CN103780376A - Method, terminal and safety carrier for realizing cryptographic algorithm system adaptive switching - Google Patents

Method, terminal and safety carrier for realizing cryptographic algorithm system adaptive switching Download PDF

Info

Publication number
CN103780376A
CN103780376A CN201210415975.1A CN201210415975A CN103780376A CN 103780376 A CN103780376 A CN 103780376A CN 201210415975 A CN201210415975 A CN 201210415975A CN 103780376 A CN103780376 A CN 103780376A
Authority
CN
China
Prior art keywords
algorithm
safety barrier
indicating device
application
applications
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210415975.1A
Other languages
Chinese (zh)
Other versions
CN103780376B (en
Inventor
谭颖
徐燕军
徐志忠
李伟
李洁
吴水炯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201210415975.1A priority Critical patent/CN103780376B/en
Publication of CN103780376A publication Critical patent/CN103780376A/en
Application granted granted Critical
Publication of CN103780376B publication Critical patent/CN103780376B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention discloses a method, a terminal and a safety carrier for realizing cryptographic algorithm system adaptive switching. In one embodiment of the present invention, the method for realizing the cryptographic algorithm system adaptive switching comprises the steps of sending an application selection command to the safety carrier for interacting with an external application; receiving the response to the application selection command from the safety carrier, wherein the response contains a safety carrier algorithm indicator; comparing the safety carrier algorithm indicator with an algorithm list supported by the external application to determine a to-be-used cryptographic algorithm system; and sending an application initialization command to the safety carrier, wherein the application initialization command contains a transaction algorithm indicator identifying the to-be-used cryptographic algorithm system.

Description

Method, terminal and safety barrier that cryptographic algorithm system self adaptation is switched
Technical field
the present invention relates to finance data process field, and more particularly, relate to self adaptation and switch the method for multiple cryptographic algorithm system, terminal and safety barrier.
Background technology
china's Financial industry is being carried forward vigorously cryptographic algorithm production domesticization work at present, and after the several years, the financial IC card of new issue and mobile payment IC-card will all be supported the close algorithm of state, and finance is accepted network also will complete the close algorithm transformation of state.On the one hand, the finance of the close algorithm of support state is accepted network still needs to accept IC-card storage, that support international algorithm, and the IC-card of card sending mechanism distribution overseas is also only supported international algorithm simultaneously, and this just need to accept network and also support international algorithm simultaneously.On the other hand, the IC-card of the close algorithm of support state of domestic institution distribution also need to only support overseas the network of accepting of international algorithm to use, and this also needs IC-card to support international algorithm simultaneously.
for example, for example, but in existing PBOC standard, the payment process between applications (POS terminal or mobile phone client software) and safety barrier (financial IC card or mobile payment IC-card) is only supported a kind of cryptographic algorithm system.That is, in process of exchange, the data encryption between applications and safety barrier and legitimate verification adopt unique cryptographic algorithm system to complete, the inner selection mechanism without many algorithms.In the time that certain country, area or industry need to be used new key system in inside according to s own situation, can produce incompatible problem between new, old key code system.
Summary of the invention
for this problem, according to an aspect of the present invention, a kind of method that multiple cryptographic algorithm system self adaptation is switched that realizes in the applications of such as POS terminal or mobile phone client software etc. is provided, has comprised: for example, sent application choice order to carrying out mutual safety barrier (financial IC card or mobile payment IC-card) with described applications; Receive the response to described application choice order from described safety barrier, this respond packet is containing safety barrier algorithm indicating device; By the algorithm list of described safety barrier algorithm indicating device and described applications support is compared, determine the cryptographic algorithm system of preparing use; And send application initializes order to described safety barrier, the transaction algorithm indicating device that described application initializes order comprises the cryptographic algorithm system that has identified described preparation use.
in said method, described safety barrier algorithm indicating device has recorded all cryptographic algorithm systems that described safety barrier is supported, and has identified the priority of every kind of algorithm system.
in said method, the cryptographic algorithm system that described preparation is used is described applications and described safety barrier is all supported and priority is the highest algorithm.
the above-mentioned method that realizes multiple cryptographic algorithm system self adaptation switching also can comprise: the response according to described safety barrier to application initialization command, read corresponding application and key data to complete payment transaction.
according to a further aspect in the invention, provide a kind of method that multiple cryptographic algorithm system self adaptation is switched that realizes in safety barrier, having comprised: received application choice order from carrying out mutual applications with described safety barrier; Send the response to application select command to described applications, this respond packet is containing safety barrier algorithm indicating device; Receive application initializes order from described applications, the transaction algorithm indicating device that described application initializes order comprises the cryptographic algorithm system that has identified preparation use, the cryptographic algorithm that wherein said preparation is used is by comparing the algorithm list of described safety barrier algorithm indicating device and described applications support to obtain.Wherein, described applications can be POS machine or Mobile phone payment client software, and described safety barrier can be financial IC card or mobile payment IC-card.
in said method, described safety barrier algorithm indicating device has recorded all cryptographic algorithm systems that described safety barrier is supported, and has identified the priority of every kind of algorithm system.
in said method, the cryptographic algorithm system that described preparation is used is described applications and described safety barrier is all supported and priority is the highest algorithm.
the above-mentioned method that realizes multiple cryptographic algorithm system self adaptation switching also can comprise: judge whether described transaction algorithm indicating device meets the algorithm selection strategy of described safety barrier.And further,, if described transaction algorithm indicating device meets the algorithm selection strategy of described safety barrier, in to the response of described application initializes order, return to application file locator corresponding to cryptographic algorithm system that described preparation is used.
according to a further aspect of the invention, provide a kind of terminal that multiple cryptographic algorithm system self adaptation is switched that realizes, having comprised: sending module, for sending application choice order to carrying out mutual safety barrier with described terminal; Receiver module, for receiving the response to described application choice order from described safety barrier, this respond packet is containing safety barrier algorithm indicating device; And algorithm selection strategy module, for by the algorithm list of described safety barrier algorithm indicating device and described terminal support is compared, determine the cryptographic algorithm system of preparing use; Wherein, described sending module is also for sending application initializes order to described safety barrier, and described application initializes order comprises the transaction algorithm indicating device that has identified the cryptographic algorithm system that described preparation uses.
the above-mentioned terminal that realizes multiple cryptographic algorithm system self adaptation switching also can comprise: read module, for the response to application initialization command according to described safety barrier, reads corresponding application and key data to complete payment transaction.
according to a further aspect of the invention, provide a kind of safety barrier that multiple cryptographic algorithm system self adaptation is switched of realizing, having comprised: receiver module, for receiving application choice order from carrying out mutual applications with described safety barrier; And sending module, for sending the response to application select command to described applications, this respond packet is containing safety barrier algorithm indicating device; Wherein, described receiver module also receives application initializes order from described applications, the transaction algorithm indicating device that described application initializes order comprises the cryptographic algorithm system that has identified preparation use, the cryptographic algorithm that wherein said preparation is used is by comparing the algorithm list of described safety barrier algorithm indicating device and described applications support to obtain.
the above-mentioned safety barrier of realizing multiple cryptographic algorithm system self adaptation switching also can comprise: algorithm selection strategy module, for judging whether described transaction algorithm indicating device meets the algorithm selection strategy of described safety barrier, if wherein described transaction algorithm indicating device meets the algorithm selection strategy of described safety barrier, in to the response of described application initializes order, return to application file locator corresponding to cryptographic algorithm system that described preparation is used.Wherein, when described algorithm selection strategy module is not returned to transaction algorithm indicating device in described applications, select continue to carry out subsequent operation or interrupt transaction.
technical scheme disclosed by the invention can realize the self adaptation switching of multiple different cryptographic algorithm system between payment process peripheral application (POS terminal, Mobile phone payment client software) and safety barrier (financial IC card, mobile payment IC-card), thereby the cryptographic algorithm that finds applications and safety barrier all to support, completes payment transaction.
Accompanying drawing explanation
after having read the specific embodiment of the present invention with reference to accompanying drawing, those skilled in the art will become apparent various aspects of the present invention.Those skilled in the art should be understood that: these accompanying drawings are only for coordinating embodiment that technical scheme of the present invention is described, and are not intended to protection scope of the present invention to be construed as limiting.
fig. 1 is the method flow diagram that multiple cryptographic algorithm system self adaptation is switched of realizing in applications according to an embodiment of the invention.
fig. 2 is the method flow diagram that multiple cryptographic algorithm system self adaptation is switched of realizing in safety barrier according to an embodiment of the invention.
fig. 3 is the flow chart of the cryptographic algorithm self adaptation handoff procedure between safety barrier according to an embodiment of the invention and applications.
fig. 4 is the schematic diagram of the terminal that realizes multiple cryptographic algorithm system self adaptation switching according to an embodiment of the invention.
fig. 5 is the schematic diagram of the safety barrier of realizing multiple cryptographic algorithm system self adaptation switching according to an embodiment of the invention.
Embodiment
what introduce below is some in multiple possibility embodiment of the present invention, aims to provide basic understanding of the present invention, is not intended to confirm key of the present invention or conclusive key element or limits claimed scope.Easily understand, according to technical scheme of the present invention, do not changing under connotation of the present invention other implementation that one of ordinary skill in the art can propose mutually to replace.Therefore, below embodiment and accompanying drawing be only the exemplary illustration to technical scheme of the present invention, and should not be considered as of the present invention all or be considered as restriction or the restriction to technical solution of the present invention.
with reference to figure 1, it shows according to one embodiment of present invention, in applications, realizes the method flow diagram that multiple cryptographic algorithm system self adaptation is switched.Applications can be here POS terminal or mobile phone client software.
in step 110, applications can send application choice order by the mutual safety barrier of Xiang Yuqi.According to an aspect of the present invention, safety barrier is financial IC card or mobile payment IC-card.
then,, in step 120, applications receives response from safety barrier, comprises safety barrier algorithm indicating device in response.Preferably, safety barrier algorithm indicating device has recorded all cryptographic algorithm systems that safety barrier is supported, and has identified the priority of every kind of algorithm system.
for example, safety barrier algorithm indicating device can be as shown in the table:
Algorithm mark Asymmetric arithmetic Symmetry algorithm Digest algorithm Cipher key index Priority
00(state is close) SM2 SM3 SM4 00 00
01(business is close) RSA DES HASH 00 01
in upper table, algorithm mark is the unique identification distributing for every kind of algorithm system, asymmetric arithmetic, symmetry algorithm, digest algorithm are respectively every kind of cryptographic algorithm that algorithm system is corresponding, cipher key index is for distinguishing many group keys of supporting under same algorithm system, priority is used for identifying the priority of every kind of algorithm system, and wherein " 00 " is limit priority.
in the close algorithm system of state, asymmetric arithmetic is SM2, and symmetry algorithm is SM3, and digest algorithm is SM4.And in the close algorithm system of business, asymmetric arithmetic is RSA, symmetry algorithm is DES, and digest algorithm is HASH.Certainly, above shown in these only for for example, those skilled in the art easily find out various other the cryptographic algorithm of application.
if applications is not being received algorithm indicating device after safety barrier sends application choice order, show that this safety barrier do not support new cryptosystem, safety barrier is former storage card, it may only support original unique kind of cryptographic algorithm.In this case, applications can decide by original algorithm process or return to algorithm to applications and do not support according to algorithm selection strategy.
subsequently, in step 130, applications, by the algorithm list of safety barrier algorithm indicating device and its support is compared, is determined the cryptographic algorithm system of preparing use.Applications can be preserved the algorithm system list of its support or the algorithm system list of its support of dynamic download therein in advance.In one embodiment, the algorithm system list that applications is supported can be as follows:
Algorithm mark Asymmetric arithmetic Symmetry algorithm Digest algorithm Cipher key index Priority
00(state is close) SM2 SM3 SM4 00 00
01(business is close) RSA DES HASH 00 01
by the algorithm list of safety barrier algorithm indicating device and applications support is compared, applications can find itself and safety barrier algorithm that both support and that priority is the highest.
in the present embodiment, because applications and safety barrier are all supported the close algorithm of state and the close algorithm of business, so can determining, applications uses the higher close algorithm of state of priority.
then, in step 140, applications sends application initializes order to safety barrier, the transaction algorithm indicating device that this application initializes order comprises the cryptographic algorithm system that has identified preparation use.
for example, transaction algorithm indicating device can be as shown in the table:
Algorithm mark Asymmetric arithmetic Symmetry algorithm Digest algorithm Cipher key index
00(state is close) SM2 SM3 SM4 00
it is the close algorithm of state that this transaction algorithm indicating device has indicated the algorithm system that this transaction of determining after applications coupling will use.
with reference to figure 2, show according to one embodiment of present invention, in safety barrier, realize the method flow diagram that multiple cryptographic algorithm system self adaptation is switched.Safety barrier can be here financial IC card or mobile payment IC-card.
in step 210, safety barrier receives application choice order from carry out mutual applications with it.According to an aspect of the present invention, applications is POS terminal or Mobile phone payment client software.
then, in step 220, safety barrier sends the response to application select command to applications, and this respond packet is containing safety barrier algorithm indicating device.Preferably, safety barrier algorithm indicating device has recorded all cryptographic algorithm systems that safety barrier is supported, and has identified the priority of every kind of algorithm system.
for example, safety barrier algorithm indicating device can be as shown in the table:
Algorithm mark Asymmetric arithmetic Symmetry algorithm Digest algorithm Cipher key index Priority
00(state is close) SM2 SM3 SM4 00 00
01(business is close) RSA DES HASH 00 01
in upper table, algorithm mark is the unique identification distributing for every kind of algorithm system, asymmetric arithmetic, symmetry algorithm, digest algorithm are respectively every kind of cryptographic algorithm that algorithm system is corresponding, cipher key index is for distinguishing many group keys of supporting under same algorithm system, priority is used for identifying the priority of every kind of algorithm system, and wherein " 00 " is limit priority.
in the close algorithm system of state, asymmetric arithmetic is SM2, and symmetry algorithm is SM3, and digest algorithm is SM4.And in the close algorithm system of business, asymmetric arithmetic is RSA, symmetry algorithm is DES, and digest algorithm is HASH.Certainly, above shown in these only for for example, those skilled in the art easily find out various other the cryptographic algorithm of application.
subsequently, in step 230, safety barrier receives application initializes order from applications, the transaction algorithm indicating device that this application initializes order comprises the cryptographic algorithm system that has identified preparation use.Wherein, the cryptographic algorithm that preparation is used is that applications is by comparing the algorithm list of safety barrier algorithm indicating device and applications support to obtain.
for example, transaction algorithm indicating device can be as shown in the table:
Algorithm mark Asymmetric arithmetic Symmetry algorithm Digest algorithm Cipher key index
00(state is close) SM2 SM3 SM4 00
it is the close algorithm of state that this transaction algorithm indicating device has indicated the algorithm system that this transaction of determining after applications coupling will use.
receive after transaction algorithm indicating device at safety barrier, it can further judge whether this transaction algorithm indicating device meets the algorithm selection strategy of itself.If met, safety barrier can return to AFL(Application File Locator corresponding to cryptographic algorithm choosing, application file locator in to the response of application initialization command), do not support otherwise can return to algorithm.
if safety barrier does not receive the transaction algorithm indicating device that applications is returned, show that this applications do not support multiple cryptographic algorithm system, the storage product before, only supports original unique kind of cryptographic algorithm.In this case, safety barrier can decide by original algorithm process or return to algorithm to applications and do not support according to algorithm selection strategy.
fig. 3 illustrates the reciprocal process between safety barrier according to an embodiment of the invention and applications.Specifically, this process has mainly comprised following steps:
the first, applications sends the application choice order of for example SELECT order to safety barrier.
second, safety barrier is at command response PDOL(Processing Options Data Object List, the list of processing selecting data object) in return to safety barrier algorithm indicating device, this safety barrier algorithm indicating device has recorded all cryptographic algorithm systems that safety barrier is supported, and has identified the priority of every kind of algorithm system.If applications is not received algorithm indicating device, be shown to be former storage card, only support original unique kind of cryptographic algorithm.At this moment, applications can be selected decide by original algorithm process or return to algorithm to applications and do not support according to algorithm selection strategy.
the 3rd, applications compares the algorithm indicating device of safety barrier and the algorithm list of its support, find both support, algorithm that priority is the highest.
the 4th, applications sends the application initializes order of for example GPO order to safety barrier, wherein comprise transaction algorithm indicating device, the cryptographic algorithm system that this transaction that this transaction algorithm indicating device has identified after adaptively selected, applications is determined should be used.
the 5th, safety barrier judges whether the transaction algorithm indicating device of receiving meets the algorithm selection strategy of safety barrier, if met, in the response of GPO order, returns to AFL corresponding to cryptographic algorithm choosing, and does not support otherwise return to algorithm; If safety barrier is not received the transaction algorithm indicating device that applications is returned, show that this applications is former storage product, only support original unique kind of cryptographic algorithm, safety barrier can be by original algorithm process or return to algorithm to applications and do not support according to the selection of algorithm selection strategy.
the 6th, the AFL that applications is returned according to safety barrier reads corresponding application and key data, completes payment transaction.
from preceding method, the present invention does not change interaction flow and the interface of existing PBOC normalized definition, use command format and the data element of existing PBOC standard completely, used the reserved extension bits of standard, thereby make the transformation of safety barrier and applications reduce to minimum.
fig. 4 shows the terminal 400 that multiple cryptographic algorithm system self adaptation is switched that realizes according to an embodiment of the invention.Terminal 400 can comprise sending module 410, receiver module 420 and algorithm selection strategy module 430.Sending module 410 is for sending application choice order to carrying out mutual safety barrier with terminal 400.Sending module 410 is also for sending application initializes order to safety barrier, and this application initializes order comprises and identified the transaction algorithm indicating device of preparing the cryptographic algorithm system using.Receiver module 420 for example, for receiving the response (PDOL) to application select command from safety barrier, and this respond packet is containing safety barrier algorithm indicating device.Algorithm selection strategy module 430, for by the algorithm list of safety barrier algorithm indicating device and terminal support is compared, is determined the cryptographic algorithm system of preparing use.Preferably, in the time that safety barrier does not send safety barrier algorithm indicating device, algorithm selection strategy module 430 can determine continue to carry out subsequent operation or interrupt transaction, and this can be by for example acquirer's self-defining.
alternatively, terminal 400 also can comprise read module 440.Read module 440, for the response to application initialization command according to safety barrier, reads corresponding application and key data to complete payment transaction.
fig. 5 shows the safety barrier 500 that multiple cryptographic algorithm system self adaptation is switched of realizing according to an embodiment of the invention.Safety barrier 500 can comprise receiver module 510 and sending module 520.Receiver module 510 is for receiving application choice order from carrying out mutual applications with safety barrier 500.Receiver module 510 also can receive application initializes order from applications, the transaction algorithm indicating device that described application initializes order comprises the cryptographic algorithm system that has identified preparation use.Sending module 510 is for sending the response to application select command to applications, this respond packet containing safety barrier algorithm indicating device, it is important to point out, prepare use cryptographic algorithm be that applications is by comparing the algorithm list of safety barrier algorithm indicating device and its support to obtain.
preferably, safety barrier 500 also can comprise algorithm selection strategy module 530.If algorithm selection strategy module 530 can be used for judging the algorithm selection strategy whether transaction algorithm indicating device meets safety barrier 500 and meet, in to the response of application initialization command, return and prepare application file locator corresponding to cryptographic algorithm system that use.More preferably, when algorithm selection strategy module 530 is not returned to transaction algorithm indicating device in applications, select continue to carry out subsequent operation or interrupt transaction, this can be by for example card issuer's self-defining.
china's Financial industry is being carried forward vigorously cryptographic algorithm production domesticization work at present, and after the several years, the financial IC card of new issue and mobile payment IC-card will all be supported the close algorithm of state, and finance is accepted network also will complete the close algorithm transformation of state.And meanwhile, existing IC-card is only supported international algorithm conventionally, and the IC-card of card sending mechanism distribution overseas is also only supported international algorithm.Method, terminal and the safety barrier that the present invention proposes solved well to be supported to carry out mutual compatibling problem between the IC-card of state close algorithm or international algorithm and POS.
to sum up, described mechanism and system can realize inspection, judgement and the selection to terminal and safety barrier key code system, support two or more checking of different cryptographic algorithm systems in same process of exchange simultaneously, all can be compatible to the safety barrier of different cryptographic algorithm systems, the overall flow that existing financial payment is concluded the business is without impact.
above, describe the specific embodiment of the present invention with reference to the accompanying drawings.But those skilled in the art can understand, without departing from the spirit and scope of the present invention in the situation that, can also do various changes and replacement to the specific embodiment of the present invention.These changes and replacement all drop in the claims in the present invention book limited range.

Claims (20)

1. in applications, realize the method that multiple cryptographic algorithm system self adaptation is switched, comprising:
Send application choice order to carrying out mutual safety barrier with described applications;
Receive the response to described application choice order from described safety barrier, this respond packet is containing safety barrier algorithm indicating device;
By the algorithm list of described safety barrier algorithm indicating device and described applications support is compared, determine the cryptographic algorithm system of preparing use; And
Send application initializes order to described safety barrier, the transaction algorithm indicating device that described application initializes order comprises the cryptographic algorithm system that has identified described preparation use.
2. the method for claim 1, wherein described applications is POS terminal or Mobile phone payment client software.
3. the method for claim 1, wherein described safety barrier is financial IC card or mobile payment IC-card.
4. the method for claim 1, wherein described safety barrier algorithm indicating device has recorded all cryptographic algorithm systems that described safety barrier is supported, and has identified the priority of every kind of algorithm system.
5. the cryptographic algorithm system that the method for claim 1, wherein described preparation is used is described applications and described safety barrier is all supported and priority is the highest algorithm.
6. the method for claim 1, also comprises:
Response according to described safety barrier to application initialization command, reads corresponding application and key data to complete payment transaction.
7. the method for claim 1, wherein described multiple cryptographic algorithm system comprises the close algorithm system of state that comprises SM2, SM3, SM4 algorithm and the close algorithm system of business that comprises RSA, DES, HASH algorithm.
8. in safety barrier, realize the method that multiple cryptographic algorithm system self adaptation is switched, comprising:
Receive application choice order from carrying out mutual applications with described safety barrier;
Send the response to application select command to described applications, this respond packet is containing safety barrier algorithm indicating device;
Receive application initializes order from described applications, the transaction algorithm indicating device that described application initializes order comprises the cryptographic algorithm system that has identified preparation use, the cryptographic algorithm that wherein said preparation is used is by comparing the algorithm list of described safety barrier algorithm indicating device and described applications support to obtain.
9. method as claimed in claim 8, wherein, described applications is POS terminal or Mobile phone payment client software.
10. method as claimed in claim 8, wherein, described safety barrier is financial IC card or mobile payment IC-card.
11. methods as claimed in claim 8, wherein, described safety barrier algorithm indicating device has recorded all cryptographic algorithm systems that described safety barrier is supported, and has identified the priority of every kind of algorithm system.
12. methods as claimed in claim 8, wherein, the cryptographic algorithm system that described preparation is used is described applications and described safety barrier is all supported and priority is the highest algorithm.
13. methods as claimed in claim 8, also comprise:
Judge whether described transaction algorithm indicating device meets the algorithm selection strategy of described safety barrier.
14. methods as claimed in claim 13, also comprise:
If described transaction algorithm indicating device meets the algorithm selection strategy of described safety barrier, in to the response of described application initializes order, return to application file locator corresponding to cryptographic algorithm system that described preparation is used.
15. methods as claimed in claim 8, wherein, described multiple cryptographic algorithm system comprises the close algorithm system of state that comprises SM2, SM3, SM4 algorithm and the close algorithm system of business that comprises RSA, DES, HASH algorithm.
Realize the terminal that multiple cryptographic algorithm system self adaptation is switched, comprising for 16. 1 kinds:
Sending module, for sending application choice order to carrying out mutual safety barrier with described terminal;
Receiver module, for receiving the response to described application choice order from described safety barrier, this respond packet is containing safety barrier algorithm indicating device; And
Algorithm selection strategy module, for by the algorithm list of described safety barrier algorithm indicating device and described terminal support is compared, determines the cryptographic algorithm system of preparing use;
Wherein, described sending module is also for sending application initializes order to described safety barrier, and described application initializes order comprises the transaction algorithm indicating device that has identified the cryptographic algorithm system that described preparation uses.
17. terminals as claimed in claim 16, also comprise:
Read module, for the response to application initialization command according to described safety barrier, reads corresponding application and key data to complete payment transaction.
Realize the safety barrier that multiple cryptographic algorithm system self adaptation is switched, comprising for 18. 1 kinds:
Receiver module, for receiving application choice order from carrying out mutual applications with described safety barrier; And
Sending module, for sending the response to application select command to described applications, this respond packet is containing safety barrier algorithm indicating device;
Wherein, described receiver module also receives application initializes order from described applications, the transaction algorithm indicating device that described application initializes order comprises the cryptographic algorithm system that has identified preparation use, the cryptographic algorithm that wherein said preparation is used is by comparing the algorithm list of described safety barrier algorithm indicating device and described applications support to obtain.
19. safety barriers as claimed in claim 18, also comprise:
Algorithm selection strategy module, for judging whether described transaction algorithm indicating device meets the algorithm selection strategy of described safety barrier, if wherein described transaction algorithm indicating device meets the algorithm selection strategy of described safety barrier, in to the response of described application initializes order, return to application file locator corresponding to cryptographic algorithm system that described preparation is used.
20. safety barriers as claimed in claim 19, wherein, when described algorithm selection strategy module is not returned to transaction algorithm indicating device in described applications, select continue to carry out subsequent operation or interrupt transaction.
CN201210415975.1A 2012-10-26 2012-10-26 Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches Active CN103780376B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210415975.1A CN103780376B (en) 2012-10-26 2012-10-26 Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210415975.1A CN103780376B (en) 2012-10-26 2012-10-26 Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches

Publications (2)

Publication Number Publication Date
CN103780376A true CN103780376A (en) 2014-05-07
CN103780376B CN103780376B (en) 2017-06-23

Family

ID=50572251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210415975.1A Active CN103780376B (en) 2012-10-26 2012-10-26 Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches

Country Status (1)

Country Link
CN (1) CN103780376B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104539429A (en) * 2014-12-30 2015-04-22 飞天诚信科技股份有限公司 Cryptographic certificate positioning method, device and system
CN105530090A (en) * 2015-12-31 2016-04-27 中国建设银行股份有限公司 Key negotiation method and device
CN106980972A (en) * 2016-12-29 2017-07-25 中国银联股份有限公司 Offline payment method and its payment system, mobile terminal based on TEE
CN112448811A (en) * 2019-09-03 2021-03-05 上海云从汇临人工智能科技有限公司 Data security management method, data security management device and data security management system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1479480A (en) * 2002-08-26 2004-03-03 华为技术有限公司 Method of consulted encryption algorithm
US20090307491A1 (en) * 2008-06-06 2009-12-10 Sony Corporation Information processing device, information processing method, program and communication system
CN102081821A (en) * 2009-11-27 2011-06-01 中国银联股份有限公司 IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal
CN102637274A (en) * 2012-03-22 2012-08-15 瑞达信息安全产业股份有限公司 Mobile payment method compatible with international and domestic cryptographic algorithm
CN102710412A (en) * 2012-05-07 2012-10-03 北京握奇数据系统有限公司 Method and device for compatible management of encryption algorithm

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1479480A (en) * 2002-08-26 2004-03-03 华为技术有限公司 Method of consulted encryption algorithm
US20090307491A1 (en) * 2008-06-06 2009-12-10 Sony Corporation Information processing device, information processing method, program and communication system
CN102081821A (en) * 2009-11-27 2011-06-01 中国银联股份有限公司 IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal
CN102637274A (en) * 2012-03-22 2012-08-15 瑞达信息安全产业股份有限公司 Mobile payment method compatible with international and domestic cryptographic algorithm
CN102710412A (en) * 2012-05-07 2012-10-03 北京握奇数据系统有限公司 Method and device for compatible management of encryption algorithm

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104539429A (en) * 2014-12-30 2015-04-22 飞天诚信科技股份有限公司 Cryptographic certificate positioning method, device and system
CN104539429B (en) * 2014-12-30 2017-09-22 飞天诚信科技股份有限公司 A kind of method and apparatus and system for positioning the close certificate of state
CN105530090A (en) * 2015-12-31 2016-04-27 中国建设银行股份有限公司 Key negotiation method and device
CN106980972A (en) * 2016-12-29 2017-07-25 中国银联股份有限公司 Offline payment method and its payment system, mobile terminal based on TEE
CN106980972B (en) * 2016-12-29 2021-02-02 中国银联股份有限公司 TEE-based offline payment method, payment system and mobile terminal
CN112448811A (en) * 2019-09-03 2021-03-05 上海云从汇临人工智能科技有限公司 Data security management method, data security management device and data security management system

Also Published As

Publication number Publication date
CN103780376B (en) 2017-06-23

Similar Documents

Publication Publication Date Title
KR101107850B1 (en) Method, system and trusted service manager for securely transmitting an application to a mobile phone
CN104115173A (en) Method for routing within a mobile terminal emulating a contactless payment card
US20170046704A1 (en) Authentication Code Entry System and Method
CN102005088A (en) Non-contact payment method, system and mobile terminal based on electronic wallet
CN104767716A (en) Service request processing method and device
CN103780376A (en) Method, terminal and safety carrier for realizing cryptographic algorithm system adaptive switching
EP3387581B1 (en) Systems and methods for a cloud connected transponder
CN103414497B (en) For communication between electronic by the control method forwarded and corresponding equipment
CN104240074A (en) Prepaid card online payment system based on identity authentication and payment method of prepaid card online payment system
CN103888932A (en) Intelligent card and method of intelligent card for supporting switching of multi-operator numbers
CN104700262A (en) NFC (near field communication) mobile terminal and POS (point of sale) terminal based payment system
CN103107888B (en) The identity identifying method that the dynamic multi-attribute of facing moving terminal is multi-level
CN102833074A (en) Authentication method and related equipment
CN103544114B (en) Based on many M1 card control system and the control method thereof of single CPU card
CN105120451A (en) Method for realizing card-less operation of mobile terminal, operator business platform and mobile terminal
AU2017228450B2 (en) Mid-range reader interactions
US9055432B2 (en) Targeted muting for communication between electronic appliances
CN101500335A (en) Dual mode terminal and method for processing data service thereof
CN103164635A (en) Security information interactive system, security information interactive device and security information interactive method based on spreading parameter set
CN102110334B (en) Device, system and method for processing information
CN102376000A (en) Communication device, information processing system, and encryption switching method
CN102144238A (en) IC chip, information processing device, software module control method, information processing system, method, and program
CN105447402A (en) Data processing method and data processing apparatus
CN103905624A (en) Digital signature generation method and mobile phone terminal
US9088304B2 (en) Interface deactivation for communication between electronic appliances

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant