CN101132276A - Method and system for symmetrical encryption of terminal data by SAM card - Google Patents

Method and system for symmetrical encryption of terminal data by SAM card Download PDF

Info

Publication number
CN101132276A
CN101132276A CNA200710152544XA CN200710152544A CN101132276A CN 101132276 A CN101132276 A CN 101132276A CN A200710152544X A CNA200710152544X A CN A200710152544XA CN 200710152544 A CN200710152544 A CN 200710152544A CN 101132276 A CN101132276 A CN 101132276A
Authority
CN
China
Prior art keywords
terminal
data
odd
key
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200710152544XA
Other languages
Chinese (zh)
Inventor
黄锐
赖天建
周晓君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNA200710152544XA priority Critical patent/CN101132276A/en
Publication of CN101132276A publication Critical patent/CN101132276A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

This invention discloses a symmetric cipherring method and a system for terminal data by SAM cards, which introduces intelligent card SAM with various ciphered algorithms in it as a place for storing symmetric cryptographic keys, a receiving platform of a terminal transmits dispersion factions and generates a temporary cyrptographic key by the SAM card and encrypts the data so as to provide safe and efficient encryption and transmission. The method includes: a terminal starts up a request for business when a trade appears, the receiving platform sends trade information including dispersion factions, a SAM card in the terminal generates a temporary working cryptographic key according a sub-cryptographic key, the dispersion factors and the algorithm in the SAM, which encrypts the being transmitted data with the temporary key and sends the data to the platform then the terminal deletes the key after the trade.

Description

A kind ofly stick into capable terminal data symmetric encryption method and system by SAM
Technical field
The present invention relates to the network technology application, relate in particular to by SAM (Security AccessModule, secure access module) and stick into capable terminal data symmetric encryption method and system.
Background technology
At present, continuous expansion along with the electronic process of payment, Information Security in the electronization payment process seems more and more important, how to guarantee that data transmission safety is very important between platform and the terminal, and data encryption needs to follow following principle and designs on terminal:
1, the terminal data encryption requires with low cost.
2, terminal data is encrypted and is required to possess anti-reverse process capability.
3, terminal data is encrypted and is required computing fast several times, the computational efficiency height.
4, terminal data is encrypted and is required the energy anti-eavesdrop.
Summary of the invention
The technical problem to be solved in the present invention provides and a kind ofly sticks into capable terminal data symmetric encryption method and system by SAM, guarantees the fail safe of terminal data.
The core concept of the data symmetric encryption method of multistage dispersion of the present invention is: introduce the place that smart card SAM card is deposited as symmetric key, the built-in various cryptographic algorithm of SAM card, the dispersion factor of terminal receiving platform side transmission, terminal generates temporary key by the SAM card and data is encrypted, for terminal provides safe and efficient encryption and transmission, guarantee the safe and reliable transmission of data in network.
In order to solve the problems of the technologies described above, this provides a kind of is that SAM sticks into capable terminal data symmetric encryption method by secure access module, and the SAM card that writes sub-key is installed in the described terminal, and described method comprises:
When transaction took place, terminal was initiated transaction request, the Transaction Information that receiving platform issues, and described Transaction Information comprises dispersion factor, the SAM card in the terminal generates the odd-job key according to the algorithm in sub-key, dispersion factor and the SAM card;
The SAM card adopts in the odd-job key terminal data waiting for transmission is encrypted, and data encrypted is sent to platform;
Once or during closing the transaction several times, the odd-job key of this transaction of terminal deletion.
Further, said method also can have following characteristics, and it is that 3DEA generates the odd-job key that described SAM card adopts triple DEAs.
Further, said method also can have following characteristics, and it is that the DES algorithm is encrypted data waiting for transmission that described SAM card adopts data encryption standard algorithm.
Further, said method also can have following characteristics, after described SAM card adopts the odd-job key that data waiting for transmission are encrypted, utilizing described odd-job key that data encrypted is carried out MAC again calculates, obtain checking data, terminal is sent to platform with data encrypted with checking data.
In order to solve the problems of the technologies described above, it is that SAM sticks into capable terminal data symmetric encryption system by secure access module that the present invention also provides a kind of, comprises the system platform and the terminal that connect by network, wherein:
Described system platform comprises encryption equipment, Service Processing Module and access server, wherein:
Access server is used for communicating by letter of system platform and terminal;
Described Service Processing Module is used for the transaction request that receiving terminal is initiated, and sends Transaction Information to terminal;
Described encryption equipment is used for generating dispersion factor according to transaction request;
Once or during closing the transaction several times, described system platform is deleted the odd-job key of this transaction;
The SAM card is installed in the described terminal, wherein:
Described terminal is used to initiate transaction request, the Transaction Information that receiving platform issues, and to platform transmission data encrypted;
The dispersion factor that described SAM card is used for issuing according to the sub-key, algorithm and the platform that block generates the odd-job key, and with the odd-job key terminal data waiting for transmission is encrypted;
Once or during closing the transaction several times, the odd-job key of described this transaction of terminal deletion.
Further, said system also can have following characteristics, and it is that 3DEA generates the odd-job key that described SAM card adopts triple DEAs.
Further, said system also can have following characteristics, and it is that the DES algorithm is encrypted data waiting for transmission that described SAM card adopts data encryption standard algorithm.
Further, said system also can have following characteristics, after described SAM card adopts the odd-job key that data waiting for transmission are encrypted, utilizes described odd-job key that data encrypted is carried out MAC again and calculates, and obtains checking data; Described terminal is sent to platform with data encrypted with checking data.
The fail safe of the method for the invention cryptographic system does not rely on algorithm, but maintaining secrecy based on encryption key, use the odd-job key to carry out data encrypting and deciphering, increase the data difficulty of attacking greatly, criminal can only crack the temporary key of certain transaction and can not obtain user's sub-key, has guaranteed key safety; And because the life cycle of odd-job key is very short, uses up promptly and lost efficacy, therefore also guaranteed safety of data.In addition, the present invention adopts SAM to carry out operations such as the generation of odd-job key and data encryption, has improved arithmetic speed, and the terminal computing capability is required low, effectively reduces the whole cost of terminal.In sum, the scheme that adopts the present invention to describe, realized terminal data safe and reliable be transferred to platform, on the basis that fully ensures the data security transmission, guaranteed the safety of payment, ensure normally carrying out of payment transaction.
Description of drawings
Fig. 1 encrypts schematic diagram for terminal data;
Fig. 2 is terminal data encryption flow figure;
Fig. 3 is the schematic diagram of embodiment of the invention encryption system.
Embodiment
With reference to figure 1 and Fig. 2, terminal comprises the steps: the encryption implementation method of data
Step 110, the SAM cartoon is crossed system and is write sub-key, and the SAM card correctly is installed in the terminal;
Sub-key is stored in the SAM card of distribution throughout one's life, can not change, and can not be derived.
Step 120, when transaction took place, terminal was initiated transaction request, and the Transaction Information that receiving platform issues comprises data such as dispersion factor, dealing money;
Dispersion factor is the Serial No. that is generated at random by platform.
Step 130 after dispersion factor is received in the SAM clamping, utilizes the algorithm computation in the SAM card to go out the odd-job key according to the dispersion factor that passes under sub-key and the platform;
The SAM card can adopt 3DEA (Triple Data Encryption Algorithm, triple DEAs) to generate the odd-job key.
The odd-job key is present in the SAM card, derives from when transaction starts, and destroys when closing the transaction, can not be derived.
Step 140, set of terminal weave the data that will be transferred to platform, and the SAM card uses temporary key that terminal data waiting for transmission are encrypted, and data encrypted is sent to platform;
The cryptographic algorithm that uses in the present embodiment be obtain People's Bank of China regulation at present with extensive DES algorithm (the Data Encryption Standard of approval in the world, data encryption standard), this encryption method is a kind of district's group password that adopts the conventional cryptography method, uses identical key that data are carried out encryption and decryption.
In other embodiments, for the integrality that guarantees data and prevent that data from losing or distorted in transmission course, also can carry out MAC (Message Authentication Code to data, the message authentication sign indicating number) calculates for platform validation, particularly, in each financial transaction process, before data encrypted is sent to platform, the SAM card carries out MAC with the odd-job key to data encrypted and calculates, obtain checking data, terminal is sent to platform with data encrypted with checking data.
After this transaction is finished, terminal deletion odd-job key, next time, system regenerated dispersion factor when concluding the business, and terminal recomputates the odd-job key according to this dispersion factor, and data are encrypted, and has guaranteed safety of data with this.
The fail safe of DSE arithmetic is to be based upon on the basis of key confidentiality.Therefore, key is the key of whole system security mechanism.In the present embodiment, because decentralized algorithm is irreversible, cipher key derivation procedure is irreversible, promptly can go out subordinate's key from higher level's key derivation, but cannot guarantee the fail safe of key by the key derivation higher level of subordinate key.And, because the odd-job key derives from when transaction starts, when closing the transaction, to destroy, its life cycle is very short, and each odd-job key that participates in encrypting all is mutually different, has guaranteed safety of data.
The life cycle of odd-job key, except being arranged to each transaction back deletion, deletion again after can also being arranged to conclude the business several times, but at least should be within one day transaction count.
After platform side was received the data of terminal transmission, then algorithm according to a preconcerted arrangement and key were decrypted data.
Fig. 3 is the schematic diagram of embodiment of the invention encryption system, and as shown in Figure 3, encryption system comprises system platform and the terminal two parts that connect by network in the present embodiment.
System platform comprises encryption equipment, Service Processing Module and access server, wherein:
Access server is used for communicating by letter of system platform and terminal;
Described Service Processing Module is used for the transaction request that receiving terminal is initiated, and sends Transaction Information to terminal, and the processing of carrying out the business of terminal request;
Described encryption equipment is used to generate dispersion factor, and the data that terminal is sent are decrypted.
The SAM card is installed in the terminal, wherein:
Described terminal is used to initiate transaction request, the Transaction Information that receiving platform issues, and to platform transmission data encrypted;
The dispersion factor that described SAM card is used for issuing according to the sub-key, algorithm and the platform that block generates the odd-job key, and with the odd-job key terminal data waiting for transmission is encrypted; Described SAM card can also carry out MAC to data encrypted with the odd-job key and calculate, and obtains checking data.

Claims (8)

1. one kind is that SAM sticks into capable terminal data symmetric encryption method by secure access module, it is characterized in that the SAM card that writes sub-key is installed in the described terminal, and described method comprises:
When transaction took place, terminal was initiated transaction request, the Transaction Information that receiving platform issues, and described Transaction Information comprises dispersion factor, the SAM card in the terminal generates the odd-job key according to the algorithm in sub-key, dispersion factor and the SAM card;
The SAM card adopts in the odd-job key terminal data waiting for transmission is encrypted, and data encrypted is sent to platform;
Once or during closing the transaction several times, the odd-job key of this transaction of terminal deletion.
2. the method for claim 1 is characterized in that,
It is that 3DEA generates the odd-job key that described SAM card adopts triple DEAs.
3. the method for claim 1 is characterized in that,
It is that the DES algorithm is encrypted data waiting for transmission that described SAM card adopts data encryption standard algorithm.
4. the method for claim 1 is characterized in that,
After described SAM card adopts the odd-job key that data waiting for transmission are encrypted, utilize described odd-job key that data encrypted is carried out MAC again and calculate, obtain checking data, terminal is sent to platform with data encrypted with checking data.
5. one kind is that SAM sticks into capable terminal data symmetric encryption system by secure access module, it is characterized in that, comprises the system platform and the terminal that connect by network, wherein:
Described system platform comprises encryption equipment, Service Processing Module and access server, wherein:
Access server is used for communicating by letter of system platform and terminal;
Described Service Processing Module is used for the transaction request that receiving terminal is initiated, and sends Transaction Information to terminal;
Described encryption equipment is used for generating dispersion factor according to transaction request;
Once or during closing the transaction several times, described system platform is deleted the odd-job key of this transaction;
The SAM card is installed in the described terminal, wherein:
Described terminal is used to initiate transaction request, the Transaction Information that receiving platform issues, and to platform transmission data encrypted;
The dispersion factor that described SAM card is used for issuing according to the sub-key, algorithm and the platform that block generates the odd-job key, and with the odd-job key terminal data waiting for transmission is encrypted;
Once or during closing the transaction several times, the odd-job key of described this transaction of terminal deletion.
6. system as claimed in claim 5 is characterized in that,
It is that 3DEA generates the odd-job key that described SAM card adopts triple DEAs.
7. system as claimed in claim 5 is characterized in that,
It is that the DES algorithm is encrypted data waiting for transmission that described SAM card adopts data encryption standard algorithm.
8. system as claimed in claim 5 is characterized in that,
After described SAM card adopts the odd-job key that data waiting for transmission are encrypted, utilize described odd-job key that data encrypted is carried out MAC again and calculate, obtain checking data;
Described terminal is sent to platform with data encrypted with checking data.
CNA200710152544XA 2007-09-27 2007-09-27 Method and system for symmetrical encryption of terminal data by SAM card Pending CN101132276A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200710152544XA CN101132276A (en) 2007-09-27 2007-09-27 Method and system for symmetrical encryption of terminal data by SAM card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200710152544XA CN101132276A (en) 2007-09-27 2007-09-27 Method and system for symmetrical encryption of terminal data by SAM card

Publications (1)

Publication Number Publication Date
CN101132276A true CN101132276A (en) 2008-02-27

Family

ID=39129409

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200710152544XA Pending CN101132276A (en) 2007-09-27 2007-09-27 Method and system for symmetrical encryption of terminal data by SAM card

Country Status (1)

Country Link
CN (1) CN101132276A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101739756B (en) * 2008-11-10 2012-01-11 中兴通讯股份有限公司 Method for generating secrete key of smart card
CN102946311A (en) * 2012-11-28 2013-02-27 成都卫士通信息产业股份有限公司 Key dispersed method for enhancing safety of symmetric key system
CN101577022B (en) * 2009-03-13 2013-03-27 深圳德诚信用咭制造有限公司 Method for encrypting and decrypting CPU card data
CN103903129A (en) * 2012-12-28 2014-07-02 北京握奇数据系统有限公司 Remitting system and remitting method realized based on text message mode
CN104318461A (en) * 2014-10-22 2015-01-28 浪潮软件集团有限公司 Anti-counterfeiting code generation and verification method based on cipher machine and USBKey
CN107070881A (en) * 2017-02-20 2017-08-18 北京古盘创世科技发展有限公司 key management method, system and user terminal
CN108780530A (en) * 2016-03-29 2018-11-09 李昕光 Smart card service system and method

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101739756B (en) * 2008-11-10 2012-01-11 中兴通讯股份有限公司 Method for generating secrete key of smart card
CN101577022B (en) * 2009-03-13 2013-03-27 深圳德诚信用咭制造有限公司 Method for encrypting and decrypting CPU card data
CN102946311A (en) * 2012-11-28 2013-02-27 成都卫士通信息产业股份有限公司 Key dispersed method for enhancing safety of symmetric key system
CN102946311B (en) * 2012-11-28 2016-05-11 成都卫士通信息产业股份有限公司 A kind of key process for dispersing that strengthens the security of symmetric key system
CN103903129A (en) * 2012-12-28 2014-07-02 北京握奇数据系统有限公司 Remitting system and remitting method realized based on text message mode
CN103903129B (en) * 2012-12-28 2017-11-24 北京握奇数据系统有限公司 A kind of funds transfer system realized based on short message mode and method
CN104318461A (en) * 2014-10-22 2015-01-28 浪潮软件集团有限公司 Anti-counterfeiting code generation and verification method based on cipher machine and USBKey
CN104318461B (en) * 2014-10-22 2017-06-27 浪潮软件集团有限公司 Anti-counterfeiting code generation and verification method based on cipher machine and USBKey
CN108780530A (en) * 2016-03-29 2018-11-09 李昕光 Smart card service system and method
CN107070881A (en) * 2017-02-20 2017-08-18 北京古盘创世科技发展有限公司 key management method, system and user terminal

Similar Documents

Publication Publication Date Title
CN106789052B (en) Remote key issuing system based on quantum communication network and use method thereof
US9948624B2 (en) Key downloading method, management method, downloading management method, device and system
CN100464549C (en) Method for realizing data safety storing business
CN101656007B (en) Safe system realizing one machine with multiple ciphers on POS machine and method thereof
CN103413159B (en) A kind of RFID electronic certificate off-line false proof realization method and system of Jianzhen based on CPK
CN101350724B (en) Encrypting method base on biology characteristic information
CN101807994B (en) Method and system for application data transmission of IC card
CN101132276A (en) Method and system for symmetrical encryption of terminal data by SAM card
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN103413109A (en) Bidirectional authentication method of radio frequency identification system
CN110519046A (en) Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD
CN103095452A (en) Random encryption method needing to adopt exhaustion method for deciphering
CN103051459B (en) The management method of the transaction key of safety card and device
CN103326864A (en) Electronic tag anti-fake authentication method
CN111737770A (en) Key management method and application
CN101938353B (en) Method for remotely resetting personal identification number (PIN) of key device
CN108537537A (en) A kind of safe and reliable digital cash Wallet System
CN102255727B (en) Improved anti-attacking intelligent card authentication method based on user defined algorithm environment
CN104574652A (en) Method for increasing and deducting pollution discharge data of IC card and IC card
CN111047305A (en) Private key storage and mnemonic method for encrypted digital currency wallet based on digital watermarking technology
Zhou et al. Implementation of cryptographic algorithm in dynamic QR code payment system and its performance
TWI476629B (en) Data security and security systems and methods
CN101651538A (en) Method for safe transmission of data based on creditable password module
CN1953366B (en) Password management method and system for intelligent secret key device
CN102521777B (en) A kind of method and system realizing remote credit

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080227