a unit group, which is based on the maximum data type length supported by the mobile phone WAE execution environment I 〇 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ----- --- I--I --------— — — — — — — (Please read the notes on the back before filling out this page) 1224455 A7 B7 5 ___ Employees ’Consumption of Intellectual Property, Ministry of Economic Affairs Cooperative cooperative printed invention description (?) Is 64-bit, converted to decimal value is -2147483647 ~ 2147483647 (please read first Note on the back, please fill in this page again). If the decimal data is expressed in decimal data, the length must be 10. Therefore, in order to avoid the time-consuming Over Flow calculation when grouping the original data, 8/9 is taken as the unit word. String length. Call for the theoretical basis of the encryption mechanism of the present invention. As mentioned above, the present invention adds an information password security in accordance with the Public Key Infrastructure to the existing mobile information server WML Server of the wireless content service provider (WCP). The system includes a mobile phone (Handset) software encryption and decryption module, a mobile information server encryption and decryption server (Cipher Server), and a key management subsystem (Key Management). Considering the current cryptographic technology, there are two main types of cryptographic systems. The first type is a symmetric golden key (Symmetric Key) cryptosystem, and the second type is an asymmetric key (Public Key) cryptosystem. The symmetric key cryptosystem has the advantages of fast encryption and decryption speeds, but because its encryption key and decryption key are the same key, how can the sender of the information send the encrypted key in a secure manner after encryption? To the receiver, how to enable the two parties to share the secret gold record for decryption is a major problem of this cryptosystem (see Figure 6), so the symmetric key cryptosystem is not suitable for multi-person login action information. The server WML Server, which is not applicable to the framework of the master-slave (cl ient-Server) mobile commerce. The public key cryptosystem improves the shortcomings of the symmetric key cryptosystem. Its encryption balance is not the same as the decryption gold loss. Each pair of key pairs (Key Pair) contains two corresponding gold losses—public encryption金 录 (Pub 1 ic (ί This paper size applies to the Chinese National Standard (CNS) A4 specification (210 x 297 mm) ^ 4455 A7 V. Description of the invention (the secret decryption key must be kept secret (ρ_), reserved for anyone) … 'F Lets people who may communicate with it know: 所 所 公公 二 :: ==' 'can use the message after T, only the intended recipient owns it, and: Never exchange the key beforehand The characteristics of animal confidential communication. On the contrary, when & 卩 ^ is secret, anyone who owns the "secret;";;;: == secret encryption will decrypt it, but because of "secret"!: = :: Public key "can be ... if it is owned by the transmitting party and kept confidential / dagger, the message encrypted by the secret can be regarded as the signature of the transmission of m. 14 #public golden gun password system and digital signature Zhang Yanzeng

Deffi-Hellman^RSA^SA^ ElGa.al ^ M-H Knaple^ R a b 111等。基於「公開金鑰密碼系統」,與不需事先交換金 餘,即可達「秘密通訊」的優點,本發明乃採用「公開金 線 餘密碼系統」理念設計適用於WAp傳輸架構之端對端二時 加密程序與模組(如圖7)。 籲本發明之加密系統機制 1 ·手機端(Handset)加解密模組及伺服端加解密伺服哭 (Cipher Server) 丨員 工 消 本發明乃於無線内容服務提供者(WCP,如銀行證券業 者)之現有行動資訊伺服器WML Server端增設之資訊资石馬 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 1224455 經濟_部1曰—意財產局員工消費合作社印製 A7 B7_ 五、發明說明(丨丨) 安全系統,含手機端(Handset)軟體加解密模組,行動資 訊伺服端加解密祠服程式(Cipher Server)及金输管理子系 統(Key Management)。當使用者透過WAP網路登入WCP之 WML Server時,WML Server可透過本行動資訊伺服端加 解密伺服程式(Cipher Server)針對不同計算機作業系統所 提供之行程間通訊介面(Inter-Process Communication Interface),如TCP/UDP通訊協定,COM物件模型介面, C0RBA物件模型介面,DDE動態資料交換及rpc遠端程序 呼叫等方式,通知加解密伺服程式(Cipher Server)負責開 啟Handset軟體加解密模組與金鑰管理子系統所維護該使 用者之公錄(Public Key) ’透過WML Server現有超本文協 定之傳輸服務(HTTP SERVICE), 經廣域網路(WAN)及 GSM/GPRS/CDMA等數位行動系統之無線協定閘道器(·ρ Gateway),下傳至行動電話或數位助理等用戶端設備。值 使用者欲送出個人商務資訊時,可先依無線標記文件(WML) 指示輸入商務資’並經已下載之Handset加解密模組搭 配使用者公鑰進行加密演算後始上傳。待該資訊至WML Server端甫由加解密伺服程式(Cipher Server)以對應之 私输(Private Key)進行反向解密動作,再將明文交由wml Server執行後續功能性程序(如圖8)。 反之,若須自WML Server'主動下傳個人商務資訊(如 查詢銀行帳戶餘額)時,則使用者須先輸入私鑰(Private Key)以存留於行動電話WAE執行環境之堆疊記憶體備用, 而WML Server將傳遞擬下傳之個人商務資料予加解密伺服 I; 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -- ---------————訂---------線 (請先閱讀背面之注意事項再填寫本頁) 1224455 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明()>) , 程式(Cipher Server) ’並通知其開啟Handset軟體加解密 模組與金鑰管理子系統所維護該使用者之公鑰(Public Key),以先行於Server端執行加密演算。再透過超本文 協定之傳輸服務下傳Handset軟體加解密模組及密文至用 戶端設備。此時再由存留於WAE執行環境之私鑰(Private Key)搭配密文進行解密動作,並將解密明文交由WML格式 文件顯示其原始結果。 2.金鑰管理系統(Key Management) 所有輔助公開金输密碼系統使用與應用服務的工作均 可視為公開金餘基磐運作架構的一部份,本發明之金输管 理子系統(Key Management)負責工作有a)金餘生成與建置 及b)金鑰共管。 a) 金鑰生成與建置 在金矯生成方面理想的金鑰必須具備隨機性’亦即其 生成的過程為極機密,而結果為不可測,且對於需求量較 大且需經常更新的金餘通常採錢隨機(pseud〇 rand〇m)程 序的生成方法。除了具借不可測性之外,本發明金錄管理 子系統(Key Management)尚滿足特定演算法要求,如脱 系統中之金鑰必須具備強化的質數(PrimeNumber)等性質。 b) 金鑰共管 在金鑰共管方面,電腦系統應用密碼技術於播案或資 料庫安全上,除了提供其機密性之外,尚需確保加密資料 --------------------訂---------線 (請先閱讀背面之注意事項再填寫本頁)Deffi-Hellman ^ RSA ^ SA ^ ElGa.al ^ M-H Knaple ^ R a b 111 and so on. Based on the "public key cryptosystem", the advantage of "secret communication" can be achieved without exchanging the balance in advance. The invention adopts the concept of "public key cryptosystem" to design end-to-end for WAp transmission architecture. Two-time encryption program and module (see Figure 7). Call for the encryption system mechanism of the present invention1. Handset encryption and decryption module and server encryption and decryption server Cipher Server 丨 This is the invention of wireless content service providers (WCP, such as bank securities industry) The information paper added on the existing mobile information server WML Server is based on the Chinese paper standard (CNS) A4 (210 X 297 mm) 1224455 Economy_Ministry 1—Printed by the Consumer Property Cooperative of Italy Property Bureau A7 B7_ V. Description of the invention (丨 丨) The security system includes a mobile phone (Handset) software encryption and decryption module, a mobile information server encryption and decryption service server (Cipher Server) and a key management subsystem (Key Management). When a user logs in to WCP WML Server through the WAP network, WML Server can use this mobile information server-side encryption and decryption server program (Cipher Server) to provide inter-process communication interfaces for different computer operating systems (Inter-Process Communication Interface) , Such as TCP / UDP communication protocol, COM object model interface, C0RBA object model interface, DDE dynamic data exchange and rpc remote program call, etc., inform the encryption and decryption server (Cipher Server) responsible for opening the Handset software encryption and decryption module and gold The key management subsystem maintains the user's public key ('Public Key') through WML Server's existing HTTP service, through the wide area network (WAN) and wireless of digital mobile systems such as GSM / GPRS / CDMA Protocol gateway (· ρ Gateway), which is downloaded to client devices such as mobile phones or digital assistants. Value When users want to send personal business information, they can first input business information according to the instructions of the wireless markup file (WML), and upload it after the downloaded Handset encryption and decryption module and the user's public key are used for encryption calculation. After the information is transmitted to the WML Server, the encryption and decryption server (Cipher Server) performs the reverse decryption operation with the corresponding Private Key, and then the plain text is sent to the WML Server for subsequent functional procedures (see Figure 8). Conversely, if it is necessary to actively download personal business information (such as querying bank account balance) from WML Server ', the user must first enter the Private Key to be stored in the stack memory of the mobile phone WAE execution environment for backup, and WML Server will pass the personal business data to be transmitted to the encryption and decryption server I; This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm)------------—— —Order --------- line (please read the notes on the back before filling this page) 1224455 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of Invention () >), Program ( (Cipher Server) 'and notify it to open the Handset software encryption and decryption module and the key management subsystem to maintain the user's public key (Public Key) to perform encryption calculations on the Server side in advance. Then, the Handset software encryption / decryption module and cipher text are transmitted to the client device through the transmission service beyond the agreement in this article. At this time, the private key (Private Key) stored in the WAE execution environment is used to decrypt the ciphertext, and the decrypted plain text is passed to the WML format file to display its original result. 2. Key Management System All the tasks of assisting the use and application services of the public gold coin cipher system can be regarded as part of the operating structure of the public gold base, Key Management of the present invention. Responsible for the work are a) generation and construction of gold surplus and b) co-management of keys. a) Key generation and construction The ideal key in terms of metal correction must have randomness, that is, its generation process is extremely confidential, and the result is unpredictable, and for gold with a large demand and which needs to be updated frequently I usually use the method of generating a random (pseudorandom) program. In addition to being unpredictable, the Key Management subsystem of the present invention also meets certain algorithm requirements. For example, the keys in the offline system must have enhanced Prime Number and other properties. b) Key co-management In terms of key co-management, computer systems apply cryptography to broadcast or database security. In addition to providing its confidentiality, it is also necessary to ensure encrypted data ------------ -------- Order --------- line (please read the notes on the back before filling this page)

X 297公釐) 1224455 A7 B7__ 五、發明說明(1¾) (請先閱讀背面之注意事項再填寫本頁) 的可還原性。本發明金输管理子系統(Key Management)體 現秘密共管(secret sharing)的機制,可將金输分成數個 金鑰影(shadows),只有在特定數目的餘影組合下方可還原 成原來金鑰,以防金鑰遺失或遭破壞時,則所有以此金鑰 加密的資料無法還原。 鲁本發明之加密機制與STK(SIM Toolkit)加密機制之比 較 經濟部智慧財產局員工消費合作社印製 基於「公開金鑰密碼系統」,與不需事先交換金鑰,即 可達「秘密通訊」的優點,本發明乃採用「公開金鑰密碼 系統」理念設計適用於WAP傳輸架構之端對端即時加密程 序與模組,此點迥異於傳統行動電話STK(SIM Tool kit) 傳輸之加密機制乃是採用對稱金鑰(Symmetric Key)密碼系 統(如 ΡΙΝΙ、PIN3、3DES) °SIMToolkit 全名為「Subscriber Identity Module Application Toolkit」(用戶識別應用 發展工具),其應用乃是透過行動電話公司與SIM卡製造商 合作,於用戶識別卡的微處理器上,燒錄或灌進加值服務 程式,使消費者客直接於手機目錄點選加值服務。由於S TK透過符合GSM Phase 2 +規格之手機發送短訊(SMS) 訊息,故基本上資料交換限制於電信公司内部網路之内交 換,故傳統上利用S T K進行電子商務安全性比WA P架 構為高。然其封閉式架構並不適用於以網際網路為基礎之 行動商務應用,且對稱性金鑰機制雖於資料保密性上有良X 297 mm) 1224455 A7 B7__ 5. Reducibility of the description of the invention (1¾) (please read the precautions on the back before filling this page). The key management subsystem of the present invention embodies the mechanism of secret sharing, which can divide the golden lose into several shadows, and can be restored to the original key only under a certain number of afterimage combinations , In case the key is lost or destroyed, all data encrypted with this key cannot be restored. Comparison of Luben's encryption mechanism and STK (SIM Toolkit) encryption mechanism The Intellectual Property Bureau Employee Consumer Cooperative of the Ministry of Economic Affairs prints a "public key cryptosystem", and can achieve "secret communication" without exchanging the key in advance. Advantages, the present invention uses the "public key cryptosystem" concept to design end-to-end real-time encryption procedures and modules suitable for WAP transmission architecture, which is very different from the encryption mechanism of traditional mobile phone STK (SIM Tool kit) transmission. It uses a symmetric key (Symmetric Key) cryptosystem (such as PINNI, PIN3, 3DES) ° The full name of SIMToolkit is "Subscriber Identity Module Application Toolkit" (user identification application development tool), and its application is through mobile phone companies and SIM cards Manufacturers cooperate to program or add value-added service programs to the microprocessor of the user identification card, so that consumers can click on the value-added services directly in the mobile phone directory. Since S TK sends short message (SMS) messages through a GSM Phase 2 + -compliant mobile phone, basically data exchange is limited to exchanges within the telecommunications company's intranet. Therefore, STK is traditionally used for e-commerce security than WA P architecture. Is high. However, its closed architecture is not suitable for Internet-based mobile business applications, and the symmetric key mechanism is good for data confidentiality.

I_ K 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 1224455 A7 B7_ 五、發明說明(丨牛) 好表現,但是對於不具備個人身份辨識之”不可否認性”功 能,也限制其於行動商務之應用空間(如圖9)。因此本資 訊安全系統直接採用’’公開金鑰”機制於WAP架構中,不僅 彌補傳統WAP架構加密不足之疑慮,更大幅具有實現「數 位簽章」之”不可否認性”特性,實為本發明之一大特色。 (如對照圖10) 綜上所述,本發明係一種行動商務(M- Co腿erce)WAP 資料傳輸段之端對端即時加密程序與模組,其特點為以無 線通訊協定(Wireless Appl i cat ion Protocol)為技術平 台,於無線内容服務提供者(WCP)之現有行動資訊伺服器 WML Server端增設一符合公開金餘架構(Public Key Infrastructure)之資訊密碼安全系統,。由此增設機制可 實現WAP行動商務資訊交換之端對端(End to End)安全性, 一舉改善現行WAP(1. 1版)架構之兩段式安全機制(2-Phase Security)之漏洞。再者本發明採用公開金鑰機制之加解密 機制,不僅應用於加密目的,亦可達到身份認證(CA)之不 可否認性功能,大幅落實行動商務可能性。另為解決公開 金鑰加解密運算效率偏低缺點,本發明尚增設一壓縮前置 模組(Pre-Compressor),以趨近1/3之高壓縮比率及0失 真率處理原始明文資料,藉此以大幅提高加密效率,更提 高本發明應用於行動商務之實用價值(如圖11) 因本發明完全符合專利申請要件,故爰依專利法提出 本叙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ---I--------i 丨丨!丨—訂-----I-- (請先閱讀背面之注意事項再填寫本頁) A7I_ K This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 1224455 A7 B7_ V. Description of the invention (丨 ox) Good performance, but not for individuals The "non-repudiation" function of identity also limits its application space in mobile commerce (see Figure 9). Therefore, this information security system directly adopts the "public key" mechanism in the WAP architecture, which not only makes up for the concerns of insufficient encryption in the traditional WAP architecture, but also has the "non-repudiation" feature of "digital signature", which is actually the invention One of the great features. (As shown in FIG. 10) In summary, the present invention is an end-to-end real-time encryption program and module for mobile data (M-Co-erce) WAP data transmission segment, which is characterized by wireless communication protocol (Wireless Appl i The cat ion protocol is a technology platform. An existing information security system that complies with the Public Key Infrastructure is added to the existing mobile information server WML Server of the wireless content service provider (WCP). The added mechanism can realize the end-to-end security of WAP mobile business information exchange and improve the loophole of 2-Phase Security of the existing WAP (version 1.1) architecture in one fell swoop. Furthermore, the present invention uses the encryption and decryption mechanism of the public key mechanism, which is not only used for encryption purposes, but also can achieve the non-repudiation function of identity authentication (CA), which greatly implements the possibility of mobile commerce. In addition, in order to solve the shortcomings of low efficiency of public key encryption and decryption operations, the present invention also adds a compression pre-module (Pre-Compressor) to process the original plaintext data with a high compression ratio close to 1/3 and a distortion rate of 0. This greatly improves the encryption efficiency and the practical value of the present invention in mobile commerce (see Figure 11). Because the present invention fully complies with the patent application requirements, it is proposed that this standard is applicable to the Chinese National Standard (CNS) A4 according to the patent law. Specifications (210 X 297 mm) --- I -------- i 丨 丨!丨 —Order ----- I-- (Please read the notes on the back before filling this page) A7

玉、發明說明(丨<) 申請之,請詳查並准予本案以保障 1224455 丨早〜明者榷盃。若鈞局貴 審查委貝有任何稽疑,請不吝來函指示。 按以上所述,僅為本發明最佳之_具體施例惟本發明 之行動商務WAP資料傳輸段之端對端加密程序與模組之特 徵亚不限於此,任何熟希該項技藝者在本發明之領域内, 可輕易思及之變化或修飾者皆可涵蓋在本案之專利範圍 内0 — I — Iin--I I --------— ^ WWW (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 1224455 A7 B7_ 五、發明說明(β ) 附件(Μ-Η演算法原文說明及本Handset加解密模組Μ-Η演 算實例 2·本發明Handset加解密模組Μ-Η演算實例 (請先閱讀背面之注意事項再填寫本頁) extern function Cipher(szTime, szURL, PublicK,Jade and invention description (丨 <) For the application, please check and approve the case in detail to protect 1224455 丨 early ~ Ming dynasty. If there is any suspicion on the part of the review committee, please write to us. According to the above, it is only the best of the present invention. Specific examples, but the features of the end-to-end encryption program and module of the mobile business WAP data transmission section of the present invention are not limited to this. In the field of the present invention, changes or modifications that can be easily considered can be covered by the patent scope of this case. 0 — I — Iin--II --------— ^ WWW (Please read the note on the back first Please fill in this page for further information) Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs, Consumer Cooperatives The paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 1224455 A7 B7_ V. Description of Invention (β) Attachment (M-Η The original description of the algorithm and the Handset encryption and decryption module Μ- 实例 calculation example 2. The Handset encryption and decryption module MH-Η calculation example of the present invention (please read the precautions on the back before filling this page) extern function Cipher (szTime, szURL , PublicK,

CompressParam, BIO) { i f(String.compare(WMLBrowser. getVar(M Compress Input "),nlM)!=0 ) WMLBrowser. go(Mhttp://M + szURL + n ?RtnCode=NoCompress&Time::::M iszTirae); var Encode^"M ; var CharPlainBit二,’丨’; var nCipher^O; var i=0 , j=0; var nLen二0; var nValue=0; nLen二String.length(BlO); nLen=nLen div 3; for( i=0; i< nLen ; i++ ) { 經濟部智慧財產局員工消費合作社印製 nValue=Lang.parselnt( String.subString(Bl0, i*3, 3)); CharPlainBi t=GenerateCharPlainBi t(nValue); nCipher=GenerateCharcipher(CharPlainBit,PublicK); if( j二二0 M i二:0 )CompressParam, BIO) {if (String.compare (WMLBrowser. GetVar (M Compress Input "), nlM)! = 0) WMLBrowser. Go (Mhttp: // M + szURL + n? RtnCode = NoCompress & Time :::: : M iszTirae); var Encode ^ "M; var CharPlainBit two, '丨'; var nCipher ^ O; var i = 0, j = 0; var nLen two 0; var nValue = 0; nLen two String.length ( BlO); nLen = nLen div 3; for (i = 0; i <nLen; i ++) {Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs nValue = Lang.parselnt (String.subString (Bl0, i * 3, 3) ); CharPlainBi t = GenerateCharPlainBi t (nValue); nCipher = GenerateCharcipher (CharPlainBit, PublicK); if (j 2 2 0 M i 2: 0)

Encode=Encode + nCipher ; __if_ 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) 1224455 A7 _B7_ 五、發明說明(I"]) else Encode二Encode + 丨丨-"+ nCipher ;} Encode=Encode+丨丨-丨丨 +CompressParam; WMLBrowser. setVar(n Compress Input",丨’ 0丨’); WMLBrowser· go( ” http://’’ + szURL + n ?Cipher: + 丨丨 &RtnCode=Success&Time=” + szTime);} function GenerateCharPlainBit(Plain) + Encode (請先閱讀背面之注意事項再填寫本頁) 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 丨印 :製 var nLen二1; var modi二0; var mod2二0; var bit=0; var nChar=0; var cChar=n n ; var PlainBi t = n n; var i=0; var nRate=2; nChar二Plain; for(i 二0;i <8;i + + ){ modi二nChar % nRate; if( nRate二2 ) 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社_邱丨製! 1224455 A7 B7_ 五、發明說明(丨 mod2=0; else mod2=nChar%(nRate div 2); bit=modl-mod2; if(bit二=0)Encode = Encode + nCipher; __if_ This paper size applies to China National Standard (CNS) A4 (210 x 297 mm) 1224455 A7 _B7_ V. Description of the Invention (I "]) else Encode Two Encode + 丨 丨-" + nCipher ;} Encode = Encode + 丨 丨-丨 丨 + CompressParam; WMLBrowser. SetVar (n Compress Input ", 丨 '0 丨'); WMLBrowser · go (”http: // '' + szURL + n? Cipher: + 丨 丨& RtnCode = Success & Time = ”+ szTime);} function GenerateCharPlainBit (Plain) + Encode (Please read the precautions on the back before filling out this page) Intellectual Property Bureau Employee Consumption Cooperative of the Ministry of Economic Affairs 丨 Print: var nLen II 1 ; var modi 2 0; var mod 2 2 0; var bit = 0; var nChar = 0; var cChar = nn; var PlainBi t = nn; var i = 0; var nRate = 2; nChar 2 Plain; for (i 2 0; i <8; i + +) {modi two nChar% nRate; if (nRate two 2) This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) Employees of the Intellectual Property Bureau of the Ministry of Economic Affairs Cooperatives_Qiu 丨 made! 1224455 A7 B7_ 5. Description of the invention (丨 mod2 = 0; else mod2 = nChar% (nRate div 2); bit = modl-mod2; if (bit two = 0)

PlainBi t:丨丨 0n +PlainBi t; elsePlainBi t: 丨 丨 0n + PlainBi t; else

PlainBit-nlM+PlainBit; nRate二nRate*2; } return PlainBit; } function GenerateCharcipher(CharPlainBit, PublicK) { var cChar:丨丨丨丨; var nChar=0; var nCipher=0; var i:0; var Publ icChar二丨,丨’; for(i二0;i<8;i++) { cChar^String.charAt(CharPlainBi t,i); if(String.compare(cChar,n 0丨’)= = 0) nChar^O; 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) --------------------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 1224455 A7 _B7_ 五、發明說明(丨|) else nChar二1;PlainBit-nlM + PlainBit; nRate two nRate * 2;} return PlainBit;} function GenerateCharcipher (CharPlainBit, PublicK) {var cChar: 丨 丨 丨 丨; var nChar = 0; var nCipher = 0; var i: 0; var Publ icChar two 丨, 丨 '; for (i 二 0; i <8; i ++) {cChar ^ String.charAt (CharPlainBi t, i); if (String.compare (cChar, n 0 丨') = = 0) nChar ^ O; This paper size applies to China National Standard (CNS) A4 (210 x 297 mm) -------------------- Order ------- -Line (please read the precautions on the back before filling this page) 1224455 A7 _B7_ V. Description of the invention (丨 |) else nChar II 1;

PublicChar=String.elementAt(PublicK, i, n); nCipher=nCipher+nChar*Lang.parseInt(PublicChar); }PublicChar = String.elementAt (PublicK, i, n); nCipher = nCipher + nChar * Lang.parseInt (PublicChar);}

I I return nCipher; (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作、社—印!f vf. 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)II return nCipher; (Please read the precautions on the back before filling out this page) Employees' Cooperatives and Social Organizations of the Intellectual Property Office of the Ministry of Economic Affairs—Institute! F vf. This paper size applies to China National Standard (CNS) A4 (210 X 297) %)

1224455 五、發明說明(>ϋ) 圖例說明 為了使貝審查委員能更進一步了解本發明之特徵與技 術内容,請參閱以下有關本說明之附圖,然而所附圖示僅 供參考說明之用,並非用來對本發明加以限制者。 第一圖無線應用協定架構圖 第一圖WAP通訊協定層級圖 第二圖本發明WAP端對端資訊加密系統結構圖 第四圖本發明Handset加解密模組執行還境(WAE)架構圖 第五圖本叙明妯置壓縮模組(pre-C〇fflpress〇r)演算流程 (以銀行轉帳為例) 第六圖對稱性加密機制運作圖 第七圖公開金鑰(PKI)加密機制運作圖(以RSA為例) 第八圖本發明WAP端對端加密機制程序圖 第九圖WAP與STK架構對照圖 第十圖WAP與STK特點對照表 第十一圖本發明WAP端對端加密系統應用於金融市場之架 構圖 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------^------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社,即製1224455 V. Description of the invention (> ϋ) Legends In order to allow the review committee to better understand the features and technical contents of the present invention, please refer to the following drawings for this description, but the attached drawings are for reference only. Is not intended to limit the invention. The first figure is a wireless application protocol architecture diagram. The first figure is a WAP communication protocol hierarchy diagram. The second figure is a structure diagram of a WAP end-to-end information encryption system of the present invention. This book describes the calculation process of the pre-compression module (pre-C0fflpress〇r) (Take bank transfer as an example) Figure 6 Symmetric encryption mechanism operation Figure 7 Public key (PKI) encryption mechanism operation diagram ( Take RSA as an example) Figure 8 The procedure of the WAP end-to-end encryption mechanism of the present invention The ninth figure WAP and STK architecture comparison chart The tenth figure WAP and STK feature comparison table The eleventh figure The WAP end-to-end encryption system of the present invention is applied Financial market structure diagram This paper size applies Chinese National Standard (CNS) A4 specification (210 X 297 mm) -------- ^ ------- (Please read the notes on the back before filling (This page) Employee Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs

Claims (1)

1224455 可 經濟部智慧財產局員工消費合作社印製 A8 B8 C8 D8 、申請專利範圍 端對端加密模組,其中使用者欲送出個人商務資訊時, 先依無線標記文件(WML)指示輸入商務資訊,並緩 Handset加解密模組搭配使用者公鑰進行加密演算彳灸 傳;待該資訊至WML Server端甫由加解密飼服程式(^此上 Server)以對應之私输(Private Key)進行反向解密動作 再將明文交由WML Server執行後續功能性程序. 5·如申請專利範圍第1項之行動商務WAP資料傳輸段之 端對端加密模組,其中若須自WML Server主動下傳個人商 務資訊時,使用者須先輸入私鑰(Private Key)以存留於行 動電話WAE執行環境之堆疊記憶體備用,WML Server將傳 遞擬下傳之個人商務資料予加解密伺服程式(Cipher Server),並通知其開啟Handset軟體加解密模組與金鑰管 理子系統所維護該使用者之公鑰(PublicKey),以先行於 Server端執行加密演算;透過超本文協定之傳輸服務下傳 Handset軟體加解密模組及密文至用戶端設備;此時再由存 留於WAE執行環境之私鍮(private Key)搭配密文進行解密 動作’並將解密明文交由WML格式文件顯示其原始結果。 6·如申請專利範圍第1項之行動商務WAP資料傳輸段之 端對端加密模組,其中金鑰管理子系統,負責工作為幻金 錄生成與建置及b)金錄共管;; 金餘生成與建置:在金鑰生成方面金鑰具備隨機性, 亦即其生成的過程為極機密,而結果為不可測,且對於需 24 本紙張尺度適用t國國家標準(CNS ) A4規格(210X297公釐) f請先聞讀背面之注意事項再填寫本頁)1224455 Printed A8 B8 C8 D8, patent application scope end-to-end encryption module by the Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economics, where users want to send personal business information, first enter business information according to WML instructions, The Handset encryption / decryption module and the user's public key are used to perform encryption calculations and moxibustion. After the information is transmitted to the WML Server, the encryption and decryption feed program (^ here Server) is used to reverse the corresponding private input (Private Key). Send the plaintext to the decryption action and then follow-up with the WML Server to execute the subsequent functional procedures. 5. If the end-to-end encryption module of the mobile business WAP data transmission section of the scope of patent application, the end-to-end encryption module, if it is necessary to actively download the personal For business information, the user must first enter the Private Key to store the stack memory in the WAE execution environment of the mobile phone for backup. WML Server will pass the personal business data to be transmitted to the Cipher Server. And notify it to open the Handset software encryption and decryption module and the key management subsystem to maintain the user's public key (PublicKey) in order to advance in Serve The r side performs encryption calculations; the Handset software encryption / decryption module and ciphertext are transmitted to the client device through the transmission service agreed on in this document; at this time, the private key stored in the WAE execution environment is used to decrypt the ciphertext Action 'and pass the decrypted plaintext to a WML format file to display its original result. 6. If the end-to-end encryption module of the mobile business WAP data transmission section of the first patent application scope, the key management subsystem is responsible for the creation and construction of the magic gold record and b) co-management of the gold record; I generate and build: The key is random in terms of key generation, that is, the process of generating the key is extremely confidential, and the result is unpredictable, and the national paper standard (CNS) A4 is required for 24 paper standards. (210X297mm) f Please read the notes on the back before filling in this page) 1224455 ABCD 經濟部智慧財產局員工消費合作社印製 六、申請專利範圍 求量較大且需經常更新的金输通常採虛擬隨機(pseudo random)程序的生成方法; 金鑰共管:在金鑰共管方面,電腦系統應用密碼技術 於檔案或資料庫安全上,除了提供其機密性之外,尚需確 保加密資料的可還原性;金输管理子系統(Key Management) 體現秘密共管(secret sharing)的機制,可將金鑰分成數 個金输影(shadows),只有在特定數目的输影組合下方可還 原成原來金鑰,以防金鑰遺失或遭破壞時,則所有以此金 鑰加密的資料無法還原。 7·如申請專利範圍第1項之行動商務WAP資料傳輸段 之端對端加密模組’其中含一壓縮前置模組 (Pre-Compressor)對傳輸資料進行解壓縮,其壓縮程序條 列如下: | a) 將原始資料長度以8或9為一單位分組為各單位 字串; b) 將每一單位字串轉為其所表示之十進位數值; c) 將各單位數值轉為十六進位單位字串; d) 將各十六進位單位字串之字元兩兩分組為單位 字組; e) 將各單位字組(oxCharBuf)轉為介於〇〜255間之 C , 十進位字碼值; f) 將各字碼值直接轉為對應之ANSI字集; 25 (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 1224455 A8 B8 C8 D8 六、申請專利範圍 其中在上述步驟1)中原始資料長度以8或9為單位分 組,乃是基於行動電話WAE執行環境所之支援之最大資料 型態長度為64位元,因此原始資料分組時為避免較耗時之 溢位(Over Flow)運算故採8或9為單位字串長。 8·如申請專利範圍第1項之行動商務wAP資料傳輸段 之端對端加密模組,其中安全機制採用WAE應用層以實作 手機端(Handset)軟體加解密模組;因此可解譯WML標籤語 言(Wireless Markup Language)及 WMLScript 描述語言 (Wireless Markup Script Language)。 (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 26 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐)1224455 ABCD Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs VI. Large-scale applications for patent applications that require frequent updates usually use pseudo random program generation methods; Key co-management: in terms of key co-management The computer system applies password technology to the security of files or databases. In addition to providing its confidentiality, it is also necessary to ensure the recoverability of encrypted data. The Key Management subsystem reflects the mechanism of secret sharing. , The key can be divided into several shadows (shadows), only under a certain number of combinations of shadows can be restored to the original key, in case the key is lost or destroyed, all the data encrypted with this key Unable to restore. 7 · If the end-to-end encryption module of the mobile business WAP data transmission section of the scope of patent application No. 1 contains a compression pre-module (Pre-Compressor) to decompress the transmission data, the compression procedure is as follows : | A) group the original data length into 8 or 9 as a unit string; b) convert each unit string to the decimal value it represents; c) convert each unit value to sixteen Carry unit string; d) Group the characters of each hexadecimal unit string into unit blocks; e) Convert each unit block (oxCharBuf) to a C, decimal word code between 0 and 255 F) Convert each code value directly into the corresponding ANSI character set; 25 (Please read the precautions on the back before filling this page) This paper size applies to China National Standard (CNS) A4 specification (210X297 mm) 1224455 A8 B8 C8 D8 6. Scope of patent application Where the length of the original data in the above step 1) is grouped in units of 8 or 9, it is based on the maximum data type length supported by the mobile phone WAE execution environment is 64 bits, so the original To avoid the waste of data when grouping data The overflow (Over Flow) so that the operational units of 8 or 9 taken long string. 8 · If the end-to-end encryption module of the mobile business WAP data transmission section of the first patent application scope, the security mechanism uses the WAE application layer to implement the mobile phone (Handset) software encryption and decryption module; therefore WML can be interpreted Label Language (Wireless Markup Language) and WMLScript Description Language (Wireless Markup Script Language). (Please read the notes on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 26 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)
TW90101316A 2001-01-19 2001-01-19 End-to-end encryption procedure and module of M-commerce WAP data transport layer TWI224455B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW90101316A TWI224455B (en) 2001-01-19 2001-01-19 End-to-end encryption procedure and module of M-commerce WAP data transport layer
JP2001151632A JP2002232415A (en) 2001-01-19 2001-05-21 Secret module of terminal to terminal in mobile commerce wap information transmitting stage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW90101316A TWI224455B (en) 2001-01-19 2001-01-19 End-to-end encryption procedure and module of M-commerce WAP data transport layer

Publications (1)

Publication Number Publication Date
TWI224455B true TWI224455B (en) 2004-11-21

Family

ID=21677117

Family Applications (1)

Application Number Title Priority Date Filing Date
TW90101316A TWI224455B (en) 2001-01-19 2001-01-19 End-to-end encryption procedure and module of M-commerce WAP data transport layer

Country Status (2)

Country Link
JP (1) JP2002232415A (en)
TW (1) TWI224455B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI407745B (en) * 2005-12-01 2013-09-01 Ericsson Telefon Ab L M Secure and replay protected memory storage
TWI416929B (en) * 2007-09-17 2013-11-21 Mitac Int Corp Handheld communication device and method for upgrading chip card service
US8788802B2 (en) 2005-09-29 2014-07-22 Qualcomm Incorporated Constrained cryptographic keys
TWI611316B (en) * 2015-12-22 2018-01-11 國民技術股份有限公司 Text processing method for safe input method, text processing device and text processing system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915612B (en) * 2015-06-05 2017-09-26 飞天诚信科技股份有限公司 A kind of realization method and system of safely inputting information
CN113055334B (en) * 2019-12-26 2023-07-28 国网山西省电力公司信息通信分公司 Method and device for supervising network behavior of terminal user

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2863370B2 (en) * 1992-05-20 1999-03-03 富士通エフ・アイ・ピー株式会社 File compression encryption processor
JPH09212457A (en) * 1996-01-30 1997-08-15 Mitsubishi Electric Corp Ciphering and deciphering device of digital bidirectional communication terminal
JPH09282281A (en) * 1996-02-14 1997-10-31 Mitsubishi Electric Corp Method and system for data security
JP3580333B2 (en) * 1996-04-10 2004-10-20 日本電信電話株式会社 How to equip the encryption authentication function
JPH10145352A (en) * 1996-11-12 1998-05-29 Hitachi Ltd Data encryption communication method
JPH10320478A (en) * 1997-03-19 1998-12-04 Pumpkin House:Kk Ciphered/deciphered communication system and method therefor
JPH10294669A (en) * 1997-04-18 1998-11-04 Nippon Telegr & Teleph Corp <Ntt> Password communication method with data compression
US6105012A (en) * 1997-04-22 2000-08-15 Sun Microsystems, Inc. Security system and method for financial institution server and client web browser
JP2000049765A (en) * 1998-07-24 2000-02-18 Sony Corp Cipher key communication system, cipher key communication method and recording medium
JP2000113040A (en) * 1998-09-30 2000-04-21 Oki Electric Ind Co Ltd Electronic commercial transaction system
JP2000174746A (en) * 1998-09-30 2000-06-23 Hitachi Software Eng Co Ltd Method and device for deciphering data
NO311000B1 (en) * 1999-06-10 2001-09-24 Ericsson Telefon Ab L M Security solution for mobile phones with WAP
KR20010004791A (en) * 1999-06-29 2001-01-15 윤종용 Apparatus for securing user's informaton and method thereof in mobile communication system connecting with internet
AU2001258793A1 (en) * 2000-05-22 2001-12-03 Fujitsu Limited Data distribution system
JP4031913B2 (en) * 2001-05-15 2008-01-09 ソフトバンクモバイル株式会社 Method of moving data between mobile phones and mobile phone

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8788802B2 (en) 2005-09-29 2014-07-22 Qualcomm Incorporated Constrained cryptographic keys
TWI407745B (en) * 2005-12-01 2013-09-01 Ericsson Telefon Ab L M Secure and replay protected memory storage
TWI416929B (en) * 2007-09-17 2013-11-21 Mitac Int Corp Handheld communication device and method for upgrading chip card service
TWI611316B (en) * 2015-12-22 2018-01-11 國民技術股份有限公司 Text processing method for safe input method, text processing device and text processing system

Also Published As

Publication number Publication date
JP2002232415A (en) 2002-08-16

Similar Documents

Publication Publication Date Title
US20020131598A1 (en) End to end real-time encrypting process of a mobile commerce WAP data transmission section and the module of the same
US9569771B2 (en) Method and system for storage and retrieval of blockchain blocks using galois fields
CN100539747C (en) Authentication and check SMS method for communicating
CN111431713B (en) Private key storage method and device and related equipment
JP4941548B2 (en) Security data transmission / reception system and method
CN105684346A (en) Method for securing over-the-air communication between a mobile application and a gateway
Isaac et al. An anonymous secure payment protocol in a payment gateway centric model
CN107248984A (en) Data exchange system, method and apparatus
CN101304569A (en) Mobile authentication system based on intelligent mobile phone
CN102254287A (en) Bank business mobile processing system and method
CN112966022A (en) Information query method, device and system for data transaction platform
Gao et al. A new blockchain-based personal privacy protection scheme
Gimenez-Aguilar et al. Zephyrus: An information hiding mechanism leveraging Ethereum data fields
TWI224455B (en) End-to-end encryption procedure and module of M-commerce WAP data transport layer
Yashiro et al. eTNet: A smart card network architecture for flexible electronic commerce services
US20230028854A1 (en) System and method of cryptographic key management in a plurality of blockchain based computer networks
CN107689867A (en) A kind of cryptographic key protection method and system under open environment
GB2366974A (en) Pre-processing data for secure protocol transfer
EP1233589A2 (en) End to end real-time encrypting process of a mobile commerce wap data transmission section and the module of the same
Isaac et al. Payment in a kiosk centric model with mobile and low computational power devices
Garza-Saldaa et al. State of security for SMS on mobile devices
KR20020020166A (en) End-to-end data encryption/decryption method and device for mobile data communication
Martínez-Peláez et al. Efficient certificate path validation and its application in mobile payment protocols
KR100452766B1 (en) Method for cryptographing a information
Yang Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography.