CN103813333B - A kind of data processing method based on arranging key - Google Patents

A kind of data processing method based on arranging key Download PDF

Info

Publication number
CN103813333B
CN103813333B CN201410060548.5A CN201410060548A CN103813333B CN 103813333 B CN103813333 B CN 103813333B CN 201410060548 A CN201410060548 A CN 201410060548A CN 103813333 B CN103813333 B CN 103813333B
Authority
CN
China
Prior art keywords
mobile phone
information
identification card
subscriber identification
safe module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410060548.5A
Other languages
Chinese (zh)
Other versions
CN103813333A (en
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Priority to CN201410060548.5A priority Critical patent/CN103813333B/en
Publication of CN103813333A publication Critical patent/CN103813333A/en
Application granted granted Critical
Publication of CN103813333B publication Critical patent/CN103813333B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a kind of data processing method based on arranging key, including:Mobile phone safe module verification subscriber identification card certificate is legal, generates the second random factor, and generate the arranging key of mobile phone safe module end;First random factor and the second random factor are encrypted mobile phone safe module, first cipher-text information is signed, second authentication information is sent to subscriber identification card, subscriber identification card checking mobile phone safe module certificate is legal, verify that the first signing messages is correct, decryption obtains the first random factor and the second random factor, and the first random factor of checking is correct, and the arranging key at subscriber identification card end is generated according to the first random factor and the second random factor;Key enters the safe transmission of row information through consultation for the two.Thus, it is possible to mobile phone is set to perform Internet-based banking services and/or confidential information transmission safely.

Description

A kind of data processing method based on arranging key
Technical field
The present invention relates to field of information security technology, more particularly to a kind of data processing method based on arranging key.
Background technology
With the great convenience that brings of developing rapidly of network, people are increasingly dependent on network and carry out various work It is dynamic, such as the transmission of network file, internet bank trade be increasingly becoming in people's life, work indispensable one Point.Because network is a virtual environment after all, there is too many unsafe factor, and will necessarily enter in a network environment The network activity of row data interaction, the especially network activity as Internet-based banking services and the transmission of confidential information, to net The safety of network proposes very high requirement, therefore people start to greatly develop network information security technology.
However, with the rapid development of mobile phone technique now, mobile phone terminal, which is more and more used to substitute computer, to be made With, but do not have the solution party that a kind of mobile phone terminal can perform Internet-based banking services and/or confidential information transmission safely now Case.
The content of the invention
Present invention seek to address that mobile phone terminal can not perform safely Internet-based banking services and/or confidential information transmission ask Topic.
It is a primary object of the present invention to provide a kind of data processing method based on arranging key.
To reach above-mentioned purpose, what technical scheme was specifically realized in:
One aspect of the present invention provides a kind of data processing method based on arranging key, including:
Subscriber identification card sends the first authentication information to mobile phone safe module, wherein, first authentication information Comprise at least:First random factor and subscriber identification card certificate;
After the mobile phone safe module receives first authentication information, the subscriber identification card certificate is verified Legitimacy;
If subscriber identification card certificate described in the mobile phone safe module verification is legal, the mobile phone safe module The second random factor is generated, and the mobile phone safe mould is generated according to first random factor and second random factor The arranging key at block end;
The mobile phone safe module passes through the subscriber identification card that is carried in the subscriber identification card certificate Public key at least first random factor and the second random factor are encrypted, obtain the first cipher-text information;
The mobile phone safe module is signed to first cipher-text information, obtains the first signing messages;
The mobile phone safe module sends the second authentication information to the subscriber identification card, wherein, described second Authentication information comprises at least:First cipher-text information, first signing messages and the mobile phone safe module certificate;
After the subscriber identification card receives second authentication information, the mobile phone safe module certificate is verified Legitimacy;
If the subscriber identification card verifies that the mobile phone safe module certificate is legal, the user identity identification Card verifies the correctness of first signing messages;
If the subscriber identification card verifies that first signing messages is correct, the subscriber identification card solution Close first cipher-text information, obtain first random factor and second random factor;
The subscriber identification card verifies institute after first random factor and second random factor is obtained State the correctness of the first random factor;
If the subscriber identification card verifies that first random factor is correct, the subscriber identification card root The arranging key at the subscriber identification card end is generated according to first random factor and second random factor;
Pass through the negotiation of the mobile phone safe module end between the mobile phone safe module and the subscriber identification card Key and the arranging key at the subscriber identification card end enter the safe transmission of row information.
One aspect of the present invention additionally provides a kind of data processing method based on arranging key, including:
Mobile phone safe module sends the first authentication information to subscriber identification card, wherein, first authentication information Comprise at least:First random factor and mobile phone safe module certificate;
After the subscriber identification card receives first authentication information, the mobile phone safe module certificate is verified Legitimacy;
If the subscriber identification card verifies that the mobile phone safe module certificate is legal, the user identity identification Card the second random factor of generation, and the user identity is generated according to first random factor and second random factor The arranging key at identification card end;
The subscriber identification card passes through the mobile phone safe module that is carried in the mobile phone safe module certificate At least first random factor and the second random factor are encrypted for public key, obtain the first cipher-text information;
The subscriber identification card is signed to first cipher-text information, obtains the first signing messages;
The subscriber identification card sends the second authentication information to the mobile phone safe module, wherein, described second Authentication information comprises at least:First cipher-text information, first signing messages and the subscriber identification card certificate;
After the mobile phone safe module receives second authentication information, the subscriber identification card certificate is verified Legitimacy;
If subscriber identification card certificate described in the mobile phone safe module verification is legal, the mobile phone safe module Verify the correctness of first signing messages;
If the first signing messages described in the mobile phone safe module verification is correct, the mobile phone safe module decrypts institute The first cipher-text information is stated, obtains first random factor and second random factor;
The mobile phone safe module is after first random factor and second random factor is obtained, described in checking The correctness of first random factor;
If the first random factor described in the mobile phone safe module verification is correct, the mobile phone safe module is according to institute State the first random factor and second random factor generates the arranging key of the mobile phone safe module end;
Pass through the negotiation of the mobile phone safe module end between the mobile phone safe module and the subscriber identification card Key and the arranging key at the subscriber identification card end enter the safe transmission of row information.
In addition, pass through the mobile phone safe module end between the mobile phone safe module and the subscriber identification card The step of arranging key and the arranging key at the subscriber identification card end enter the safe transmission of row information includes:
The mobile phone safe module obtains information to be transmitted;
The mobile phone safe module is carried out by the arranging key of the mobile phone safe module end to the information to be transmitted Encryption, obtain the second cipher-text information;
The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, described first Processing information comprises at least:Second cipher-text information;
After the subscriber identification card receives first processing information, pass through the subscriber identification card end Second cipher-text information is decrypted arranging key, obtains information to be transmitted;
The subscriber identification card is signed to the information to be transmitted, obtains the second signing messages;
The subscriber identification card is by the arranging key at the subscriber identification card end to second A.L.S. Breath is encrypted, and obtains the 3rd cipher-text information;
The subscriber identification card sends second processing information to the mobile phone safe module, wherein, described second Processing information comprises at least:3rd cipher-text information;
After the mobile phone safe module receives the second processing information, pass through the negotiation of the mobile phone safe module end 3rd cipher-text information is decrypted key, obtains second signing messages;
The mobile phone safe module is at least by the second signing messages outgoing.
In addition, pass through the mobile phone safe module end between the mobile phone safe module and the subscriber identification card The step of arranging key and the arranging key at the subscriber identification card end enter the safe transmission of row information includes:
The mobile phone safe module obtains information to be transmitted;
The mobile phone safe module is carried out by the arranging key of the mobile phone safe module end to the information to be transmitted Verification calculates, and obtains the first check information;
The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, described first Processing information comprises at least:The information to be transmitted and first check information;
After the subscriber identification card receives first processing information, pass through the subscriber identification card end Arranging key is verified to first processing information;
If the subscriber identification card is verified to first processing information, the subscriber identification card The information to be transmitted is signed, obtains the second signing messages;
The subscriber identification card is by the arranging key at the subscriber identification card end to second A.L.S. Breath carries out verification calculating, obtains the second check information;
The subscriber identification card sends second processing information to the mobile phone safe module, wherein, described second Processing information comprises at least:Second signing messages and second check information;
After the mobile phone safe module receives the second processing information, pass through the negotiation of the mobile phone safe module end Key is verified to the second processing information;
If the mobile phone safe module is to the second processing Information Authentication by the way that the mobile phone safe module is at least By the second signing messages outgoing.
In addition, pass through the mobile phone safe module end between the mobile phone safe module and the subscriber identification card The step of arranging key and the arranging key at the subscriber identification card end enter the safe transmission of row information includes:
The mobile phone safe module obtains information to be transmitted;
The mobile phone safe module is carried out by the arranging key of the mobile phone safe module end to the information to be transmitted Encryption, the second cipher-text information is obtained, and verification calculating is carried out to second cipher-text information, obtain the first check information;
The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, described first Processing information comprises at least:Second cipher-text information and first check information;
After the subscriber identification card receives first processing information, pass through the subscriber identification card end Arranging key is verified to first processing information;
If the subscriber identification card is verified to first processing information, the subscriber identification card Second cipher-text information is decrypted by the arranging key at the subscriber identification card end, obtains the letter to be transmitted Breath;
The subscriber identification card is signed to the information to be transmitted, obtains the second signing messages;
The subscriber identification card is by the arranging key at the subscriber identification card end to second A.L.S. Breath is encrypted, and obtains the 3rd cipher-text information, and verification calculating is carried out to the 3rd cipher-text information, obtains the second verification letter Breath;
The subscriber identification card sends second processing information to the mobile phone safe module, wherein, described second Processing information comprises at least:3rd cipher-text information and second check information;
After the mobile phone safe module receives the second processing information, pass through the negotiation of the mobile phone safe module end Key is verified to the second processing information;
If the mobile phone safe module is to the second processing Information Authentication by passing through the mobile phone safe module 3rd cipher-text information is decrypted the arranging key at end, obtains second signing messages;
The mobile phone safe module is at least by the second signing messages outgoing.
In addition, pass through the mobile phone safe module end between the mobile phone safe module and the subscriber identification card The step of arranging key and the arranging key at the subscriber identification card end enter the safe transmission of row information includes:
The mobile phone safe module obtains information to be transmitted;
The mobile phone safe module is carried out by the arranging key of the mobile phone safe module end to the information to be transmitted Encryption, obtain the second cipher-text information;
The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, described first Processing information comprises at least:Second cipher-text information;
After the subscriber identification card receives first processing information, pass through the subscriber identification card end Second cipher-text information is decrypted arranging key, obtains information to be transmitted;
The subscriber identification card is signed to the information to be transmitted, obtains the second signing messages;
The subscriber identification card is by the arranging key at the subscriber identification card end to second A.L.S. Breath carries out verification calculating, obtains the first check information;
The subscriber identification card sends second processing information to the mobile phone safe module, wherein, described second Processing information comprises at least:Second signing messages and first check information;
After the mobile phone safe module receives the second processing information, pass through the negotiation of the mobile phone safe module end Key is verified to the second processing information;
If the mobile phone safe module is to the second processing Information Authentication by the way that the mobile phone safe module is at least By the second signing messages outgoing.
In addition, pass through the mobile phone safe module end between the mobile phone safe module and the subscriber identification card The step of arranging key and the arranging key at the subscriber identification card end enter the safe transmission of row information includes:
The mobile phone safe module obtains information to be transmitted;
The mobile phone safe module is carried out by the arranging key of the mobile phone safe module end to the information to be transmitted Verification calculates, and obtains the first check information;
The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, described first Processing information comprises at least:The information to be transmitted and first check information;
After the subscriber identification card receives first processing information, pass through the subscriber identification card end Arranging key is verified to first processing information;
If the subscriber identification card is verified to first processing information, the subscriber identification card The information to be transmitted is signed, obtains the second signing messages;
The subscriber identification card is by the arranging key at the subscriber identification card end to second A.L.S. Breath is encrypted, and obtains the second cipher-text information;
The subscriber identification card sends second processing information to the mobile phone safe module, wherein, described second Processing information comprises at least:Second cipher-text information;
After the mobile phone safe module receives the second processing information, pass through the negotiation of the mobile phone safe module end Second cipher-text information is decrypted key, obtains second signing messages;
The mobile phone safe module is at least by the second signing messages outgoing.
In addition, after the step of mobile phone safe module obtains information to be transmitted, will in the mobile phone safe module First processing information was sent the step of subscriber identification card before, and methods described also includes:
The mobile phone safe module extracts the key message in the information to be transmitted;
Mobile phone safe module control mobile phone display screen show described in key message in the information to be transmitted that extracts;
The mobile phone safe module receives the confirmation instruction of cell phone keyboard output;
After the confirmation instruction that the mobile phone safe module receives the cell phone keyboard output, the mobile phone safe is performed The step of module sends the first processing information to the subscriber identification card.
In addition, second random factor be according to first random factor generate, or it is described 3rd it is random because What son was randomly generated.
In addition, the mobile phone safe module is to be set independently of the module outside mobile phone CPU, or the mobile phone safe module Put the safety zone in the mobile phone CPU.
As seen from the above technical solution provided by the invention, the data processing based on arranging key of the present invention is passed through Method, mobile phone can be enable to perform Internet-based banking services and/or confidential information transmission safely.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this For the those of ordinary skill in field, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is the flow chart for the data processing method based on arranging key that the embodiment of the present invention 1 provides;
Fig. 2 is the flow chart for the data processing method based on arranging key that the embodiment of the present invention 2 provides.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this The embodiment of invention, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to protection scope of the present invention.
In the description of the invention, it is to be understood that term " " center ", " longitudinal direction ", " transverse direction ", " on ", " under ", The orientation or position relationship of the instruction such as "front", "rear", "left", "right", " vertical ", " level ", " top ", " bottom ", " interior ", " outer " are Based on orientation shown in the drawings or position relationship, it is for only for ease of the description present invention and simplifies description, rather than instruction or dark Show that the device of meaning or element there must be specific orientation, with specific azimuth configuration and operation, thus it is it is not intended that right The limitation of the present invention.In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint are relative Importance or quantity or position.
In the description of the invention, it is necessary to illustrate, unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;Can To be mechanical connection or electrical connection;Can be joined directly together, can also be indirectly connected by intermediary, Ke Yishi The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with accompanying drawing.
The data processing method based on arranging key of the present invention is realized based on mobile phone, and the mobile phone comprises at least one Possess the subscriber identification card of security function, and a mobile phone safe module.Wherein:
Subscriber identification card can be following any card:SIM(Subscriber Identity Module, visitor Family identification module)Card, UIM(User Identity Module)Card, usim card, PIM cards etc., the card of the above is existing On the basis of function, security function is expanded, to coordinate the mobile phone safe module of the present invention to realize the function of the present invention.
The mobile phone safe module could be arranged to independently of the single module outside mobile phone CPU, it can also be provided that Safety zone in mobile phone CPU, to ensure independent security function that the mobile phone safe module can be realized, such as:Mobile phone is pacified Full module can independently carry out safe identity authentication function, and the security control shown, ensure the true of display content Reality etc..
In addition, third party CA can issue subscriber identification card the certificate Jing Guo ca authentication, while third party CA Certificate Jing Guo ca authentication can also have also been issued mobile phone security module, to ensure that both sides can verify the legal of other side's identity Property, improve security.
Embodiment 1
Fig. 1 illustrates the flow chart of the data processing method based on arranging key of the offer of the embodiment of the present invention 1, referring to figure 1, the data processing method of the invention based on arranging key, including:
Step S101, subscriber identification card send the first authentication information to mobile phone safe module, wherein, the first certification Information comprises at least:First random factor and subscriber identification card certificate;
Specifically, subscriber identification card previously generates first random factor, the random factor of generation and CA are issued The certificate for issuing subscriber identification card is sent to mobile phone safe module in the lump.The first random factor is sent to ensure to send every time Information be different, prevent Replay Attack, improve security.First random factor can be that subscriber identification card is given birth to Into one or a string of random numbers, can be either one or a string of random characters or a string of random numbers and random combine Any combination.
Step S102, after mobile phone safe module receives the first authentication information, verify the conjunction of subscriber identification card certificate Method;
Specifically, after mobile phone safe module receives subscriber identification card certificate, the legitimacy of the certificate is tested Card.Such as:The part signed using the CA CA issued public key to CA private keys in subscriber identification card certificate is tested Label, only in sign test by rear, just verify that subscriber identification card certificate is legal.
Step S103, if mobile phone safe module verification subscriber identification card certificate is legal, the life of mobile phone safe module Into the second random factor, and it is close according to the negotiation of the first random factor and the second random factor generation mobile phone safe module end Key;
Specifically, after mobile phone safe module verification subscriber identification card certificate is legal, the second random factor, and root are generated Generate the arranging key of mobile phone safe module end jointly according to the first random factor and the second random factor.Wherein, this is second random The factor can be what mobile phone safe module generated according to the first random factor, or second random factor is mobile phone safe module Generate at random.Meanwhile second random factor can also be one or a string of random numbers, or can be one or a string with Machine character, or a string of random numbers and any combination of random combine.Thus, the negotiation for generating mobile phone safe module end is close Key, subsequently to enter the safe transmission of row information according to the arranging key and subscriber identification card.
Step S104, mobile phone safe module pass through the public affairs of the subscriber identification card carried in subscriber identification card certificate At least the first random factor and the second random factor are encrypted for key, obtain the first cipher-text information;
Specifically, the user identity identification carried in the subscriber identification card certificate sent by subscriber identification card First random factor and the second random factor are encrypted the public key of card, thereby guarantee that the first random factor and second it is random because The security of son transmission.
Step S105, mobile phone safe module are signed to the first cipher-text information, obtain the first signing messages;
The first ciphertext is obtained specifically, the first random factor and the second random factor are encrypted in mobile phone safe module After information, also the first cipher-text information is signed at least with the private key of mobile phone safe module, to ensure the first cipher-text information The integrality and non repudiation of transmission.
Certainly, the invention is not limited in mobile phone safe module is signed to the first cipher-text information, mobile phone safe module First random factor and the second random factor can also directly be signed, the first signing messages be obtained, thus, it is possible to ensure First random factor and the second random factor integrality in itself and non repudiation.
In the present invention, the scheme that mobile phone safe module is signed to the first cipher-text information is preferably selected, to ensure first The opaque transmission of random factor and the second random factor.
Step S106, mobile phone safe module send the second authentication information to subscriber identification card, wherein, the second certification Information comprises at least:First cipher-text information, the first signing messages and mobile phone safe module certificate;
Step S107, after subscriber identification card receives the second authentication information, verify the conjunction of mobile phone safe module certificate Method;
Specifically, after subscriber identification card receives mobile phone safe module certificate, the legitimacy of the certificate is tested Card.Such as:The part signed using the CA CA issued public key to CA private keys in mobile phone security module certificate carries out sign test, Only in sign test by rear, just verify that mobile phone safe module certificate is legal.
Step S108, if subscriber identification card checking mobile phone safe module certificate is legal, subscriber identification card Verify the correctness of the first signing messages;
Specifically, after subscriber identification card checking mobile phone safe module certificate is legal, the first signing messages is also verified Correctness.Now, subscriber identification card is directly according in the first cipher-text information and mobile phone safe module certificate received The public key of mobile phone safe module verify the correctness of the first signing messages.
Certainly, if mobile phone safe module is that the first random factor and the second random factor are signed, then user Identification card then decrypts the first cipher-text information in advance, obtains the first random factor and the second random factor, so as to further according to solution It is close go out the first random factor and the second random factor and the public key of the mobile phone safe module in mobile phone safe module certificate come Verify the correctness of the first signing messages.
In the present invention, it is preferred to use verify the first A.L.S. according to the public key of the first cipher-text information and mobile phone safe module The correctness of breath.
Step S109, if subscriber identification card verifies that the first signing messages is correct, subscriber identification card decryption First cipher-text information, obtain the first random factor and the second random factor;
Specifically, subscriber identification card passes through the private of subscriber identification card after verifying that the first signing messages is correct First cipher-text information is decrypted key, obtains the first random factor and the second random factor.It is possible thereby to believe in the first ciphertext Breath be not tampered with the premise of decrypt the first cipher-text information, so as to ensure to obtain real first random factor and second it is random because Son.
Step S110, subscriber identification card is after the first random factor and the second random factor is obtained, checking first The correctness of random factor;
Specifically, only subscriber identification card is after it decrypted real first random factor and the second random factor, Whether whether the first random factor that just checking decrypts consistent with the first random factor of generation before subscriber identification card, If consistent, it is correct to verify the first random factor.
Step S111, if subscriber identification card verify the first random factor it is correct, subscriber identification card according to First random factor and the arranging key at the second random factor generation subscriber identification card end;
Specifically, subscriber identification card is after real first random factor and the second random factor is obtained, according to this First random factor and the arranging key at the second random factor generation subscriber identification card end, so as to close subsequently according to the negotiation Key enters the safe transmission of row information with mobile phone safe module.
Step S112, pass through the arranging key of mobile phone safe module end between mobile phone safe module and subscriber identification card And the arranging key at subscriber identification card end enters the safe transmission of row information.
Specifically, generate the arranging key of mobile phone safe module end, and user identity identification in mobile phone safe module After card generates the arranging key at subscriber identification card end, pass through both ends between mobile phone safe module and subscriber identification card Arranging key enter the safe transmission of row information.
At this point it is possible to the safe transmission of information is realized one of in the following way:
Mode one:
Step S113a, mobile phone safe module obtain information to be transmitted;
Specifically, mobile phone safe module obtains information to be transmitted, the information to be transmitted can be to need the machine of safe transmission Confidential information, or Transaction Information to be transacted in Net silver.
If the present invention is applied in secure transmission of confidential information, information to be transmitted can be the machine that mobile phone needs to export Confidential information, such as:Confidential information that mobile phone obtains out of mobile phone secure storage section etc.;
If the present invention is applied in Internet-based banking services, information to be transmitted can be that the transaction of pending transaction is believed Breath, such as:The Transaction Informations such as Transaction Account number that mobile phone is got by Web bank's client, dealing money.
Step S114a, mobile phone safe module are added by the arranging key of mobile phone safe module end to information to be transmitted It is close, obtain the second cipher-text information;
Specifically, the arranging key for the mobile phone safe module end that mobile phone safe module is generated by it enters to information to be transmitted Row encryption, so that information to be transmitted carries out opaque transmission, ensure the security of transmission.Now, arranging key at least wraps Include an encryption key.
Step S115a, mobile phone safe module send the first processing information to subscriber identification card, wherein, at first Reason information comprises at least:Second cipher-text information;
Step S116a, after subscriber identification card receives the first processing information, pass through the association at subscriber identification card end Second cipher-text information is decrypted business's key, obtains information to be transmitted;
Specifically, because information to be transmitted is encrypted by the arranging key of mobile phone safe module end, now, user After identification card receives the second cipher-text information, it is decrypted by the arranging key in subscriber identification card, so as to obtain Obtain really information to be transmitted.
Step S117a, subscriber identification card are signed to information to be transmitted, obtain the second signing messages;
Specifically, subscriber identification card is signed after real information to be transmitted is obtained to the information to be transmitted Name, to ensure the integrality of information to be transmitted and non repudiation.
Step S118a, subscriber identification card is by the arranging key at subscriber identification card end to the second signing messages It is encrypted, obtains the 3rd cipher-text information;
Specifically, subscriber identification card is also entered by the arranging key at subscriber identification card end to the second signing messages Row encryption, so as to ensure the opaque transmission of the second signing messages, improve security.
Step S119a, subscriber identification card send second processing information to mobile phone safe module, wherein, at second Reason information comprises at least:3rd cipher-text information;
Step S120a, after mobile phone safe module receives second processing information, the negotiation by mobile phone safe module end is close 3rd cipher-text information is decrypted key, obtains the second signing messages;
Specifically, after mobile phone safe module receives the 3rd cipher-text information, the negotiation also by mobile phone safe module end is close 3rd cipher-text information is decrypted key, obtains real second signing messages.Thus, mobile phone safe module is known with user identity Not Ka between complete the information exchange of once safety.
Step S121a, mobile phone safe module is at least by the second signing messages outgoing.
Specifically, mobile phone safe module information to be transmitted will be signed after the second signing messages outgoing.
If the present invention is applied in secure transmission of confidential information, confidential information will be sent to outside the confidential information after signature The device of extraction is medium;
If the present invention is applied in Internet-based banking services, the Transaction Information after signature is sent to online banking service Device etc..
Mode two:
Step S113b, mobile phone safe module obtain information to be transmitted;
Specifically, mobile phone safe module obtains information to be transmitted, the information to be transmitted can be to need the machine of safe transmission Confidential information, or Transaction Information to be transacted in Net silver.
If the present invention is applied in secure transmission of confidential information, information to be transmitted can be the machine that mobile phone needs to export Confidential information, such as:Confidential information that mobile phone obtains out of mobile phone secure storage section etc.;
If the present invention is applied in Internet-based banking services, information to be transmitted can be that the transaction of pending transaction is believed Breath, such as:The Transaction Informations such as Transaction Account number that mobile phone is got by Web bank's client, dealing money.
Step S114b, mobile phone safe module carry out school by the arranging key of mobile phone safe module end to information to be transmitted Calculating is tested, obtains the first check information;
Specifically, the arranging key for the mobile phone safe module end that mobile phone safe module is generated by it enters to information to be transmitted Row verification calculates, so as to ensure the integrality of information to be transmitted.Now, arranging key comprises at least a verification computation key, It can be to calculate any verification modes such as MAC value that the verification, which calculates,.
Step S115b, mobile phone safe module send the first processing information to subscriber identification card, wherein, at first Reason information comprises at least:Information to be transmitted and the first check information;
Step S116b, after subscriber identification card receives the first processing information, pass through the association at subscriber identification card end Business's key is verified to the first processing information;
Specifically, calculated because information to be transmitted has carried out verification by the arranging key of mobile phone safe module end, now, After subscriber identification card receives information to be transmitted and the first check information, pass through the arranging key in subscriber identification card Verification calculating is equally carried out to information to be transmitted, and compared with the first check information, and than after more consistent, checking is logical Cross, so that it is guaranteed that the information to be transmitted obtained is not tampered.
Step S117b, if subscriber identification card is verified to the first processing information, subscriber identification card pair Information to be transmitted is signed, and obtains the second signing messages;
Specifically, subscriber identification card is signed after real information to be transmitted is obtained to the information to be transmitted Name, to ensure the integrality of information to be transmitted and non repudiation.
Step S118b, subscriber identification card is by the arranging key at subscriber identification card end to the second signing messages Verification calculating is carried out, obtains the second check information;
Specifically, subscriber identification card is also entered by the arranging key at subscriber identification card end to the second signing messages Row verification calculates, so as to ensure the integrality of the second signing messages.
Step S119b, subscriber identification card send second processing information to mobile phone safe module, wherein, at second Reason information comprises at least:Second signing messages and the second check information;
Step S120b, after mobile phone safe module receives second processing information, the negotiation by mobile phone safe module end is close Key is verified to second processing information;
Specifically, after mobile phone safe module receives the second signing messages and the second check information, also pass through mobile phone safe The arranging key of module end carries out verification calculating to the second signing messages, and compared with the second check information, and comparing After consistent, it is verified, so that it is guaranteed that the second signing messages obtained is not tampered.Thus, mobile phone safe module and user's body The information exchange of once safety is completed between part identification card.
Step S121b, if mobile phone safe module passes through mobile phone safe module at least general to second processing Information Authentication Second signing messages outgoing.
Specifically, mobile phone safe module information to be transmitted will be signed after the second signing messages outgoing.
If the present invention is applied in secure transmission of confidential information, confidential information will be sent to outside the confidential information after signature The device of extraction is medium;
If the present invention is applied in Internet-based banking services, the Transaction Information after signature is sent to online banking service Device etc..
Mode three:
Step S113c, mobile phone safe module obtain information to be transmitted;
Specifically, mobile phone safe module obtains information to be transmitted, the information to be transmitted can be to need the machine of safe transmission Confidential information, or Transaction Information to be transacted in Net silver.
If the present invention is applied in secure transmission of confidential information, information to be transmitted can be the machine that mobile phone needs to export Confidential information, such as:Confidential information that mobile phone obtains out of mobile phone secure storage section etc.;
If the present invention is applied in Internet-based banking services, information to be transmitted can be that the transaction of pending transaction is believed Breath, such as:The Transaction Informations such as Transaction Account number that mobile phone is got by Web bank's client, dealing money.
Step S114c, mobile phone safe module are added by the arranging key of mobile phone safe module end to information to be transmitted It is close, the second cipher-text information is obtained, and verification calculating is carried out to the second cipher-text information, obtain the first check information;
Specifically, the arranging key for the mobile phone safe module end that mobile phone safe module is generated by it enters to information to be transmitted Row encryption, so that information to be transmitted carries out opaque transmission, ensure the security of transmission.
Mobile phone safe module carries out school by the arranging key of its mobile phone safe module end generated to the second cipher-text information Calculating is tested, so as to ensure the integrality of the second cipher-text information.It can be to calculate any verification modes such as MAC value that the verification, which calculates,.
Now, arranging key comprises at least one verification computation key of an encryption key.
Step S115c, mobile phone safe module send the first processing information to subscriber identification card, wherein, at first Reason information comprises at least:Second cipher-text information and the first check information;
Step S116c, after subscriber identification card receives the first processing information, pass through the association at subscriber identification card end Business's key is verified to the first processing information;
Specifically, calculated because the second cipher-text information has carried out verification by the arranging key of mobile phone safe module end, this When, after subscriber identification card receives the second cipher-text information and the first check information, pass through the association in subscriber identification card Business's key equally carries out verification calculating to the second cipher-text information, and compared with the first check information, and than after more consistent, It is verified, so that it is guaranteed that the second cipher-text information obtained is not tampered.
Step S117c, if subscriber identification card is verified to the first processing information, subscriber identification card leads to Second cipher-text information is decrypted the arranging key for crossing subscriber identification card end, obtains information to be transmitted;
Specifically, because information to be transmitted is encrypted by the arranging key of mobile phone safe module end, now, user After identification card receives real second cipher-text information, it is decrypted by the arranging key in subscriber identification card, So as to obtain real information to be transmitted.
Step S118c, subscriber identification card are signed to information to be transmitted, obtain the second signing messages;
Specifically, subscriber identification card is signed after real information to be transmitted is obtained to the information to be transmitted Name, to ensure the integrality of information to be transmitted and non repudiation.
Step S119c, subscriber identification card is by the arranging key at subscriber identification card end to the second signing messages It is encrypted, obtains the 3rd cipher-text information, and verification calculating is carried out to the 3rd cipher-text information, obtains the second check information;
Specifically, subscriber identification card is also entered by the arranging key at subscriber identification card end to the second signing messages Row encryption, so as to ensure the opaque transmission of the second signing messages, improve security.
Subscriber identification card is also verified by the arranging key at subscriber identification card end to the 3rd cipher-text information Calculate, so as to ensure the integrality of the 3rd cipher-text information.
Step S120c, subscriber identification card send second processing information to mobile phone safe module, wherein, at second Reason information comprises at least:3rd cipher-text information and the second check information;
Step S121c, after mobile phone safe module receives second processing information, the negotiation by mobile phone safe module end is close Key is verified to second processing information;
Specifically, after mobile phone safe module receives the 3rd cipher-text information and the second check information, also pass through mobile phone safe The arranging key of module end carries out verification calculating to the 3rd cipher-text information, and compared with the second check information, and comparing After consistent, it is verified, so that it is guaranteed that the 3rd cipher-text information obtained is not tampered.
Step S122c, if mobile phone safe module to second processing Information Authentication by passing through mobile phone safe module end Arranging key the 3rd cipher-text information is decrypted, obtain the second signing messages;
Specifically, mobile phone safe module also passes through mobile phone safe module end after real 3rd cipher-text information is obtained Arranging key the 3rd cipher-text information is decrypted, obtain real second signing messages.
Thus, the information exchange of once safety is completed between mobile phone safe module and subscriber identification card.
Step S123c, mobile phone safe module is at least by the second signing messages outgoing.
Specifically, mobile phone safe module information to be transmitted will be signed after the second signing messages outgoing.
If the present invention is applied in secure transmission of confidential information, confidential information will be sent to outside the confidential information after signature The device of extraction is medium;
If the present invention is applied in Internet-based banking services, the Transaction Information after signature is sent to online banking service Device etc..
Mode four:
Step S113d, mobile phone safe module obtain information to be transmitted;
Step S114d, mobile phone safe module are added by the arranging key of mobile phone safe module end to information to be transmitted It is close, the second cipher-text information is obtained, and verification calculating is carried out to the second cipher-text information, obtain the first check information;
Step S115d, mobile phone safe module send the first processing information to subscriber identification card, wherein, at first Reason information comprises at least:Second cipher-text information and the first check information;
Step S116d, after subscriber identification card receives the first processing information, pass through the association at subscriber identification card end Business's key is verified to the first processing information;
Step S117d, if subscriber identification card is verified to the first processing information, subscriber identification card leads to Second cipher-text information is decrypted the arranging key for crossing subscriber identification card end, obtains information to be transmitted;
Step S118d, subscriber identification card are signed to information to be transmitted, obtain the second signing messages;
Step S119d, subscriber identification card is by the arranging key at subscriber identification card end to the second signing messages It is encrypted, obtains the 3rd cipher-text information;
Step S120d, subscriber identification card send second processing information to mobile phone safe module, wherein, at second Reason information comprises at least:3rd cipher-text information;
Step S121d, mobile phone safe module are carried out by the arranging key of mobile phone safe module end to the 3rd cipher-text information Decryption, obtain the second signing messages;
Step S122d, mobile phone safe module is at least by the second signing messages outgoing.
Mode five:
Step S113e, mobile phone safe module obtain information to be transmitted;
Step S114e, mobile phone safe module are added by the arranging key of mobile phone safe module end to information to be transmitted It is close, the second cipher-text information is obtained, and verification calculating is carried out to the second cipher-text information, obtain the first check information;
Step S115e, mobile phone safe module send the first processing information to subscriber identification card, wherein, at first Reason information comprises at least:Second cipher-text information and the first check information;
Step S116e, after subscriber identification card receives the first processing information, pass through the association at subscriber identification card end Business's key is verified to the first processing information;
Step S117e, if subscriber identification card is verified to the first processing information, subscriber identification card leads to Second cipher-text information is decrypted the arranging key for crossing subscriber identification card end, obtains information to be transmitted;
Step S118e, subscriber identification card are signed to information to be transmitted, obtain the second signing messages;
Step S119e, subscriber identification card is by the arranging key at subscriber identification card end to the second signing messages Verification calculating is carried out, obtains the second check information;
Step S120e, subscriber identification card send second processing information to mobile phone safe module, wherein, at second Reason information comprises at least:Second signing messages and the second check information;
Step S121e, after mobile phone safe module receives second processing information, the negotiation by mobile phone safe module end is close Key is verified to second processing information;
Step S122e, if mobile phone safe module passes through mobile phone safe module at least general to second processing Information Authentication Second signing messages outgoing.
Mode six:
Step S113f, mobile phone safe module obtain information to be transmitted;
Step S114f, mobile phone safe module are added by the arranging key of mobile phone safe module end to information to be transmitted It is close, obtain the second cipher-text information;
Step S115f, mobile phone safe module send the first processing information to subscriber identification card, wherein, at first Reason information comprises at least:Second cipher-text information;
Step S116f, after subscriber identification card receives the first processing information, pass through the association at subscriber identification card end Second cipher-text information is decrypted business's key, obtains information to be transmitted;
Step S117f, subscriber identification card are signed to information to be transmitted, obtain the second signing messages;
Step S118f, subscriber identification card is by the arranging key at subscriber identification card end to the second signing messages It is encrypted, obtains the 3rd cipher-text information, and verification calculating is carried out to the 3rd cipher-text information, obtains the first check information;
Step S119f, subscriber identification card send second processing information to mobile phone safe module, wherein, at second Reason information comprises at least:3rd cipher-text information and the first check information;
Step S120f, after mobile phone safe module receives second processing information, the negotiation by mobile phone safe module end is close Key is verified to second processing information;
Step S121f, if mobile phone safe module to second processing Information Authentication by passing through mobile phone safe module end Arranging key the 3rd cipher-text information is decrypted, obtain the second signing messages;
Step S122f, mobile phone safe module is at least by the second signing messages outgoing.
Mode seven:
Step S113g, mobile phone safe module obtain information to be transmitted;
Step S114g, mobile phone safe module carry out school by the arranging key of mobile phone safe module end to information to be transmitted Calculating is tested, obtains the first check information;
Step S115g, mobile phone safe module send the first processing information to subscriber identification card, wherein, at first Reason information comprises at least:Information to be transmitted and the first check information;
Step S116g, after subscriber identification card receives the first processing information, pass through the association at subscriber identification card end Business's key is verified to the first processing information;
Step S117g, if subscriber identification card is verified to the first processing information, subscriber identification card pair Information to be transmitted is signed, and obtains the second signing messages;
Step S118g, subscriber identification card is by the arranging key at subscriber identification card end to the second signing messages It is encrypted, obtains the second cipher-text information, and verification calculating is carried out to the second cipher-text information, obtains the second check information;
Step S119g, subscriber identification card send second processing information to mobile phone safe module, wherein, at second Reason information comprises at least:Second cipher-text information and the second check information;
Step S120g, after mobile phone safe module receives second processing information, the negotiation by mobile phone safe module end is close Key is verified to second processing information;
Step S121g, if mobile phone safe module to second processing Information Authentication by passing through mobile phone safe module end Arranging key the second cipher-text information is decrypted, obtain the second signing messages;
Step S122g, mobile phone safe module is at least by the second signing messages outgoing.
Mode eight:
Step S113h, mobile phone safe module obtain information to be transmitted;
Step S114h, mobile phone safe module are added by the arranging key of mobile phone safe module end to information to be transmitted It is close, obtain the second cipher-text information;
Step S115h, mobile phone safe module send the first processing information to subscriber identification card, wherein, at first Reason information comprises at least:Second cipher-text information;
Step S116h, after subscriber identification card receives the first processing information, pass through the association at subscriber identification card end Second cipher-text information is decrypted business's key, obtains information to be transmitted;
Step S117h, subscriber identification card are signed to information to be transmitted, obtain the second signing messages;
Step S118h, subscriber identification card is by the arranging key at subscriber identification card end to the second signing messages Verification calculating is carried out, obtains the first check information;
Step S119h, subscriber identification card send second processing information to mobile phone safe module, wherein, at second Reason information comprises at least:Second signing messages and the first check information;
Step S120h, after mobile phone safe module receives second processing information, the negotiation by mobile phone safe module end is close Key is verified to second processing information;
Step S121h, if mobile phone safe module passes through mobile phone safe module at least general to second processing Information Authentication Second signing messages outgoing.
Mode nine:
Step S113i, mobile phone safe module obtain information to be transmitted;
Step S114i, mobile phone safe module are added by the arranging key of mobile phone safe module end to information to be transmitted It is close, the second cipher-text information is obtained, and verification calculating is carried out to the second cipher-text information, obtain the first check information;
Step S115i, mobile phone safe module send the first processing information to subscriber identification card, wherein, at first Reason information comprises at least:Second cipher-text information and the first check information;
Step S116i, after subscriber identification card receives the first processing information, pass through the association at subscriber identification card end Business's key is verified to the first processing information;
Step S117i, if subscriber identification card is verified to the first processing information, subscriber identification card leads to Second cipher-text information is decrypted the arranging key for crossing subscriber identification card end, obtains information to be transmitted;
Step S118i, subscriber identification card are signed to information to be transmitted, obtain the second signing messages;
Step S119i, subscriber identification card is by the arranging key at subscriber identification card end to the second signing messages It is encrypted, obtains the 3rd cipher-text information;
Step S120i, subscriber identification card send second processing information to mobile phone safe module, wherein, at second Reason information comprises at least:3rd cipher-text information;
Step S121i, mobile phone safe module are carried out by the arranging key of mobile phone safe module end to the 3rd cipher-text information Decryption, obtain the second signing messages;
Step S122i, mobile phone safe module is at least by the second signing messages outgoing.
Certainly, in upper type one is nine in a manner of, for carrying out the step of verification calculates to cipher-text information to each, Calculated to substitute with carrying out verification using the original text to cipher-text information, after check information and cipher-text information is obtained, solved in advance It is close to obtain the original text of cipher-text information, then carry out the checking of check information.As long as cipher-text information or cipher-text information can be ensured Original text can not be tampered.
As can be seen here, by the data processing method based on arranging key of the present invention, mobile phone can be enabled safe Perform Internet-based banking services and/or confidential information transmission.
In addition, in any of the above-described mode, after the step of mobile phone safe module obtains information to be transmitted, pacify in mobile phone Full module sends the first processing information the step of subscriber identification card before, the data processing method based on arranging key Also comprise the following steps:
Step S1131, mobile phone safe module extract the key message in information to be transmitted;
Specifically, mobile phone safe module will extract the key message in information to be transmitted, it is to be shown to user's confirmation No is the information.Such as:
If the present invention is applied in secure transmission of confidential information, mobile phone safe module can be extracted in confidential information The key messages such as filename, so that user is confirmed whether to need to extract classified papers progress Safety output;
If the present invention is applied in Internet-based banking services, mobile phone safe module can extract the key in Transaction Information Information, such as the key message such as Transaction Account number and dealing money, so that user confirms whether the transaction is really to merchandise.
Step S1132, mobile phone safe module control mobile phone display screen show the crucial letter in the information to be transmitted extracted Breath;
Specifically, the display screen of mobile phone safe module control mobile phone shows the key message extracted, so that user is true The authenticity of key message is recognized, so as to ensure the authenticity of information to be transmitted.In addition, mobile phone is controlled by mobile phone safe module Display screen shows the key message extracted, is also prevented from controlling mobile phone display screen to show that key message can by mobile phone CPU The problem of being tampered, ensure that it is real content to control the content of display by mobile phone safe module, improves security.
Step S1133, mobile phone safe module receive the confirmation instruction of cell phone keyboard output;
Specifically, after user confirms that the key message that mobile phone display screen is shown is errorless, the acknowledgement key on mobile phone is pressed, should Acknowledgement key can be the hardware button set on mobile phone, or the virtual key of touch-screen mobile phone, be connect in mobile phone safe module After the confirmation instruction for receiving cell phone keyboard output, confirm the authenticity of information to be transmitted, carry out the preparation of Subsequent secure transmission.
Step S1134, after mobile phone safe module receives the confirmation instruction of cell phone keyboard output, perform mobile phone safe mould The step of block sends the first processing information to subscriber identification card.
Specifically, the information to be transmitted only confirmed by user key-press is considered as just real information to be transmitted, protect The authenticity of information to be transmitted is demonstrate,proved, so as to improve the authenticity of confidential information output, and the security of Transaction Information output.
Certainly, the embodiment of the present invention 1 can also provide a kind of mobile phone, and the mobile phone is using the offer of embodiment 1 based on negotiation The data processing method of key, the mobile phone of the embodiment of the present invention 1 comprise at least:Mobile phone safe module and user identity identification Card;Wherein, mobile phone safe module and subscriber identification card can be divided into Transmit-Receive Unit, encryption/decryption element, generation unit, The modules such as authentication unit, signature unit are to complete corresponding function, and this is no longer going to repeat them.
Embodiment 2
The difference of the present embodiment 2 and embodiment 1 is authenticating between mobile phone safe module and subscriber identification card Journey and key generation process are opposite process, and this is no longer going to repeat them, and only the present embodiment 2 is provided is close based on consulting The data processing method of key is briefly described.
Fig. 2 shows the flow chart of the data processing method based on arranging key of the offer of the embodiment of the present invention 2, referring to Fig. 2, The data processing method based on arranging key of the embodiment of the present invention 2, including:
Step S201, mobile phone safe module send the first authentication information to subscriber identification card, wherein, the first certification Information comprises at least:First random factor and mobile phone safe module certificate;
Step S202, after subscriber identification card receives the first authentication information, verify the conjunction of mobile phone safe module certificate Method;
Step S203, if subscriber identification card checking mobile phone safe module certificate is legal, subscriber identification card The second random factor is generated, and the negotiation at subscriber identification card end is generated according to the first random factor and the second random factor Key;
Step S204, subscriber identification card pass through the public key of the mobile phone safe module carried in mobile phone safe module certificate At least the first random factor and the second random factor are encrypted, obtain the first cipher-text information;
Step S205, subscriber identification card are signed to the first cipher-text information, obtain the first signing messages;
Step S206, subscriber identification card send the second authentication information to mobile phone safe module, wherein, the second certification Information comprises at least:First cipher-text information, the first signing messages and subscriber identification card certificate;
Step S207, after mobile phone safe module receives the second authentication information, verify the conjunction of subscriber identification card certificate Method;
Step S208, if mobile phone safe module verification subscriber identification card certificate is legal, mobile phone safe module is tested Demonstrate,prove the correctness of the first signing messages;
Step S209, if the signing messages of mobile phone safe module verification first is correct, mobile phone safe module decryption first Cipher-text information, obtain the first random factor and the second random factor;
Step S210, mobile phone safe module after the first random factor and the second random factor is obtained, checking first with The correctness of the machine factor;
Step S211, if the random factor of mobile phone safe module verification first is correct, mobile phone safe module is according to first The arranging key of random factor and the second random factor generation mobile phone safe module end;
Step S212, pass through the arranging key of mobile phone safe module end between mobile phone safe module and subscriber identification card And the arranging key at subscriber identification card end enters the safe transmission of row information.
As can be seen here, by the data processing method based on arranging key of the present invention, mobile phone can be enabled safe Perform Internet-based banking services and/or confidential information transmission.
Wherein, in step S212, mobile phone safe module end is passed through between mobile phone safe module and subscriber identification card Arranging key and subscriber identification card end arranging key enter row information safe transmission process and the phase of embodiment 1 Together, will not be repeated here.
Certainly, the embodiment of the present invention 2 can also provide a kind of mobile phone, and the mobile phone is using the offer of embodiment 2 based on negotiation The data processing method of key, the mobile phone of the embodiment of the present invention 2 comprise at least:Mobile phone safe module and user identity identification Card;Wherein, mobile phone safe module and subscriber identification card can be divided into Transmit-Receive Unit, encryption/decryption element, generation unit, The modules such as authentication unit, signature unit are to complete corresponding function, and this is no longer going to repeat them.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize specific logical function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, software that multiple steps or method can be performed in memory and by suitable instruction execution system with storage Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal Discrete logic, have suitable combinational logic gate circuit application specific integrated circuit, programmable gate array(PGA), scene Programmable gate array(FPGA)Deng.
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, can also That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould Block can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and as independent production marketing or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any One or more embodiments or example in combine in an appropriate manner.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art is not departing from the principle and objective of the present invention In the case of above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention By appended claims and its equivalent limit.

Claims (18)

  1. A kind of 1. data processing method based on arranging key, it is characterised in that including:
    Subscriber identification card sends the first authentication information to mobile phone safe module, wherein, first authentication information is at least Including:First random factor and subscriber identification card certificate;
    After the mobile phone safe module receives first authentication information, the legal of the subscriber identification card certificate is verified Property;
    If subscriber identification card certificate described in the mobile phone safe module verification is legal, the mobile phone safe module generation Second random factor, and the mobile phone safe module end is generated according to first random factor and second random factor Arranging key;
    The mobile phone safe module passes through the public affairs of the subscriber identification card carried in the subscriber identification card certificate At least first random factor and the second random factor are encrypted for key, obtain the first cipher-text information;
    The mobile phone safe module is signed to first cipher-text information, obtains the first signing messages;
    The mobile phone safe module sends the second authentication information to the subscriber identification card, wherein, second certification Information comprises at least:First cipher-text information, first signing messages and the mobile phone safe module certificate;
    After the subscriber identification card receives second authentication information, the legal of the mobile phone safe module certificate is verified Property;
    If the subscriber identification card verifies that the mobile phone safe module certificate is legal, the subscriber identification card is tested Demonstrate,prove the correctness of first signing messages;
    If the subscriber identification card verifies that first signing messages is correct, the subscriber identification card utilizes institute The private key for stating subscriber identification card decrypts first cipher-text information, obtain first random factor and described second with The machine factor;
    The subscriber identification card is after first random factor and second random factor is obtained, checking described the The correctness of one random factor;
    If the subscriber identification card verifies that first random factor is correct, the subscriber identification card is according to institute State the first random factor and second random factor generates the arranging key at the subscriber identification card end;
    Pass through the arranging key of the mobile phone safe module end between the mobile phone safe module and the subscriber identification card And the arranging key at the subscriber identification card end enters the safe transmission of row information.
  2. A kind of 2. data processing method based on arranging key, it is characterised in that including:
    Mobile phone safe module sends the first authentication information to subscriber identification card, wherein, first authentication information is at least Including:First random factor and mobile phone safe module certificate;
    After the subscriber identification card receives first authentication information, the legal of the mobile phone safe module certificate is verified Property;
    If the subscriber identification card verifies that the mobile phone safe module certificate is legal, the subscriber identification card life The user identity identification is generated into the second random factor, and according to first random factor and second random factor The arranging key at card end;
    The subscriber identification card passes through the public key of the mobile phone safe module carried in the mobile phone safe module certificate At least first random factor and the second random factor are encrypted, obtain the first cipher-text information;
    The subscriber identification card is signed to first cipher-text information, obtains the first signing messages;
    The subscriber identification card sends the second authentication information to the mobile phone safe module, wherein, second certification Information comprises at least:First cipher-text information, first signing messages and the subscriber identification card certificate;
    After the mobile phone safe module receives second authentication information, the legal of the subscriber identification card certificate is verified Property;
    If subscriber identification card certificate described in the mobile phone safe module verification is legal, the mobile phone safe module verification The correctness of first signing messages;
    If the first signing messages described in the mobile phone safe module verification is correct, the mobile phone safe module utilizes the hand The private key of machine security module decrypts first cipher-text information, obtain first random factor and it is described second it is random because Son;
    The mobile phone safe module is after first random factor and second random factor is obtained, checking described first The correctness of random factor;
    If the first random factor described in the mobile phone safe module verification is correct, the mobile phone safe module is according to described One random factor and second random factor generate the arranging key of the mobile phone safe module end;
    Pass through the arranging key of the mobile phone safe module end between the mobile phone safe module and the subscriber identification card And the arranging key at the subscriber identification card end enters the safe transmission of row information.
  3. 3. according to the method for claim 1, it is characterised in that the mobile phone safe module and the subscriber identification card Between letter carried out by the arranging key of the mobile phone safe module end and the arranging key at the subscriber identification card end The step of safe transmission of breath, includes:
    The mobile phone safe module obtains information to be transmitted;
    The information to be transmitted is encrypted by the arranging key of the mobile phone safe module end for the mobile phone safe module, Obtain the second cipher-text information;
    The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, first processing Information comprises at least:Second cipher-text information;
    After the subscriber identification card receives first processing information, pass through the negotiation at the subscriber identification card end Second cipher-text information is decrypted key, obtains information to be transmitted;
    The subscriber identification card is signed to the information to be transmitted, obtains the second signing messages;
    The subscriber identification card is entered by the arranging key at the subscriber identification card end to second signing messages Row encryption, obtains the 3rd cipher-text information;
    The subscriber identification card sends second processing information to the mobile phone safe module, wherein, the second processing Information comprises at least:3rd cipher-text information;
    After the mobile phone safe module receives the second processing information, pass through the arranging key of the mobile phone safe module end 3rd cipher-text information is decrypted, obtains second signing messages;
    The mobile phone safe module is at least by the second signing messages outgoing.
  4. 4. according to the method for claim 2, it is characterised in that the mobile phone safe module and the subscriber identification card Between letter carried out by the arranging key of the mobile phone safe module end and the arranging key at the subscriber identification card end The step of safe transmission of breath, includes:
    The mobile phone safe module obtains information to be transmitted;
    The information to be transmitted is encrypted by the arranging key of the mobile phone safe module end for the mobile phone safe module, Obtain the second cipher-text information;
    The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, first processing Information comprises at least:Second cipher-text information;
    After the subscriber identification card receives first processing information, pass through the negotiation at the subscriber identification card end Second cipher-text information is decrypted key, obtains information to be transmitted;
    The subscriber identification card is signed to the information to be transmitted, obtains the second signing messages;
    The subscriber identification card is entered by the arranging key at the subscriber identification card end to second signing messages Row encryption, obtains the 3rd cipher-text information;
    The subscriber identification card sends second processing information to the mobile phone safe module, wherein, the second processing Information comprises at least:3rd cipher-text information;
    After the mobile phone safe module receives the second processing information, pass through the arranging key of the mobile phone safe module end 3rd cipher-text information is decrypted, obtains second signing messages;
    The mobile phone safe module is at least by the second signing messages outgoing.
  5. 5. according to the method for claim 1, it is characterised in that the mobile phone safe module and the subscriber identification card Between letter carried out by the arranging key of the mobile phone safe module end and the arranging key at the subscriber identification card end The step of safe transmission of breath, includes:
    The mobile phone safe module obtains information to be transmitted;
    The mobile phone safe module is verified by the arranging key of the mobile phone safe module end to the information to be transmitted Calculate, obtain the first check information;
    The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, first processing Information comprises at least:The information to be transmitted and first check information;
    After the subscriber identification card receives first processing information, pass through the negotiation at the subscriber identification card end Key is verified to first processing information;
    If the subscriber identification card is verified to first processing information, the subscriber identification card is to institute State information to be transmitted to be signed, obtain the second signing messages;
    The subscriber identification card is entered by the arranging key at the subscriber identification card end to second signing messages Row verification calculates, and obtains the second check information;
    The subscriber identification card sends second processing information to the mobile phone safe module, wherein, the second processing Information comprises at least:Second signing messages and second check information;
    After the mobile phone safe module receives the second processing information, pass through the arranging key of the mobile phone safe module end The second processing information is verified;
    If the mobile phone safe module is to the second processing Information Authentication by the way that the mobile phone safe module is at least by institute State the second signing messages outgoing.
  6. 6. according to the method for claim 2, it is characterised in that the mobile phone safe module and the subscriber identification card Between letter carried out by the arranging key of the mobile phone safe module end and the arranging key at the subscriber identification card end The step of safe transmission of breath, includes:
    The mobile phone safe module obtains information to be transmitted;
    The mobile phone safe module is verified by the arranging key of the mobile phone safe module end to the information to be transmitted Calculate, obtain the first check information;
    The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, first processing Information comprises at least:The information to be transmitted and first check information;
    After the subscriber identification card receives first processing information, pass through the negotiation at the subscriber identification card end Key is verified to first processing information;
    If the subscriber identification card is verified to first processing information, the subscriber identification card is to institute State information to be transmitted to be signed, obtain the second signing messages;
    The subscriber identification card is entered by the arranging key at the subscriber identification card end to second signing messages Row verification calculates, and obtains the second check information;
    The subscriber identification card sends second processing information to the mobile phone safe module, wherein, the second processing Information comprises at least:Second signing messages and second check information;
    After the mobile phone safe module receives the second processing information, pass through the arranging key of the mobile phone safe module end The second processing information is verified;
    If the mobile phone safe module is to the second processing Information Authentication by the way that the mobile phone safe module is at least by institute State the second signing messages outgoing.
  7. 7. according to the method for claim 1, it is characterised in that the mobile phone safe module and the subscriber identification card Between letter carried out by the arranging key of the mobile phone safe module end and the arranging key at the subscriber identification card end The step of safe transmission of breath, includes:
    The mobile phone safe module obtains information to be transmitted;
    The information to be transmitted is encrypted by the arranging key of the mobile phone safe module end for the mobile phone safe module, The second cipher-text information is obtained, and verification calculating is carried out to second cipher-text information, obtains the first check information;
    The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, first processing Information comprises at least:Second cipher-text information and first check information;
    After the subscriber identification card receives first processing information, pass through the negotiation at the subscriber identification card end Key is verified to first processing information;
    If the subscriber identification card is verified to first processing information, the subscriber identification card passes through Second cipher-text information is decrypted the arranging key at the subscriber identification card end, obtains the information to be transmitted;
    The subscriber identification card is signed to the information to be transmitted, obtains the second signing messages;
    The subscriber identification card is entered by the arranging key at the subscriber identification card end to second signing messages Row encryption, obtains the 3rd cipher-text information, and verification calculating is carried out to the 3rd cipher-text information, obtains the second check information;
    The subscriber identification card sends second processing information to the mobile phone safe module, wherein, the second processing Information comprises at least:3rd cipher-text information and second check information;
    After the mobile phone safe module receives the second processing information, pass through the arranging key of the mobile phone safe module end The second processing information is verified;
    If the mobile phone safe module is to the second processing Information Authentication by passing through the mobile phone safe module end 3rd cipher-text information is decrypted arranging key, obtains second signing messages;
    The mobile phone safe module is at least by the second signing messages outgoing.
  8. 8. according to the method for claim 2, it is characterised in that the mobile phone safe module and the subscriber identification card Between letter carried out by the arranging key of the mobile phone safe module end and the arranging key at the subscriber identification card end The step of safe transmission of breath, includes:
    The mobile phone safe module obtains information to be transmitted;
    The information to be transmitted is encrypted by the arranging key of the mobile phone safe module end for the mobile phone safe module, The second cipher-text information is obtained, and verification calculating is carried out to second cipher-text information, obtains the first check information;
    The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, first processing Information comprises at least:Second cipher-text information and first check information;
    After the subscriber identification card receives first processing information, pass through the negotiation at the subscriber identification card end Key is verified to first processing information;
    If the subscriber identification card is verified to first processing information, the subscriber identification card passes through Second cipher-text information is decrypted the arranging key at the subscriber identification card end, obtains the information to be transmitted;
    The subscriber identification card is signed to the information to be transmitted, obtains the second signing messages;
    The subscriber identification card is entered by the arranging key at the subscriber identification card end to second signing messages Row encryption, obtains the 3rd cipher-text information, and verification calculating is carried out to the 3rd cipher-text information, obtains the second check information;
    The subscriber identification card sends second processing information to the mobile phone safe module, wherein, the second processing Information comprises at least:3rd cipher-text information and second check information;
    After the mobile phone safe module receives the second processing information, pass through the arranging key of the mobile phone safe module end The second processing information is verified;
    If the mobile phone safe module is to the second processing Information Authentication by passing through the mobile phone safe module end 3rd cipher-text information is decrypted arranging key, obtains second signing messages;
    The mobile phone safe module is at least by the second signing messages outgoing.
  9. 9. according to the method for claim 1, it is characterised in that the mobile phone safe module and the subscriber identification card Between letter carried out by the arranging key of the mobile phone safe module end and the arranging key at the subscriber identification card end The step of safe transmission of breath, includes:
    The mobile phone safe module obtains information to be transmitted;
    The information to be transmitted is encrypted by the arranging key of the mobile phone safe module end for the mobile phone safe module, Obtain the second cipher-text information;
    The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, first processing Information comprises at least:Second cipher-text information;
    After the subscriber identification card receives first processing information, pass through the negotiation at the subscriber identification card end Second cipher-text information is decrypted key, obtains information to be transmitted;
    The subscriber identification card is signed to the information to be transmitted, obtains the second signing messages;
    The subscriber identification card is entered by the arranging key at the subscriber identification card end to second signing messages Row verification calculates, and obtains the first check information;
    The subscriber identification card sends second processing information to the mobile phone safe module, wherein, the second processing Information comprises at least:Second signing messages and first check information;
    After the mobile phone safe module receives the second processing information, pass through the arranging key of the mobile phone safe module end The second processing information is verified;
    If the mobile phone safe module is to the second processing Information Authentication by the way that the mobile phone safe module is at least by institute State the second signing messages outgoing.
  10. 10. according to the method for claim 2, it is characterised in that the mobile phone safe module and the user identity identification Carried out between card by the arranging key of the mobile phone safe module end and the arranging key at the subscriber identification card end The step of safe transmission of information, includes:
    The mobile phone safe module obtains information to be transmitted;
    The information to be transmitted is encrypted by the arranging key of the mobile phone safe module end for the mobile phone safe module, Obtain the second cipher-text information;
    The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, first processing Information comprises at least:Second cipher-text information;
    After the subscriber identification card receives first processing information, pass through the negotiation at the subscriber identification card end Second cipher-text information is decrypted key, obtains information to be transmitted;
    The subscriber identification card is signed to the information to be transmitted, obtains the second signing messages;
    The subscriber identification card is entered by the arranging key at the subscriber identification card end to second signing messages Row verification calculates, and obtains the first check information;
    The subscriber identification card sends second processing information to the mobile phone safe module, wherein, the second processing Information comprises at least:Second signing messages and first check information;
    After the mobile phone safe module receives the second processing information, pass through the arranging key of the mobile phone safe module end The second processing information is verified;
    If the mobile phone safe module is to the second processing Information Authentication by the way that the mobile phone safe module is at least by institute State the second signing messages outgoing.
  11. 11. according to the method for claim 1, it is characterised in that the mobile phone safe module and the user identity identification Carried out between card by the arranging key of the mobile phone safe module end and the arranging key at the subscriber identification card end The step of safe transmission of information, includes:
    The mobile phone safe module obtains information to be transmitted;
    The mobile phone safe module is verified by the arranging key of the mobile phone safe module end to the information to be transmitted Calculate, obtain the first check information;
    The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, first processing Information comprises at least:The information to be transmitted and first check information;
    After the subscriber identification card receives first processing information, pass through the negotiation at the subscriber identification card end Key is verified to first processing information;
    If the subscriber identification card is verified to first processing information, the subscriber identification card is to institute State information to be transmitted to be signed, obtain the second signing messages;
    The subscriber identification card is entered by the arranging key at the subscriber identification card end to second signing messages Row encryption, obtains the second cipher-text information;
    The subscriber identification card sends second processing information to the mobile phone safe module, wherein, the second processing Information comprises at least:Second cipher-text information;
    After the mobile phone safe module receives the second processing information, pass through the arranging key of the mobile phone safe module end Second cipher-text information is decrypted, obtains second signing messages;
    The mobile phone safe module is at least by the second signing messages outgoing.
  12. 12. according to the method for claim 2, it is characterised in that the mobile phone safe module and the user identity identification Carried out between card by the arranging key of the mobile phone safe module end and the arranging key at the subscriber identification card end The step of safe transmission of information, includes:
    The mobile phone safe module obtains information to be transmitted;
    The mobile phone safe module is verified by the arranging key of the mobile phone safe module end to the information to be transmitted Calculate, obtain the first check information;
    The mobile phone safe module sends the first processing information to the subscriber identification card, wherein, first processing Information comprises at least:The information to be transmitted and first check information;
    After the subscriber identification card receives first processing information, pass through the negotiation at the subscriber identification card end Key is verified to first processing information;
    If the subscriber identification card is verified to first processing information, the subscriber identification card is to institute State information to be transmitted to be signed, obtain the second signing messages;
    The subscriber identification card is entered by the arranging key at the subscriber identification card end to second signing messages Row encryption, obtains the second cipher-text information;
    The subscriber identification card sends second processing information to the mobile phone safe module, wherein, the second processing Information comprises at least:Second cipher-text information;
    After the mobile phone safe module receives the second processing information, pass through the arranging key of the mobile phone safe module end Second cipher-text information is decrypted, obtains second signing messages;
    The mobile phone safe module is at least by the second signing messages outgoing.
  13. 13. according to the method described in any one of claim 3 to 12, it is characterised in that obtain and treat in the mobile phone safe module After the step of transmitting information, the first processing information is sent to the subscriber identification card in the mobile phone safe module Before step, methods described also includes:
    The mobile phone safe module extracts the key message in the information to be transmitted;
    Mobile phone safe module control mobile phone display screen show described in key message in the information to be transmitted that extracts;
    The mobile phone safe module receives the confirmation instruction of cell phone keyboard output;
    After the confirmation instruction that the mobile phone safe module receives the cell phone keyboard output, the mobile phone safe module is performed The step of first processing information is sent to the subscriber identification card.
  14. 14. according to the method described in any one of claim 1 to 12, it is characterised in that second random factor is according to institute State the generation of the first random factor.
  15. 15. according to the method for claim 13, it is characterised in that second random factor is random according to described first Factor generation.
  16. 16. according to the method described in claim 1 to 12,15 any one, it is characterised in that the mobile phone safe module is independent Module outside mobile phone CPU, or the mobile phone safe module are arranged on the safety zone in the mobile phone CPU.
  17. 17. according to the method for claim 13, it is characterised in that the mobile phone safe module be independently of mobile phone CPU it Outer module, or the mobile phone safe module are arranged on the safety zone in the mobile phone CPU.
  18. 18. according to the method for claim 14, it is characterised in that the mobile phone safe module be independently of mobile phone CPU it Outer module, or the mobile phone safe module are arranged on the safety zone in the mobile phone CPU.
CN201410060548.5A 2014-02-21 2014-02-21 A kind of data processing method based on arranging key Active CN103813333B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410060548.5A CN103813333B (en) 2014-02-21 2014-02-21 A kind of data processing method based on arranging key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410060548.5A CN103813333B (en) 2014-02-21 2014-02-21 A kind of data processing method based on arranging key

Publications (2)

Publication Number Publication Date
CN103813333A CN103813333A (en) 2014-05-21
CN103813333B true CN103813333B (en) 2017-12-19

Family

ID=50709429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410060548.5A Active CN103813333B (en) 2014-02-21 2014-02-21 A kind of data processing method based on arranging key

Country Status (1)

Country Link
CN (1) CN103813333B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105991540A (en) * 2014-11-07 2016-10-05 天地融科技股份有限公司 Data interaction method and system
CN105989481B (en) * 2014-11-07 2020-05-15 天地融科技股份有限公司 Data interaction method and system
CN105812334B (en) * 2014-12-31 2019-02-05 北京华虹集成电路设计有限责任公司 A kind of method for network authorization
CN105357667B (en) * 2015-10-22 2019-04-30 东信和平科技股份有限公司 A kind of novel electron identity identifies smart card and discrimination method
WO2017113353A1 (en) * 2015-12-31 2017-07-06 华为技术有限公司 Data transmission method, apparatus and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004019552A1 (en) * 2002-08-20 2004-03-04 Koninklijke Philips Electronics N.V. Mobile network authentication for protecting stored content
CN1688171A (en) * 2005-05-16 2005-10-26 航天科工信息技术研究院 Apparatus and method for implementing data safety transmission of mobile communication apparatus
CN1925428A (en) * 2006-09-28 2007-03-07 北京理工大学 Method for detecting network nonlicet nodes by adjacent supervise
CN101686127A (en) * 2008-09-24 2010-03-31 北京创原天地科技有限公司 Novel USBKey secure calling method and USBKey device
CN101720071A (en) * 2009-12-01 2010-06-02 郑州信大捷安信息技术有限公司 Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN103002442A (en) * 2012-12-20 2013-03-27 邱华 Safe wireless local area network key distribution method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004019552A1 (en) * 2002-08-20 2004-03-04 Koninklijke Philips Electronics N.V. Mobile network authentication for protecting stored content
CN1688171A (en) * 2005-05-16 2005-10-26 航天科工信息技术研究院 Apparatus and method for implementing data safety transmission of mobile communication apparatus
CN1925428A (en) * 2006-09-28 2007-03-07 北京理工大学 Method for detecting network nonlicet nodes by adjacent supervise
CN101686127A (en) * 2008-09-24 2010-03-31 北京创原天地科技有限公司 Novel USBKey secure calling method and USBKey device
CN101720071A (en) * 2009-12-01 2010-06-02 郑州信大捷安信息技术有限公司 Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN103002442A (en) * 2012-12-20 2013-03-27 邱华 Safe wireless local area network key distribution method

Also Published As

Publication number Publication date
CN103813333A (en) 2014-05-21

Similar Documents

Publication Publication Date Title
CN103944715B (en) A kind of data processing method based on arranging key
CN107888382B (en) A kind of methods, devices and systems of the digital identity verifying based on block chain
CN103888453B (en) A kind of data processing method based on arranging key
CN103888942B (en) Data processing method based on negotiation secret keys
CN101960762B (en) system and method for performing wireless financial transactions
CN104243451B (en) A kind of information interacting method, system and intelligent cipher key equipment
CN117579281A (en) Method and system for ownership verification using blockchain
CN103944724B (en) A kind of subscriber identification card
CN105933119B (en) A kind of authentication method and equipment
CN103813333B (en) A kind of data processing method based on arranging key
CN103905204B (en) The transmission method and Transmission system of data
CN103116847B (en) Smart card, intelligent card transaction system and method with electronic signature functionality
CN103326862B (en) Electronically signing method and system
CN109479001A (en) Exit passageway is established
CN104243162B (en) A kind of information interacting method, system and intelligent cipher key equipment
CN103746802B (en) A kind of data processing method and mobile phone based on arranging key
El Madhoun et al. An online security protocol for NFC payment: Formally analyzed by the scyther tool
El Madhoun et al. A cloud-based secure authentication protocol for contactless-nfc payment
El Madhoun et al. Security enhancements in emv protocol for nfc mobile payment
CN103945375B (en) A kind of data processing method based on arranging key
CN103813321B (en) Agreement key based data processing method and mobile phone
CN104835038A (en) Networking payment device and networking payment method
CN106411520A (en) Method, device and system for processing virtual resource data
CN105989481B (en) Data interaction method and system
CN104113416B (en) 2 D code verification method and system based on electronic signature

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant