CN104144256B - A kind of portable cryptographic device based on mobile terminal - Google Patents

A kind of portable cryptographic device based on mobile terminal Download PDF

Info

Publication number
CN104144256B
CN104144256B CN201410340474.0A CN201410340474A CN104144256B CN 104144256 B CN104144256 B CN 104144256B CN 201410340474 A CN201410340474 A CN 201410340474A CN 104144256 B CN104144256 B CN 104144256B
Authority
CN
China
Prior art keywords
cryptographic
cryptographic function
program
stake
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410340474.0A
Other languages
Chinese (zh)
Other versions
CN104144256A (en
Inventor
龙毅宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University of Technology WUT
Original Assignee
Wuhan University of Technology WUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University of Technology WUT filed Critical Wuhan University of Technology WUT
Priority to CN201410340474.0A priority Critical patent/CN104144256B/en
Publication of CN104144256A publication Critical patent/CN104144256A/en
Application granted granted Critical
Publication of CN104144256B publication Critical patent/CN104144256B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a kind of portable cryptographic device based on mobile terminal, this encryption apparatus includes the mobile terminal with point-to-point communication ability, run the cryptographic function program that cryptographic function is provided in the terminal, crypto module in the computing device that cryptographic application is located stays stake, and the computing device that wherein cryptographic application is located has the ability carrying out data exchange by point-to-point communication and mobile terminal;When a cryptographic application calls the cryptographic function that crypto module stays stake, cryptographic function call request is submitted to cryptographic function program in stake by point-to-point communication mode by crypto module, is completed process that cryptographic function calls and returned result by cryptographic function program;By way of staying and set up secured session between stake and cryptographic function program in crypto module or by the way of password protection, to storage, the use of key in the terminal carries out safeguard protection to described encryption apparatus.

Description

A kind of portable cryptographic device based on mobile terminal
Technical field
The invention belongs to field of information security technology, particularly a kind of portable cryptographic device based on mobile terminal.
Background technology
Using the people of Net silver have such experience, when you open a Net silver account in bank, bank is often To your cryptographic hardware providing cryptographic function by USB interface to computer, this cryptographic hardware is referred to as USB Key (USB cipher key).Public key digital certificate and its private key has been deposited, for body during User logs in Net silver account in USB Key The safeguard protection (signature paying or transferring accounts) that part discriminating and/or online transaction payment or fund are transferred accounts.The function master of USB Key Generate including key, store and crypto-operation.
Main cause one using USB Key is to protect the safety of key (private key), and key is saved in special password Can effectively prevent other people from key is usurped in hardware;Two is to provide ease of use, and user can carry with USB Key and exist Different computers, different places realize safety protection function using digital certificate and its private key.But USB Key is in actual applications Situation but provides the original intention of ease of use to disagree with it, this is because:One to be that user may need to carry and use multiple For different application, the USB Key from different manufacturers is such as being provided by different bank, from different manufacturers USB Key, and various different USB Key has each different management and mode of operation, these carry to user and use USB Key brings very big inconvenience;Two is USB Key very little, is easily lost, and again applies for or purchase USB Key is number after loss Tired;Three be in many cases user need payment expense to purchase USB Key (bank would generally be its Net silver client's Free distribution USB Key, but make up to typically require and pay dues after losing;And to other application situation, user generally is intended to prop up paying for USB Key ).The problem of exactly these inconveniences, leads to the user would rather be using unsafe user name, password or using relatively The dynamic password of safety includes SMS, is also unwilling using safe USB Key (it is understood that dynamic password includes mobile phone Note is actually also not bery safe, has occurred in that stolen using dynamic password, the network game user of SMS, bank-user account With, cause the situation of heavy losses).
In addition to USB Key, a kind of also portable cryptographic device, cryptographic smart cards (Smart Card).Password intelligence The password usage of card is the same with USB Key, but needs using special card-reading apparatus, therefore, except using in special occasion Outward (as social security card, medical insurance card, bank card), cryptographic smart cards in daily life and work using not universal, and password Smart card is carrying and there is a problem of same with USB Key during using.
Content of the invention
It is an object of the invention to provide a kind of using the mobile terminals such as mobile phone, panel computer realize cryptographic function based on shifting The portable cryptographic device of dynamic terminal, to overcome the deficiencies in the prior art.
To achieve these goals, the technical solution adopted in the present invention is:
A kind of portable cryptographic device based on mobile terminal, described encryption apparatus includes following assembly:
Mobile terminal:A kind of user is portable have program performing and computing capability device (as cell phone, Panel computer);Described mobile terminal has by point-to-point (Point to Point) communication mode with other computing devices (such as Desk computer, portable computer) carry out the ability of data exchange;
Cryptographic function program:One is run the component software providing cryptographic function on mobile terminals;Described cryptographic function Including key management and crypto-operation;
Crypto module stays stake (Stub):Positioned at cryptographic application place computing device, to cryptographic application provide close The component software (as dynamic base, com component etc.) of code funcall;Described cryptographic application is to realize peace using cryptographic function The program of full purpose;Described crypto module place in stake computing device is not that cryptographic function program runs the mobile terminal being located; Described crypto module place in stake computing device has by point-to-point communication mode and movement that the operation of cryptographic function program is located Terminal carries out the ability of data exchange;
When the cryptographic function that a cryptographic application (by interface) calls described crypto module to stay stake, described password Cryptographic function call request is submitted to described cryptographic function program by point-to-point communication mode, by cryptographic function in stake by module Program completes process that cryptographic function calls and result is returned to crypto module stays stake, then by crypto module general in stake Result returns to cryptographic application.
A kind of safety shield for the cryptographic function of mobile terminal is to stay stake in described crypto module and pass through communication Before the cryptographic function that cryptographic function program described in mode request call provides, crypto module is stayed between stake and cryptographic function program first Set up secured session, the foundation of secured session needs to obtain the participation of user of cryptographic function program place mobile terminal or true Recognize.
A kind of safety shield for the key (including private key or symmetric key) being stored in described mobile terminal It is to call cryptographic function that described cryptographic function program provide to use in stake by communication mode in described crypto module and be stored in During one of mobile terminal key (as using private key ciphertext data or be digitally signed), the prompting of described cryptographic function program Cryptographic application in one computing device of user is currently in use key and by allowing user be confirmed whether that permission uses key Mode key is carried out safeguard protection (crypto module can pass to cryptographic function the name of cryptographic application in stake Program, and it is shown to user).
Safety shield for cryptographic function and the safety shield for key can be implemented it is also possible to only simultaneously Implement one of.
Based on the method for the present invention, the mobile terminal that people commonly use becomes the cryptographic hardware such as replacement USB Key, smart card Portable cryptographic device, and one can be stored for different safety applications based on the portable cryptographic device of mobile terminal Key includes public key digital certificate and private key, and user need not pay extra hardware costs, and on the one hand this bring to user Greatly facilitate, on the other hand save the cost using security password again for user.
Brief description
Fig. 1 is the schematic diagram of the encryption apparatus of the present invention.
Specific embodiment
The invention will be further described with reference to the accompanying drawings and examples.
The solution of the present invention to be implemented, mobile terminal must have by point-to-point communication mode and operation cipher application journey The computing device of sequence carries out the ability of data exchange.Below with the mobile terminal (including mobile phone, panel computer) based on Android As the mobile terminal of enforcement cryptographic function, using PC computer (including desk-top and portable PC computer) as cryptographic application As a example the computing device run, the specific embodiment of the present invention is illustrated.
Mobile terminal based on Android supports that USB (Universal Serial Bus) communication is carried out with outside mostly Data exchange (point-to-point communication), and current PC computer (including desk-top and portable PC computer) is almost all supported Usb communication mode, therefore, Android mobile terminal can adopt usb communication mode with the communication of PC intercomputer.How to exist Android mobile terminal includes network forum, has Jie in blog in disclosed data with realizing usb communication between PC computer Continue, here no longer describes.
In addition, the mobile terminal based on Android supports that line number is entered in bluetooth (Bluetooth) communication mode and outside mostly According to interaction (bluetooth can build point-to-point peer-to-peer network), and Blue-tooth communication method all supported by almost all of portable PC computer, Therefore Android mobile terminal may also be employed bluetooth with the communication of portable PC intercomputer.Count with PC in Android mobile terminal How to realize the technical scheme of Bluetooth communication between calculation machine to include network forum, be all described in blog in disclosed data, its In, cryptographic function program can be using J2ME exploitation, and using JSR82API (JABWT) exploitation for Bluetooth technology, here is not Many introductions.
Cryptographic function program can be using J2ME exploitation.In being embodied as, cryptographic function program both can take as one Business device program (Server) is implemented it is also possible to implement (Client) as a client-side program.
If described cryptographic function program is to implement as server program, its be one operate in mobile terminal after Platform monitors the program of service password funcall request, and it can operate in mobile terminal backstage always, or uses in user Started by user during cryptographic application, and crypto module is in the client-side program that stake is cryptographic function program.
If described cryptographic function program is to implement as a client-side program, also need to count at crypto module place in stake Implement an intermediary sevices program in calculation machine;When user uses cryptographic application, cryptographic function program is as intermediary sevices The client-side program of program is most likely initiated by a user and connects intermediary sevices program, and now, crypto module is also as intermediary's clothes in stake The client-side program of business program;During cryptographic application calls crypto module to stay stake, crypto module stays stake through intermediary Service routine carries out data interaction by communication mode and cryptographic function program.Intermediary sevices program can using C/C++ exploitation or Other suitable technological development.
Crypto module stays stake can be using the program language exploitation being adapted with cryptographic application, such as C/C++, COM etc..
Crypto module stays the foundation of the secured session between stake and cryptographic function program, and a kind of scheme is to carry using to user Show the scheme of confirmation, another kind of scheme is the scheme using password authentication.
The user's prompting confirmation scheme set up for secured session, is embodied as follows:
Crypto module stays stake before the cryptographic function calling cryptographic function program, and crypto module is first asked and password work(in stake Program can set up secured session, cryptographic function program points out the cipher application journey in one computing device of user by mobile terminal Using the cryptographic function in mobile terminal, (crypto module can pass to password the name of cryptographic application in stake for sequence request Function program, and it is shown to user), ask the user whether to allow, if user confirms to allow, cryptographic function program returns one Session identification (Session ID), all comprises this session mark in the cryptographic function call request of crypto module submission in stake afterwards Know.Crypto module stays the name that stake can obtain the application program calling crypto module to stay stake by the function that operating system provides.
The password authentication scheme set up for secured session, is embodied as follows:
The cryptographic function of mobile terminal is protected by user password.When crypto module is calling the close of cryptographic function program in stake Before code function, crypto module first requires the protection password of user input cryptographic function, after user input password, crypto module in stake In stake, the password of user input is submitted to cryptographic function program, secured session, cryptographic function program verification user are set up in request Password, password authentication pass through rear return one session identification, the cryptographic function call request of crypto module submission in stake afterwards In all comprise this session identification.
Other is had to the mobile terminal carrying out data exchange capability by communication mode and other computing devices, in fact It is the same for applying principle, and the developing instrument that simply different mobile terminals provides includes communication drivers can be different.
Other unaccounted particular techniques are implemented, and are it is known that not saying certainly for those skilled in the relevant art Bright.

Claims (6)

1. a kind of portable cryptographic device based on mobile terminal, is characterized in that:Described portable cryptographic device is a replacement The device that USB Key, cryptographic smart cardses device call towards cryptographic application offer cryptographic function;Described cryptographic application The program realizing security purpose using cryptographic function, including using symmetric key cipher function application program, use private key Ciphertext data and the application program being digitally signed, the application program realizing security purpose using public key digital certificate;Described Mobile terminal, cryptographic function program and crypto module are included based on the portable cryptographic device of mobile terminal again and stays stake, wherein:
Mobile terminal:A kind of portable device with program performing and computing capability of user;Described mobile terminal tool There is the ability carrying out data exchange by point-to-point communication mode and other computing devices;Described mobile terminal is stored with password should Key with program;
Cryptographic function program:One is run the component software providing cryptographic function on mobile terminals;Described cryptographic function includes Key management and crypto-operation;The algorithm of described crypto-operation includes symmetric key cipher algorithm;Described cryptographic function program carries For crypto-operation function include using the private key ciphertext data that is stored in described mobile terminal or be digitally signed;Described Cryptographic function program stays stake by crypto module provides cryptographic function to call to cryptographic application;
Crypto module stays stake:Cryptographic function is provided to call positioned at cryptographic application place computing device, to cryptographic application Component software;Described crypto module is dynamic base in stake;The password that described crypto module provides to cryptographic application in stake Funcall includes using the private key ciphertext data being stored in described mobile terminal or is digitally signed;Described cipher application Program is stayed stake by crypto module described in interface interchange and is called in stake by described crypto module close in described mobile terminal The cryptographic function that code function program provides;Described crypto module place in stake computing device is not that cryptographic function program runs place Mobile terminal;Described crypto module place in stake computing device has to be transported with cryptographic function program by point-to-point communication mode Row place mobile terminal carries out the ability of data exchange;
When the cryptographic function that a cryptographic application calls described crypto module to stay stake, described crypto module is stayed stake and is passed through point Cryptographic function call request is submitted to described cryptographic function program by point to-point communication mode, completes password work(by cryptographic function program Result is simultaneously returned to crypto module and stays stake by the process that can call, is then returned to result in stake by crypto module Cryptographic application.
2. the portable cryptographic device based on mobile terminal according to claim 1, is characterized in that:For mobile terminal The safety shield of cryptographic function is to stay stake in described crypto module and pass through cryptographic function journey described in communication mode request call Before the cryptographic function that sequence provides, crypto module is stayed and is first set up secured session between stake and cryptographic function program, the building of secured session The vertical participation of user or the confirmation having cryptographic function program place mobile terminal.
3. the portable cryptographic device based on mobile terminal according to claim 1, is characterized in that:Described for being stored in The safety shield of the key in mobile terminal is to call described password work(in stake by communication mode in described crypto module Can the cryptographic function that provides of program using when being stored in one of mobile terminal key, described cryptographic function program prompting use Cryptographic application in the computing device of one, family is currently in use key and by allowing user to be confirmed whether to allow using key Mode to carry out safeguard protection to key.
4. the portable cryptographic device based on mobile terminal according to claim 1, is characterized in that:
Described cryptographic function program is a server program or client-side program;
If described cryptographic function program is a server program, it operates in mobile terminal backstage always and monitors cryptographic function The service request called, or started by user when user is using cryptographic application, then listen for what cryptographic function called Service request, calls to the crypto module cryptographic function of offer in stake;
If described cryptographic function program is a client-side program, running in the computing device of described crypto module place in stake has One intermediary sevices program, when user uses cryptographic application, described cryptographic function program is as intermediary sevices program Client-side program is most likely initiated by a user and connects intermediary sevices program, and crypto module also serves as the client of intermediary sevices program in stake End program calls the cryptographic function of cryptographic function program offer through intermediary sevices program by communication mode.
5. the portable cryptographic device based on mobile terminal according to claim 2, is characterized in that:Crypto module stay stake with The concrete grammar setting up secured session between cryptographic function program is as follows:
Crypto module stays stake before the cryptographic function calling cryptographic function program, and crypto module is first asked and cryptographic function journey in stake Sequence sets up secured session, and cryptographic function program points out the cryptographic application in one computing device of user to ask by mobile terminal Ask using the cryptographic function in mobile terminal, ask the user whether to allow, if user confirms to allow, cryptographic function program returns One session identification, all comprises this session identification in the cryptographic function call request of crypto module submission in stake afterwards.
6. the portable cryptographic device based on mobile terminal according to claim 2, is characterized in that:Crypto module stay stake with The concrete grammar setting up secured session between cryptographic function program is as follows:
When crypto module stays stake before the cryptographic function calling cryptographic function program, crypto module first requires user input close in stake The protection password of code function, after user input password, the password of user input is submitted to cryptographic function journey in stake by crypto module Sequence, secured session, the password of cryptographic function program verification user are set up in request, and password authentication is by one session mark of rear return Know, in the cryptographic function call request of crypto module submission in stake afterwards, all comprise this session identification.
CN201410340474.0A 2014-07-17 2014-07-17 A kind of portable cryptographic device based on mobile terminal Active CN104144256B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410340474.0A CN104144256B (en) 2014-07-17 2014-07-17 A kind of portable cryptographic device based on mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410340474.0A CN104144256B (en) 2014-07-17 2014-07-17 A kind of portable cryptographic device based on mobile terminal

Publications (2)

Publication Number Publication Date
CN104144256A CN104144256A (en) 2014-11-12
CN104144256B true CN104144256B (en) 2017-03-08

Family

ID=51853321

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410340474.0A Active CN104144256B (en) 2014-07-17 2014-07-17 A kind of portable cryptographic device based on mobile terminal

Country Status (1)

Country Link
CN (1) CN104144256B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281916B (en) * 2015-11-05 2018-09-25 武汉理工大学 A kind of portable cryptographic system
CN106506152A (en) * 2016-11-16 2017-03-15 武汉理工大学 A kind of shared using method of encryption apparatus
CN107622395B (en) * 2017-09-28 2020-09-01 杭州恒生数据安全技术有限公司 Payment password generation method, terminal, server and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5513245A (en) * 1994-08-29 1996-04-30 Sony Corporation Automatic generation of private authentication key for wireless communication systems
CN101325774A (en) * 2008-07-30 2008-12-17 青岛海信移动通信技术股份有限公司 Encryption/decryption method and mobile terminal thereof

Also Published As

Publication number Publication date
CN104144256A (en) 2014-11-12

Similar Documents

Publication Publication Date Title
US11227275B2 (en) Person-to-person electronic payment processing
CN108012268B (en) SIM card for ensuring safe use of application software on mobile phone terminal
CN104618116B (en) A kind of cooperative digital signature system and its method
CA2936810C (en) Device, system and method of mobile identity verification
US9934502B1 (en) Contacts for misdirected payments and user authentication
CN110826043B (en) Digital identity application system and method, identity authentication system and method
CN105874494A (en) Disabling mobile payments for lost electronic devices
CN104751334A (en) Service processing method, device and system
CN103164792A (en) Providing method of payment service on wireless terminal and relevant equipment and system thereof
CN104012034A (en) Authentication for network access related applications
KR20170092679A (en) System and Method for Enabling Secure Authentication
AU2018213955B2 (en) Contacts for misdirected payments and user authentication
CN104202744A (en) Operation authentication method for intelligent terminal, terminal and system
CN110210207A (en) Authorization method and equipment
CN104144256B (en) A kind of portable cryptographic device based on mobile terminal
CN103268436A (en) Method and system for touch-screen based graphical password authentication in mobile payment
CN104636917A (en) Mobile payment system and method with secure payment function
CN104112199A (en) Multi-communication-port IC card safety terminal, access system and financial transaction payment method
CN103530768A (en) Mobile communication payment system and cost payment method thereof
US9836618B2 (en) System and method of authentication of a first party respective of a second party aided by a third party
CN102693478A (en) Trading method of bid security during bidding procedure and system thereof
EP3162042B1 (en) Identification of call participants
US20170213213A1 (en) Enhanced authentication security applicable in an at least partially insecure network environment
EP3340094B1 (en) Method for renewal of cryptographic whiteboxes under binding of new public key and old identifier
CN112150151B (en) Secure payment method, apparatus, electronic device and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant