CN101374153A - Method for activating a third party application safely, a third party server, terminal and system - Google Patents

Method for activating a third party application safely, a third party server, terminal and system Download PDF

Info

Publication number
CN101374153A
CN101374153A CNA2007101206694A CN200710120669A CN101374153A CN 101374153 A CN101374153 A CN 101374153A CN A2007101206694 A CNA2007101206694 A CN A2007101206694A CN 200710120669 A CN200710120669 A CN 200710120669A CN 101374153 A CN101374153 A CN 101374153A
Authority
CN
China
Prior art keywords
terminal
party
key
random number
domain key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007101206694A
Other languages
Chinese (zh)
Other versions
CN101374153B (en
Inventor
李征
游峰
赵波锋
郭小明
范金桥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Hunan Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Hunan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Hunan Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN2007101206694A priority Critical patent/CN101374153B/en
Publication of CN101374153A publication Critical patent/CN101374153A/en
Application granted granted Critical
Publication of CN101374153B publication Critical patent/CN101374153B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a method for safely activating the application of a third party, a third-party server, a terminal and a system. The method comprises the following steps: an initial security domain key applied by a third party is acquired by the terminal and the third-party server; a request for modifying the security domain key is triggered by the terminal, and a new security domain key is generated through negotiation with the same cryptographic algorithm with the third-party server, so as to update the initial security domain key; the related user information for activating the application of the third party is transmitted to the third-party server by the terminal; the application key of the terminal corresponding to the application of the third party is set by the third-party server according to the related user information; the updated security domain key is used for encrypting the application key of the third-party application by the third-party server and transmitting the application key to the terminal; the application key of the third-party application is acquired by the terminal through the decryption. The embodiments of the invention solve the problems that the current preset many-time writing card has lower efficiency and high cost, and the over-the-air downloading mode can not solve the problem of the privatization of the third-party security domain key.

