WO2013139194A1 - Financial pos system capable of resisting channel trojan attack and anti-attack implementation method thereof - Google Patents

Financial pos system capable of resisting channel trojan attack and anti-attack implementation method thereof Download PDF

Info

Publication number
WO2013139194A1
WO2013139194A1 PCT/CN2013/071890 CN2013071890W WO2013139194A1 WO 2013139194 A1 WO2013139194 A1 WO 2013139194A1 CN 2013071890 W CN2013071890 W CN 2013071890W WO 2013139194 A1 WO2013139194 A1 WO 2013139194A1
Authority
WO
WIPO (PCT)
Prior art keywords
card
key
card box
box
trust management
Prior art date
Application number
PCT/CN2013/071890
Other languages
French (fr)
Chinese (zh)
Inventor
邹候文
唐韶华
唐春明
张世渡
苏胡双
Original Assignee
广州大学
华南理工大学
深圳视融达科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广州大学, 华南理工大学, 深圳视融达科技有限公司 filed Critical 广州大学
Publication of WO2013139194A1 publication Critical patent/WO2013139194A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • the invention relates to the application field of a cipher chip for security and authentication in information security, in particular to a financial POS system against channel Trojan attack and an anti-attack implementation method. Background technique
  • EMV is a bank IC card specification jointly developed by Europay, MasterCard and VISA.
  • EMV migration refers to the transfer of bank cards from magnetic stripe cards to integrated circuit (IC) cards. The purpose of EMV migration is to replace magnetic stripe cards with IC cards to prevent financial crimes such as using fake credit cards, credit card fraud, and cross-border financial fraud.
  • a and D will not be aware of the following counterfeiting:
  • B could not get the pass to the location, but she wanted to go. A plans to carry out illegal activities and hopes to obtain evidence of absence, so she recommends B to rent her passport. Through a method similar to the "mafia problem", B went to ", A did illegal activities and obtained evidence of absence.
  • Drimer et al. in the "Keep your enemies close: Distance bounding against smartcard relay attacks" article, using the "mafia problem” attack EMV card, as shown in Figure 1.
  • Drimer et al.'s attack experiments are not related to cryptographic security protocols (password-based security protocols are not sufficient to resist such attacks). The limitation is that the mafia holding the POS terminal exposes itself and there is a time synchronization problem. "electronic attorney” or "Distance bounding" to resist this attack.
  • Resistronic attorney or "Distance bounding" to resist this attack.
  • Murdoch, S. et al. gave the agreement on the EMV card and PIN password in the article Chip and PIN is Broken. Attack method, as shown in Figure 2.
  • the method used in Murdoch, S. et al.'s attack experiment is similar to the method in the "Chess Master Problem", but instead of simply forwarding information, it intercepts and inserts a message in the key steps of the EMV protocol, using the proposed Method, after the attacker seizes or steals the EMV card, the EMV card can be stolen before the cardholder's report is effective.
  • the text suggests a password-based security protocol to resist the man-in-the-middle attack.
  • PCI-DSS Payment Card Industry Data Security Standard
  • PCI-DSS is a security protocol developed by the founding members of the PCI Security Standards Council (including American Express, Discover Financial Services, JCB, MasterCard Worldwide, and Visa International) to encourage international adoption of consistent data security measures.
  • the cardholder's credit and debit card information is secure.
  • the channel refers to the transmission channel of the signal.
  • the Trojan is a secret latent malicious function module that can be controlled by a remote network.
  • the channel Trojan refers to a malicious function module secretly lurking on the signal transmission path. Forwarding, tampering, inserting, replaying, intercepting, and leaking of messages.
  • the attacker holds a legal EMV card A, and a card reader B.
  • the attacking partner holds a fake card C that can communicate with B in accordance with the attacker's EMV card.
  • the attacking partner used a fake card to shop at a store in City G and swipe the card at POS Terminal D.
  • the attacking partner will successfully take the goods.
  • the attacker is convinced that the attacking partner has left safely, he falsely reports to the police that he has been stolen. Since the attacker has evidence of absence, he can file a chargeback with the bank.
  • the experimental method of this attack is completely consistent with the experimental method of Drimer et al.
  • the bank shall reject the request for an attacker’s refusal.
  • the attacker inserts a channel Trojan in advance on the channels of the EMV card, the display, the keyboard, and the printer of the POS terminal of the store B of the city G and the store B of the city H.
  • attacker A take 20,000 yuan of goods
  • another cardholder take 100 yuan Goods
  • This kind of attack also has a problem of time synchronization.
  • the cardholder's refusal is a reasonable appeal and should be supported. If the bank supports the refusal, the merchant loses, otherwise the cardholder loses. In any case, the attacker can make a profit, and the cardholder is attacked without fault.
  • the attacker forges a POS terminal B, and the IC card holder of the POS terminal B is connected to the deck of a legitimate POS terminal D by the wire C. If the cardholder is shopping at the attacker's store, the cardholder of the purchase is considered to be role A in the "mafia problem", since A does not see the legitimate POS terminal D, and the actual credit card amount is determined by D, Therefore, the attacker can arbitrarily set the legal credit card amount.
  • the merchant who initiated the attack inserts the channel Trojan in the POS terminal B of the store, and also inserts the channel Trojan in the POS terminal D of the attacked merchant of the city H in advance.
  • Cardholder A swipes the card at the POS terminal B (100 yuan), and the cardholder C swipes the card at POS terminal D (20,000 yuan).
  • the attack is successful in a similar way to attack example 2.
  • This kind of attack does not affect the two cardholders.
  • Their card amount is equal to the value of the goods, but the attacking merchant pays 20,000 yuan for the goods of 100 yuan, while the attacked merchant pays 20,000 yuan for the goods but only receives 100 yuan. .
  • Example 1 the cardholders of Examples 1, 2, and 3 all filed a chargeback application with the bank.
  • the chargeback of Example 1 is a refusal and should be rejected.
  • the second and third refusal requests are reasonable, but existing The European and American bank card technology can't distinguish the rejection of the one-off application, and the one that refuses to apply for the support.
  • SCA Bypass Attack
  • SCA uses the various physical information leaked by the chip to efficiently obtain the key in the crypto chip. This is a channel leak key information, but this leak is natural and not artificially introduced.
  • the equipment required for SCA is easy to obtain, and it can be attacked without leaving any traces.
  • SCA has broken a large number of smart cards, cryptographic chips and cryptosystems, including current mainstream computing security AES, IDEA, 3DES, RSA, ECC and other cryptographic algorithms.
  • Existing methods of resisting bypass attacks include hidden, masked, and provable security against leaks.
  • the hidden method can effectively increase the attacker's attack difficulty, but the hidden method can't prove its security; the n-th order mask can't resist the n+1 order differential attack, and the existing anti-leakage scheme is actually equivalent to one time and one secret, therefore, currently The practical solution of SCA resistance is far from the cryptography "Safety" goal.
  • N key schemes to resist bypass attacks Assume that bypass attacks require M sets of key leakage information to break the system, if the number of times each key is used is less than N times and N ⁇ M, the bypass attack that requires the M key leakage information cannot attack the system based on the N-time key scheme. By adopting appropriate concealment measures, the M value can be effectively increased at a lower speed, area, and power consumption cost.
  • the cryptographic logic dynamically takes the key sequence as input and invokes the key extraction process to extract the key from the physical unclonable module.
  • a cryptographic chip containing such cryptographic logic creates a physical unclonable puzzle for physical intruders: sensitive circuitry that bypasses the physical unclon module of the cryptographic logic's periphery and does not destroy these sensitive circuits.
  • the bank should provide at least the bank card system: Protect the interests of cardholders and merchants. If the cardholder or merchant is not at fault, it should not be attacked. In the second and third examples of the above attack, the cardholder is not at fault, but is attacked. After joining attack example 1 and attack example four, the existing bank card system cannot distinguish who should bear the responsibility.
  • Another object of the present invention is to provide an anti-attack implementation method for a financial POS system based on the above-mentioned anti-channel Trojan attack.
  • the invention relates to a financial POS system against channel Trojan attack, which comprises a POS motherboard, an IC card box, a PIN pad, a user PIN disk, a nonvolatile memory, an IC card, and a trust management party, and the IC card box and the POS motherboard are Connecting, the PIN pad is connected to the IC card box, and the POS motherboard is connected to the trust management party through an I/O interface, and the IC card is connected to the trust management party through the IC card box;
  • the PIN pad is configured to receive a user PIN code
  • the user PIN disk is used to display the transaction amount and receive the user PIN password
  • the nonvolatile memory is configured to store an authorization credential of the transaction
  • the IC card box, the PIN pad, the user PIN disk, and the IC card are all provided with a cryptographic chip;
  • the inner and outer layers of the sealed shielding box are each covered with a layer of sensitive circuit
  • the cryptographic chip of the IC card box is disposed between the inner and outer layers of the sensitive circuit layer, and the external contact interface and the external non-contact interface are in the outer layer.
  • the internal contact interface and the internal contactless interface are within the inner sensitive circuit layer; when the sealed screen of the IC card box is opened, the sensitive circuit is cut off, and when the sealed screen door is closed, the sensitive circuit is connected.
  • the sensitive circuit layer is composed of a sensitive circuit of a physical unclonable module.
  • the cryptographic chip is provided with a physical unclonable module and a cryptographic processor IP core, and the sensitive circuit of the physical unclonable module is surrounded by a periphery of the cryptographic processor IP core to form a cage structure, and the cryptographic processor
  • the key sequence that needs to be reused in the IP core is stored in the non-volatile memory of the cryptographic chip, and the key is extracted from the physical unclonable module with the key sequence number as input when needed.
  • the invention provides a method for implementing anti-attack of a financial POS system against channel Trojan attack, and the specific steps are as follows:
  • the trust management direction writes the initial symmetric key sequence number and the initial asymmetric key sequence number in the cipher chip of the IC card box, the PIN pad, the user PIN disk, and the IC card, and the number of times of use of each key sequence number;
  • the symmetric key sequence is used as an input to extract the initial symmetric key from the physical unclonable module, and the cryptographic chip sends the extracted initial symmetric key back to the trust management party;
  • the cryptographic chip uses the initial asymmetric key sequence number as input and is not clonotable from the physical.
  • the initial private key is extracted from the module, and the corresponding initial public key is calculated and sent to the trust management party.
  • the trust management party signs the digital certificate for the initial public key and sends it back to the cipher chip.
  • the trust management party sends its own public key to the IC card box and password. a password chip in the keyboard, the user PIN disk and the IC card; the trust management party receives and stores the cardholder's PIN code;
  • the card holder inserts the IC card into the IC card case and closes the sealed screen door of the IC card case, so that the sealed shielding box of the IC card case acts as a shield, so that the IC card in the IC card case can only pass through the inside and outside of the IC card case.
  • Communication line and IC The device communication outside the card box; in addition, after the sealed screen door of the IC card box is closed, the sensitive circuit of the physical unclonable module on the IC card box is turned on, so that the cipher chip of the IC card box can be extracted from the physical unclonable module
  • the cryptographic chip Each time the cryptographic chip uses the key shared by the trust manager or its own private key, it needs to be extracted from the physical unclonable module using a symmetric key sequence number or an asymmetric key sequence number; the crypto chip uses any key at a time. After the serial number, it is necessary to increase the number of times the key sequence number is used. When the number of uses reaches the limit of use, the cipher chip will update the key sequence number, and take the new key sequence number as input and extract the corresponding new key from the physical unclonable module. For the new key corresponding to the symmetric key sequence, the cryptographic chip encrypts the new key and the new key sequence number with the old key and sends it to the trust management party.
  • the cryptographic chip For the private key corresponding to the asymmetric key sequence, the cryptographic chip will The public key corresponding to the private key and its key sequence number are sent to the trust management party, and the trust management party signs the digital certificate for the public key and sends it back to the cryptographic chip.
  • the initializing further comprises setting a help PIN password, wherein the help PIN password is used in an emergency situation, and when the cardholder enters the help PIN password in the transaction process, the trust management party completes the same as the universal PIN password. Outside of all the processes, the cardholder needs to be assisted to ask the police for help.
  • the IC card sends the card number to the IC card box;
  • the IC card box sends the IC card number and the IC card box number to the trust management party;
  • step (28) is:
  • the present invention is effective against attacks described in the four channel Trojan attack examples based on our proposed channel vulnerabilities, and existing bank card technologies are not resistant to these four attacks.
  • the attack examples 1, 2 and 4 are all dependent on wireless communication (submerged channel), otherwise the merchant will find the attack behavior.
  • the IC card box with the shielding function must be closed to open the screen door for trading operations, and closing the screen door will cause the IC card box to be closed.
  • the IC card in the middle cannot exchange information with the border through wireless communication, so that the attacks of the first, second and fourth examples cannot be carried out.
  • the attack example 3 when the cardholder enters the PIN code using the private user PIN disk, since the cardholder checks the card amount in advance, the merchant cannot tamper with the card amount, so the attack method of the third example is invalid.
  • IC card robbery refers to the criminals who hijack the cardholder and force the cardholder to say the PIN code and then use the cardholder's IC card to withdraw money. Since it is difficult for criminals to distinguish whether the cardholder gives a normal PIN code or a help PIN code, the trust manager will be able to notify the police in time when the criminal uses the cardholder's PIN for withdrawal.
  • the background trust management party can monitor the usage of the key through the transaction record. By limiting the number of uses, the attacker can collect up to N sets of leak information of the same key. If the new bypass attack collects the M group leak information, the system can be broken. When N>M, an attacker can attack the system. After this happens, the background trust management party sets each key to use up to L times, so that the attacker can only collect the L group leaks, and L ⁇ M, the new bypass attack method that needs the M group leak information. Invalid.
  • the delay circuit of the physical cloning module is overlaid on the periphery of the cryptographic processor IP core (also covering the inner and outer layers of the IC card encapsulation shield). If an attacker wants to obtain a key through a physical intrusion attack, it needs to bypass the sensitivity. The circuit can't damage the sensitive circuit, and the successful wire-tapping can be successful. This is the "difficult" we set, and it is the security foundation of the system we designed.
  • the cost of inserting Hamming distance interference into the IP core of the cryptographic processor is not large, but it can effectively increase the difficulty of establishing a Hamming model based on passive bypass attacks such as energy/electromagnetic, and greatly increase the number of leaked samples that the attack needs to collect.
  • the trust management party limits the number of times each key is used, and forces the update after the specified number of uses.
  • the PUF delay circuit covers the periphery of the processor IP core to effectively increase the attack cost of an active bypass attacker such as fault injection. .
  • the financial P0S system's resistance to channel Trojan attacks requires a new cryptographic chip based on the problem of physical unclonable modules.
  • IC cards that need to comply with protocols, tamper-resistant and can shield potential channels, need to comply with the protocol.
  • a cardholder-private user PIN that is tamper-proof and can display the transaction amount.
  • Figure 2 is a schematic diagram of the EMV protocol man-in-the-middle attack by Murdoch, S. et al.
  • FIG. 3 is a schematic diagram of a card attacker attacking a merchant in the channel Trojan attack example 1;
  • FIG. 4 is a schematic diagram of a cardholder attacking a cardholder in the second example of the channel Trojan attack
  • FIG. 5 is a schematic diagram of a merchant attack cardholder of the channel Trojan attack example 3;
  • FIG. 6 is a schematic diagram of a merchant attacking merchant of the channel Trojan attack example 4.
  • Figure ⁇ is a schematic structural diagram of a financial P0S system of the anti-channel Trojan attack of the present invention.
  • Figure 8 is a schematic diagram of a dual arbitrator physical unclonable module DAPUF
  • Figure 10 is a flow chart of key reconstruction of the DAPUF.
  • a financial POS system against channel Trojan attacks includes a POS motherboard, an IC card box, a PIN pad, a user PIN disk, a nonvolatile memory, an IC card, and a trust management party.
  • the IC card box is connected to the POS motherboard, and the PIN pad is connected to the IC card box.
  • the POS board is connected to the trust management party through an I/O interface, and the IC card is connected to the trust management party through the IC card box.
  • the PIN pad is configured to receive a user PIN code
  • the user PIN disk is used to display the transaction amount and receive the user PIN password
  • the nonvolatile memory is configured to store an authorization credential of the transaction
  • the IC card box, the PIN pad, the user PIN disk, and the IC card are all provided with a cryptographic chip;
  • the trust management party shares a key with an IC card box, a PIN pad, a user PIN disk, and an IC card, respectively.
  • the IC card case comprises an external contact interface, an external contactless interface, an internal contact interface, an internal contactless interface and a sealed shielding box, the sealed shielding box is provided with a communication line inside and outside the box and an opening for inserting the IC card
  • a sealed screen door that can be opened and closed is provided at the opening, and the sealing door is sealed with a contact point.
  • the inner and outer layers of the sealed shielding box are each covered with a sensitive circuit layer, and the sensitive circuit layer is composed of a sensitive circuit of a physical unclonable module; the cryptographic chip of the IC card box is disposed between the inner and outer two sensitive circuit layers, The external contact interface and the external contactless interface are outside the outer sensitive circuit layer, the internal contact interface and the internal non-contact interface are within the inner sensitive circuit layer; the sealed circuit of the IC card box is cut off when the shielding gate is opened When the sealed screen door is closed, the sensitive circuit is connected.
  • the cryptographic chip is provided with a physical unclonable module and a cryptographic processor IP core, and the sensitive circuit of the physical unclonable module is surrounded by the periphery of the cryptographic processor IP core to form a cage structure, and the cryptographic processor IP core
  • the key sequence that needs to be reused is stored in the non-volatile memory of the cryptographic chip, and the key is extracted from the physical unclonable module with the key sequence number as input when needed.
  • the physical unclonable module may adopt a double arbiter non-cloning module DAPUF, as shown in FIG. 8;
  • the two signals are directly output, otherwise the crossover Output;
  • the upper and lower signals are directly sent to the positive arbiter and cross-processed to the inverse arbiter, and the positive arbiter and the inverse arbiter are The order in which the upper and lower signals arrive is output, if the first path is first, the output is 1, otherwise the output is 0.
  • the cryptographic processor IP core performs a custom instruction set according to the cryptographic operation, taking the rainbow signature and verification requirements of the multivariate public key cipher MPKC as an example, and can customize the instruction set shown in Table 1 and the instruction set decoding shown in Table 2. table.
  • R ANRd generates random number to send Rd
  • I LW t, Rs, Radr sends the contents of the storage unit or port 10 with the address Rs+Radr to Rt.
  • I SW t, Rs, and Radr store the contents of Rt in the storage unit or port 10 with the address Rs+Radr.
  • each instruction is completed in one clock cycle, and each clock cycle is divided into five stages: instruction fetch, decode, control, execution, and write back.
  • the MPKC Rainbow Processor IP core uses 16-bit data channels and 32 general-purpose registers, occupying 1261 ALUTs and 539 dedicated logic registers in Altera's EP2S series FPGAs.
  • the signature algorithm program occupies 2216 bytes of space ( 554 * 4) and consumes 405392 clock cycles.
  • MPKC's rainbow signature and verification requires an instruction set of 11 instructions, but except for the domain multiply GFM and the domain inversion GFI is a dedicated instruction of MPKC, the other instructions are general instructions, which can be directly adopted by other algorithms and general control programs. . With proper processing, the GFI-consuming gates can even be shared with the inversion of the AES algorithm.
  • the cryptographic processor IP core inserts Hamming distance interference in five stages of the data path of each instruction cycle, so that the Hamming distance of each instruction stage is maintained at a constant value, thereby effectively eliminating processor power consumption.
  • the user PIN disk is private to the user, and the user PIN disk includes a contact interface, a contactless interface, a keyboard, and a display, and the contact interface can be connected to an external contact interface of the IC card case, and the contactless interface can be Connect to the external contactless interface of the IC card holder.
  • the embodiment is based on the anti-attack implementation method of the above-mentioned anti-channel Trojan attack financial POS system, and the specific steps are as follows:
  • the trust management direction writes the initial symmetric key sequence number and the initial asymmetric key sequence number in the cipher chip of the IC card box, the PIN pad, the user PIN disk, and the IC card, and the number of times of use of each key sequence number;
  • the symmetric key sequence is used as an input to extract the initial symmetric key from the physical unclonable module, and the cryptographic chip sends the extracted initial symmetric key back to the trust management party;
  • the cryptographic chip uses the initial asymmetric key sequence number as input and is not clonotable from the physical.
  • the initial private key is extracted from the module, and the corresponding initial public key is calculated and sent to the trust management party.
  • the trust management party signs the digital certificate for the initial public key and sends it back to the cipher chip.
  • the trust management party sends its own public key to the IC card box and password.
  • the cardholder can also set a helper PIN code.
  • the card holder inserts the IC card into the IC card case and closes the sealed screen door of the IC card case, so that the sealed shielding box of the IC card case acts as a shield, so that the IC card in the IC card case can only pass through the inside and outside of the IC card case.
  • the communication line communicates with the device outside the IC card box; in addition, after the sealed screen door of the IC card box is closed, the sensitive circuit of the physical unclonable module on the IC card box is turned on, so that the cipher chip of the IC card box can be physically incapable Extracting a key shared by the trust management party and a private key of the IC card cipher chip in the cloning module;
  • the cryptographic chip Each time the cryptographic chip uses the key shared by the trust manager or its own private key, it needs to be extracted from the physical unclonable module using a symmetric key sequence number or an asymmetric key sequence number; the crypto chip uses any key at a time. After the serial number, it is necessary to increase the number of times the key sequence number is used. When the number of uses reaches the limit of use, the cipher chip will update the key sequence number, and take the new key sequence number as input and extract the corresponding new key from the physical unclonable module. For the new key corresponding to the symmetric key sequence, the cryptographic chip encrypts the new key and the new key sequence number with the old key and sends it to the trust management party.
  • the cryptographic chip For the private key corresponding to the asymmetric key sequence, the cryptographic chip will The public key corresponding to the private key and its key sequence number are sent to the trust management party, and the trust management party signs the digital certificate for the public key and sends it back to the cryptographic chip.
  • the help PIN code set in the initialization is used in an emergency situation.
  • the trust management party needs to assist the cardholder in addition to all the processes like the universal PIN password. Ask the police for help.
  • the transaction process includes the following steps:
  • the IC card sends the card number to the IC card box;
  • the IC card box sends Ml, Mll, M2, M21 to the trust management party, and the trust management party checks and verifies the validity of Mi l and M21, and ends with an error;
  • the IC card box is based on the value of M32:
  • the IC card box and the IC card both add their respective transaction serial numbers, the IC card box requests the IC card to open the certificate of the IC card box screen door, and after receiving the response, the IC card box will be M5 and M51 is saved to the non-volatile memory of the POS system to open the screen door of the IC card box; the POS system prints the document, and the document includes "IC card box number, IC card box key serial number, IC card box transaction serial number, IC card number, IC card key serial number, IC card transaction serial number, transaction amount, date, time"; after the document is signed by the cardholder and the merchant representative signs and seals, the cardholder holds the stamp, and the merchant submits the signature to the acquiring bank.
  • the acquiring bank will submit an application to the issuing bank after the verification is correct.
  • the issuing bank will transfer the transaction amount from the cardholder's account to the merchant's designated account and end the transaction process.

Abstract

Disclosed are a financial POS system capable of resisting a channel Trojan attack and an anti-attack implementation method thereof. The system comprises a POS mainboard, an IC card box, a password keyboard, a user PIN disk, a nonvolatile memory, an IC card, and a trust management party. The IC card box is connected to the POS mainboard, the password keyboard is connected to the IC card box, the POS mainboard is connected to the trust management party through an I/O interface, and the IC card is connected to the trust management party through the IC card box. In the present invention, under a condition that a subliminal channel can be reliably shielded on a POS terminal of a dealer and a card holder uses a private user PIN disk to confirm a transaction amount and input a PIN password, the dealer and the card holder can avoid the attack of the channel Trojan.

Description

抗信道木马攻击的金融 P0S系统及其抗攻击的实现方法 技术领域  Financial P0S system against channel Trojan attack and its anti-attack implementation method
本发明涉及信息安全中用于保密和认证的密码芯片的应用领域, 特别涉及一种 抗信道木马攻击的金融 P0S系统及抗攻击的实现方法。 背景技术  The invention relates to the application field of a cipher chip for security and authentication in information security, in particular to a financial POS system against channel Trojan attack and an anti-attack implementation method. Background technique
以密码芯片为核心的 IC卡已经广泛应用于金融、 电信、 交通、 公共事业、 政府 部门、 国防和军队等各个领域。 EMV是 Europay、 MasterCard、 VISA三大国际银行 卡组织共同制定的银行 IC卡规范, EMV迁移是指银行卡由磁条卡向集成电路 (IC) 卡转移。 EMV迁移的目的是用 IC卡替换磁条卡, 以防范制作使用假信用卡、 信用 卡欺诈、 跨国金融诈骗等金融犯罪。  IC cards based on crypto chips have been widely used in finance, telecommunications, transportation, public utilities, government, defense, and military. EMV is a bank IC card specification jointly developed by Europay, MasterCard and VISA. EMV migration refers to the transfer of bank cards from magnetic stripe cards to integrated circuit (IC) cards. The purpose of EMV migration is to replace magnetic stripe cards with IC cards to prevent financial crimes such as using fake credit cards, credit card fraud, and cross-border financial fraud.
为便于讨论银行卡的安全性问题, 先看三个经典问题:  To facilitate discussion of the security of bank cards, let's look at three classic questions:
1 ) "象棋大师问题"(Chess Grandmaster):  1) "Chess Grandmaster":
1976年, 丄 Η· Conway在专著 On numbers and games (论数字与游戏) 中提到, 不会下棋的 B与两个国际象棋大师 A和 C下棋。棋盘一中 A执黑对 B, 棋盘二中 B 执黑对 C。 B等棋盘一中执黑的 A先走棋, 然后按 A的走法在棋盘二中走棋, 等棋 盘二的 C走棋后, B学 C的走法在棋盘一中走棋。 如此类推, 两个棋盘的走法完全 一样, 其结果是要么 B赢下其中的一盘棋, 要么两盘均和棋。  In 1976, Η Con Conway mentioned in the monograph On numbers and games that B, which does not play chess, plays chess with two chess masters A and C. In the chessboard, A holds black against B, and in the second checkboard, B holds black against C. B, such as the black one in the chessboard, first moves, then presses A to move in the second board. After the second move of C, the learning of B moves in the chessboard. By analogy, the two boards move exactly the same, and the result is that either B wins one of the games, or both play.
采用 "象棋大师问题"中的方法, 可引起 "黑手党问题"、 "护照租用问题" / "恐 怖分子问题"。 1988年, Yvo Desmedt等人在 Special uses and abuses of the Fiat-Shamir passport protocol (专用和滥用 Fiat-Shamir护照协议)一文中给出这些问题的描述。  Using the method in the "Chess Master Problem" can cause "mafia problem", "passport rental problem" / "terrorist problem". In 1988, Yvo Desmedt et al. gave a description of these issues in the article Special Use and abuses of the Fiat-Shamir passport protocol.
2) "黑手党问题"(Mafia Fraud) :  2) "Mafia Fraud":
A住在黑手党 B开的酒店, C是黑手党的成员, D是珠宝商, B和 C能够通过 无线信道通讯, C的身份识别卡能够通过无线信道与 B的设备通讯。 A和 D将不能 察觉下述假冒:  A lives in a hotel opened by Mafia B, C is a member of the Mafia, D is a jeweler, B and C are able to communicate via wireless channel, and C's identification card can communicate with device B through the wireless channel. A and D will not be aware of the following counterfeiting:
当 A结帐时, B通知 C开始欺诈。 C在 D处挑选珠宝并结帐, D检查 C的身份 识别卡。 在检查过程中, B和 C作为中间人站在 A和 D之间, B和 C交换 A和 D 之间的所有问题和答案, 其结果是 B免去 A的酒店费用, A替 C支付珠宝款。 3 ) "护照租用问题" I "恐怖分子问题"(Renting passports) : When A checks out, B informs C to start fraud. C selects the jewelry at D and checks out, D checks C's identification card. During the inspection process, B and C act as intermediaries between A and D. B and C exchange all questions and answers between A and D. The result is that B is exempt from A's hotel expenses, and A pays for C for jewelry. . 3) "Passport Rental Issues" I "Renting passports":
B无法获得到地点《的通行证,但她很想去。 A计划进行非法活动并希望获得不 在场证据, 于是她建议 B租用她的护照。 通过类似 "黑手党问题"中的方法, B到 了《, A干了非法活动且获得了不在场证据。  B could not get the pass to the location, but she wanted to go. A plans to carry out illegal activities and hopes to obtain evidence of absence, so she recommends B to rent her passport. Through a method similar to the "mafia problem", B went to ", A did illegal activities and obtained evidence of absence.
1990年, Thomas Beth等人在 Identification tokens ― or: Solving The Chess Grandmaster Problem (鉴别令牌 一 或者: 求解象棋大师问题)一文中指出: 在博弈 论 (Game Theory)模型下不存在通用的安全识别问题解决方案, 解决安全识别问题 必须依赖具体的模型; 每提出一个解决黑手党问题的方案, 则从理论上可把这个方 案扩展用于解决护照租用问题。 Thomas Beth等人的结论警示我们: 必须根据某个具 体应用方案讨论 "象棋大师问题"及其衍生问题的解决方法, 不要试图找到这些问 题的通用解决方法。 此外, 文也指出: 把证明者的安全协议嵌入到抗篡改系统中, 并强制证明者遵守协议, 则可有效地解决 "黑手党问题"和 "恐怖分子问题"。  In 1990, Thomas Beth et al. pointed out in the article Identification tokens - or: Solving The Chess Grandmaster Problem: There is no general security identification problem under the Game Theory model. The solution to solve the security identification problem must rely on the specific model; each proposal to solve the mafia problem can theoretically be extended to solve the passport rental problem. The conclusions of Thomas Beth et al. warn us that we must discuss the "Chess Master Problem" and its solutions to the problem based on a specific application. Don't try to find a general solution to these problems. In addition, the article also pointed out: Embedding the certifier's security protocol into the anti-tampering system and forcing the certifier to abide by the agreement can effectively solve the "mafia problem" and "terrorist problem."
2007年, Drimer等人在 Keep your enemies close: Distance bounding against smartcard relay attacks (禁闭您的敌人:基于转发的对智能卡的远距离跳转攻击) 一文中, 利用 "黑手党问题"中的方法攻击了 EMV卡, 如图 1所示。 Drimer等人 的攻击实验与密码安全协议无关 (基于密码的安全协议不足以抵抗这种攻击), 其局 限性在于持有 POS终端的黑手党会暴露自己, 且存在时间同步问题, 文中也提出用 "电子律师"(electronic attorney) 或 "距离限"(Distance bounding) 来抵抗这种攻 击。 2010年,全球发行的 EMV银行卡超过 7.3亿张, Murdoch, S.等人在 Chip and PIN is Broken (芯片和密码被攻破了)一文中给出了对 EMV卡及 PIN密码的针对协议的 中间人攻击方法, 如图 2所示。 Murdoch, S.等人的攻击实验中所用的方法与 "象棋 大师问题"中的方法类似, 但并非简单地转发信息, 而是在 EMV协议关键的步骤中 截获和插入一条信息, 利用文中提出的方法, 当攻击者捡获或偷取到 EMV卡后, 在 持卡人的报失生效前可盗刷 EMV卡,文中建议用基于密码的安全协议抵抗中间人攻 击。  In 2007, Drimer et al. in the "Keep your enemies close: Distance bounding against smartcard relay attacks" article, using the "mafia problem" attack EMV card, as shown in Figure 1. Drimer et al.'s attack experiments are not related to cryptographic security protocols (password-based security protocols are not sufficient to resist such attacks). The limitation is that the mafia holding the POS terminal exposes itself and there is a time synchronization problem. "electronic attorney" or "Distance bounding" to resist this attack. In 2010, there were more than 730 million EMV bank cards issued worldwide. Murdoch, S. et al. gave the agreement on the EMV card and PIN password in the article Chip and PIN is Broken. Attack method, as shown in Figure 2. The method used in Murdoch, S. et al.'s attack experiment is similar to the method in the "Chess Master Problem", but instead of simply forwarding information, it intercepts and inserts a message in the key steps of the EMV protocol, using the proposed Method, after the attacker seizes or steals the EMV card, the EMV card can be stolen before the cardholder's report is effective. The text suggests a password-based security protocol to resist the man-in-the-middle attack.
考虑 EMV协议存在的缺陷, 目前国际上的银行卡协议开始逐渐满足支付卡行业 数据安全标准 (PCI-DSS )。 PCI-DSS 由 PCI 安全标准委员会的创始成员 (包括 American Express、 Discover Financial Services、 JCB、 MasterCard Worldwide禾卩 Visa International) 制定的安全协议, 旨在鼓励国际上采用一致的数据安全措施, 其目的 是确保持卡人的信用卡和借记卡的信息安全。  Considering the shortcomings of the EMV protocol, the international bank card agreement has gradually begun to meet the Payment Card Industry Data Security Standard (PCI-DSS). PCI-DSS is a security protocol developed by the founding members of the PCI Security Standards Council (including American Express, Discover Financial Services, JCB, MasterCard Worldwide, and Visa International) to encourage international adoption of consistent data security measures. The cardholder's credit and debit card information is secure.
通过对现有 EMV金融 POS系统的研究, 我们简化、 总结和归纳了 "象棋大师 问题"、 "黑手党问题"、 "护照租用问题" I "恐怖分子问题" 中的方法, 通过推广发 现了现有 EMV系统中存在信道漏洞,我们把利用信道漏洞进行的攻击称为信道木马 攻击。 已有的 "距离限"、 "电子律师"和基于密码的安全协议难以堵塞信道漏洞。 下面基于信道木马给出持卡人攻击商家、 持卡人攻击持卡人、 商家攻击持卡人、 以 及商家攻击商家的例子。 Through the study of the existing EMV financial POS system, we simplified, summarized and summarized the "Chess Master The method of "problem", "mafia problem", "passport rental problem" I "terrorist problem", through the promotion found that there are channel vulnerabilities in the existing EMV system, we call the attack using channel vulnerability as channel Trojan attack Existing "distance limits", "electronic lawyers" and password-based security protocols are difficult to block channel vulnerabilities. The following is based on channel Trojans giving cardholders attacking merchants, cardholders attacking cardholders, merchants attacking cardholders, And examples of merchants attacking merchants.
信道木马: 其中的信道指信号的传输通道, 木马是指一种秘密潜伏的能够通过 远程网络进行控制的恶意功能模块, 信道木马指的是秘密潜伏在信号传输通路上的 恶意功能模块, 具有对消息的转发、 篡改、 插入、 重放、 截留和泄露等功能。  Channel Trojan: The channel refers to the transmission channel of the signal. The Trojan is a secret latent malicious function module that can be controlled by a remote network. The channel Trojan refers to a malicious function module secretly lurking on the signal transmission path. Forwarding, tampering, inserting, replaying, intercepting, and leaking of messages.
信道木马攻击例子一: 持卡人攻击商家:  Channel Trojan Attack Example 1: Cardholder Attacking Merchant:
如图 3所示, 攻击者持有一张合法的 EMV卡 A, 以及读卡器 B, 攻击合伙人持 一张外观与攻击者的 EMV卡一致的能够跟 B通讯的假卡 C。攻击合伙人用假卡在城 市 G的一家商店购物并在 POS终端 D上刷卡。采用 "黑手党问题"上的方法, 攻击 合伙人将成功地取走货物。 当攻击者确信攻击合伙人安全地离开后, 向警方谎报被 盗刷, 由于攻击者有不在场证据, 因此可向银行提出拒付。 这种攻击的实验方法可 与 Drimer等人的实验方法完全一致。 对于攻击者的拒付请求, 银行应当驳回。  As shown in Figure 3, the attacker holds a legal EMV card A, and a card reader B. The attacking partner holds a fake card C that can communicate with B in accordance with the attacker's EMV card. The attacking partner used a fake card to shop at a store in City G and swipe the card at POS Terminal D. Using the method of the "mafia problem", the attacking partner will successfully take the goods. When the attacker is convinced that the attacking partner has left safely, he falsely reports to the police that he has been stolen. Since the attacker has evidence of absence, he can file a chargeback with the bank. The experimental method of this attack is completely consistent with the experimental method of Drimer et al. The bank shall reject the request for an attacker’s refusal.
信道木马攻击例子二: 持卡人攻击持卡人:  Channel Trojan Attack Example 2: Cardholder Attack Cardholder:
攻击者预先在城市 G的商店 B和城市 H的商店 D的 POS终端的 EMV卡、显示 器、 键盘和打印机的信道上分别插入信道木马。 利用 "黑手党问题"上类似的方法 (也略有不同, B和 C交叉交换信息, 如图 4), 攻击者 A (取 20000元货物) 可以 成功地与另一持卡人 (取 100元货物) 互换帐单。 当持卡人发觉被多刷卡后, 将会 向银行提出拒付。 这种攻击也存在时间同步问题, 持卡人的拒付属于合理诉求, 应 予支持。 如果银行支持拒付, 则商家损失, 否则持卡人损失, 无论如何, 攻击者均 可获利, 而持卡人为无过失被攻。  The attacker inserts a channel Trojan in advance on the channels of the EMV card, the display, the keyboard, and the printer of the POS terminal of the store B of the city G and the store B of the city H. Using a similar method on the "mafia problem" (also slightly different, B and C cross-exchange information, as shown in Figure 4), attacker A (take 20,000 yuan of goods) can successfully contact another cardholder (take 100 yuan) Goods) Exchange bills. When the cardholder finds that he has been swiped, he will file a chargeback with the bank. This kind of attack also has a problem of time synchronization. The cardholder's refusal is a reasonable appeal and should be supported. If the bank supports the refusal, the merchant loses, otherwise the cardholder loses. In any case, the attacker can make a profit, and the cardholder is attacked without fault.
信道木马攻击例子三: 商家攻击持卡人:  Channel Trojan Attack Example 3: Merchant Attack Cardholder:
如图 5所示, 攻击者伪造一台 POS终端 B, POS终端 B的 IC卡座用导线 C接 到一台合法的 POS终端 D的卡座。 如果持卡人在攻击者的商店购物, 则把购物的持 卡人看成 "黑手党问题"中的角色 A, 由于 A看不到合法的 POS终端 D, 而实际的 刷卡金额由 D决定, 因此攻击者可任意设定合法的刷卡金额。 由于持卡人被面前的 假 POS终端蒙骗, IC卡通过导线直接连接到真正的 POS终端, 因此"距离限 "和密 码协议无法解决这种攻击问题, "电子律师"也许可以抵抗这种攻击,但"电子律师" 仅保护持卡人的利益, 如果允许使用 "电子律师", 则持卡人可攻击商家。 持卡人发 现被多刷卡肯定提出拒付, 这是无过失被攻击, 属于合理诉求, 银行应给予支持。 信道木马攻击例子四: 商家攻击商家: As shown in FIG. 5, the attacker forges a POS terminal B, and the IC card holder of the POS terminal B is connected to the deck of a legitimate POS terminal D by the wire C. If the cardholder is shopping at the attacker's store, the cardholder of the purchase is considered to be role A in the "mafia problem", since A does not see the legitimate POS terminal D, and the actual credit card amount is determined by D, Therefore, the attacker can arbitrarily set the legal credit card amount. Since the cardholder is deceived by the fake POS terminal in front of it, the IC card is directly connected to the real POS terminal through the wire, so the "distance limit" and the cryptographic protocol cannot solve the attack problem, and the "electronic lawyer" may be able to resist this attack. However, the "electronic lawyer" only protects the interests of the cardholder. If the "electronic lawyer" is allowed, the cardholder can attack the merchant. Cardholder It is now being refused to pay by multiple cards, which is attacked without fault. It is a reasonable appeal and the bank should give support. Channel Trojan Attack Example 4: Merchant Attack Merchant:
如图 6所示, 在城市 G, 发起攻击的商家在本店的 POS终端 B插入信道木马, 也预先在城市 H的被攻击商家的 POS终端 D中插入信道木马。 持卡人 A在 POS终 端 B刷卡 (100元), 同时持卡人 C在 POS终端 D刷卡 (20000元), 采用与攻击例 子二类似的方法可攻击成功。 这种攻击不影响两个持卡人, 他们的刷卡金额与货值 相等, 但发起攻击的商家付出 100元的货物收取了 20000元, 而被攻击的商家付出 20000元货物却只收到 100元。  As shown in Fig. 6, in the city G, the merchant who initiated the attack inserts the channel Trojan in the POS terminal B of the store, and also inserts the channel Trojan in the POS terminal D of the attacked merchant of the city H in advance. Cardholder A swipes the card at the POS terminal B (100 yuan), and the cardholder C swipes the card at POS terminal D (20,000 yuan). The attack is successful in a similar way to attack example 2. This kind of attack does not affect the two cardholders. Their card amount is equal to the value of the goods, but the attacking merchant pays 20,000 yuan for the goods of 100 yuan, while the attacked merchant pays 20,000 yuan for the goods but only receives 100 yuan. .
上述四个例子中, 例子一、 二、 三的持卡人都向银行提出拒付申请, 其中例子 一的拒付属于抵赖, 应予拒绝, 例子二和三的拒付请求合理, 但现有的欧美银行卡 技术无法区分那一笔拒付申请该拒绝, 那一笔拒付申请该支持。  In the above four examples, the cardholders of Examples 1, 2, and 3 all filed a chargeback application with the bank. The chargeback of Example 1 is a refusal and should be rejected. The second and third refusal requests are reasonable, but existing The European and American bank card technology can't distinguish the rejection of the one-off application, and the one that refuses to apply for the support.
上术四个例子中的攻击与安全协议无关, 即使欧美的银行卡使用满足 PCI-DSS 标准的 POS终端和 EMV卡, 银行和警察也难以区分谁是受害者、 谁是攻击者。 利 用信道漏洞实施信道木马攻击的代价不高, 特别是攻击例子三, 只需要做一台假的 POS终端, 并把假 POS终端的 IC卡座用导线连接到真的 POS终端的 IC卡座即可。 信道木马攻击使得现有的银行 IC卡并不比磁条卡提供更高的安全性!  The attacks in the four examples of the above are not related to the security protocol. Even if the bank cards in Europe and the United States use POS terminals and EMV cards that meet the PCI-DSS standard, it is difficult for banks and police to distinguish who is the victim and who is the attacker. The use of channel vulnerabilities to implement channel Trojan attacks is not costly. In particular, attack example 3, only need to make a fake POS terminal, and connect the IC card holder of the fake POS terminal to the IC card holder of the real POS terminal. can. Channel Trojan attacks make existing bank IC cards no more secure than magnetic stripe cards!
银行卡系统在攻击者眼中具有极高的价值, 必须采用高安全等级的系统, 因此 应设定完善的威胁模型、 制定稳妥的安全策略、 安全协议和安全方法。 旁路攻击、 物理入侵攻击、 芯片木马等新型密码芯片攻击方法均具有信道木马的特征。 Drimer 等人的转播攻击与我们的四个例子均有所不同 (与例子一同构), 均属于基于信道漏 洞的攻击。 Murdoch, S.等人的中间人攻击属于协议攻击, 协议攻击同样具有信道木 马的特征。 因此, 我们将利用信道漏洞开展的攻击、 协议攻击、 旁路攻击、 物理入 侵攻击和芯片木马攻击统称为信道木马攻击。  Bank card systems are extremely valuable in the eyes of attackers, and systems with high security levels must be used. Therefore, a comprehensive threat model, a secure security policy, security protocols, and security methods should be established. New cryptographic chip attack methods such as bypass attacks, physical intrusion attacks, and chip Trojans all have the characteristics of channel Trojans. The broadcast attacks of Drimer et al. are different from our four examples (isolated with the example one), which are all channel-based vulnerabilities. The man-in-the-middle attack by Murdoch, S. et al. is a protocol attack, and the protocol attack also has the characteristics of a channel Trojan. Therefore, we will use channel vulnerabilities to conduct attacks, protocol attacks, bypass attacks, physical intrusion attacks, and chip Trojan attacks collectively as channel Trojan attacks.
旁路攻击 (SCA) 利用芯片泄露的各种物理信息有效地获取密码芯片中的密钥, 这属于信道泄露密钥信息, 只不过这种泄露带有天然性而并非人为引入罢了。 SCA所 需的设备很容易获取, 可以在不留痕迹的情况下实施攻击, 受到空前重视。 SCA已经 攻破了大量的智能卡、 密码芯片和密码系统, 其中包括目前主流的计算安全的 AES、 IDEA, 3DES、 RSA、 ECC等密码算法。 现有抵抗旁路攻击的方法包括隐藏、 掩码、 以 及可证明安全的抗泄露方案。 隐藏方法能够有效增加攻击者的攻击难度, 但隐藏方 法无法证明其安全性; n阶掩码无法抵抗 n+1阶差分攻击, 而已有的抗泄露方案实际 上等同于一次一密, 因此, 目前的实用方案的 SCA抵抗能力远未达到密码学的 "计 算安全" 目标。 我们曾提出 N次密钥方案抵抗旁路攻击: 假设旁路攻击需要 M组密 钥泄露信息方可攻破系统, 如果设定每个密钥的使用次数小于 N次且 N<M, 则需要 M组密钥泄露信息的旁路攻击无法攻击基于 N次密钥方案的系统。采取适当的隐藏措 施, 可以在较低的速度、 面积、 功耗代价的情况有效地增加 M值。 当然, 如果攻击 者能够绕过密码芯片的计数机制, 则限制密钥使用次数无效, 我们的申请号为 201110303449. 1 的专利申请中的方法能够有效地避免攻击者绕过密码芯片的计数机 制, 能有效地抵抗旁路攻击。 Bypass Attack (SCA) uses the various physical information leaked by the chip to efficiently obtain the key in the crypto chip. This is a channel leak key information, but this leak is natural and not artificially introduced. The equipment required for SCA is easy to obtain, and it can be attacked without leaving any traces. SCA has broken a large number of smart cards, cryptographic chips and cryptosystems, including current mainstream computing security AES, IDEA, 3DES, RSA, ECC and other cryptographic algorithms. Existing methods of resisting bypass attacks include hidden, masked, and provable security against leaks. The hidden method can effectively increase the attacker's attack difficulty, but the hidden method can't prove its security; the n-th order mask can't resist the n+1 order differential attack, and the existing anti-leakage scheme is actually equivalent to one time and one secret, therefore, currently The practical solution of SCA resistance is far from the cryptography "Safety" goal. We have proposed N key schemes to resist bypass attacks: Assume that bypass attacks require M sets of key leakage information to break the system, if the number of times each key is used is less than N times and N< M, the bypass attack that requires the M key leakage information cannot attack the system based on the N-time key scheme. By adopting appropriate concealment measures, the M value can be effectively increased at a lower speed, area, and power consumption cost. Of course, if the attacker can bypass the counting mechanism of the cryptographic chip, the number of times the key is used is invalid. The method in the patent application with the application number of 201110303449. 1 can effectively prevent the attacker from bypassing the counting mechanism of the cryptographic chip. , can effectively resist bypass attacks.
物理入侵攻击代价高昂, 因此往往被研究者忽略, 但 Mifare被破、 Actel芯片 被破后破产重组、 如日中天的英飞凌也扛不住其 TPM被破这三件事情提升了人们对 物理入侵攻击的尊重。 其中对英飞凌 TPM 的攻击采用物理入侵芯片, 绕过传感检测 网络后搭线窃听获取密钥和唯一制造信息, 这属于信道窃听。 抵抗物理入侵攻击如 同抵抗穷搜攻击一样, 理论上无法抵抗, 但可通过致密的 CMOS工艺的物理不可克隆 模块的敏感电路包围密码运算逻辑有效增加物理入侵攻击者的实施难度, 甚至达到 "计算安全"效果。 密码运算逻辑根据需要动态地以密钥序号作为输入, 调用密钥 提取流程从物理不可克隆模块中提取密钥。 包含这种密码运算逻辑的密码芯片给物 理入侵者制造了一个物理不可克隆难题: 需要绕过密码运算逻辑外围的物理不可克 隆模块的敏感电路而不能破坏这些敏感电路。  Physical intrusion attacks are expensive, so they are often ignored by researchers, but Mifare is broken, Actel chips are broken, bankruptcy reorganization, and the inferior Infineon can't help but its TPM is broken. These three things have raised people's attacks on physical intrusions. Respect. The attack on the Infineon TPM uses a physical intrusion chip, bypassing the sensor detection network and then tapping the wire to obtain the key and unique manufacturing information, which is a channel eavesdropping. Resist physical intrusion attacks, like resistance to poor search attacks, can't be theoretically resisted, but the sensitive circuit of the physical unclonable module of dense CMOS technology can surround the cryptographic logic to effectively increase the difficulty of implementing physical intruders, even achieving "computational security." "effect. The cryptographic logic dynamically takes the key sequence as input and invokes the key extraction process to extract the key from the physical unclonable module. A cryptographic chip containing such cryptographic logic creates a physical unclonable puzzle for physical intruders: sensitive circuitry that bypasses the physical unclon module of the cryptographic logic's periphery and does not destroy these sensitive circuits.
类似于物理入侵攻击不被重视, 由于芯片木马的攻击代价问题 (主要是插入芯 片木马的代价问题), 使之也易被人们忽略。 所谓芯片木马, 指的是在芯片生产过程 中插入的木马。 考虑利用现有研究成果的问题, 以及芯片产业生存压力等因素, 现 有的密码芯片均利用成熟的 IP核组合而成, 这其中包括密码算法 IP核、 处理器 IP 核、 以及各种功能 IP核。我国现有的密码芯片不可避免需要使用国外技术的功能 IP 核, 甚至其中的处理器 IP核也使用了国外技术。 当然, 在自主的密码算法 IP核中 插入芯片木马很容易被检出, 但在功能 IP核或处理器 IP核中插入木马被检出的概 率很低。 我们一直致力于密码处理器 IP核设计, 目前在密码算法 IP核、 密码算法 专用指令集、 处理器 IP核、 IP核的 FPGA硬仿真、 自定制专用指令集的仿真软件和 编译软件等方面均进展良好, 形成一个完整的密码处理器体系, 目前正打算将一个 13条指令的 MPKC处理器 IP核进行流片实验。基于密码处理器 IP核设计的密码芯片, 即使其它功能模块中插入芯片木马, 密码芯片的保密认证仍然可靠。  Similar to physical intrusion attacks are not valued, due to the attack cost of the chip Trojan (mainly the cost of inserting the chip Trojan), making it easy to be ignored. The so-called chip Trojan refers to the Trojan inserted during the chip production process. Considering the problems of using existing research results and the survival pressure of the chip industry, existing cryptographic chips are all made up of mature IP cores, including cryptographic algorithm IP core, processor IP core, and various functional IPs. nuclear. China's existing cryptographic chips inevitably need to use the functional IP core of foreign technology, and even the processor IP core of the processor also uses foreign technology. Of course, it is easy to check out the chip Trojan inserted in the autonomous cryptographic algorithm IP core, but the probability of inserting a Trojan in the functional IP core or processor IP core is very low. We have been working on cryptographic processor IP core design. Currently, we have cryptographic algorithm IP core, cryptographic algorithm dedicated instruction set, processor IP core, IP core FPGA hard emulation, custom dedicated instruction set emulation software and compiling software. Good progress, forming a complete cryptographic processor system, is currently planning to stream 13 experiments with a 13-instruction MPKC processor IP core. Based on the cryptographic chip designed by the cryptographic processor IP core, even if the chip Trojan is inserted into other functional modules, the secret authentication of the cryptographic chip is still reliable.
信道木马的攻击形式会不断发展, Murdoch, S.等人在攻击芯片和 PIN的论文中 指出, 协议被破难以挽救。 EMV和 PCI协议均非常复杂, 一般而言, 协议越复杂, 分析越困难, 存在致命漏洞的概率则越高。 采用保密和认证手段的协议具有较高的 安全性, 但难以保证对协议攻击免疫, 如果能够动态地更新密码芯片的执行程序、 更新执行程序的过程可靠并且不会降低系统的安全性, 则协议被破后, 简单地更新 执行程序将可避免更换大量硬件和系统。 基于某个难题设计密码系统是信息安全科 研人员所追求的目标, 我们打算基于物理不可克隆难题设计密码系统, 期望这样的 系统具有动态的协议安全性之余, 系统的总体安全性仍然基于物理不可克隆难题。 The attack form of the channel Trojan will continue to evolve, and Murdoch, S. et al. pointed out in the paper attacking the chip and PIN that the agreement was broken and difficult to save. Both the EMV and PCI protocols are very complex. In general, the more complex the protocol, The more difficult the analysis, the higher the probability of a fatal vulnerability. The protocol using confidentiality and authentication means high security, but it is difficult to guarantee immunization against the protocol attack. If the process of dynamically updating the cipher chip execution program and updating the execution program is reliable and does not reduce the security of the system, the protocol After being broken, simply updating the executive will avoid replacing a lot of hardware and systems. Designing a cryptosystem based on a certain problem is the goal pursued by information security researchers. We intend to design a cryptosystem based on a physical unclonable puzzle. It is expected that such a system has dynamic protocol security, and the overall security of the system is still based on physical impossibility. Clone the puzzle.
不存在绝对安全的系统, 但攻击技术在不断进步, 因此防护技术也必须进步, 防护措施应该足够应付预期的攻击者。 作为具有极高价值的被攻击目标, 金融系统 应该追求类似于 "计算安全" 的系统安全目标。 银行作为信任管理方, 其提供的银 行卡系统起码应该做到: 保护持卡人和商家的利益, 如果持卡人或商家无过错, 则 不应该受到攻击。 而上述攻击例子二和例子三中, 持卡人无过错, 却受到攻击, 当 加入攻击例子一和攻击例子四以后, 则现有的银行卡系统根本无法区分谁该承担责 任。  There is no absolutely secure system, but the attack technology is constantly improving, so the protection technology must also be improved, and the protection measures should be sufficient to deal with the expected attackers. As a highly valuable target, the financial system should pursue a system security goal similar to "computational security." As a trust management party, the bank should provide at least the bank card system: Protect the interests of cardholders and merchants. If the cardholder or merchant is not at fault, it should not be attacked. In the second and third examples of the above attack, the cardholder is not at fault, but is attacked. After joining attack example 1 and attack example four, the existing bank card system cannot distinguish who should bear the responsibility.
综上所述, 一种可以有效抵抗信道木马攻击的金融 P0S系统及其抗攻击的实现 方法, 是本领域的技术人员急需解决的问题之一。 发明内容  In summary, a financial P0S system that can effectively resist channel Trojan attacks and an anti-attack implementation method thereof are one of the problems that those skilled in the art urgently need to solve. Summary of the invention
本发明的目的在于克服现有技术的缺点与不足, 提供一种可有效抵抗信道木马 攻击的金融 P0S系统。  The object of the present invention is to overcome the shortcomings and deficiencies of the prior art and to provide a financial POS system that can effectively resist channel Trojan attacks.
本发明的另一目的在于, 提供一种基于上述抗信道木马攻击的金融 P0S系统的 抗攻击的实现方法。  Another object of the present invention is to provide an anti-attack implementation method for a financial POS system based on the above-mentioned anti-channel Trojan attack.
为了达到上述第一目的, 本发明采用以下技术方案:  In order to achieve the above first object, the present invention adopts the following technical solutions:
本发明一种抗信道木马攻击的金融 POS系统,包括 POS主板、 IC卡盒、密码键盘、 用户 PIN盘、非易失存储器、 IC卡、以及信任管理方,所述 IC卡盒与 POS主板相连接, 所述密码键盘与 IC卡盒相连接, 所述 POS主板通过 I/O接口与信任管理方相连接, 所 述 IC卡通过 IC卡盒与信任管理方相连接;  The invention relates to a financial POS system against channel Trojan attack, which comprises a POS motherboard, an IC card box, a PIN pad, a user PIN disk, a nonvolatile memory, an IC card, and a trust management party, and the IC card box and the POS motherboard are Connecting, the PIN pad is connected to the IC card box, and the POS motherboard is connected to the trust management party through an I/O interface, and the IC card is connected to the trust management party through the IC card box;
所述密码键盘用于接收用户 PIN密码;  The PIN pad is configured to receive a user PIN code;
所述用户 PIN盘用于显示交易金额以及接收用户 PIN密码;  The user PIN disk is used to display the transaction amount and receive the user PIN password;
所述非易失存储器用于存储交易的授权凭证;  The nonvolatile memory is configured to store an authorization credential of the transaction;
所述 IC卡盒、 密码键盘、 用户 PIN盘、 IC卡均设置有密码芯片;  The IC card box, the PIN pad, the user PIN disk, and the IC card are all provided with a cryptographic chip;
所述信任管理方与 IC卡盒、 密码键盘、 用户 PIN盘、 IC卡分别共享密钥。 优选的, 所述 IC卡盒包括外部接触式接口、 外部非接触式接口、 内部接触式接 口、 内部非接触式接口和密封屏蔽盒, 所述密封屏蔽盒设置有盒内外通讯线路以及 一个插入 IC卡的开口, 开口处设置有可打开和关闭的密封屏蔽门, 密封屏蔽门密布 接触点。 The trust management party shares a key with an IC card box, a PIN pad, a user PIN disk, and an IC card, respectively. Preferably, the IC card case comprises an external contact interface, an external contactless interface, an internal contact interface, an internal contactless interface and a sealed shielding box, the sealed shielding box is provided with a communication line inside and outside the box and an insertion IC The opening of the card is provided with a sealing screen door that can be opened and closed, and the sealing screen door is densely contacted.
优选的, 所述密封屏蔽盒的内外层各覆盖一层敏感电路层, IC卡盒的密码芯片 设置在内外两层敏感电路层之间, 所述外部接触式接口和外部非接触式接口在外层 敏感电路层外,所述内部接触式接口和内部非接触式接口在内层敏感电路层之内; IC 卡盒的密封屏蔽门打开时切断敏感电路, 密封屏蔽门关闭则连通敏感电路。  Preferably, the inner and outer layers of the sealed shielding box are each covered with a layer of sensitive circuit, and the cryptographic chip of the IC card box is disposed between the inner and outer layers of the sensitive circuit layer, and the external contact interface and the external non-contact interface are in the outer layer. Outside the sensitive circuit layer, the internal contact interface and the internal contactless interface are within the inner sensitive circuit layer; when the sealed screen of the IC card box is opened, the sensitive circuit is cut off, and when the sealed screen door is closed, the sensitive circuit is connected.
优选的, 所述敏感电路层由物理不可克隆模块的敏感电路组成。  Preferably, the sensitive circuit layer is composed of a sensitive circuit of a physical unclonable module.
优选的,所述密码芯片中设置有物理不可克隆模块和密码处理器 IP核,所述物理 不可克隆模块的敏感电路包围在密码处理器 IP核的外围,形成笼形结构,所述密码处 理器 IP核中需要重复使用的密钥序号存储在密码芯片的非易失存储器中,密钥则在需 要使用时, 以密钥序号作为输入从物理不可克隆模块提取。  Preferably, the cryptographic chip is provided with a physical unclonable module and a cryptographic processor IP core, and the sensitive circuit of the physical unclonable module is surrounded by a periphery of the cryptographic processor IP core to form a cage structure, and the cryptographic processor The key sequence that needs to be reused in the IP core is stored in the non-volatile memory of the cryptographic chip, and the key is extracted from the physical unclonable module with the key sequence number as input when needed.
优选的, 所述用户 PIN盘为用户私有, 用户 PIN盘包括接触式接口、 非接触式 接口、 键盘以及显示器, 所述接触式接口可与 IC卡盒的外部接触式接口连接, 所述 非接触式接口可与 IC卡盒的外部非接触式接口连接。  Preferably, the user PIN disk is private to the user, and the user PIN disk includes a contact interface, a contactless interface, a keyboard and a display, and the contact interface can be connected with an external contact interface of the IC card case, the non-contact The interface can be connected to the external contactless interface of the IC card holder.
为了达到上述另一目的, 本发明采用以下技术方案:  In order to achieve the above other object, the present invention adopts the following technical solutions:
本发明一种抗信道木马攻击的金融 POS系统的抗攻击的实现方法, 其具体步骤 为:  The invention provides a method for implementing anti-attack of a financial POS system against channel Trojan attack, and the specific steps are as follows:
( 11 )初始化:  (11) Initialization:
信任管理方向 IC卡盒、 密码键盘、 用户 PIN盘和 IC卡的密码芯片中写入初始 对称密钥序号和初始非对称密钥序号, 以及每个密钥序号的使用限制次数; 密码芯 片以初始对称密钥序号作为输入从物理不可克隆模块中提取初始对称密钥, 密码芯 片将提取到的初始对称密钥发回给信任管理方; 密码芯片以初始非对称密钥序号作 为输入从物理不可克隆模块中提取初始私钥, 计算对应的初始公钥并发给信任管理 方, 信任管理方为初始公钥签署数字证书发回给密码芯片; 信任管理方将本身的公 钥发给 IC卡盒、 密码键盘、 用户 PIN盘和 IC卡中的密码芯片; 信任管理方接收并 存储持卡人的 PIN密码;  The trust management direction writes the initial symmetric key sequence number and the initial asymmetric key sequence number in the cipher chip of the IC card box, the PIN pad, the user PIN disk, and the IC card, and the number of times of use of each key sequence number; The symmetric key sequence is used as an input to extract the initial symmetric key from the physical unclonable module, and the cryptographic chip sends the extracted initial symmetric key back to the trust management party; the cryptographic chip uses the initial asymmetric key sequence number as input and is not clonotable from the physical. The initial private key is extracted from the module, and the corresponding initial public key is calculated and sent to the trust management party. The trust management party signs the digital certificate for the initial public key and sends it back to the cipher chip. The trust management party sends its own public key to the IC card box and password. a password chip in the keyboard, the user PIN disk and the IC card; the trust management party receives and stores the cardholder's PIN code;
( 12 ) 交易流程:  (12) Transaction process:
持卡人将 IC卡插入 IC卡盒中并关闭 IC卡盒的密封屏蔽门, 使 IC卡盒的密封 屏蔽盒起屏蔽作用,从而使 IC卡盒中的 IC卡只能通过 IC卡盒的内外通讯线路跟 IC 卡盒外的设备通讯; 另外, IC卡盒的密封屏蔽门关闭后, IC卡盒上的物理不可克隆 模块的敏感电路导通, 从而使 IC卡盒的密码芯片能够从物理不可克隆模块中提取与 信任管理方共享的密钥以及 IC卡盒密码芯片的私钥; The card holder inserts the IC card into the IC card case and closes the sealed screen door of the IC card case, so that the sealed shielding box of the IC card case acts as a shield, so that the IC card in the IC card case can only pass through the inside and outside of the IC card case. Communication line and IC The device communication outside the card box; in addition, after the sealed screen door of the IC card box is closed, the sensitive circuit of the physical unclonable module on the IC card box is turned on, so that the cipher chip of the IC card box can be extracted from the physical unclonable module The key shared with the trust management party and the private key of the IC card cipher chip;
( 13 ) 增加密钥序号使用次数流程:  ( 13 ) Increase the number of key sequence usage times:
密码芯片每次使用与信任管理方共享的密钥或自身的私钥时, 都需要使用对称 密钥序号或非对称密钥序号从物理不可克隆模块中提取; 密码芯片每次使用任意一 个密钥序号后均需要增加密钥序号的使用次数, 当使用次数达到使用限制次数时, 密码芯片将更新密钥序号, 并将新的密钥序号作为输入从物理不可克隆模块中提取 对应的新密钥; 对于对称密钥序号对应的新密钥, 密码芯片用旧密钥加密新密钥和 新的密钥序号后发送给信任管理方, 对于非对称密钥序号对应的私钥, 密码芯片将 该私钥对应的公钥及其密钥序号发给信任管理方, 信任管理方为该公钥签署数字证 书发回给密码芯片。  Each time the cryptographic chip uses the key shared by the trust manager or its own private key, it needs to be extracted from the physical unclonable module using a symmetric key sequence number or an asymmetric key sequence number; the crypto chip uses any key at a time. After the serial number, it is necessary to increase the number of times the key sequence number is used. When the number of uses reaches the limit of use, the cipher chip will update the key sequence number, and take the new key sequence number as input and extract the corresponding new key from the physical unclonable module. For the new key corresponding to the symmetric key sequence, the cryptographic chip encrypts the new key and the new key sequence number with the old key and sends it to the trust management party. For the private key corresponding to the asymmetric key sequence, the cryptographic chip will The public key corresponding to the private key and its key sequence number are sent to the trust management party, and the trust management party signs the digital certificate for the public key and sends it back to the cryptographic chip.
优选的, 所述初始化进一步包括设定一个求助 PIN密码, 所述求助 PIN密码在 紧急情况下使用, 当持卡人在交易流程中输入求助 PIN密码时, 信任管理方除完成 与通用 PIN密码一样的所有流程外, 需要协助持卡人向警方提出求助。  Preferably, the initializing further comprises setting a help PIN password, wherein the help PIN password is used in an emergency situation, and when the cardholder enters the help PIN password in the transaction process, the trust management party completes the same as the universal PIN password. Outside of all the processes, the cardholder needs to be assisted to ask the police for help.
优选的, 所述交易流程包括以下步骤:  Preferably, the transaction process comprises the following steps:
(21 ) IC卡将卡号发送给 IC卡盒;  (21) The IC card sends the card number to the IC card box;
(22) IC卡盒将 IC卡号、 IC卡盒号发送给信任管理方;  (22) The IC card box sends the IC card number and the IC card box number to the trust management party;
(23 )信任管理方根据 IC卡号可查询到 IC卡是否使用持卡人私有的用户 PIN 盘, 根据 IC卡盒号查询到密码键盘号; 如果 IC卡使用用户 PIN盘, 则交互三方为 IC卡、 IC卡盒和用户 PIN盘, 否则为 IC卡、 IC卡盒和密码键盘; 信任管理方产生 一个会话密钥, 分别用与交互三方共享的密钥或者三方的公钥加密会话密钥后分发 给交互三方, 下述步骤 (24) - (29 ) 中的通讯均使用会话密钥加密;  (23) The trust management party can query whether the IC card uses the cardholder's private user PIN disk according to the IC card number, and query the password keyboard number according to the IC card box number; if the IC card uses the user PIN disk, the interactive three parties are the IC card. , IC card box and user PIN disk, otherwise IC card, IC card box and password keyboard; trust management party generates a session key, respectively, using the key shared with the three parties or the three-party public key to encrypt the session key and then distribute For interactive three parties, the communication in steps (24) - (29) below is encrypted using the session key;
(24) IC卡盒向 IC卡发送 Ml和 Mil, 其中 Ml = "IC卡盒号、 IC卡盒密钥序 号、 IC卡盒密钥序号使用次数、 IC卡盒交易序号、交易金额", M11=EK (H (MD ); 其中 EK ( )表示以密码芯片与信任管理方共享的密钥对信息加密, 或者用发起方的 私钥对信息签名; H ( ) 是一个 HASH函数; IC卡盒调用增加密钥序号使用次数流 程;  (24) The IC card box sends Ml and Mil to the IC card, where Ml = "IC card box number, IC card box key serial number, IC card box key serial number usage count, IC card box transaction serial number, transaction amount", M11 =EK (H (MD ); where EK ( ) indicates that the key is encrypted with the key shared by the cryptographic chip and the trust manager, or the information is signed with the private key of the initiator; H ( ) is a HASH function; IC card box Calling to increase the number of key sequence usage times;
(25 ) IC卡向 IC卡盒发送 M2和 M21 , 其中 M2 = "IC卡号、 IC卡密钥序号、 IC卡密钥序号使用次数、 IC卡交易序号", M21 =EK (H (M2||M11 ) ), IC卡调用 增加密钥序号使用次数流程; (26) IC卡盒向信任管理方发送 Ml、 Mil, M2、 M21, 信任管理方检查并验 证 Mil和 M21的有效性, 有误则结束; (25) The IC card sends M2 and M21 to the IC card box, where M2 = "IC card number, IC card key serial number, IC card key serial number usage count, IC card transaction serial number", M21 = EK (H (M2|| M11)), the IC card calls to increase the number of key sequence usage times; (26) The IC card box sends Ml, Mil, M2, M21 to the trust management party, and the trust management party checks and verifies the validity of the Mil and M21, and ends with an error;
(27)信任管理方向 IC卡盒发送 M3、 M31和 M32, 其中 M3= "M2、 交易金 额", M31-EK (H (M3)), 信任管理方根据 M2中的 IC卡号查询 IC卡的使用的 PIN设备, 如果采用密码键盘, 则 M32 = l, 如果采用用户 PIN盘则 M32 = 2;  (27) Trust management direction The IC card box sends M3, M31 and M32, where M3 = "M2, transaction amount", M31-EK (H (M3)), and the trust management party queries the use of the IC card according to the IC card number in M2. PIN device, if using a PIN pad, M32 = l, if using a user PIN disk, M32 = 2;
(28) IC卡盒根据 M32的值决定将 M3和 M31发给密码键盘或用户 PIN盘, 并接收 M4=EK (H (M3、 用户 PIN密码));  (28) The IC card box decides to send M3 and M31 to the PIN pad or the user PIN disk according to the value of M32, and receives M4=EK (H (M3, user PIN code));
(29) IC卡盒将 M4发给信任管理方,信任管理方验证无误后,把 M5= "Ml、 Mil, M2、 M21、 M3、 M4、 日期、 时间"作为一条记录保存起来, 计算 M51=EK (29) The IC card box sends M4 to the trust management party. After the trust management party verifies the error, save M5= "Ml, Mil, M2, M21, M3, M4, date, time" as a record, and calculate M51= EK
(H (M5)) 并发送给 IC卡盒; IC卡盒和 IC卡均增加各自的交易序号, IC卡盒请 求 IC卡打开 IC卡盒屏蔽门的凭证, 得到回应后 IC卡盒将 M5和 M51保存到 POS 系统的非易失存储器中,打开 IC卡盒的屏蔽门; POS系统打印单据,单据上包含" IC 卡盒号、 IC卡盒密钥序号、 IC卡盒交易序号、 IC卡号、 IC卡密钥序号、 IC卡交易 序号、 交易金额、 日期、 时间"; 单据由持卡人签名和商家代表签名盖章后, 持卡人 持有盖章联, 商家持签名单据向收单行提出收单申请, 收单行验证无误后向发卡行 提出申请, 发卡行把交易金额从持卡人的帐号转入商家的指定帐号后结束交易流程。 (H (M5)) and sent to the IC card box; the IC card box and the IC card both add their respective transaction serial numbers, the IC card box requests the IC card to open the certificate of the IC card box screen door, and after receiving the response, the IC card box will be M5 and M51 is saved to the non-volatile memory of the POS system to open the screen door of the IC card box; the POS system prints the document, and the document includes "IC card box number, IC card box key serial number, IC card box transaction serial number, IC card number, IC card key serial number, IC card transaction serial number, transaction amount, date, time"; after the document is signed by the cardholder and the merchant representative signs and seals, the cardholder holds the stamp, and the merchant submits the signature to the acquiring bank. After receiving the application, the acquiring bank will apply to the issuing bank after the verification is correct. The issuing bank will transfer the transaction amount from the cardholder's account to the merchant's designated account and end the transaction process.
优选的, 步骤 (28) 的具体内容为:  Preferably, the specific content of step (28) is:
(281 )如果 M32 = 1则把 M3和 M31发给密码键盘,密码键盘验证 M3和 M31, 有误则调用增加密钥序号使用次数流程后结束, 验证 M3和 M31无误后密码键盘接 收用户 PIN密码,并向 IC卡盒发送 M4,其中 M4 = EK (H (M3、用户 PIN密码)), 密码键盘调用增加密钥序号使用次数流程;  (281) If M32 = 1, send M3 and M31 to the PIN pad, and the PIN pad verifies M3 and M31. If there is an error, the process of adding the key sequence number is used to end the process. After verifying that M3 and M31 are correct, the PIN pad receives the user PIN code. And send M4 to the IC card box, wherein M4 = EK (H (M3, user PIN code)), the password keyboard calls to increase the number of key sequence usage times;
(282)如果 M32 = 2则把 M3和 M31发给用户 PIN盘,用户 PIN盘验证 M3和 M31, 有误则调用增加密钥序号使用次数流程后结束, 无误后显示 M3, 用户确认 M3的金额无误后输入 PIN密码, 用户 PIN盘向 IC卡盒发送 M4, 其中 M4 = EK (H (282) If M32 = 2, send M3 and M31 to the user's PIN disk, and the user PIN disk will verify M3 and M31. If there is an error, the process of increasing the key number usage times will be called, and M3 will be displayed after error. The user confirms the amount of M3. After entering the PIN code without error, the user PIN disk sends M4 to the IC card box, where M4 = EK (H
(M3、 用户 PIN密码)), 用户 PIN盘调用增加密钥序号使用次数流程。 本发明相对于现有技术具有如下的优点及效果: (M3, user PIN code)), the user PIN disk calls to increase the number of key sequence usage times. The present invention has the following advantages and effects over the prior art:
1、 本发明可有效地抵抗基于我们提出的信道漏洞的四个信道木马攻击例子所述 的攻击, 而现有的银行卡技术无法抵抗这四种攻击。 攻击例子一、 二和四的开展均 依赖于无线通讯 (潜信道), 否则商家会发现攻击行为。 本发明的金融 P0S系统中带 屏蔽功能的 IC卡盒必须关闭屏蔽门才能进行交易操作, 而关闭屏蔽门将使 IC卡盒 中的 IC卡无法通过无线通讯跟交界交换信息, 从而使例子一、 二和四的攻击无法开 展。 对于攻击例子三、 当持卡人采用私有的用户 PIN盘输入 PIN密码时, 由于持卡 人事先检査刷卡金额, 因此商家无法篡改刷卡金额, 因此例子三的攻击方法失效。 1. The present invention is effective against attacks described in the four channel Trojan attack examples based on our proposed channel vulnerabilities, and existing bank card technologies are not resistant to these four attacks. The attack examples 1, 2 and 4 are all dependent on wireless communication (submerged channel), otherwise the merchant will find the attack behavior. In the financial POS system of the present invention, the IC card box with the shielding function must be closed to open the screen door for trading operations, and closing the screen door will cause the IC card box to be closed. The IC card in the middle cannot exchange information with the border through wireless communication, so that the attacks of the first, second and fourth examples cannot be carried out. For the attack example 3, when the cardholder enters the PIN code using the private user PIN disk, since the cardholder checks the card amount in advance, the merchant cannot tamper with the card amount, so the attack method of the third example is invalid.
2、 可有效增加 IC卡抢劫者的风险。 所谓 IC卡抢劫者, 是指劫持持卡人, 逼迫 持卡人说出 PIN密码, 进而利用持卡人的 IC卡取款的犯罪分子。 由于犯罪分子难以 区分持卡人给出的究竟是普通 PIN密码还是求助 PIN密码, 当犯罪分子用持卡人的 求助 PIN密码取款时, 信任管理方将能够及时通知警方。  2, can effectively increase the risk of IC card robbers. The so-called IC card robbery refers to the criminals who hijack the cardholder and force the cardholder to say the PIN code and then use the cardholder's IC card to withdraw money. Since it is difficult for criminals to distinguish whether the cardholder gives a normal PIN code or a help PIN code, the trust manager will be able to notify the police in time when the criminal uses the cardholder's PIN for withdrawal.
3、 具有动态的旁路攻击安全性。 后台信任管理方通过交易记录可监控密钥的使 用情况, 通过限定使用次数限制攻击者最多可收集到同一密钥的 N组泄露信息, 如 果新型的旁路攻击采集 M组泄露信息可攻破系统,当 N>M,则攻击者可攻击系统。 出现这种情况后, 后台信任管理方通设定每个密钥最多使用 L次, 使得攻击者只可 收集到 L组泄露, 并且 L<M, 则需要 M组泄露信息的新型旁路攻击方法失效。  3. Dynamic bypass attack security. The background trust management party can monitor the usage of the key through the transaction record. By limiting the number of uses, the attacker can collect up to N sets of leak information of the same key. If the new bypass attack collects the M group leak information, the system can be broken. When N>M, an attacker can attack the system. After this happens, the background trust management party sets each key to use up to L times, so that the attacker can only collect the L group leaks, and L<M, the new bypass attack method that needs the M group leak information. Invalid.
4、 本发明金融 POS系统具有以下特性:  4. The financial POS system of the present invention has the following characteristics:
( 1 )有效抵抗芯片木马攻击。在密码处理器 IP核中插入芯片木马很容易被检出, 而在密码处理 IP核外的其它功能 IP核中插入芯片木马时, 由于密码处理器 IP核自 成一体, 因此采用密码处理器 IP核的密码芯片的保密和认证服务仍然可靠。  (1) Effectively resist chip Trojan attacks. Inserting a chip Trojan in the cryptographic processor IP core is easy to check out, and when a chip Trojan is inserted into another functional IP core other than the cryptographic processing IP core, since the cryptographic processor IP core is self-contained, the cryptographic processor IP is used. The security and authentication services of the core crypto chip are still reliable.
(2 )具有增强的抗物理入侵攻击能力。 物理克隆模块的延迟电路覆盖在密码处 理器 IP核的外围 (也覆盖在 IC卡盒密封屏蔽层的内层和外层), 如果攻击者想通过 物理入侵攻击获取密钥, 则需要绕过敏感电路而不能破坏敏感电路, 并且成功搭线 窃听方可成功, 这是我们设定的 "难题", 是我们设计的系统的安全基础。  (2) It has an enhanced ability to resist physical intrusion attacks. The delay circuit of the physical cloning module is overlaid on the periphery of the cryptographic processor IP core (also covering the inner and outer layers of the IC card encapsulation shield). If an attacker wants to obtain a key through a physical intrusion attack, it needs to bypass the sensitivity. The circuit can't damage the sensitive circuit, and the successful wire-tapping can be successful. This is the "difficult" we set, and it is the security foundation of the system we designed.
(3 ) 具有增强的抗旁路攻击能力。 密码处理器 IP核中插入汉明距离干扰的开 销不大, 但却能有效增加基于能量 /电磁等被动旁路攻击者建立汉明模型的难度, 大 幅提高攻击需要采集的泄露样本数, 而后台信任管理方又限制每个密钥的使用次数, 达到规定的使用次数后强制更新; PUF的延迟电路覆盖在处理器 IP核的外围则有效 地增加诸如故障注入等主动旁路攻击者的攻击代价。  (3) It has an enhanced anti-bypass attack capability. The cost of inserting Hamming distance interference into the IP core of the cryptographic processor is not large, but it can effectively increase the difficulty of establishing a Hamming model based on passive bypass attacks such as energy/electromagnetic, and greatly increase the number of leaked samples that the attack needs to collect. The trust management party limits the number of times each key is used, and forces the update after the specified number of uses. The PUF delay circuit covers the periphery of the processor IP core to effectively increase the attack cost of an active bypass attacker such as fault injection. .
下一歩, 我们将会基于物理不可克隆难题实现动态的协议安全性: 如果敌手不 能攻破物理不可克隆模块, 那么即使敌手采用新型协议攻击方法攻破了协议, 也可 以通过在线更新 IC卡、 POS终端、 用户 PIN盘、 后台设备的执行协议的程序来抵抗 新型协议攻击,从而避免大量更换 IC卡和金融 POS终端,有效降低协议被破的损失。  Next, we will implement dynamic protocol security based on physical unclonable puzzles: If the adversary can't break the physical unclonable module, then even if the adversary uses a new protocol attack method to break the protocol, you can update the IC card, POS terminal online, The program of the user PIN disk and the background device execution protocol resists the new protocol attack, thereby avoiding a large number of replacement of the IC card and the financial POS terminal, thereby effectively reducing the loss of the protocol.
总而言之, 金融 P0S系统抵抗信道木马的攻击需要基于物理不可克隆模块难题 的新型密码芯片,需要遵守协议、抗篡改并能屏蔽潜信道的 IC卡盒,需要遵守协议、 抗篡改并能显示交易金额的持卡人私有的用户 PIN盘。 附图说明 In summary, the financial P0S system's resistance to channel Trojan attacks requires a new cryptographic chip based on the problem of physical unclonable modules. IC cards that need to comply with protocols, tamper-resistant and can shield potential channels, need to comply with the protocol. A cardholder-private user PIN that is tamper-proof and can display the transaction amount. DRAWINGS
图 1是 Drimer等人的黑手党攻击示意图;  Figure 1 is a schematic diagram of the mafia attack by Drimer et al;
图 2是 Murdoch, S.等人的 EMV协议中间人攻击示意图;  Figure 2 is a schematic diagram of the EMV protocol man-in-the-middle attack by Murdoch, S. et al.
图 3是信道木马攻击例子一之持卡人攻击商家的示意图;  3 is a schematic diagram of a card attacker attacking a merchant in the channel Trojan attack example 1;
图 4是信道木马攻击例子二之持卡人攻击持卡人的示意图;  4 is a schematic diagram of a cardholder attacking a cardholder in the second example of the channel Trojan attack;
图 5是信道木马攻击例子三之商家攻击持卡人示意图;  FIG. 5 is a schematic diagram of a merchant attack cardholder of the channel Trojan attack example 3;
图 6是信道木马攻击例子四之商家攻击商家示意图;  6 is a schematic diagram of a merchant attacking merchant of the channel Trojan attack example 4;
图 Ί是本发明抗信道木马攻击的金融 P0S系统结构示意图;  Figure Ί is a schematic structural diagram of a financial P0S system of the anti-channel Trojan attack of the present invention;
图 8是双仲裁器物理不可克隆模块 DAPUF的示意图;  Figure 8 is a schematic diagram of a dual arbitrator physical unclonable module DAPUF;
图 9是 DAPUF的密钥生成流程图;  Figure 9 is a flow chart of key generation of the DAPUF;
图 10是 DAPUF的密钥重建流程图。  Figure 10 is a flow chart of key reconstruction of the DAPUF.
具体实施方式 detailed description
下面结合实施例及附图对本发明作进一步详细的描述, 但本发明的实施方式不 限于此。  The present invention will be further described in detail below with reference to the embodiments and drawings, but the embodiments of the invention are not limited thereto.
实施例  Example
如图 7所示, 本实施例一种抗信道木马攻击的金融 POS系统, 包括 POS主板、 IC 卡盒、 密码键盘、 用户 PIN盘、 非易失存储器、 IC卡、 以及信任管理方, 所述 IC卡盒 与 POS主板相连接, 所述密码键盘与 IC卡盒相连接, 所述 POS主板通过 I/O接口与信 任管理方相连接, 所述 IC卡通过 IC卡盒与信任管理方相连接;  As shown in FIG. 7, a financial POS system against channel Trojan attacks includes a POS motherboard, an IC card box, a PIN pad, a user PIN disk, a nonvolatile memory, an IC card, and a trust management party. The IC card box is connected to the POS motherboard, and the PIN pad is connected to the IC card box. The POS board is connected to the trust management party through an I/O interface, and the IC card is connected to the trust management party through the IC card box. ;
所述密码键盘用于接收用户 PIN密码;  The PIN pad is configured to receive a user PIN code;
所述用户 PIN盘用于显示交易金额以及接收用户 PIN密码;  The user PIN disk is used to display the transaction amount and receive the user PIN password;
所述非易失存储器用于存储交易的授权凭证;  The nonvolatile memory is configured to store an authorization credential of the transaction;
所述 IC卡盒、 密码键盘、 用户 PIN盘、 IC卡均设置有密码芯片;  The IC card box, the PIN pad, the user PIN disk, and the IC card are all provided with a cryptographic chip;
所述信任管理方与 IC卡盒、 密码键盘、 用户 PIN盘、 IC卡分别共享密钥。  The trust management party shares a key with an IC card box, a PIN pad, a user PIN disk, and an IC card, respectively.
所述 IC卡盒包括外部接触式接口、 外部非接触式接口、 内部接触式接口、 内部 非接触式接口和密封屏蔽盒, 所述密封屏蔽盒设置有盒内外通讯线路以及一个插入 IC卡的开口, 开口处设置有可打开和关闭的密封屏蔽门, 密封屏蔽门密布接触点。 所述密封屏蔽盒的内外层各覆盖一层敏感电路层, 所述敏感电路层由物理不可 克隆模块的敏感电路组成; IC卡盒的密码芯片设置在内外两层敏感电路层之间, 所 述外部接触式接口和外部非接触式接口在外层敏感电路层外, 所述内部接触式接口 和内部非接触式接口在内层敏感电路层之内; IC卡盒的密封屏蔽门打开时切断敏感 电路, 密封屏蔽门关闭则连通敏感电路。 The IC card case comprises an external contact interface, an external contactless interface, an internal contact interface, an internal contactless interface and a sealed shielding box, the sealed shielding box is provided with a communication line inside and outside the box and an opening for inserting the IC card A sealed screen door that can be opened and closed is provided at the opening, and the sealing door is sealed with a contact point. The inner and outer layers of the sealed shielding box are each covered with a sensitive circuit layer, and the sensitive circuit layer is composed of a sensitive circuit of a physical unclonable module; the cryptographic chip of the IC card box is disposed between the inner and outer two sensitive circuit layers, The external contact interface and the external contactless interface are outside the outer sensitive circuit layer, the internal contact interface and the internal non-contact interface are within the inner sensitive circuit layer; the sealed circuit of the IC card box is cut off when the shielding gate is opened When the sealed screen door is closed, the sensitive circuit is connected.
所述密码芯片中设置有物理不可克隆模块和密码处理器 IP核,所述物理不可克隆 模块的敏感电路包围在密码处理器 IP核的外围, 形成笼形结构, 所述密码处理器 IP 核中需要重复使用的密钥序号存储在密码芯片的非易失存储器中, 密钥则在需要使 用时, 以密钥序号作为输入从物理不可克隆模块提取。  The cryptographic chip is provided with a physical unclonable module and a cryptographic processor IP core, and the sensitive circuit of the physical unclonable module is surrounded by the periphery of the cryptographic processor IP core to form a cage structure, and the cryptographic processor IP core The key sequence that needs to be reused is stored in the non-volatile memory of the cryptographic chip, and the key is extracted from the physical unclonable module with the key sequence number as input when needed.
所述物理不可克隆模块可采用双仲裁器不可克隆模块 DAPUF , 如图 8所示; DAPUF包含 m (图 7中 m=l)组延时电路, m个正仲裁器 (Arbiterl)和 m个反仲裁器 (Arbiter2)组成, 输入一个 n比特的挑战 C获得 m比特正仲裁应答 LR和 m比特反仲裁应 答 RR; DAPUF中每组延时电路由 n个两进两出的通路选择器组成, 每个通路选择器 的激励信号通路由挑战 C中的一比特控制, 激励信号分成上下两条通路同时到达第一 个通路选择器, 如果挑战的第一比特为 0则两路信号直通输出, 否则交叉输出; 当两 路信号通过由挑战的第 n比特控制的第 n个通路选择器后, 上下两路信号直接送到正 仲裁器并且交叉后送到反仲裁器, 正仲裁器和反仲裁器根据上下两路信号到达的先 后顺序, 如果上路先到则输出 1, 否则输出 0。  The physical unclonable module may adopt a double arbiter non-cloning module DAPUF, as shown in FIG. 8; DAPUF includes m (m=l in FIG. 7) group delay circuit, m positive arbiter (Arbiterl) and m counters Arbiter (Arbiter2), input an n-bit challenge C to obtain m-bit positive arbitration response LR and m-bit inverse arbitration response RR; each delay circuit in DAPUF consists of n two-in and two-out path selectors, each The excitation signal path of the path selector is controlled by one bit in the challenge C. The excitation signal is divided into two upper and lower paths to reach the first path selector. If the first bit of the challenge is 0, the two signals are directly output, otherwise the crossover Output; When two signals pass through the nth path selector controlled by the nth bit of the challenge, the upper and lower signals are directly sent to the positive arbiter and cross-processed to the inverse arbiter, and the positive arbiter and the inverse arbiter are The order in which the upper and lower signals arrive is output, if the first path is first, the output is 1, otherwise the output is 0.
采用如图 9所示的密钥生成流程和如图 10所示的密钥重建流程开展实验 (图 9和 图 10中的 OWP^、 OWF2和 OWF3均为单向函数)。目前,我们已经收集了 630万组 DAPUF 的挑战应答对, 每个应答包含 64比特正仲裁应答和 64比特反仲裁应答, 其中平均有 效比特为 57.4 (每 64) 比特。 630万个应答中的有效应答比特已经通过 NIST的随机性 测试, 对相同的 10万组挑战, 不同的芯片之间有效应答的比特差异率约为 49.6%, 相 同芯片相同挑战不同区域的有效应答比特差率为 49.01%。 所测试的 630万数据中, 没 有出现需要启用 Shamir门限方案恢复密钥的情况。 Experiments were carried out using the key generation flow shown in FIG. 9 and the key reconstruction process shown in FIG. 10 (OWP^, OWF 2, and OWF 3 in FIGS. 9 and 10 are both one-way functions). Currently, we have collected a challenge response pair of 6.3 million DAPUFs, each containing a 64-bit positive arbitration response and a 64-bit inverse arbitration response with an average effective bit of 57.4 (every 64) bits. The valid response bits in the 6.3 million responses have passed the randomness test of NIST. For the same 100,000 group challenge, the bit difference rate of effective responses between different chips is about 49.6%. The same chip has the same challenge and the effective response of different regions. The bit difference rate is 49.01%. Of the 6.3 million data tested, there is no need to enable the Shamir threshold scheme to recover the key.
所述密码处理器 IP核根据密码运算定制指令集, 以多变量公钥密码 MPKC的彩虹 签名和验证需求为例, 可定制如表 1所示的指令集和表 2所示的指令集译码表。  The cryptographic processor IP core performs a custom instruction set according to the cryptographic operation, taking the rainbow signature and verification requirements of the multivariate public key cipher MPKC as an example, and can customize the instruction set shown in Table 1 and the instruction set decoding shown in Table 2. table.
表 1
Figure imgf000014_0001
R SUB d,Rt, s s- t送 Rd
Table 1
Figure imgf000014_0001
R SUB d, Rt, s s- t send Rd
R XOR Rd,Rt,Rs Rt按位异或 Rs送 Rd  R XOR Rd, Rt, Rs Rt Bitwise XOR Rs
R GFM d,Rt,Rs 域上乘法 Rd=Rt* s  R GFM d, Rt, Rs domain multiplication Rd=Rt* s
R GFI d,Rt, s 域上求逆 Rd=GF_Inv(Rs)  R GFI d, Rt, inversion on the s domain Rd=GF_Inv(Rs)
R ANRd 生成随机数送 Rd  R ANRd generates random number to send Rd
I BEQ Rt, s,Radr Rs等于 Rt则把 PC+Radr送 PC寄存器  I BEQ Rt, s, Radr Rs equals Rt, then send PC+Radr to PC register
I ADDI t,Rs,Imm Imm+Rt送 Rt。 (Rs不参与运算)  I ADDI t, Rs, Imm Imm + Rt to send Rt. (Rs does not participate in the operation)
I LW t,Rs,Radr 把地址为 Rs+Radr的存储单元或 10端口中的内容送 到 Rt。  I LW t, Rs, Radr sends the contents of the storage unit or port 10 with the address Rs+Radr to Rt.
I SW t,Rs,Radr 把 Rt的内容存到地址为 Rs+Radr的存储单元或 10端 口中。  I SW t, Rs, and Radr store the contents of Rt in the storage unit or port 10 with the address Rs+Radr.
J JMP Adr 把 Adr送 PC  J JMP Adr sends Adr to PC
表 2  Table 2
Figure imgf000015_0001
000010 Adr(A9~A2) A1,A0=00 J Jmp Adr
Figure imgf000015_0001
000010 Adr(A9~A2) A1,A0=00 J Jmp Adr
000100 Rs Rt Radr(A7~A0) I BEQ 000100 Rs Rt Radr(A7~A0) I BEQ
001000 Rs Rt Immed(Sign OOOOH D15-D0) I ADDI 001000 Rs Rt Immed(Sign OOOOH D15-D0) I ADDI
100011 Rs Rt Radr I LW 100011 Rs Rt Radr I LW
101011 Rs Rt Radr I SW 101011 Rs Rt Radr I SW
对于表 1中的指令, 每条指令均在一个时钟周期内完成, 每个时钟周期分为取指 令、译码、 控制、 执行和回写 5个阶段。采用表 1所示的指令集编程, MPKC彩虹处理 器 IP核采用 16比特的数据通道, 32个通用寄存器, 在 Altera公司的 EP2S系列 FPGA中 占用 1261个 ALUTs和 539个专用逻辑寄存器。 签名算法的程序占用 2216个字节空间 ( 554 * 4), 消耗 405392个时钟周期。 MPKC的彩虹签名和验证需要 11条指令的指令 集, 但除了域上乘法 GFM和域上求逆 GFI为 MPKC的专用指令外, 其余指令均为通用 指令, 可直接被其它算法和通用控制程序采用。 通过适当处理, GFI消耗的门电路甚 至可以和 AES算法的求逆运算共用。  For the instructions in Table 1, each instruction is completed in one clock cycle, and each clock cycle is divided into five stages: instruction fetch, decode, control, execution, and write back. Using the instruction set programming shown in Table 1, the MPKC Rainbow Processor IP core uses 16-bit data channels and 32 general-purpose registers, occupying 1261 ALUTs and 539 dedicated logic registers in Altera's EP2S series FPGAs. The signature algorithm program occupies 2216 bytes of space ( 554 * 4) and consumes 405392 clock cycles. MPKC's rainbow signature and verification requires an instruction set of 11 instructions, but except for the domain multiply GFM and the domain inversion GFI is a dedicated instruction of MPKC, the other instructions are general instructions, which can be directly adopted by other algorithms and general control programs. . With proper processing, the GFI-consuming gates can even be shared with the inversion of the AES algorithm.
所述密码处理器 IP核在每个指令周期的数据通路的 5个阶段中插入汉明距离干扰, 使每个指令阶段的汉明距离保持为一个恒定值, 则可有效消除处理器的功耗特征, 从而使得攻击者难以建立汉明模型。  The cryptographic processor IP core inserts Hamming distance interference in five stages of the data path of each instruction cycle, so that the Hamming distance of each instruction stage is maintained at a constant value, thereby effectively eliminating processor power consumption. Features that make it difficult for an attacker to build a Hamming model.
所述用户 PIN盘为用户私有, 用户 PIN盘包括接触式接口、 非接触式接口、 键盘 以及显示器, 所述接触式接口可与 IC卡盒的外部接触式接口连接, 所述非接触式接 口可与 IC卡盒的外部非接触式接口连接。  The user PIN disk is private to the user, and the user PIN disk includes a contact interface, a contactless interface, a keyboard, and a display, and the contact interface can be connected to an external contact interface of the IC card case, and the contactless interface can be Connect to the external contactless interface of the IC card holder.
本实施例基于上述抗信道木马攻击的金融 POS系统的抗攻击的实现方法, 其具 体歩骤为:  The embodiment is based on the anti-attack implementation method of the above-mentioned anti-channel Trojan attack financial POS system, and the specific steps are as follows:
( 11 ) 初始化:  (11) Initialization:
信任管理方向 IC卡盒、 密码键盘、 用户 PIN盘和 IC卡的密码芯片中写入初始 对称密钥序号和初始非对称密钥序号, 以及每个密钥序号的使用限制次数; 密码芯 片以初始对称密钥序号作为输入从物理不可克隆模块中提取初始对称密钥, 密码芯 片将提取到的初始对称密钥发回给信任管理方; 密码芯片以初始非对称密钥序号作 为输入从物理不可克隆模块中提取初始私钥, 计算对应的初始公钥并发给信任管理 方, 信任管理方为初始公钥签署数字证书发回给密码芯片; 信任管理方将本身的公 钥发给 IC卡盒、 密码键盘、 用户 PIN盘和 IC卡中的密码芯片; 信任管理方接收并 存储持卡人的 PIN密码, 持卡人除了可以设定一个通用的 PIN密码外, 还可以设定 一个求助 PIN密码; The trust management direction writes the initial symmetric key sequence number and the initial asymmetric key sequence number in the cipher chip of the IC card box, the PIN pad, the user PIN disk, and the IC card, and the number of times of use of each key sequence number; The symmetric key sequence is used as an input to extract the initial symmetric key from the physical unclonable module, and the cryptographic chip sends the extracted initial symmetric key back to the trust management party; the cryptographic chip uses the initial asymmetric key sequence number as input and is not clonotable from the physical. The initial private key is extracted from the module, and the corresponding initial public key is calculated and sent to the trust management party. The trust management party signs the digital certificate for the initial public key and sends it back to the cipher chip. The trust management party sends its own public key to the IC card box and password. Password chip in keyboard, user PIN disk and IC card; trust management party receives and The cardholder's PIN code is stored. In addition to setting a general PIN code, the cardholder can also set a helper PIN code.
( 12 ) 交易流程:  (12) Transaction process:
持卡人将 IC卡插入 IC卡盒中并关闭 IC卡盒的密封屏蔽门, 使 IC卡盒的密封 屏蔽盒起屏蔽作用,从而使 IC卡盒中的 IC卡只能通过 IC卡盒的内外通讯线路跟 IC 卡盒外的设备通讯; 另外, IC卡盒的密封屏蔽门关闭后, IC卡盒上的物理不可克隆 模块的敏感电路导通, 从而使 IC卡盒的密码芯片能够从物理不可克隆模块中提取与 信任管理方共享的密钥以及 IC卡盒密码芯片的私钥;  The card holder inserts the IC card into the IC card case and closes the sealed screen door of the IC card case, so that the sealed shielding box of the IC card case acts as a shield, so that the IC card in the IC card case can only pass through the inside and outside of the IC card case. The communication line communicates with the device outside the IC card box; in addition, after the sealed screen door of the IC card box is closed, the sensitive circuit of the physical unclonable module on the IC card box is turned on, so that the cipher chip of the IC card box can be physically incapable Extracting a key shared by the trust management party and a private key of the IC card cipher chip in the cloning module;
( 13 ) 增加密钥序号使用次数流程:  ( 13 ) Increase the number of key sequence usage times:
密码芯片每次使用与信任管理方共享的密钥或自身的私钥时, 都需要使用对称 密钥序号或非对称密钥序号从物理不可克隆模块中提取; 密码芯片每次使用任意一 个密钥序号后均需要增加密钥序号的使用次数, 当使用次数达到使用限制次数时, 密码芯片将更新密钥序号, 并将新的密钥序号作为输入从物理不可克隆模块中提取 对应的新密钥; 对于对称密钥序号对应的新密钥, 密码芯片用旧密钥加密新密钥和 新的密钥序号后发送给信任管理方, 对于非对称密钥序号对应的私钥, 密码芯片将 该私钥对应的公钥及其密钥序号发给信任管理方, 信任管理方为该公钥签署数字证 书发回给密码芯片。  Each time the cryptographic chip uses the key shared by the trust manager or its own private key, it needs to be extracted from the physical unclonable module using a symmetric key sequence number or an asymmetric key sequence number; the crypto chip uses any key at a time. After the serial number, it is necessary to increase the number of times the key sequence number is used. When the number of uses reaches the limit of use, the cipher chip will update the key sequence number, and take the new key sequence number as input and extract the corresponding new key from the physical unclonable module. For the new key corresponding to the symmetric key sequence, the cryptographic chip encrypts the new key and the new key sequence number with the old key and sends it to the trust management party. For the private key corresponding to the asymmetric key sequence, the cryptographic chip will The public key corresponding to the private key and its key sequence number are sent to the trust management party, and the trust management party signs the digital certificate for the public key and sends it back to the cryptographic chip.
所述初始化中设定的求助 PIN密码在紧急情况下使用, 当持卡人在交易流程中 输入求助 PIN密码时, 信任管理方除完成与通用 PIN密码一样的所有流程外, 需要 协助持卡人向警方提出求助。  The help PIN code set in the initialization is used in an emergency situation. When the cardholder enters the help PIN code in the transaction process, the trust management party needs to assist the cardholder in addition to all the processes like the universal PIN password. Ask the police for help.
所述交易流程包括以下步骤:  The transaction process includes the following steps:
(21 ) IC卡将卡号发送给 IC卡盒;  (21) The IC card sends the card number to the IC card box;
(22 ) IC卡盒将 IC卡号、 IC卡盒号发送给信任管理方;  (22) The IC card box sends the IC card number and the IC card box number to the trust management party;
(23 )信任管理方根据 IC卡号可査询到 IC卡是否使用持卡人私有的用户 PIN 盘, 根据 IC卡盒号查询到密码键盘号; 如果 IC卡使用用户 PIN盘, 则交互三方为 IC卡、 IC卡盒和用户 PIN盘, 否则为 IC卡、 IC卡盒和密码键盘; 信任管理方产生 一个会话密钥, 分别用与交互三方共享的密钥或者三方的公钥加密会话密钥后分发 给交互三方, 下述步骤 (24) - (29 ) 中的通讯均使用会话密钥加密;  (23) The trust management party can query whether the IC card uses the cardholder's private user PIN disk according to the IC card number, and query the password keyboard number according to the IC card box number; if the IC card uses the user PIN disk, the interaction three parties are IC Card, IC card box and user PIN disk, otherwise IC card, IC card box and password keyboard; trust management party generates a session key, respectively, after encrypting the session key with the key shared by the interactive three parties or the three-party public key Distributed to the interactive three parties, the communication in the following steps (24) - (29) are encrypted using the session key;
(24) IC卡盒向 IC卡发送 Ml和 Mil , 其中 Ml = "IC卡盒号、 IC卡盒密钥序 号、 IC卡盒密钥序号使用次数、 IC卡盒交易序号、交易金额", M11=EK (H (M1 ) ); 其中 EK ( )表示以密码芯片与信任管理方共享的密钥对信息加密, 或者用发起方的 私钥对信息签名; H ( ) 是一个 HASH函数; IC卡盒调用增加密钥序号使用次数流 程; (24) The IC card box sends Ml and Mil to the IC card, where Ml = "IC card box number, IC card box key serial number, IC card box key serial number usage count, IC card box transaction serial number, transaction amount", M11 =EK (H (M1 ) ) ; where EK ( ) indicates that the cryptographic chip is encrypted with the key shared by the trust manager, or by the initiator The private key signs the information; H ( ) is a HASH function; the IC card box calls to increase the number of key sequence usage times;
(25 ) IC卡向 IC卡盒发送 M2和 M21 , 其中 M2 = "IC卡号、 IC卡密钥序号、 IC卡密钥序号使用次数、 IC卡交易序号", M21 =EK (H (M2||M11 ) ), IC卡调用 增加密钥序号使用次数流程;  (25) The IC card sends M2 and M21 to the IC card box, where M2 = "IC card number, IC card key serial number, IC card key serial number usage count, IC card transaction serial number", M21 = EK (H (M2|| M11)), the IC card calls to increase the number of key sequence usage times;
(26) IC卡盒向信任管理方发送 Ml、 Mll、 M2、 M21 , 信任管理方检査并验 证 Mi l和 M21的有效性, 有误则结束;  (26) The IC card box sends Ml, Mll, M2, M21 to the trust management party, and the trust management party checks and verifies the validity of Mi l and M21, and ends with an error;
(27)信任管理方向 IC卡盒发送 M3、 M31和 M32, 其中 M3 = "M2、 交易金 额", M31 =EK (H (M3 )), 信任管理方根据 M2中的 IC卡号查询 IC卡的使用的 PIN设备, 如果采用密码键盘, 则 M32 = l, 如果采用用户 PIN盘则 M32 = 2;  (27) Trust management direction The IC card box sends M3, M31 and M32, where M3 = "M2, transaction amount", M31 = EK (H (M3)), and the trust management party queries the use of the IC card according to the IC card number in M2. PIN device, if using a PIN pad, M32 = l, if using a user PIN disk, M32 = 2;
(28 ) IC卡盒根据 M32的值:  (28) The IC card box is based on the value of M32:
(281 )如果 M32= 1则把 M3和 M31发给密码键盘, 密码键盘验证 M3和 M31 , 有误则调用增加密钥序号使用次数流程后结束, 验证 M3和 M31无误后密码键盘接收用户 PIN密码,并向 IC卡盒发送 M4,其 中 M4=EK (H (M3、 用户 PIN密码)), 密码键盘调用增加密钥序 号使用次数流程;  (281) If M32=1, send M3 and M31 to the PIN pad, and the PIN pad will verify M3 and M31. If there is an error, the process will increase the number of key sequence usage and end. After verifying that M3 and M31 are correct, the PIN pad receives the user PIN code. And sending M4 to the IC card box, wherein M4=EK (H (M3, user PIN code)), the password keyboard calls to increase the number of key sequence usage times;
(282 ) 如果 M32 = 2则把 M3和 M31发给用户 PIN盘, 用户 PIN盘验证 M3和 M31, 有误则调用增加密钥序号使用次数流程后结束,无误后 显示 M3 ,用户确认 M3的金额无误后输入 PIN密码,用户 PIN盘向 IC卡盒发送 M4, 其中 M4 = EK (H (M3、 用户 PIN密码)), 用户 PIN盘调用增加密钥序号使用次数流程;  (282) If M32 = 2, send M3 and M31 to the user's PIN disk, and the user PIN disk verifies M3 and M31. If there is an error, the process of increasing the number of key usage is ended, and M3 is displayed after error. The user confirms the amount of M3. After inputting the PIN code without error, the user PIN disk sends M4 to the IC card box, where M4 = EK (H (M3, user PIN code)), and the user PIN disk calls to increase the number of times of using the key sequence number;
(29 ) IC卡盒将 M4发给信任管理方, 信任管理方验证无误后, 把 M5 = "Ml、 Mil , M2、 M21、 M3、 M4、 日期、 时间"作为一条记录保存起来, 计算 M51 =EK (29) The IC card box sends M4 to the trust management party. After the trust management party verifies the error, save M5 = "Ml, Mil, M2, M21, M3, M4, date, time" as a record, and calculate M51 = EK
(H (M5 ) ) 并发送给 IC卡盒; IC卡盒和 IC卡均增加各自的交易序号, IC卡盒请求 IC卡打开 IC卡盒屏蔽门的凭证, 得到回应后 IC卡盒将 M5和 M51保存到 POS系统 的非易失存储器中, 打开 IC卡盒的屏蔽门; POS系统打印单据, 单据上包含 " IC卡 盒号、 IC卡盒密钥序号、 IC卡盒交易序号、 IC卡号、 IC卡密钥序号、 IC卡交易序号、 交易金额、 日期、 时间"; 单据由持卡人签名和商家代表签名盖章后, 持卡人持有盖 章联,商家持签名单据向收单行提出收单申请,收单行验证无误后向发卡行提出申请, 发卡行把交易金额从持卡人的帐号转入商家的指定帐号后结束交易流程。 (H (M5)) and sent to the IC card box; the IC card box and the IC card both add their respective transaction serial numbers, the IC card box requests the IC card to open the certificate of the IC card box screen door, and after receiving the response, the IC card box will be M5 and M51 is saved to the non-volatile memory of the POS system to open the screen door of the IC card box; the POS system prints the document, and the document includes "IC card box number, IC card box key serial number, IC card box transaction serial number, IC card number, IC card key serial number, IC card transaction serial number, transaction amount, date, time"; after the document is signed by the cardholder and the merchant representative signs and seals, the cardholder holds the stamp, and the merchant submits the signature to the acquiring bank. After receiving the application, the acquiring bank will submit an application to the issuing bank after the verification is correct. The issuing bank will transfer the transaction amount from the cardholder's account to the merchant's designated account and end the transaction process.
上述实施例为本发明较佳的实施方式, 但本发明的实施方式并不受上述实施例 的限制, 其他的任何未背离本发明的精神实质与原理下所作的改变、 修饰、 替代、 组合、 简化, 均应为等效的置换方式, 都包含在本发明的保护范围之内。 The above embodiments are preferred embodiments of the present invention, but the embodiments of the present invention are not affected by the above embodiments. It is intended that the present invention be construed as being limited by the scope of the invention, and the modifications, substitutions, combinations, and simplifications of the present invention.

Claims

权 利 要 求 书 Claims
1、一种抗信道木马攻击的金融 POS系统, 其特征在于, 包括 POS主板、 IC卡盒、 密码键盘、 用户 PIN盘、 非易失存储器、 IC卡、 以及信任管理方, 所述 IC卡盒与 POS 主板相连接, 所述密码键盘与 IC卡盒相连接, 所述 POS主板通过 I/O接口与信任管理 方相连接, 所述 IC卡通过 IC卡盒与信任管理方相连接; A financial POS system for anti-channel Trojan attack, comprising: a POS motherboard, an IC card box, a PIN pad, a user PIN disk, a nonvolatile memory, an IC card, and a trust management party, the IC card box The PIN motherboard is connected to the IC card box, and the POS motherboard is connected to the trust management party through an I/O interface, and the IC card is connected to the trust management party through the IC card box;
所述密码键盘用于接收用户 PIN密码;  The PIN pad is configured to receive a user PIN code;
所述用户 PIN盘用于显示交易金额以及接收用户 PIN密码;  The user PIN disk is used to display the transaction amount and receive the user PIN password;
所述非易失存储器用于存储交易的授权凭证;  The nonvolatile memory is configured to store an authorization credential of the transaction;
所述 IC卡盒、 密码键盘、 用户 PIN盘以及 IC卡均设置有密码芯片;  The IC card box, the PIN pad, the user PIN disk and the IC card are all provided with a cryptographic chip;
所述信任管理方与 IC卡盒、 密码键盘、 用户 PIN盘以及 IC卡分别共享密钥。  The trust management party shares a key with the IC card box, the PIN pad, the user PIN disk, and the IC card, respectively.
2、 根据权利要求 1所述的抗信道木马攻击的金融 POS系统, 其特征在于, 所述 IC 卡盒包括外部接触式接口、 外部非接触式接口、 内部接触式接口、 内部非接触式接 口和密封屏蔽盒, 所述密封屏蔽盒设置有盒内外通讯线路以及一个插入 IC卡的开口, 开口处设置有密封屏蔽门, 密封屏蔽门密布接触点。  2. The financial POS system for anti-channel Trojan attack according to claim 1, wherein the IC card box comprises an external contact interface, an external contactless interface, an internal contact interface, an internal contactless interface, and The sealed shielding box is provided with a communication line inside and outside the box and an opening for inserting the IC card, and a sealing screen door is arranged at the opening to seal the contact point of the shielding door.
3、 根据权利要求 2所述的抗信道木马攻击的金融 POS系统, 其特征在于, 所述密 封屏蔽盒的内外层各覆盖一层敏感电路层, IC卡盒的密码芯片设置在内外两层敏感 电路层之间, 所述外部接触式接口和外部非接触式接口在外层敏感电路层外, 所述 内部接触式接口和内部非接触式接口在内层敏感电路层之内; IC卡盒的密封屏蔽门 打开时切断敏感电路, 密封屏蔽门关闭则连通敏感电路。  3. The financial POS system for anti-channel Trojan attack according to claim 2, wherein the inner and outer layers of the sealed shielding box are each covered with a layer of sensitive circuit, and the cipher chip of the IC card box is disposed inside and outside. Between the circuit layers, the external contact interface and the external contactless interface are outside the outer sensitive circuit layer, the internal contact interface and the internal non-contact interface are within the inner sensitive circuit layer; the IC card box is sealed When the screen door is opened, the sensitive circuit is cut off, and when the sealed screen door is closed, the sensitive circuit is connected.
4、 根据权利要求 3所述的抗信道木马攻击的金融 POS系统, 其特征在于, 所述 敏感电路层由物理不可克隆模块的敏感电路组成。  4. The financial POS system for anti-channel Trojan attack according to claim 3, wherein the sensitive circuit layer is composed of a sensitive circuit of a physical unclonable module.
5、 根据权利要求 1所述的抗信道木马攻击的金融 POS系统, 其特征在于, 所述密 码芯片中设置有物理不可克隆模块和密码处理器 IP核,所述物理不可克隆模块的敏感 电路包围在密码处理器 IP核的外围, 形成笼形结构, 所述密码处理器 IP核中重复使用 的密钥序号存储在密码芯片的非易失存储器中, 密钥则在需要使用时, 以密钥序号 作为输入从物理不可克隆模块提取。  The financial POS system for anti-channel Trojan attack according to claim 1, wherein the cryptographic chip is provided with a physical unclonable module and a cryptographic processor IP core, and the sensitive circuit of the physical unclonable module is surrounded. At the periphery of the cryptographic processor IP core, a cage structure is formed, and the key sequence number repeatedly used in the cryptographic processor IP core is stored in the non-volatile memory of the cryptographic chip, and the key is used as a key when needed. The sequence number is extracted as input from the physical unclonable module.
6、 根据权利要求 1或 2所述的抗信道木马攻击的金融 POS系统, 其特征在于, 所 述用户 PIN盘为用户私有, 用户 PIN盘包括接触式接口、 非接触式接口、 键盘以及显 示器, 所述接触式接口与 IC卡盒的外部接触式接口连接, 所述非接触式接口与 IC卡 盒的外部非接触式接口连接。 7、根据权利要求 1-6中任一项所述抗信道木马攻击的金融 POS系统的抗攻击的 实现方法, 其特征在于, 具体歩骤为: The financial POS system for anti-channel Trojan attack according to claim 1 or 2, wherein the user PIN disk is private to the user, and the user PIN disk comprises a contact interface, a contactless interface, a keyboard, and a display. The contact interface is connected to an external contact interface of the IC card case, and the contactless interface is connected to an external contactless interface of the IC card case. The method for implementing anti-attack of a financial POS system for anti-channel Trojan attack according to any one of claims 1 to 6, characterized in that the specific steps are:
( 11 ) 初始化:  (11) Initialization:
信任管理方向 IC卡盒、 密码键盘、 用户 PIN盘和 IC卡的密码芯片中写入初始 对称密钥序号和初始非对称密钥序号, 以及每个密钥序号的使用限制次数; 密码芯 片以初始对称密钥序号作为输入从物理不可克隆模块中提取初始对称密钥, 密码芯 片将提取到的初始对称密钥发回给信任管理方; 密码芯片以初始非对称密钥序号作 为输入从物理不可克隆模块中提取初始私钥, 计算对应的初始公钥并发给信任管理 方, 信任管理方为初始公钥签署数字证书发回给密码芯片; 信任管理方将本身的公 钥发给 IC卡盒、 密码键盘、 用户 PIN盘和 IC卡中的密码芯片; 信任管理方接收并 存储持卡人的 PIN密码;  The trust management direction writes the initial symmetric key sequence number and the initial asymmetric key sequence number in the cipher chip of the IC card box, the PIN pad, the user PIN disk, and the IC card, and the number of times of use of each key sequence number; The symmetric key sequence is used as an input to extract the initial symmetric key from the physical unclonable module, and the cryptographic chip sends the extracted initial symmetric key back to the trust management party; the cryptographic chip uses the initial asymmetric key sequence number as input and is not clonotable from the physical. The initial private key is extracted from the module, and the corresponding initial public key is calculated and sent to the trust management party. The trust management party signs the digital certificate for the initial public key and sends it back to the cipher chip. The trust management party sends its own public key to the IC card box and password. a password chip in the keyboard, the user PIN disk and the IC card; the trust management party receives and stores the cardholder's PIN code;
( 12 ) 交易流程:  (12) Transaction process:
将 IC卡插入 IC卡盒中并关闭 IC卡盒的密封屏蔽门, 使 IC卡盒的密封屏蔽盒 起屏蔽作用, 从而使 IC卡盒中的 IC卡只能通过 IC卡盒的内外通讯线路跟 IC卡盒 外的设备通讯; 另外, IC卡盒的密封屏蔽门关闭后, IC卡盒上的物理不可克隆模块 的敏感电路导通, 从而使 IC卡盒的密码芯片能够从物理不可克隆模块中提取与信任 管理方共享的密钥以及 IC卡盒密码芯片的私钥;  Insert the IC card into the IC card box and close the sealed screen door of the IC card box, so that the sealed shielding box of the IC card box can be shielded, so that the IC card in the IC card box can only pass through the internal and external communication lines of the IC card box. The device communication outside the IC card box; in addition, after the sealed screen door of the IC card box is closed, the sensitive circuit of the physical unclonable module on the IC card box is turned on, so that the cipher chip of the IC card box can be removed from the physical unclonable module. Extracting a key shared with the trust management party and a private key of the IC card cipher chip;
( 13 ) 增加密钥序号使用次数流程:  ( 13 ) Increase the number of key sequence usage times:
密码芯片每次使用与信任管理方共享的密钥或自身的私钥时, 都需要使用对称 密钥序号或非对称密钥序号从物理不可克隆模块中提取; 密码芯片每次使用任意一 个密钥序号后均需要增加密钥序号的使用次数, 当使用次数达到使用限制次数时, 密码芯片将更新密钥序号, 并将新的密钥序号作为输入从物理不可克隆模块中提取 对应的新密钥; 对于对称密钥序号对应的新密钥, 密码芯片用旧密钥加密新密钥和 新的密钥序号后发送给信任管理方, 对于非对称密钥序号对应的私钥, 密码芯片将 该私钥对应的公钥及其密钥序号发给信任管理方, 信任管理方为该公钥签署数字证 书发回给密码芯片。  Each time the cryptographic chip uses the key shared by the trust manager or its own private key, it needs to be extracted from the physical unclonable module using a symmetric key sequence number or an asymmetric key sequence number; the crypto chip uses any key at a time. After the serial number, it is necessary to increase the number of times the key sequence number is used. When the number of uses reaches the limit of use, the cipher chip will update the key sequence number, and take the new key sequence number as input and extract the corresponding new key from the physical unclonable module. For the new key corresponding to the symmetric key sequence, the cryptographic chip encrypts the new key and the new key sequence number with the old key and sends it to the trust management party. For the private key corresponding to the asymmetric key sequence, the cryptographic chip will The public key corresponding to the private key and its key sequence number are sent to the trust management party, and the trust management party signs the digital certificate for the public key and sends it back to the cryptographic chip.
8、 根据权利要求 Ί所述抗信道木马攻击的金融 POS系统的抗攻击的实现方法, 其特征在于, 所述初始化进一步包括设定一个求助 PIN密码, 所述求助 PIN密码在 紧急情况下使用, 当持卡人在交易流程中输入求助 PIN密码时, 信任管理方除完成 与通用 PIN密码一样的所有流程外, 需要协助持卡人向警方提出求助。  8. The method for implementing an anti-attack of a financial POS system for anti-channel Trojan attack according to claim 301, wherein said initializing further comprises setting a help PIN code, said help PIN code being used in an emergency situation, When the cardholder enters the help PIN code in the transaction process, the trust manager needs to assist the cardholder to seek help from the police, in addition to completing all the same procedures as the universal PIN code.
9、 根据权利要求 Ί所述抗信道木马攻击的金融 POS系统的抗攻击的实现方法, 其特征在于, 所述交易流程包括以下步骤: 9. The method for implementing anti-attack of a financial POS system for anti-channel Trojan attack according to claim ,, The method is characterized in that the transaction process comprises the following steps:
(21 ) IC卡将卡号发送给 IC卡盒;  (21) The IC card sends the card number to the IC card box;
(22 ) IC卡盒将 IC卡号、 IC卡盒号发送给信任管理方;  (22) The IC card box sends the IC card number and the IC card box number to the trust management party;
(23 M言任管理方根据 IC卡号查询到 IC卡是否使用持卡人私有的用户 PIN盘, 根据 IC卡盒号査询到密码键盘号;如果 IC卡使用用户 PIN盘,则交互三方为 IC卡、 IC卡盒和用户 PIN盘, 否则为 IC卡、 IC卡盒和密码键盘; 信任管理方产生一个会 话密钥, 分别用与交互三方共享的密钥或者三方的公钥加密会话密钥后分发给交互 三方, 下述步骤 (24) - (29 ) 中的通讯均使用会话密钥加密;  (23 M words management party according to the IC card number to check whether the IC card uses the cardholder's private user PIN disk, according to the IC card box number to query the password keyboard number; if the IC card uses the user PIN disk, the interactive three parties are IC Card, IC card box and user PIN disk, otherwise IC card, IC card box and password keyboard; trust management party generates a session key, respectively, after encrypting the session key with the key shared by the interactive three parties or the three-party public key Distributed to the interactive three parties, the communication in the following steps (24) - (29) are encrypted using the session key;
(24) IC卡盒向 IC卡发送 Ml和 Mil, 其中 Ml = "IC卡盒号、 IC卡盒密钥序 号、 IC卡盒密钥序号使用次数、 IC卡盒交易序号、交易金额", M11=EK (H (Ml ) ); 其中 EK ( )表示以密码芯片与信任管理方共享的密钥对信息加密, 或者用发起方的 私钥对信息签名; H ( ) 是一个 HASH函数; IC卡盒调用增加密钥序号使用次数流 程;  (24) The IC card box sends Ml and Mil to the IC card, where Ml = "IC card box number, IC card box key serial number, IC card box key serial number usage count, IC card box transaction serial number, transaction amount", M11 =EK (H (Ml ) ); where EK ( ) indicates that the cryptographic chip is encrypted with the key shared by the trust manager, or the information is signed with the initiator's private key; H ( ) is a HASH function; IC card The box call increases the number of key sequence usage times;
(25 ) IC卡向 IC卡盒发送 M2和 M21 , 其中 M2 = "IC卡号、 IC卡密钥序号、 IC卡密钥序号使用次数、 IC卡交易序号", M21 =EK (H (M2||M11 ) ), IC卡调用 增加密钥序号使用次数流程;  (25) The IC card sends M2 and M21 to the IC card box, where M2 = "IC card number, IC card key serial number, IC card key serial number usage count, IC card transaction serial number", M21 = EK (H (M2|| M11)), the IC card calls to increase the number of key sequence usage times;
(26) IC卡盒向信任管理方发送 Ml、 Mll、 M2、 M21 , 信任管理方检査并验 证 Mi l和 M21的有效性, 有误则结束;  (26) The IC card box sends Ml, Mll, M2, M21 to the trust management party, and the trust management party checks and verifies the validity of Mi l and M21, and ends with an error;
(27)信任管理方向 IC卡盒发送 M3、 M31和 M32, 其中 M3 = "M2、 交易金 额", M31 =EK (H (M3 )), 信任管理方根据 M2中的 IC卡号查询 IC卡的使用的 PIN设备, 如果采用密码键盘, 则 M32 = l, 如果采用用户 PIN盘则 M32 = 2;  (27) Trust management direction The IC card box sends M3, M31 and M32, where M3 = "M2, transaction amount", M31 = EK (H (M3)), and the trust management party queries the use of the IC card according to the IC card number in M2. PIN device, if using a PIN pad, M32 = l, if using a user PIN disk, M32 = 2;
(28 ) IC卡盒根据 M32的值来决定将 M3和 M31发给密码键盘或用户 PIN盘, 并接收 M4=EK (H (M3、 用户 PIN密码));  (28) The IC card box decides to send M3 and M31 to the PIN pad or the user PIN disk according to the value of M32, and receives M4=EK (H (M3, user PIN code));
(29 ) IC卡盒将 M4发给信任管理方,信任管理方验证无误后,把 M5= "Ml、 Mil , M2、 M21、 M3、 M4、 日期、 时间"作为一条记录保存起来, 计算 M51 =EK (29) The IC card box sends M4 to the trust management party. After the trust management party verifies the error, save M5= "Ml, Mil, M2, M21, M3, M4, date, time" as a record, and calculate M51 = EK
(H (M5 ) ) 并发送给 IC卡盒; IC卡盒和 IC卡均增加各自的交易序号, IC卡盒请 求 IC卡打开 IC卡盒屏蔽门的凭证, 得到回应后 IC卡盒将 M5和 M51保存到 POS 系统的非易失存储器中,打开 IC卡盒的屏蔽门; POS系统打印单据,单据上包含" IC 卡盒号、 IC卡盒密钥序号、 IC卡盒交易序号、 IC卡号、 IC卡密钥序号、 IC卡交易 序号、 交易金额、 日期、 时间"; 单据由持卡人签名和商家代表签名盖章后, 持卡人 持有盖章联, 商家持签名单据向收单行提出收单申请, 收单行验证无误后向发卡行 提出申请, 发卡行把交易金额从持卡人的帐号转入商家的指定帐号后结束交易流程。(H (M5)) and sent to the IC card box; the IC card box and the IC card both add their respective transaction serial numbers, the IC card box requests the IC card to open the certificate of the IC card box screen door, and after receiving the response, the IC card box will be M5 and M51 is saved to the non-volatile memory of the POS system to open the screen door of the IC card box; the POS system prints the document, and the document includes "IC card box number, IC card box key serial number, IC card box transaction serial number, IC card number, IC card key serial number, IC card transaction serial number, transaction amount, date, time"; after the document is signed by the cardholder and the merchant representative signs and seals, the cardholder holds the stamp, and the merchant submits the signature to the acquiring bank. The application for the receipt, the receipt of the receipt is correct, and the card is issued to the issuing bank. When the application is filed, the card issuing bank transfers the transaction amount from the cardholder's account to the merchant's designated account and ends the transaction process.
10、 根据权利要求 9所述抗信道木马攻击的金融 POS系统的抗攻击的实现方法, 其特征在于, 所述步骤 (28) 的具体步骤为: The method for implementing the anti-attack of the anti-channel Trojan attack-resistant financial POS system according to claim 9, wherein the specific steps of the step (28) are:
(281 )如果 M32 = 1则把 M3和 M31发给密码键盘,密码键盘验证 M3和 M31, 有误则调用增加密钥序号使用次数流程后结束, 验证 M3和 M31无误后密码键盘接 收用户 PIN密码,并向 IC卡盒发送 M4,其中 M4 = EK (H (M3、用户 PIN密码)), 密码键盘调用增加密钥序号使用次数流程;  (281) If M32 = 1, send M3 and M31 to the PIN pad, and the PIN pad verifies M3 and M31. If there is an error, the process of adding the key sequence number is used to end the process. After verifying that M3 and M31 are correct, the PIN pad receives the user PIN code. And send M4 to the IC card box, wherein M4 = EK (H (M3, user PIN code)), the password keyboard calls to increase the number of key sequence usage times;
(282)如果 M32 = 2则把 M3和 M31发给用户 PIN盘,用户 PIN盘验证 M3和 M31 , 有误则调用增加密钥序号使用次数流程后结束, 无误后显示 M3, 用户确认 M3的金额无误后输入 PIN密码, 用户 PIN盘向 IC卡盒发送 M4, 其中 M4 = EK (H (282) If M32 = 2, send M3 and M31 to the user's PIN disk, and the user PIN disk will verify M3 and M31. If there is an error, the process of increasing the key number usage times will be called, and M3 will be displayed after the error. The user confirms the amount of M3. After entering the PIN code without error, the user PIN disk sends M4 to the IC card box, where M4 = EK (H
(M3、 用户 PIN密码)), 用户 HN盘调用增加密钥序号使用次数流程。 (M3, user PIN code)), the user HN disk calls to increase the number of key sequence usage times.
PCT/CN2013/071890 2012-03-23 2013-02-26 Financial pos system capable of resisting channel trojan attack and anti-attack implementation method thereof WO2013139194A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210081187.3 2012-03-23
CN201210081187.3A CN102663863B (en) 2012-03-23 2012-03-23 Financial POS system capable of resisting channel Trojan attack and anti-attack realization method thereof

Publications (1)

Publication Number Publication Date
WO2013139194A1 true WO2013139194A1 (en) 2013-09-26

Family

ID=46773338

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/071890 WO2013139194A1 (en) 2012-03-23 2013-02-26 Financial pos system capable of resisting channel trojan attack and anti-attack implementation method thereof

Country Status (2)

Country Link
CN (1) CN102663863B (en)
WO (1) WO2013139194A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663863B (en) * 2012-03-23 2014-10-29 广州大学 Financial POS system capable of resisting channel Trojan attack and anti-attack realization method thereof
CN103188075B (en) * 2013-02-01 2016-01-06 广州大学 A kind of method of key and real random number generator and generation key and true random number
CN107888379A (en) * 2017-10-25 2018-04-06 百富计算机技术(深圳)有限公司 A kind of method of secure connection, POS terminal and code keypad
CN110690967B (en) * 2019-12-11 2021-03-02 杭州字节信息技术有限公司 Instant communication key establishment method independent of server security
CN113335794A (en) * 2021-07-09 2021-09-03 卡赛尔电子机械(深圳)有限公司 Intelligent garbage can capable of automatically classifying and using method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6543684B1 (en) * 2000-03-28 2003-04-08 Ncr Corporation Transaction terminal with privacy shield for touch-screen pin entry
CN101206779A (en) * 2006-12-18 2008-06-25 汉王科技股份有限公司 Online banking system safety terminal and data safety processing method thereof
CN201698459U (en) * 2009-12-31 2011-01-05 公安部第三研究所 Digital certification read-write device with operation confirmation function
CN102663863A (en) * 2012-03-23 2012-09-12 广州大学 Financial POS system capable of resisting channel Trojan attack and anti-attack realization method thereof

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010007791A (en) * 2000-09-16 2001-02-05 이동욱 Card reader for integrated financial works and operating method thereof
CN100550074C (en) * 2005-09-07 2009-10-14 吕航 A kind of POS machine
JP4727739B2 (en) * 2009-04-08 2011-07-20 東芝テック株式会社 PIN code input device
CN101853370B (en) * 2010-04-13 2012-03-07 厦门市世赢电子科技有限公司 Card container and matched radio-frequency SIM card
CN102147662A (en) * 2011-03-14 2011-08-10 张龙其 Input terminal with keyboard and encryption module

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6543684B1 (en) * 2000-03-28 2003-04-08 Ncr Corporation Transaction terminal with privacy shield for touch-screen pin entry
CN101206779A (en) * 2006-12-18 2008-06-25 汉王科技股份有限公司 Online banking system safety terminal and data safety processing method thereof
CN201698459U (en) * 2009-12-31 2011-01-05 公安部第三研究所 Digital certification read-write device with operation confirmation function
CN102663863A (en) * 2012-03-23 2012-09-12 广州大学 Financial POS system capable of resisting channel Trojan attack and anti-attack realization method thereof

Also Published As

Publication number Publication date
CN102663863B (en) 2014-10-29
CN102663863A (en) 2012-09-12

Similar Documents

Publication Publication Date Title
CN103778374B (en) The method of trusted terminal, double-channel card, anti-clone&#39;s chip, chip finger print and anti-channel attack
US11157912B2 (en) Method and system for enhancing the security of a transaction
RU2591665C2 (en) Device and method of processing sensitive data
JPS645783B2 (en)
CN107278307A (en) Software layer is mutually authenticated
CN106910072A (en) Digital cash management method and system
CN106067205B (en) A kind of gate inhibition&#39;s method for authenticating and device
WO2013139194A1 (en) Financial pos system capable of resisting channel trojan attack and anti-attack implementation method thereof
CN107332671A (en) A kind of safety mobile terminal system and method for secure transactions based on safety chip
WO2018096559A1 (en) System and method for translation and authentication of secure pin and sensitive data
CN108510278A (en) A kind of face method of payment and system
Moriyama et al. PUF-based RFID authentication secure and private under memory leakage
Mridha et al. A new approach to enhance internet banking security
Konheim Automated teller machines: their history and authentication protocols
CN106100854A (en) The reverse authentication method of terminal unit based on authority&#39;s main body and system
CA3053453A1 (en) An apparatus, computer program and method
CN106330888A (en) Method and device for ensuring security of Internet online payment
JP2007298985A (en) Method for implementing pki application of bank card on computer
US20190034891A1 (en) Automated transaction system, method for control thereof, and card reader
CN113159940A (en) Transaction method, system and computer equipment for enhanced bit currency wallet
Daza et al. FORCE: Fully off-line secure credits for mobile micro payments
Hole et al. Lessons from the Norwegian ATM system
CN103927661A (en) Bank card system with portable electronic device as carrier
CN109285004A (en) Business confirmation method and system based on mobile network&#39;s terminal
Focardi et al. Blunting differential attacks on PIN processing APIs

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13764889

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13764889

Country of ref document: EP

Kind code of ref document: A1