Description

Safety activates method, third-party server, terminal and the system that the third party uses
Technical field
The present invention relates to a kind of safety and activate the method that the third party uses, particularly a kind of method third-party application activating by network security; The invention still further relates to a kind of third-party server, particularly a kind of and terminal is carried out key agreement, and safety activates the server that the third party uses; The present invention relates to a kind of terminal again, particularly communicates with third-party server, and safety activates the terminal that the third party uses; The invention still further relates to a kind of safety and activate the system that the third party uses, particularly a kind of third-party server and terminal are carried out key agreement, and safety activates the system that the third party uses, and belongs to communication technical field.
Background technology
Mobile operator is at the telecommunications card equipment of distribution or mark off a plurality of security domains space on pluggable storage card on the mobile phone etc., and different security domain key is set on each security domain, to deposit the different application of mobile operator.
Equipment such as telecommunications card or storage card mainly obtain application numbers, security domain arrangement space and initial safe domain key by three kinds of modes at present:
1) preset the hair fastener mode: the portable terminal non-volatile memory device writes in this memory device in advance at before sales;
2) user's downloading mode initiatively: when the user need open a certain application, initiatively send instructions to network (wired or wireless) side server, and the numbering that will use, security domain arrangement space and initial safe domain key download on the non-volatile memory device (memory module of pluggable storage card or terminal) of user terminal;
3) network side server issue initiatively that mode: mobile operator arranges the security domain allocation space of a certain application and security domain key by the control key encrypted instruction, send on all memory card device of having sold through aerial channel (as: note or GPRS), obtain the security domain allocation space and the initial safe domain key of this application behind the terminal deciphering control key encrypted instruction.
Fig. 1 is a parsing schematic diagram of downloading a certain application in the prior art, and as shown in Figure 1, the process that the user downloaded and opened a certain application in the air comprises:
1. terminal sends to the management server of depositing application program and uses the download request instruction;
2. after management server is received download request, the application code of correspondence is issued on the portable terminal;
3. portable terminal downloads and finishes, and begins to activate to use, and is uploaded to application server with activating after the required associated user information of this application is encrypted with the initial safe domain key;
4. after application server is received above-mentioned information, be decrypted, obtain and set up the incidence relation of user terminal and this application with the initial safe domain key;
5. after the application key employing initial safe domain key encryption that application server will be used, issue terminal;
6. terminal is received this key information, is decrypted with the initial safe domain key, obtains to use key and is loaded into application, and whole application activating process finishes.
Application server in the above-mentioned aerial downloading process belongs to the equipment of mobile operator inside, and application server for storage has the information such as related information of using key, initial safe domain key and user, and the opening of the every application of user, cancellation etc. are managed.Can find out that from the process of above-mentioned aerial down load application operator knows initial safe domain key, application code plaintext, uses all information such as related information of key and user.
Further reinforcement along with mobile operator cooperates with third party as application such as bank card in bank, the public transport or mass transit card are downloaded on the portable terminal by moving aerial channel, can make portable terminal possess multiple application functions such as telecommunications, public transport, bank.Mobile operator not only can reduce the inconvenience that the user carries many different telecommunications, public transport and bank cards with third-party cooperation, and it is detailed or supplement with money in the air to make the user inquire about relationship trading at any time, satisfies the many-sided demand of user.Wish that with the third party of mobile operator cooperation the information such as application key, security domain key of oneself externally maintain secrecy in using downloading process, promptly have only the user and the third party oneself of down load application to know, do not wish that or not professional of oneself expressly is exposed in the mobile operator visual line of sight, but existing application download flow process can not satisfy third-party requirement.
For satisfying third-party requirement, use to preset at present and repeatedly write the card mode, promptly before memory card device (as SIM cards of mobile phones, USD card, USCC card etc.) is sold, earlier finish the security domain key initialization by the mobile operator memory card device, give the third party after initialization is finished and carry out third-party (security domain key is upgraded and application code is installed) initialization, after one or more third party's initialization finish, sell to the user by mobile operator again.Though existing presetting repeatedly write the card mode and can be satisfied the requirement of third party to the security domain key privatization, but still has following defective:
1) mobile operator can't know the quantity of potential third party and application thereof, and preset mode can only adopt the third party and the application thereof that know.In case after having preset third party's application on the memory card device, can bring very big inconvenience: for example to the expansion of business, storage card or telecommunications card that the only integrated A of bank uses are sold to behind the user, public transport C is desirably in also integrated public transport C application on the storage card, if the user need open the application of public transport C in addition, mobile operator just must reclaim user's storage card or telecommunications card, finishes initialization to public transport C again; Perhaps mobile operator directly changes a storage card or a telecommunications card that presets public transport C trading card to the user;
2) when the cooperation the third party more for a long time, need in card, preset a plurality of third-party application respectively, the flow process complexity, the time is long, efficient is low;
3) if a plurality of third-party application are preset in the storage card in advance, concurrently sell to the user, the user is so many demands not, may only use limited several application, even do not use any application, cause the waste of resource.
Summary of the invention
First purpose of the present invention provides a kind of safety and activates the method that the third party uses, can't solve the problem of third party's security domain key privatization in order to solve the existing poor efficiency of repeatedly writing card and expensive problem and existing aerial downloading mode of presetting, realize the key agreement between third party and the terminal, safe downloads to third-party application on the terminal.
Second purpose of the present invention provides a kind of third-party server, is used to solve existing server and can't finishes the security domain key privatization that the third party uses, and realizes that safety activates the third party and uses.
The 3rd purpose of the present invention provides a kind of terminal, can't realize not known to solve existing terminal by other third party with the security domain key of third-party server, key agreement between realization and the third-party server, the security domain key that the activation third party of safety uses is not known by other third party.
The 4th purpose of the present invention provides a kind of safety and activates the system that the third party uses, can't solve the problem of third party's security domain key privatization in order to solve the existing poor efficiency of repeatedly writing card and expensive problem and existing aerial downloading mode of presetting, realize the key agreement between third party and the terminal, with third-party application by network download on terminal.
In order to realize the present invention's first purpose, the method that the safety of some execution modes of the present invention activates third party's application provides following technical scheme:
Terminal and third-party server obtain the initial safe domain key that the third party uses;
Described terminal triggers security domain key and revises request, and consults to produce a new security domain key with described third-party server by the identical cryptographic algorithm that comprises at least two random numbers, and described initial safe domain key is upgraded;
Terminal will activate the associated user information of third party's application and carry out encrypting and transmitting to third-party server with the security domain key after upgrading;
Third-party server is decrypted described associated user information with the security domain key after upgrading, according to described associated user information setting terminal and the incidence relation of described third party's application and corresponding application key;
The application key that third-party server is used described third party with the security domain key after upgrading carries out encrypting and transmitting and gives terminal;
Terminal is decrypted described application key with the security domain key after upgrading and obtains the application key that described third party uses.
In the above-mentioned technical scheme, can realize the security negotiation of security domain key between user terminal and the third party (third parties of non-moving operators such as industry and enterprise, individual), user terminal adopts identical cryptographic algorithm with the third party, negotiate a key that has only user and third party oneself to know, thereby initial security domain key is upgraded.Can do not known through the key that user terminal and third-party server negotiate by any other third party, the mobile operator that comprises the network service, be third party's information such as application, application key and security domain key of control and management oneself fully, need not worry that oneself application message is monitored or steal, solved and preset poor efficiency and the expensive problem of repeatedly writing card in the prior art, and solved the problem of third party's security domain key privatization in the technique scheme.Simultaneously, technique scheme also can be undertaken by the third party fully to the upgrading and the maintenance of using, and is convenient to the management to third party's application and relative users terminal.
In order to realize the present invention's second purpose, the third-party server technical scheme of some execution modes of the present invention is as follows: comprise interface module, processing module and memory module, wherein:
Memory module, the cryptographic algorithm that is used to store the initial safe domain key of third party's application and comprises at least two random numbers;
Processing module is connected with described memory module, after being used for security domain key that receiving terminal sends and revising request, produces the correlation random number information of server side; The random number information that autonomous device outside receiving terminal or terminal and the third-party server sends, random number information according to cryptographic algorithm, processing module generation and reception in the memory module, produce a new security domain key identical, and the initial safe domain key of memory module is upgraded with terminal; The associated user information that the activation third party who sends with the security domain key deciphering terminal after upgrading uses, and according to described associated user information setting terminal and the incidence relation of described third party's application and corresponding application key; Encrypt the application key and send to interface module with the security domain key after upgrading;
Interface module is connected with processing module, and the security domain key that is used for that terminal is sent is revised the random number information of request, the random number information of terminal generation, the generation of described autonomous device or activated the associated user information that the third party uses, and sends to processing module; Random number information that output processing module produces or application key information.
Above-mentioned third-party server is different with the application server or the management server of existing mobile operator inside, third-party server need upgrade original initial safe domain key that is not the third party is provided with, with terminal communication, carry out the negotiation of key, the mode that activates third party's application by safety downloads to portable terminal with third-party application, and guarantee the privatization of third party's key, guarantee third-party information security, both satisfy third-party requirement, avoided repeatedly low, the defect of high cost of hair fastener efficient of existing presetting system again.
In order to realize the present invention's the 3rd purpose, the terminal of some execution modes of the present invention is as follows:
Non-volatile memory modules stores initial safe domain key that the third party uses and the cryptographic algorithm that comprises at least two random numbers;
Processing module is connected with non-volatile memory modules, is used to trigger security domain key and revises request; Produce random number information; Receive the random number information that the autonomous device outside third-party server or terminal and the third-party server produces, random number information according to the cryptographic algorithm in the non-volatile memory modules, processing module generation and reception, produce a new security domain key, and the initial safe domain key is upgraded; The associated user information of using the security domain key ciphering activation third party after upgrading to use; Encrypt the relevant information of transmitting with third-party server with the security domain key after upgrading;
Interface module is connected with processing module, is used to receive the random number information of the autonomous device generation outside third-party server or terminal and the third-party server and is forwarded to processing module; The security domain key that output processing module produces is revised request, the random number information that terminal produces, the associated user information that the activation third party uses and the relevant information of transmitting with third-party server.
Above-mentioned terminal needs the storage encryption algorithm, and according to the initial safe domain key being upgraded with the new security domain key of third-party server negotiation, thereby a side of a mobile operator or an initial safe domain key does not know new security domain key, with new security domain key consistency and the confidentiality of guaranteeing that terminal and third party use.
For realizing the present invention's the 4th purpose, the system that safety of the present invention activates third party's application comprises: terminal, be connected with third-party server, comprise non-volatile memory modules in the terminal, the non-volatile memory modules internal memory contains initial safe domain key and the cryptographic algorithm that the third party uses, be used for consulting to produce new security domain key, the initial safe domain key is upgraded with third-party server;
Third-party server is used for when the terminal security domain key is revised request, consults to produce a new security domain key with terminal by identical cryptographic algorithm, and described initial safe domain key is upgraded; And the security domain key after utilize upgrading to opening of using of third party, nullify and manage control, and corresponding management of using key.
Said system is different with the system that existing download third party uses, and need do corresponding improvement to terminal and third-party server, to satisfy the purpose that safety activates.Native system carries out key agreement and renewal to original initial safe domain key that is not the third party is provided with, guarantee the privatization of third party's security domain key and subsequent applications key, guarantee third-party information security, both satisfy third-party requirement, avoided repeatedly low, the defect of high cost of hair fastener efficient of existing presetting system again.
Below by drawings and Examples, technical scheme of the present invention is described in further detail.
Description of drawings
Fig. 1 is an aerial parsing schematic diagram of downloading a certain application in the prior art;
Fig. 2 activates method embodiment one flow chart that the third party uses for safety of the present invention;
Fig. 3 is the embodiment flow chart that produces new safe key among Fig. 2;
Fig. 4 activates the method embodiment two parsing schematic diagrames that the third party uses for safety of the present invention;
Fig. 5 activates the method embodiment three parsing schematic diagrames that the third party uses for safety of the present invention;
Fig. 6 opens the flow process of application for existing presetting system;
Fig. 7 activates the method analytic application schematic diagram that the third party uses for safety of the present invention;
Fig. 8 is third-party server embodiment one schematic diagram of the present invention;
Fig. 9 is third-party server embodiment two schematic diagrames of the present invention;
Figure 10 is terminal embodiment one schematic diagram of the present invention;
Figure 11 is terminal embodiment two schematic diagrames of the present invention;
Figure 12 activates the system embodiment schematic diagram that the third party uses for safety of the present invention.
Embodiment
Referring to Fig. 2, for safety of the present invention activates method embodiment one flow chart that the third party uses.As shown in Figure 2, present embodiment comprises:
Step 1: terminal and third-party server obtain the initial safe domain key that the third party uses;
Step 2: terminal triggers security domain key and revises request, and consults to produce a new security domain key with third-party server by the identical cryptographic algorithm that comprises at least two random numbers, and described initial safe domain key is upgraded;
Step 3: terminal will activate the associated user information of third party's application and carry out encrypting and transmitting to third-party server with the security domain key after upgrading;
Step 4: third-party server is decrypted described associated user information with the security domain key after upgrading, according to described associated user information setting terminal and the incidence relation of described third party's application and corresponding application key;
Step 5: the application key that third-party server is used described third party with the security domain key after upgrading carries out encrypting and transmitting and gives terminal;
Step 6: terminal is decrypted described application key with the security domain key after upgrading and obtains the application key that described third party uses.
Technique scheme can realize the security negotiation of security domain key between terminal and the third party (third parties of non-moving operators such as industry and enterprise, individual), terminal adopts identical cryptographic algorithm with third-party server, negotiate a key that has only user terminal and third party oneself to know, thereby initial security domain key is upgraded.Can do not known through the key that user terminal and third-party server negotiate by any other third party, the mobile operator that comprises the network service, be the third party fully control and management oneself application, use information such as key and security domain key, need not worry that oneself application message is monitored or steal.Above-mentioned associated user information is used required personal user information for activating the third party, and as user ID, activation is which application, user key etc.Present embodiment has solved and has preset poor efficiency and the expensive problem of repeatedly writing card in the prior art, and has solved the problem of third party's security domain key privatization in the technique scheme.Simultaneously, technique scheme also can be undertaken by the third party fully to the upgrading and the maintenance of using, and is convenient to the management to third party's application and relative users terminal.
Fig. 3 is the embodiment flow chart that produces new safe key among Fig. 2.As shown in Figure 3, producing a new security domain key by identical cryptographic algorithm specifically comprises:
Terminal, third-party server produce at least one random number in the cryptographic algorithm respectively, and other random number in the cryptographic algorithm produces by terminal, third-party server or by the autonomous device outside terminal and the third-party server;
The terminal or the third-party server that produce random number send to third-party server or the terminal that does not produce this random number with the random number that produces;
If autonomous device produces random number, then described autonomous device sends to terminal and the third-party server that does not produce this random number with the random number that produces;
Terminal and third-party server produce a new security domain key according to the random number information of identical cryptographic algorithm and generation and reception.
Cryptographic algorithm of the present invention comprises at least two random numbers, the present invention can adopt multiple multi-form cryptographic algorithm, when cryptographic algorithm comprises two random numbers, produce the needed random number information of cryptographic algorithm respectively by terminal and third-party server, and the random number information that produces is sent to the other side respectively; When cryptographic algorithm comprises two above random numbers, can be by at least one random number in terminal and the third-party server generation cryptographic algorithm, other random number is produced by another autonomous device of terminal, third-party server or terminal and third-party server.For convenience of explanation, if described identical cryptographic algorithm needs the individual random number of N (N is integer and N ≧ 2), if the random number that terminal produces is A, the random number that third-party server produces is B, and the random number that described autonomous device produces is C (A, B, C is integer and C ≧ 0), then need only A+B+C=N and satisfy condition, wherein N A ≧ 1, N〉B ≧ 1.Find out by top formula A+B+C=N, when the random number B sum that random number A that produces when terminal and third-party server produce is N, the random number C=0 that autonomous device produces, be that described autonomous device can not participate in producing random number, jointly produce all random number by terminal and third-party server this moment, and notify the other side mutually.The random number B sum that random number A that produces when terminal and third-party server produce is during less than N, the random number C=that autonomous device produces (N-A-B) ≧ 1, be that described autonomous device participates in producing random number, jointly produce all random number by terminal, third-party server and autonomous device this moment, by autonomous device the random number that produces sent to terminal and third-party server.In a word, finally make terminal and third-party server obtain same random number information, and calculate new security domain key according to the random number that produces and receive.
Producing a random number respectively with terminal and third-party server below is example, the identical cryptographic algorithm computing formula that comprises two random number x and y of storing as terminal and third-party server is f (x, y), produce one of them random number x or y respectively by terminal and third-party server, and notify the other side, final identical x and the value of y of obtaining of terminal and third-party server then, (x y) can be with the identical value calculated as new security domain key for the cryptographic algorithm f by storage.Because terminal or third-party server send the random number x or the y of generation respectively, even wherein an information is intercepted and captured, owing to do not know another random number and cryptographic algorithm, intercepting and capturing side still can't obtain or calculate new security domain key, guarantees the fail safe of key.
Be further to guarantee that fail safe, terminal and third-party server can also adopt the initial safe domain key that the random number information that sends is encrypted, and then send to the other side, prevent that terminal or third-party server that puppet is emitted from doing key agreement.
Move the master key of operation control terminal, master key is used for opening up on terminal or deletes arbitrary security domain space, and different security domains is used for depositing different third-party application.Any Application can not preset in advance in operator in terminal, and only need to provide concrete demands of applications according to the third party who cooperates with it, mark segment space as this third-party security domain in terminal, and be that the security domain that different third parties use generates different initial safe domain key.Terminal is by aforesaid mode, as preset mode, by user's downloading mode or issue mode etc. by network side server and obtain security domain space and the initial safe domain key that the third party uses initiatively.Operator will notify the third party by the mode (as: employing encryption envelope is manually sent with charge free by the special messenger or set up the encrypted link transmission by network) of safety for the third party uses the initial safe domain key of distribution.If also want the autonomous device outside terminal and the third-party server to produce random number information, then can also notify described autonomous device by the mode of safety with the initial safe domain key, and when sending random number, adopt the initial safe domain key to encrypt, improve fail safe and reliability.If do not need the autonomous device outside terminal and the third-party server to produce random number information, then do not need to send the initial safe domain key to autonomous device.
Terminal just can be opened third-party application after obtaining initial safe domain key and security domain distribution, and adopts identical cryptographic algorithm to produce new security domain key with third-party server.Terminal and third-party server produce new security domain key can use multiple encryption algorithms; can not exemplify one by one at this; above-mentioned to comprise the cryptographic algorithm f (x of two random number x and y; y) be example; simply introduced the cipher key agreement process when cryptographic algorithm comprises two random numbers; be example with the cryptographic algorithm Differ-Hoffman algorithm that comprises two above random numbers below; in conjunction with the accompanying drawings 4 and Fig. 5 when introducing the above random number of three or three terminal and third-party server produce the process of new security domain key by key agreement; but this does not also mean that the applied instantiation of the present invention can only be confined in the Differ-Hoffman algorithm; those of ordinary skill in the art should understand; hereinafter the specific embodiments that is provided is some examples in the multiple its preferred usage; thereby terminal adopts any identical cryptographic algorithm that comprises at least two random numbers to produce new security domain key with third-party server to be upgraded the initial safe domain key, and the technical scheme of utilizing the security domain key after upgrading that subsequent applications or application key etc. is encrypted all should be within technical solution of the present invention scope required for protection.
Referring to Fig. 4, for safety of the present invention activates the method embodiment two parsing schematic diagrames that the third party uses.As shown in Figure 4, present embodiment comprises:
1) terminal sends to the application code memory device and uses the download request instruction, and command information comprises application numbers and the User Identity information that the user need download;
2) after the application code memory device is received download request, the application code of correspondence is handed down to terminal, terminal is installed this application program;
3) application program installs, the user activates application, terminal is sent out security domain key to third-party server and is revised request and (for making user terminal better user experience is arranged downloading can to trigger when the third party uses, user's terminal bodies can be revised less than key, as long as the user needs down load application, the instruction of user's download application request can trigger security domain key automatically and revise request so that the initial safe domain key is upgraded), after third-party server receives that security domain key is revised request, consult two prime number n and g with one at terminal, g is the primitive element of mould n, primitive element is a proper noun in the mathematical algorithm, is those of ordinary skills' common practise.Terminal and third-party server produce the n of prime number at random or the g of Differ-Hoffman algorithm respectively, and send to the opposing party; Perhaps produce the n of prime number at random and the g of Differ-Hoffman algorithm, and send to the opposing party by terminal or third-party server; Finally make terminal obtain identical prime number n and g with third-party server;
4) terminal produces a little random number x, and calculates X=g xMod n after with the initial safe domain key X being encrypted, sends to third-party server; With the initial safe domain key random number X that produces is encrypted and to avoid carrying out key agreement after the pseudo-third-party server acquisition of information;
5) third-party server uses the deciphering of initial safe domain key to obtain X information, produces a little random number y simultaneously, and calculates Y=g yMod n after with the initial safe domain key Y being encrypted, sends to the portable terminal non-volatile memory device, can prevent that equally pseudo-terminal from intercepting and capturing cleartext information and carrying out key agreement;
6) after terminal uses the deciphering of initial safe domain key to obtain Y information, calculate k=Y xMod n=g XyMod n is as new security domain key, and third-party server is by calculating k=X yMod n=g XyThe new security domain key of the same acquisition of mod n; And terminal is consistent with the security domain key value that third-party server calculates, and is not comprised that moving other the third party merchant who runs knows, thereby can guarantee the fail safe of key;
7) after terminal is upgraded security domain key,, set up the incidence relation of user and application by third-party server with being uploaded to third-party server after the security domain key encryption that activates after required personal information adopts renewal;
8) after third-party server will be used corresponding application key and adopt security domain key k after upgrading to encrypt, pass to terminal;
9) terminal is used the information that the security domain key deciphering after upgrading is received, obtains to use key and is loaded into application, and whole application activating process finishes.
Terminal and third party consult a security domain key of having only it and this third-party server to know and substitute initial security domain key.Present embodiment produces according to the Differ-Hoffman algorithm, and the Differ-Hoffman algorithm needs four random number: n, g, x and y altogether, is produced by terminal or third-party server respectively.Present embodiment be not simply with the DH algorithm application in the flow process that aerial download third party uses, the information that existing DH algorithm produces is attacked by the people easily, the present invention is in the process of carrying out key agreement, and n and g encrypt by the initial safe domain key and transmit; X and Y encrypt by the initial safe domain key and transmit; X and Y are the cipher-text information after x and y encrypt in the DH algorithm, even mobile operator obtains said n, g, X, Y by the deciphering of initial safe domain key, but because X and Y are the value after random number x and the y encryption, still can't obtain x and y, this be because, the algorithm that calculates X and Y by x and y is a non-reversible algorithm, because same X value can have a plurality of x to produce; Same Y value can have a plurality of y to produce; But terminal and third-party server can utilize x or y and X that receives or the Y calculating k=Y that self produces xMod n or k=X yMod n is as new security domain key, and the consistent k=Y of the value of the two xMod n=X yMod n=g XyMod n, but other third party even have X and Y also can't calculate the value of k, thereby can't calculate new security domain key owing to can't obtain x or y; Other third party of non-moving operator is not owing to there is the initial safe domain key, more can't be decrypted and participate in the calculating of key to above-mentioned information, improved the security reliability of key agreement, so the security domain key with after upgrading that third-party server can be safe is issued portable terminal with third-party application key.
Use key and concrete third party and use relevantly, some application may not need to use key, use as bank card; But also there are some application needs to use keys, use, have the key and supplement key etc. with money and use key of deducting fees as mass transit card.
Referring to Fig. 5, for safety of the present invention activates the method embodiment three parsing schematic diagrames that the third party uses.Present embodiment and Fig. 4 are similar, difference is to use the position difference of download, present embodiment is consulted just to download concrete application after the new security domain key of back acquisition in terminal and third-party server, and increased in the present embodiment one at random the prime number generator as the autonomous device outside terminal and the third-party server, be used for producing prime number n and/or the g that the Differ-Hoffman algorithm needs, and notice terminal and third-party server.Introduce the idiographic flow of present embodiment below:
1. terminal triggers security domain key modification request and sends to third-party server when the download third party uses;
2, after third-party server is received request, notify prime number generator at random;
3, the prime number generator produces two prime number n and g at random, and g is the primitive element of mould n, with two prime number n and the g notice third-party server that produces;
4, third-party server is informed terminal with n, g;
Wherein step 3 and step 4 mainly are for making terminal and third-party server obtain prime number n and g at random, wherein step 3 and step 4 also can be combined into a step: the prime number generator produces two prime number n and g at random, and two prime number n that will produce and g notify third-party server and terminal;
5, terminal produces a random number x, calculates X=g xMod n after employing initial safe domain key is encrypted X, sends to third-party server;
6, third-party server uses the deciphering of initial safe domain key to obtain X, produces a random number y simultaneously, calculates Y=g yMod n adopts the initial safe domain key to give terminal to the Y encrypting and transmitting;
Third-party server and terminal are calculated and are produced new security domain key k=X yMod n=g XyMod n upgrades the initial safe domain key;
6, after renewal is finished, third-party server can be initiated key updating to terminal, use the new security domain key k that produces that the key that third party oneself produces is encrypted, send to terminal, by replacing security domain key once more after the end side deciphering, this process is optional, depends on whether the third party thinks on the unified different terminals security domain key of oneself, streamlining management;
7, after terminal is upgraded security domain key, send the application download instruction to third-party server;
8, third-party server notice application code memory device;
9, the application code memory device sends application code to terminal, and terminal downloads is installed and used;
10, terminal activates and uses, and the personal information that third party's application activating is required is uploaded to third-party server after adopting the security domain key after upgrading to encrypt;
11, after third-party server will be used required application key and adopt security domain key after upgrading to encrypt, pass to terminal.
Above-mentioned terminal, third-party server or at random the prime number generator sending the random number that produces or at random during prime number, can adopt the initial safe domain key to encrypt, to improve the fail safe of system.Because third-party server is different with the security domain key that different terminals produces, the quantity of user terminal is very huge again, so third-party server need be stored a large amount of keys, but present embodiment is after terminal and third-party server upgrade the initial safe domain key, once more to key updating, the key that uses third party oneself to produce is replaced the security domain key of negotiation once more, can unified key be set for different terminals like this, make things convenient for the third party to manage, and provide convenience for regularly replacing unified security domain key in third party's follow-up management process.
Below by Fig. 6-Fig. 7 method and the contrast of existing method that the present invention downloads third party's application in the air is illustrated.The concrete application scenarios of Fig. 6-Fig. 7 is: a plurality of third parties' application are installed on the built-in or pluggable telecommunications card of terminal.Mobile operator cooperates with third party 11, third party 12, integrated third party 11 and third party's 12 application on telecommunications card.But after card is issued the terminal use, established the cooperative relationship with third party 13 again, need be in integrated third party's 13 application.
Fig. 6 opens the flow process of application for existing presetting system.As shown in Figure 6, idiographic flow comprises:
1 ' supplier delivers memory devices such as telecommunications card to mobile operator, and operator sets up third party 11 and 12 two security domains of third party, respectively default two security domain initial keys in card;
2 ' operator delivers to third party 11 in the lump with telecommunications card and the card that is preset with third party's 11 initial safe domain key, upgrades security domain key by third party's 11 system equipments, and third party 11 application program is installed at security domain;
Card that 3 ' operator is intact with third party's 11 initialization and default third party's 12 security domain initial key is delivered third party 12, upgrades security domain key by third party's 12 system equipments, and third party 12 application program is installed at security domain;
4 ' operator fetches by third party 11 and the intact card of third party's 12 initialization, finishes other initial work;
5 ' operator will finish initialized card and sell to user terminal;
After 6 ' user terminal is taken card, obtain the initial safe domain key of third party 11 and 12, open third party 11 application;
7 ' operator and third party's 13 cooperations are wished also to be transplanted to third party 13 application in the card;
8 ' user terminal has the demand of opening third party 13, but former telecommunications card can't realize that the neocaine that needs integrated third party 13 of terminal replacing to use will bring the cost that changes card for user terminal thus.
Fig. 7 activates the method analytic application schematic diagram that the third party uses for safety of the present invention.Adopt the flow process of the method for the invention to be:
A. the equipment supplier delivers telecommunications card to mobile operator, and operator sets up two security domains: third party 11 and third party's 12 security domains, default two security domain initial keys in card respectively;
B. operator is notified to third party 11 and third party 12 respectively with set third party 11, third party's 12 initial safe domain key, notify the terminal of providing telecommunications card by the mode of issuing initiatively simultaneously, saved the process of how tame third party's initialized card, process simplification, cost reduces;
C. terminal is upgraded the initial safe domain key by carrying out key agreement with third-party server, safety activates a certain third-party application, specifically see the explanation of Fig. 2-Fig. 5 embodiment for details, autonomous device outside terminal and the third-party server produces random number information if desired, the initial safe domain key can also be sent to described autonomous device, and the random number that produces is sent to terminal and third-party server after with the encryption of initial safe domain key;
D. mobile operator and third party 13 set up cooperation;
E. terminal is obtained the initial safe domain key of third party 13 application numbers, arrangement space and third party's 13 application by active mode, the method of using by the safety activation third party among Fig. 2-Fig. 5 embodiment is opened third party 13 application again, need not to change card, save cost.
Third party herein can be concrete industry and enterprise, also can be the individual, and it can be the application of trading cards such as mass transit card, bank card that the third party uses, and also can be concrete third-party certain application, as: recreation, download song etc.Above-mentioned execution mode of the present invention can be realized utilizing aerial channel to open certain trading card and use, realize aerial hair fastener, other application that also third party can be carried out downloads to terminal by mobile network or cable network etc., realize moving the non-usefulness that scoops out, the carrying of application by network that is the exploitation of non-moving operator makes terminal downloads or use, make things convenient for the user, save cost.
Referring to Fig. 8 is third-party server embodiment one schematic diagram of the present invention.The present embodiment server comprises interface module, processing module and memory module, wherein:
Memory module, the cryptographic algorithm that is used to store the initial safe domain key of third party's application and comprises at least two random numbers is the Differ-Hoffman algorithm as cryptographic algorithm;
Processing module is connected with memory module, after being used for security domain key that receiving terminal sends and revising request, produces the correlation random number information of server side; The random number information that autonomous device outside receiving terminal or terminal and the third-party server sends, correlation random number information according to cryptographic algorithm, processing module generation and reception in the memory module, produce a new security domain key identical, and the initial safe domain key of memory module is upgraded with terminal; The associated user information that the activation third party who sends with the security domain key deciphering terminal after upgrading uses, and according to described associated user information setting terminal and the incidence relation of described third party's application and corresponding application key; Encrypt the application key and send to interface module with the security domain key after upgrading;
Interface module is connected with processing module, and the security domain key that is used for that terminal is sent is revised the random number information of request, the random number information of terminal generation, the generation of described autonomous device or activated the associated user information that the third party uses, and sends to processing module; Correlation random number information that output processing module produces or application key information.
Server can also comprise the application code memory module in the present embodiment, is connected with processing module, is used to store third party application, and described third party application is sent to terminal.Described application code memory module can be integrated in third-party server inside, also can be arranged at the third-party server outside.
Third-party server can comprise in the prior art functional module general in the server in the present embodiment, as: communication module etc., no longer illustrate with general utility functions module identical in the prior art server, the difference part of third-party server and existing server is to store in the memory module cryptographic algorithm that comprises at least two random numbers in the present embodiment, described cryptographic algorithm is used for consulting new security domain key with third-party server, and comprises the security domain key information processing module that is used to handle and calculate renewal.
Fig. 9 is third-party server embodiment two schematic diagrames of the present invention.Present embodiment third-party server and Fig. 8 are similar, and to the further refinement of processing module, as shown in Figure 9, processing module comprises:
Random number receives submodule, is used for the correlation random number information that the autonomous device outside receiving terminal or terminal and the third-party server produces;
Random number produces submodule, is used to produce the correlation random number information of third-party server side;
Calculating sub module receives submodule, random number generation submodule and memory module with random number and is connected, and is used for calculating new security domain key according to correlation random number information that produces and receive and memory module cryptographic algorithm;
The application management submodule is connected with calculating sub module, is used for carrying out maintenance management according to described associated user information setting terminal and the incidence relation of described third party's application and corresponding application key to using key information.
Calculating sub module is according to the cryptographic algorithm of storing in the memory module in the present embodiment, and the random number information that self produces and terminal sends, calculate and produce new security domain key, specifically can activate the description of the method embodiment of third party's application referring to safety among Fig. 2-Fig. 5.
In memory module, store when the Differ-Hoffman algorithm, processing module can also comprise among Fig. 9 embodiment:
Prime number produces submodule at random, is connected with calculating sub module and interface module, is used for producing the prime number n and/or the g of Differ-Hofffman algorithm, and sends to terminal by interface module.
By the description of method embodiment as can be known, can produce prime number at random, and the prime number that produces is informed terminal or the third-party server that does not produce this prime number by terminal or third-party server; Perhaps produce prime number at random, and send to terminal and third-party server, make terminal finally can obtain identical prime number information with third-party server by the autonomous device outside terminal and the third-party server.
Among Fig. 8 and Fig. 9 embodiment, can also comprise: key management module, be connected with processing module and memory module, be used for producing the new security domain key identical with terminal in processing module, and after the initial safe domain key of memory module upgraded, initiate the key updating request to terminal, the key that the third party is produced uses new security domain key to carry out encrypting and transmitting to interface module; The key that produces with the third party is as the security domain key after upgrading.
Key management module is after terminal and third-party server upgrade the initial safe domain key, once more to key updating, the key that uses third party oneself to produce is replaced the security domain key of negotiation once more, this module is optional module, depends on whether the third party thinks on the unified different terminals security domain key of oneself.The new security domain key that third-party server and terminal consult to produce has only third party and terminal know, because third-party server is different with the security domain key that different terminals produces, the quantity of user terminal is very huge again, so third-party server need possess stronger key management functions with streamlining management, if once more the security domain key of consulting is replaced with the key that third party oneself produces, different terminals is provided with unified key like this, make things convenient for the third party to manage, and can provide convenience for the unified key of follow-up regular update.
The third-party server of Fig. 8-Fig. 9 is different with existing server, need upgrade original initial safe domain key, with terminal communication, carry out the negotiation of key, consulting the back utilizes the security domain key of upgrading that third-party application is downloaded to terminal, guarantee the privatization and the third-party information security of third party's key, both satisfied third-party requirement, avoided repeatedly low, the defect of high cost of hair fastener efficient of existing presetting system again.
Figure 10 is terminal embodiment one schematic diagram of the present invention.Present embodiment comprises:
Non-volatile memory modules stores initial safe domain key that the third party uses and the cryptographic algorithm that comprises at least two random numbers;
Processing module is connected with non-volatile memory modules, is used to trigger security domain key and revises request; Produce random number information; Receive the correlation random number information that the autonomous device outside third-party server or terminal and the third-party server produces, correlation random number information according to the cryptographic algorithm in the non-volatile memory modules, processing module generation and reception, produce a new security domain key, and the initial safe domain key is upgraded; The associated user information of using the security domain key ciphering activation third party after upgrading to use; Encrypt the relevant information of transmitting with third-party server with the security domain key after upgrading;
Interface module is connected with processing module, is used to receive the correlation random number information of the autonomous device generation outside third-party server or terminal and the third-party server and is forwarded to processing module; The security domain key that output processing module produces is revised request, the correlation random number information that terminal produces, the associated user information that the activation third party uses and the relevant information of transmitting with third-party server.
As seen from Figure 10, when safety corresponding of the present invention activates the method for third party's application, terminal and third-party server internal structure are similar, but in the present embodiment, non-volatile memory modules is specifically as follows: telecommunications card equipment, on mobile phone pluggable storage card, SIM card, USD card or USCC card, or its combination in any.Described non-volatile memory modules also can be the built-in memory module of terminal, finishes safety with cooperation and activates the function that the third party uses.No matter non-volatile memory modules is a built-in module of terminal or passes through to insert terminal; some as terminal; so long as be provided with non-volatile memory modules in the terminal; store safe activation and need carry out the cryptographic algorithm of key agreement, and finish renewal to the initial safe domain key all within technical solution of the present invention scope required for protection with third-party server.Above the terminal of being mentioned is any equipment that can communicate by letter with third-party server, as: mobile phone, handheld device (as, PDA) etc.
Figure 11 is for embodiment two schematic diagrames of terminal of the present invention, and is similar with third-party server processing module internal structure among Fig. 9, but is specially the refinement of terminal inner to terminal processing module, and as shown in figure 11, the processing module inside of terminal comprises in the present embodiment:
Random number receives submodule, is used to receive the random number information that the autonomous device outside third-party server or terminal and the third-party server produces;
Random number produces submodule, is used to produce the correlation random number information of end side;
Calculating sub module, be connected and the non-volatile memory modules connection with random number reception submodule, random number generation submodule, be used for producing the correlation random number information and the new security domain key of non-volatile memory modules cryptographic algorithm calculating of submodule generation and the reception of random number reception submodule according to random number.
Calculating sub module is according to the cryptographic algorithm of storing in the non-volatile memory modules in the present embodiment, and the random number information that self produces and receive, calculate and produce new security domain key, specifically can activate the description of the method embodiment of third party's application referring to safety among Fig. 2-Fig. 5.
Non-volatile memory modules can be stored the Differ-Hoffman algorithm in the present embodiment, and processing module can also comprise:
Prime number produces submodule at random, is connected with calculating sub module and interface module, is used for producing the prime number n and/or the g of Differ-Hoffman algorithm, and sends to third-party server by interface module.
By the description of method embodiment as can be known, prime number can be produced by terminal at random, also can produce, perhaps produce, finally make terminal obtain the identical information of prime number at random with third-party server by the autonomous device outside terminal and the third-party server by third-party server.
Among Figure 10 and Figure 11 embodiment, can also comprise: key management module, be connected with processing module and non-volatile memory modules, be used for after the key updating request that receives the third-party server transmission, obtain the key that the third party produces with described new security domain key deciphering; The key that produces with the third party is as the security domain key after upgrading, and deposits non-volatile memory modules in.
Referring among above-mentioned Fig. 8-Fig. 9 embodiment to the explanation of third-party server, the key management module that increases among Figure 10-Figure 11 terminal embodiment is after the key updating request that receives the third-party server transmission, once more security domain key is upgraded, the key that uses third party oneself to produce is replaced the security domain key of negotiation once more, this module is optional module, depends on whether the third party thinks on the unified different terminals security domain key of oneself.
Figure 12 activates the system embodiment schematic diagram that the third party uses for safety of the present invention, and the system that present embodiment is downloaded third party's application in the air comprises:
Terminal comprises non-volatile memory modules, and internal memory contains initial safe domain key and the cryptographic algorithm that the third party uses, and is used for consulting to produce new security domain key with third-party server, and the initial safe domain key is upgraded;
Third-party server is connected with terminal by network (wired or wireless network), is used for and terminal interaction, consults to produce new security domain key by cryptographic algorithm identical with terminal and terminal the initial safe domain key is upgraded; Have the functions such as maintenance that opening of using of described third party, cancellation etc. are managed control and use key.
Terminal can be referring to Figure 10-Figure 11 embodiment and respective description in the present embodiment, and third-party server can be referring to Fig. 8-Fig. 9 embodiment and respective description, and present embodiment can also comprise:
Memory device is used to deposit the equipment of third party application.According to third party's situation, this equipment can be integrated in third-party server, also can belong to the mobile operator unified management;
Randomizer is used to produce cryptographic algorithm other random number except that the random number of terminal and third-party server generation.This equipment can be autonomous device, home-operator or ownership third party; Also can be the functional module of miscellaneous equipment,, specifically participate in Fig. 8-Figure 11 embodiment and respective description as a build-in function module of terminal and/or third-party server.
Third-party server in the present embodiment can be shown in Fig. 8-Fig. 9 embodiment structure, the function of prime number generator or memory device at random is built in the described third-party server, no longer the internal structure of third-party server is illustrated at this.Because third-party server is different with the security domain key that different terminals produces, the quantity of user terminal is very huge again, so third-party server need possess stronger key management functions.If third-party server is further replaced the security domain key of consulting once more with the key that third party oneself produces, can unified key be set to different terminals, make things convenient for third-party server to manage, if and be that follow-up third party needs the regular security domain key of replacing to provide convenience, specifically can referring in terminal and/or the third-party server for the explanation of upgrading security domain key once more, repeat no more.
The system that above-mentioned aerial download third party uses, need be provided with using the third party, use the third-party server that key and security domain key manage, different with the application server or the management server of existing mobile operator inside, third-party server need upgrade original initial safe domain key that is not the third party is provided with, by network and terminal communication, carry out the negotiation of key, mode by aerial download downloads to terminal with third-party application, and guarantee the privatization of third party's key, guarantee third-party information security, both satisfied third-party requirement, repeatedly hair fastener efficient is low to have avoided existing presetting system again, defect of high cost.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of program command, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (19)

1. a safety activates the method that the third party uses, and it is characterized in that, comprising:
Terminal and third-party server obtain the initial safe domain key that the third party uses;
Described terminal triggers security domain key and revises request, and consults to produce a new security domain key with described third-party server by the identical cryptographic algorithm that comprises at least two random numbers, and described initial safe domain key is upgraded;
Terminal will activate the associated user information of third party's application and carry out encrypting and transmitting to third-party server with the security domain key after upgrading;
Third-party server is decrypted described associated user information with the security domain key after upgrading, according to described associated user information setting terminal and the incidence relation of described third party's application and corresponding application key, with the security domain key after upgrading described application key is carried out encrypting and transmitting and give terminal;
Terminal is decrypted described application key with the security domain key after upgrading and obtains the application key that described third party uses.
2. safety according to claim 1 activates the method that the third party uses, and it is characterized in that, describedly consults to produce a new security domain key by identical cryptographic algorithm and comprises:
Terminal, third-party server produce at least one random number in the cryptographic algorithm respectively, and other random number in the cryptographic algorithm produces by terminal, third-party server or by the autonomous device outside terminal and the third-party server;
The terminal or the third-party server that produce random number send to third-party server or the terminal that does not produce this random number with the random number that produces;
If autonomous device produces random number, then the random number that produces is sent to terminal and the third-party server that does not produce this random number;
Terminal and third-party server produce a new security domain key according to identical cryptographic algorithm and generation and the random number information that receives.
3. safety according to claim 2 activates the method that the third party uses, and it is characterized in that, when described identical cryptographic algorithm is the Differ-Hoffman algorithm, describedly consults to produce a new security domain key by identical cryptographic algorithm and specifically comprises:
Terminal and third-party server produce the n of prime number at random or the g of Differ-Hoffman algorithm respectively, and send to the opposing party, perhaps produce the n of prime number at random and the g of Differ-Hoffman algorithm by terminal or third-party server, and send to the opposing party, perhaps produce the n of prime number at random and the g of Differ-Hoffman algorithm, and send to terminal and third-party server respectively by the autonomous device outside terminal and the third-party server;
Terminal produces the random number x of Differ-Hoffman algorithm, and calculates X according to the random number x of prime number n and g and generation at random, and sends to third-party server, wherein X=g xModn;
Third-party server produces the random number y of Differ-Hoffman algorithm, and calculates Y according to the random number y of prime number n and g and generation at random, and sends to terminal, wherein Y=g yModn;
Terminal is according to the Y calculating K=Y of random number x that produces and third-party server transmission xModn=g XyModn, third-party server calculates calculating K=X according to the X of random number y that produces and terminal transmission yModn=g XyModn;
The same K value that terminal and third-party server will produce is as new security domain key, and the initial safe domain key is upgraded.
4. activate the method that the third party uses according to claim 2 or 3 described safety, it is characterized in that described terminal or third-party server are also encrypted the random number that sends with the initial safe domain key when sending random number.
5. activate the method that the third party uses according to the described arbitrary safety of claim 1-4, it is characterized in that terminal and third-party server consult to produce a new security domain key, also comprise after the initial safe domain key is upgraded:
Third-party server is initiated the key updating request to terminal, uses new security domain key that the key that the third party produces is encrypted, and sends to terminal;
Terminal obtains the key that the third party produces with new security domain key deciphering back, and the key that produces with the third party is replaced described terminal and third-party server and consulted the new security domain key that produces, as the security domain key after the renewal.
6. activate the method that the third party uses according to the described arbitrary safety of claim 1-4, it is characterized in that, also comprise before the associated user information that transmission activation third party uses: the operation that the described third party of terminal downloads uses.
7. a third-party server is characterized in that, comprises interface module, processing module and memory module, wherein:
Memory module, the cryptographic algorithm that is used to store the initial safe domain key of third party's application and comprises at least two random numbers;
Processing module is connected with described memory module, after being used for security domain key that receiving terminal sends and revising request, produces the random number information of server side; The random number information that autonomous device outside receiving terminal or terminal and the third-party server sends, random number information according to cryptographic algorithm, processing module generation and reception in the memory module, produce a new security domain key identical, and the initial safe domain key of memory module is upgraded with terminal; The associated user information that the activation third party who sends with the security domain key deciphering terminal after upgrading uses, and according to described associated user information setting terminal and the incidence relation of described third party's application and corresponding application key; Encrypt the application key and send to interface module with the security domain key after upgrading;
Interface module is connected with processing module, and the security domain key that is used for that terminal is sent is revised the random number information of request, the random number information of terminal generation, the generation of described autonomous device or activated the associated user information that the third party uses, and sends to processing module; Random number information that output processing module produces or application key information.
8. third-party server according to claim 7 is characterized in that, described processing module comprises:
Random number receives submodule, is used for the random number information that the autonomous device outside receiving terminal or terminal and the third-party server produces;
Random number produces submodule, is used to produce the random number information of third-party server side;
Calculating sub module, receive submodule, random number generation submodule and memory module with random number and be connected, be used for producing random number information and the new security domain key of memory module cryptographic algorithm calculating that submodule produces and random number reception submodule receives according to random number;
The application management submodule is connected with calculating sub module, is used for carrying out maintenance management according to described associated user information setting terminal and the incidence relation of described third party's application and corresponding application key to using key information.
9. third-party server according to claim 7 is characterized in that, also comprises:
The application code memory module is connected with processing module, is used to store third party application, when the terminal downloads third party uses, described third party application is sent to terminal.
10. according to the described arbitrary third-party server of claim 7-9, it is characterized in that described processing module also comprises:
Key management module, be connected with processing module and memory module, be used for producing the new security domain key identical with terminal in processing module, and after the initial safe domain key of memory module upgraded, initiate the key updating request to terminal, the key that the third party is produced uses new security domain key to carry out encrypting and transmitting to interface module; The key that produces with the third party is as the security domain key after upgrading.
11. third-party server according to claim 8 is characterized in that, the cryptographic algorithm of described memory module storage is the Differ-Hoffman algorithm, and described processing module also comprises:
Prime number produces submodule at random, is connected with calculating sub module and interface module, is used for producing the prime number information of Differ-Hoffman algorithm, and sends to terminal by interface module.
12. a terminal is characterized in that, comprising:
Non-volatile memory modules stores initial safe domain key that the third party uses and the cryptographic algorithm that comprises at least two random numbers;
Processing module is connected with non-volatile memory modules, is used to trigger security domain key and revises request; Produce random number information; Receive the random number information that the autonomous device outside third-party server or terminal and the third-party server produces, random number information according to the cryptographic algorithm in the non-volatile memory modules, processing module generation and reception, produce a new security domain key, and the initial safe domain key of non-volatile memory modules is upgraded; The associated user information of using the security domain key ciphering activation third party after upgrading to use; Encrypt the relevant information of transmitting with third-party server with the security domain key after upgrading;
Interface module is connected with processing module, is used to receive the random number information of the autonomous device generation outside third-party server or terminal and the third-party server and is forwarded to processing module; The security domain key that output processing module produces is revised request, the random number information that terminal produces, the associated user information that the activation third party uses and the relevant information of transmitting with third-party server.
13. terminal according to claim 12 is characterized in that, described processing module comprises:
Random number receives submodule, is used to receive the random number information that the autonomous device outside third-party server or terminal and the third-party server produces;
Random number produces submodule, is used to produce the random number information of end side;
Calculating sub module, be connected and the non-volatile memory modules connection with random number reception submodule, random number generation submodule, be used for receiving the random number information of submodule reception and the generation of random number generation submodule and the new security domain key of cryptographic algorithm calculating of non-volatile memory modules according to random number.
14. terminal according to claim 13 is characterized in that, the cryptographic algorithm of described non-volatile memory modules storage is the Differ-Hoffman algorithm, and described processing module also comprises:
Prime number produces submodule at random, is connected with calculating sub module and interface module, is used for producing the prime number information of Differ-Hoffman algorithm, and sends to third-party server by interface module.
15. according to the described arbitrary terminal of claim 12-14, it is characterized in that, also comprise:
Key management module is connected with processing module and non-volatile memory modules, is used for after the key updating request that receives the third-party server transmission, obtains the key that the third party produces with described new security domain key deciphering; The key that produces with the third party is as the security domain key after upgrading, and deposits non-volatile memory modules in.
16., it is characterized in that described non-volatile memory modules is specially according to the described arbitrary terminal of claim 12-14:
Telecommunications card equipment, on mobile phone pluggable storage card, SIM card, USD card, USCC card or built-in memory module, or its combination in any.
17. a safety activates the system that the third party uses, and comprises terminal and third-party server, wherein:
Comprise non-volatile memory modules in the terminal, be connected, be used to store initial safe domain key and the cryptographic algorithm that the third party uses, consult to produce new security domain key with third-party server, and the initial safe domain key is upgraded with third-party server;
Third-party server is used for when the terminal security domain key is revised request, consults to produce a new security domain key with terminal by identical cryptographic algorithm, and described initial safe domain key is upgraded; And the security domain key after utilize upgrading to opening of using of third party, nullify and manage control, and corresponding management of using key.
18. safety according to claim 17 activates the system that the third party uses, described terminal is the described arbitrary terminal of claim 12-16, and/or described third-party server is the described arbitrary third-party server of claim 7-11.
19. safety according to claim 17 activates the system that the third party uses, and it is characterized in that, also comprises:
Randomizer is connected with third-party server and terminal, is used for producing other random number information except that the random number of terminal and third-party server generation of cryptographic algorithm, and the random number information that produces is sent to third-party server and terminal.
CN2007101206694A 2007-08-23 2007-08-23 Method for activating a third party application safely, a third party server, terminal and system Active CN101374153B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101206694A CN101374153B (en) 2007-08-23 2007-08-23 Method for activating a third party application safely, a third party server, terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101206694A CN101374153B (en) 2007-08-23 2007-08-23 Method for activating a third party application safely, a third party server, terminal and system

Publications (2)

Publication Number Publication Date
CN101374153A true CN101374153A (en) 2009-02-25
CN101374153B CN101374153B (en) 2012-02-29

Family

ID=40448076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101206694A Active CN101374153B (en) 2007-08-23 2007-08-23 Method for activating a third party application safely, a third party server, terminal and system

Country Status (1)

Country Link
CN (1) CN101374153B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521882A (en) * 2009-03-24 2009-09-02 刘建 Method and system for updating preshared key
WO2010051716A1 (en) * 2008-11-10 2010-05-14 中兴通讯股份有限公司 Method, system and mobile terminal for updating and distributing the secondary security domain key of smart card
WO2010096994A1 (en) * 2009-02-27 2010-09-02 中兴通讯股份有限公司 System and method for downloading application
WO2011001861A1 (en) 2009-06-29 2011-01-06 Nec Corporation Secure network connection
WO2011001993A1 (en) 2009-06-29 2011-01-06 Nec Corporation Secure network connection allowing choice of a suitable security algorithm
CN102118385A (en) * 2010-12-14 2011-07-06 北京握奇数据系统有限公司 Security domain management method and device
CN102427461A (en) * 2011-12-31 2012-04-25 山东中创软件商用中间件股份有限公司 Method and system for realizing Web service application security
WO2012126432A2 (en) * 2012-05-29 2012-09-27 华为技术有限公司 Method, device and system for data transmission
CN102904713A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Key exchange method for secret key encryption communication system
CN103312670A (en) * 2012-03-12 2013-09-18 西安西电捷通无线网络通信股份有限公司 Authentication method and system
CN103532720A (en) * 2013-10-22 2014-01-22 杭州华三通信技术有限公司 Transmission method and equipment of CAPWAP message
CN104717131A (en) * 2015-02-13 2015-06-17 腾讯科技(深圳)有限公司 Information interaction method and server
CN104994494A (en) * 2015-05-07 2015-10-21 深圳市数智国兴信息科技有限公司 One-card service implementation method and system
CN105207988A (en) * 2015-08-11 2015-12-30 联想(北京)有限公司 Information processing methods, server and terminal
CN105491067A (en) * 2016-01-08 2016-04-13 腾讯科技(深圳)有限公司 Key-based business security verification method and device
CN106302457A (en) * 2016-08-16 2017-01-04 上海斐讯数据通信技术有限公司 A kind of data communications method and system
WO2017000237A1 (en) * 2015-06-30 2017-01-05 华为技术有限公司 Algorithm update method, device to be updated, and server
CN107231335A (en) * 2016-03-24 2017-10-03 阿里巴巴集团控股有限公司 A kind of method for processing business and device
US10291614B2 (en) 2012-03-12 2019-05-14 China Iwncomm Co., Ltd. Method, device, and system for identity authentication
CN110995775A (en) * 2019-10-11 2020-04-10 浙江口碑网络技术有限公司 Service data processing method, device and system
CN115462057A (en) * 2020-05-04 2022-12-09 华为技术有限公司 Method and apparatus for service composition

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100534237C (en) * 2004-12-30 2009-08-26 北京航空航天大学 Mobile terminal of supporting application of electronic purse through SIM card
CN100405386C (en) * 2006-09-30 2008-07-23 华中科技大学 Safety identification method in radio frequency distinguishing system

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010051716A1 (en) * 2008-11-10 2010-05-14 中兴通讯股份有限公司 Method, system and mobile terminal for updating and distributing the secondary security domain key of smart card
WO2010096994A1 (en) * 2009-02-27 2010-09-02 中兴通讯股份有限公司 System and method for downloading application
US9037857B2 (en) 2009-02-27 2015-05-19 Zte Corporation System and method for downloading application
CN101521882B (en) * 2009-03-24 2014-03-12 中兴通讯股份有限公司南京分公司 Method and system for updating preshared key
CN101521882A (en) * 2009-03-24 2009-09-02 刘建 Method and system for updating preshared key
WO2011001861A1 (en) 2009-06-29 2011-01-06 Nec Corporation Secure network connection
WO2011001993A1 (en) 2009-06-29 2011-01-06 Nec Corporation Secure network connection allowing choice of a suitable security algorithm
US9027081B2 (en) 2009-06-29 2015-05-05 Lenovo Innovations Limited (Hong Kong) Secure network connection allowing choice of a suitable security algorithm
CN102118385A (en) * 2010-12-14 2011-07-06 北京握奇数据系统有限公司 Security domain management method and device
CN102904713A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Key exchange method for secret key encryption communication system
CN102427461B (en) * 2011-12-31 2015-05-20 山东中创软件商用中间件股份有限公司 Method and system for realizing Web service application security
CN102427461A (en) * 2011-12-31 2012-04-25 山东中创软件商用中间件股份有限公司 Method and system for realizing Web service application security
US9716707B2 (en) 2012-03-12 2017-07-25 China Iwncomm Co., Ltd. Mutual authentication with anonymity
CN103312670A (en) * 2012-03-12 2013-09-18 西安西电捷通无线网络通信股份有限公司 Authentication method and system
WO2013135172A1 (en) * 2012-03-12 2013-09-19 西安西电捷通无线网络通信股份有限公司 Method, device, and system for authentication
US10291614B2 (en) 2012-03-12 2019-05-14 China Iwncomm Co., Ltd. Method, device, and system for identity authentication
WO2012126432A3 (en) * 2012-05-29 2013-05-02 华为技术有限公司 Method, device and system for data transmission
WO2012126432A2 (en) * 2012-05-29 2012-09-27 华为技术有限公司 Method, device and system for data transmission
CN103532720A (en) * 2013-10-22 2014-01-22 杭州华三通信技术有限公司 Transmission method and equipment of CAPWAP message
CN104717131A (en) * 2015-02-13 2015-06-17 腾讯科技(深圳)有限公司 Information interaction method and server
US10873640B2 (en) 2015-02-13 2020-12-22 Tencent Technology (Shenzhen) Company Limited Information exchange method and server
CN104717131B (en) * 2015-02-13 2017-09-15 腾讯科技(深圳)有限公司 Information interacting method and server
CN104994494A (en) * 2015-05-07 2015-10-21 深圳市数智国兴信息科技有限公司 One-card service implementation method and system
CN107925565A (en) * 2015-06-30 2018-04-17 华为技术有限公司 Algorithm update method, equipment to be updated and server
WO2017000237A1 (en) * 2015-06-30 2017-01-05 华为技术有限公司 Algorithm update method, device to be updated, and server
CN107925565B (en) * 2015-06-30 2020-08-07 华为技术有限公司 Algorithm updating method, equipment to be updated and server
CN105207988B (en) * 2015-08-11 2019-07-26 联想(北京)有限公司 A kind of information processing method, server and terminal
CN105207988A (en) * 2015-08-11 2015-12-30 联想(北京)有限公司 Information processing methods, server and terminal
CN105491067B (en) * 2016-01-08 2017-10-24 腾讯科技(深圳)有限公司 Service security verification method and device based on key
CN105491067A (en) * 2016-01-08 2016-04-13 腾讯科技(深圳)有限公司 Key-based business security verification method and device
CN107231335A (en) * 2016-03-24 2017-10-03 阿里巴巴集团控股有限公司 A kind of method for processing business and device
CN107231335B (en) * 2016-03-24 2021-05-25 创新先进技术有限公司 Service processing method and device
CN106302457A (en) * 2016-08-16 2017-01-04 上海斐讯数据通信技术有限公司 A kind of data communications method and system
CN110995775A (en) * 2019-10-11 2020-04-10 浙江口碑网络技术有限公司 Service data processing method, device and system
CN115462057A (en) * 2020-05-04 2022-12-09 华为技术有限公司 Method and apparatus for service composition

Also Published As

Publication number Publication date
CN101374153B (en) 2012-02-29

Similar Documents

Publication Publication Date Title
CN101374153B (en) Method for activating a third party application safely, a third party server, terminal and system
KR102373685B1 (en) Operating system for blockchain IOT devices
CN108156180B (en) Communication key distribution method based on Android intelligent mobile terminal
CN102196425B (en) Quantum-key-distribution-network-based mobile encryption system and communication method thereof
US9185089B2 (en) System and method for key management for issuer security domain using global platform specifications
US8532301B2 (en) Key distribution method and system
CN101370248B (en) Cryptographic key updating method, third party server and system for activating third party application
CN109525390A (en) Quantum key wireless dispatch method and system for terminal device secret communication
CN109698822A (en) Combination learning method and system based on publicly-owned block chain and encryption neural network
CN202121593U (en) Mobile encryption system based on quantum key distribution network
CN105391840A (en) automatic purposed-application creation
CN101511051A (en) Method, system and equipment for downloading application business of telecom smart card
CN101841416A (en) Method, device and system for realizing mobile phone bank
EP1741224A1 (en) System and method for generating reproducible session keys
CN110535641B (en) Key management method and apparatus, computer device, and storage medium
CN100495959C (en) System in a digital wireless data communication network for arranging end-to-end encryption and corresponding terminal equipment
CN102457842A (en) Method, device and system for transaction by mobile phone
CN202444629U (en) System for carrying out card operation by using mobile terminal
US4984271A (en) Cipher system with closed cipher procedure
CN110636028B (en) Key generation device, encryption device, key generation and distribution system
CN103988465A (en) Method and apparatus for implementing key stream hierarchy
KR20030090538A (en) Communication terminal, portable terminal, circulating server, providing server, electronic book distributing method, and electronic book distributing program
CN109039613A (en) A kind of quantum key distribution system and method
CN101841806A (en) Service card information processing method, device and system and communication terminal
CN103841552A (en) Method and system for carrying out aerial card writing through mobile terminal and card reader

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant