CN104243152B - Security information interaction system, apparatus and method - Google Patents

Security information interaction system, apparatus and method Download PDF

Info

Publication number
CN104243152B
CN104243152B CN201310222736.9A CN201310222736A CN104243152B CN 104243152 B CN104243152 B CN 104243152B CN 201310222736 A CN201310222736 A CN 201310222736A CN 104243152 B CN104243152 B CN 104243152B
Authority
CN
China
Prior art keywords
safety
binding
safety barrier
information
interactive terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310222736.9A
Other languages
Chinese (zh)
Other versions
CN104243152A (en
Inventor
郭伟
周钰
于彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201310222736.9A priority Critical patent/CN104243152B/en
Publication of CN104243152A publication Critical patent/CN104243152A/en
Application granted granted Critical
Publication of CN104243152B publication Critical patent/CN104243152B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Credit Cards Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention proposes security information interaction system, apparatus and method, and methods described includes:Communication link is established first between safety barrier and safety information interactive terminal;The safety information interactive terminal performs the binding authentication operation for the safety barrier based on safety barrier list of bindings, and the result then operated according to the binding authentication performs related safety information interaction.By security information interaction system disclosed in this invention, apparatus and method, safety barrier internal information can be avoided maliciously to be read in the case of unauthorized in the case where keeping separation between machine and card, so as to considerably improve the security of system.

Description

Security information interaction system, apparatus and method
Technical field
The present invention relates to information interaction system, apparatus and method, more particularly, to security information interaction system, set Standby and method.
Background technology
At present, increasingly extensive and different field the class of business applied with cyber-net becomes increasingly abundant, Interacted for safety information(Information exchange i.e. higher to security requirement, such as the trading processing process in financial field) System, apparatus and method(It is based especially on the security information interaction system of mobile terminal)Become more and more important.
The basic functional principle of existing technical scheme is as follows:Safety barrier(Can be stored thereon and run one or Multiple security applications, such as SIM card, SD card)Exist with safety information interactive terminal (such as mobile terminal, POS etc.) It is physically separated, both sides are in communication with each other by the interface of standard to carry out the safety information interaction of correlation.
However, there are the following problems for existing technical scheme:Because safety barrier can be in any support relevant criterion Used on the safety information interactive terminal of interface, therefore the possibility of leakage be present in the safety information on safety barrier, so as to lead Cause potential potential safety hazard.
Accordingly, there exist following demand:Offer enable safety barrier mutually bound with safety information interactive terminal and The security information interaction system of certification, apparatus and method.
The content of the invention
In order to solve the problems of above-mentioned prior art, the present invention, which proposes, enables safety barrier and peace Full property information interactive terminal is mutually bound and the security information interaction system of certification, apparatus and method.
The purpose of the present invention is achieved through the following technical solutions:
A kind of safety information interaction method, the safety information interaction method comprise the following steps:
(A1)Communication link is established first between safety barrier and safety information interactive terminal;
(A2)The safety information interactive terminal is performed for the safety barrier based on safety barrier list of bindings Binding authentication operates, and the result then operated according to the binding authentication performs related safety information interaction.
In scheme disclosed above, it is preferable that the step(A2)Further comprise:Performing the binding authentication Before operation, the legitimacy of the safety barrier is verified in the safety information interactive terminal, and is only " peace in the result Full carrier is legal " in the case of binding authentication described in subsequent execution operate.
In scheme disclosed above, it is preferable that each record in the safety barrier list of bindings includes following Field:Safety barrier identifier field and safety barrier confidential information field, wherein, the safety barrier identifier field is used for The identifier of the safety barrier corresponding to the record is stored, the safety barrier confidential information field is used to store to be carried safely with this First binding authentication confidential information of body phase association.
In scheme disclosed above, it is preferable that the safety barrier provides secure storage section to be recognized with storing binding Information is demonstrate,proved, wherein, the binding authentication information includes binding logo symbol and the second binding authentication confidential information, the binding logo Symbol is the unique mark associated with specific binding relationship, and the second binding authentication confidential information and corresponding first Binding authentication confidential information is associated.
In scheme disclosed above, it is preferable that the binding authentication operation includes:(1)The safety information is handed over Mutual terminal is accorded with by the binding logo of safety barrier described in the data communication inquiry with the safety barrier;(2)If it find that institute State safety barrier not bind with any safety information interactive terminal, then prompt user to input bound secret, and by predetermined The password that is inputted based on user of computing mode generate the safety barrier identifier associated with the safety barrier, first bind and recognize Demonstrate,prove confidential information, binding logo symbol and the second binding authentication confidential information;(3)Created in the safety barrier list of bindings new Record, and the safety barrier identifier, the first binding authentication confidential information are stored in the record;(4)Tied up described Determine identifier and the second binding authentication confidential information is sent to the safety barrier;(5)What the safety barrier storage received The binding logo symbol and the second binding authentication confidential information.
In scheme disclosed above, it is preferable that the step(A2)Further comprise:When the binding authentication operates When the safety barrier again connects to the safety information interactive terminal bound in it after successfully completing, the safety barrier The safety information interactive terminal is authenticated using the second binding authentication confidential information, and only in certification success In the case of allow the follow-up data between the safety barrier and the safety information interactive terminal to communicate to perform phase The safety information interaction of pass.
In scheme disclosed above, it is preferable that the safety information interactive terminal can provide security context, and And user inputs the bound secret under the security context, and under the security context by binding logo symbol and Second binding authentication confidential information is sent to the safety barrier.
In scheme disclosed above, it is preferable that perform solution bindings as follows:(1)Perform the safety Authentication operation between carrier and the safety information interactive terminal;(2)If certification success, prompt described in user's input Bound secret;(3)If the bound secret of user's input is correct, the related binding logo symbol in the safety barrier is deleted With the safety barrier list of bindings in the second binding authentication confidential information and the deletion safety information interactive terminal In corresponding record.
In scheme disclosed above, it is preferable that a safety barrier can only be tied to a safety information interaction In terminal, and a safety information interactive terminal can bind multiple safety barriers.
The purpose of the present invention can also be achieved through the following technical solutions:
A kind of security information interaction system, the security information interaction system include safety information interactive terminal and Safety barrier, wherein, after establishing communication link first between the safety barrier and the safety information interactive terminal, institute State safety information interactive terminal and the binding authentication operation for being directed to the safety barrier is performed based on safety barrier list of bindings, and The result then operated according to the binding authentication performs related safety information interaction.
The purpose of the present invention can also be achieved through the following technical solutions:
A kind of safety information interactive terminal, the safety information interactive terminal communicate being established first with safety barrier The binding authentication operation for the safety barrier is performed based on safety barrier list of bindings after link, and then tied up according to The result for determining authentication operation performs related safety information interaction.
The purpose of the present invention can also be achieved through the following technical solutions:
A kind of safety barrier, after the safety barrier establishes communication link first between safety information interactive terminal Assist the safety information interactive terminal to perform the binding authentication operation for the safety barrier, and then tied up according to The result for determining authentication operation performs related safety information interaction.
Security information interaction system disclosed in this invention, apparatus and method have following advantages:Can be in the machine of holding Safety barrier internal information is avoided maliciously to be read in the case of unauthorized in the case of card separation, so as to considerably improve The security of system.
Brief description of the drawings
With reference to accompanying drawing, technical characteristic of the invention and advantage will be more fully understood by those skilled in the art, wherein:
Fig. 1 is the schematic diagram of security information interaction system according to an embodiment of the invention;
Fig. 2 is the flow chart of safety information interaction method according to an embodiment of the invention.
Embodiment
Fig. 1 is the schematic diagram of security information interaction system according to an embodiment of the invention.As shown in figure 1, Security information interaction system disclosed in this invention includes safety information interactive terminal 1 and safety barrier 2.Wherein, in institute State after establishing communication link first between safety barrier 2 and the safety information interactive terminal 1, the safety information interaction Terminal 1 performs the binding authentication operation for the safety barrier 2 based on safety barrier list of bindings, and is then tied up according to The result for determining authentication operation performs related safety information interaction(Such as the payment transaction process in financial field).
Preferably, in security information interaction system disclosed in this invention, it is operated performing the binding authentication Before, the legitimacy of the safety barrier 2 is verified in the safety information interactive terminal 1, and only in the result for " safety carries Body is legal " in the case of described in subsequent execution binding authentication operate.
Preferably, in security information interaction system disclosed in this invention, the safety information interactive terminal 1 is entered One step includes:Secure storage module 3 and binding authentication module 4.Wherein, the secure storage module 3 provides secure storage section To store the safety barrier list of bindings.The binding authentication module 4 is used to perform the binding authentication operation.
Preferably, in security information interaction system disclosed in this invention, in the safety barrier list of bindings Each record includes fields:Safety barrier identifier field and safety barrier confidential information field, wherein, the safety carries Body identifier field is used for the identifier for storing the safety barrier corresponding to the record, and the safety barrier confidential information field is used In the storage first binding authentication confidential information associated with the safety barrier.
Preferably, in security information interaction system disclosed in this invention, the safety barrier 2 further comprises tying up Determine authentication module 5 and secure storage module 6.Wherein, the binding authentication module 5 is based on the safety barrier 2 and the safety Property information interactive terminal 1 between data communications assistance perform binding authentication operation.The secure storage module 6 provides peace Full storage region to store binding authentication information, wherein, the binding authentication information includes binding logo symbol and the second binding is recognized Confidential information is demonstrate,proved, the binding logo symbol is the unique mark associated with specific binding relationship, and described second binds Certification confidential information is associated with corresponding first binding authentication confidential information.
Preferably, in security information interaction system disclosed in this invention, the binding authentication operation includes:(1) Binding authentication module 4 in the safety information interactive terminal 1 by with the binding authentication module 5 in the safety barrier 2 Data communication inquiry described in safety barrier 2 binding logo symbol;(2)If it find that the safety barrier 2 not with any peace Full property information interactive terminal binding(Binding logo is not present to accord with), then prompt user to input bound secret, and by predetermined Computing mode generates the safety barrier identifier associated with the safety barrier, the first binding authentication based on the password that user inputs Confidential information, binding logo symbol and the second binding authentication confidential information;(3)Created newly in the safety barrier list of bindings Record, and the safety barrier identifier, the first binding authentication confidential information are stored in the record;(4)By the binding Identifier and the second binding authentication confidential information are sent to the binding authentication module 5 in the safety barrier 2;(5)The safety The binding logo received symbol and the second binding authentication confidential information are stored in institute by the binding authentication module 5 in carrier 2 State in secure storage module 6.
Preferably, in security information interaction system disclosed in this invention, when the binding authentication operate it is successfully complete Into when the safety barrier 2 again connects to the safety information interactive terminal 1 bound in it afterwards, in the safety barrier 2 Binding authentication module 5 the safety information interactive terminal 1 will be recognized using the second binding authentication confidential information Card, and only after allowing between the safety barrier 2 and the safety information interactive terminal 1 in the case of certification is successful Continuous data communicate to perform the safety information interaction of correlation.
Preferably, in security information interaction system disclosed in this invention, the energy of safety information interactive terminal 1 Security context is enough provided(Such as SOS), and user inputs the bound secret under the security context, with And binding logo symbol and the second binding authentication confidential information are sent in the safety barrier 2 under the security context Binding authentication module 5.
Preferably, in security information interaction system disclosed in this invention, the safety information interactive terminal 1 with Following manner performs solution bindings:(1)Perform recognizing between the safety barrier 2 and the safety information interactive terminal 1 Card operation;(2)If certification success, prompts user to input the bound secret;(3)If the bound secret of user's input is just Really, then delete described in related binding logo symbol and the second binding authentication confidential information and the deletion in the safety barrier 2 The corresponding record in the safety barrier list of bindings in safety information interactive terminal 1.If in addition, because security is believed Breath interactive terminal is damaged and can not carry out unbinding operation, then can be by the service provider of safety barrier(That is the confession of safety barrier Answer business)Carry out unbinding operation for the safety barrier.
Exemplarily, in the first embodiment of security information interaction system disclosed in this invention, the safety Property information interactive terminal 1 be mobile terminal, and crucial binding authentication operating process is as follows:User inputs 6 bit digital passwords As bound secret, mobile terminal is using the password that user inputs as sequence number number, public private key pair corresponding to lookup(The public private key pair As binding authentication confidential information);Mobile terminal preserves private key, and public key is sent to safety barrier preservation;When safety barrier is with moving During dynamic terminal connection, mobile terminal is by the peculiar information of some safety barriers(As safety barrier sent in this dialogue it is random Number etc.)Safety barrier is sent to after carrying out private key encryption, safety barrier uses public key decryptions, the errorless then certification success of information.
Preferably, in security information interaction system disclosed in this invention, a safety barrier 2 can only be tied to one On individual safety information interactive terminal 1, and a safety information interactive terminal 1 can bind multiple safety barriers 2.
Alternately, in security information interaction system disclosed in this invention, a safety barrier 2 can only be tied to On one safety information interactive terminal 1, and a safety information interactive terminal 1 is also only capable of binding a safety barrier 2. In this case it is desirable to perform the mutual authentication process between safety barrier 2 and safety information interactive terminal 1.Can for this The scheme of replacement, in the exemplary second embodiment of the present invention, the safety information interactive terminal 1 is mobile whole End, and the critical process of the two-way authentication is as follows:User inputs 6 bit digital passwords will as bound secret, mobile terminal The password is converted to the binary data of 16 byte lengths and does XOR with specific 16 byte length data in mobile terminal, raw Into data be binding authentication confidential information, be stored in the secure storage areas of oneself and be sent to safety barrier and protected Deposit;When safety barrier is attached with mobile terminal again, mobile terminal uses symmetric encipherment algorithm 3DES, uses the binding The peculiar information that certification confidential information encryption safe carrier is sent(The random number that such as safety barrier is sent in this dialogue), Safety barrier is sent the result to, safety barrier is decrypted using the binding authentication confidential information of oneself storage, and information is errorless, recognizes Demonstrate,prove mobile terminal success;Mobile terminal certification safety barrier in the same way.
Therefore security information interaction system disclosed in this invention has following advantages:Machine card can kept Avoid safety barrier internal information maliciously to be read in the case of unauthorized in the case of separation, be so as to considerably improve The security of system.
As shown in figure 1, the invention discloses a kind of safety information interactive terminal 1, the safety information interactive terminal 1 Tying up for the safety barrier 2 is performed based on safety barrier list of bindings being established first after communication link with safety barrier 2 Determine authentication operation, and the result then operated according to the binding authentication performs related safety information interaction(Such as Payment transaction process in financial field).
Preferably, safety information interactive terminal 1 disclosed in this invention is tested before the binding authentication operation is performed Demonstrate,prove the legitimacy of the safety barrier 2, and only described in subsequent execution in the case that the result is " safety barrier is legal " Binding authentication operates.
Preferably, safety information interactive terminal 1 disclosed in this invention further comprises:Secure storage module 3 and tie up Determine authentication module 4.Wherein, the secure storage module 3 provides secure storage section to store the safety barrier list of bindings. The binding authentication module 4 is used to perform the binding authentication operation.
Preferably, in safety information interactive terminal 1 disclosed in this invention, in the safety barrier list of bindings Each record includes fields:Safety barrier identifier field and safety barrier confidential information field, wherein, the safety carries Body identifier field is used for the identifier for storing the safety barrier corresponding to the record, and the safety barrier confidential information field is used In the storage first binding authentication confidential information associated with the safety barrier.
Preferably, in safety information interactive terminal 1 disclosed in this invention, the binding authentication operation includes:(1) Binding authentication module 4 in the safety information interactive terminal 1 by with described in the data communication inquiry of the safety barrier 2 The binding logo symbol of safety barrier 2;(2)If it find that the safety barrier 2 is not tied up with any safety information interactive terminal It is fixed(Binding logo is not present to accord with), then prompt user to input bound secret, and it is defeated based on user by predetermined computing mode The password entered generates the safety barrier identifier associated with the safety barrier, the first binding authentication confidential information, binding logo Symbol and the second binding authentication confidential information;(3)Create new record in the safety barrier list of bindings, and by the safety Signal of carrier symbol, the first binding authentication confidential information are stored in the record;(4)Binding logo symbol and the second binding are recognized Card confidential information is sent to the safety barrier 2;(5)The safety barrier 2 stores the binding logo symbol that receives and the Two binding authentication confidential information.
Preferably, in safety information interactive terminal 1 disclosed in this invention, when the binding authentication operate it is successfully complete Into when the safety barrier 2 again connects to the safety information interactive terminal 1 afterwards, described in the use of safety barrier 2 Second binding authentication confidential information is authenticated to the safety information interactive terminal 1, and only in the successful situation of certification The lower follow-up data allowed between the safety barrier 2 and the safety information interactive terminal 1 communicate related to perform Safety information interaction.
Preferably, safety information interactive terminal 1 disclosed in this invention can provide security context(Such as safety operation System), and user inputs the bound secret under the security context, and by the binding under the security context Identifier and the second binding authentication confidential information are sent to the safety barrier 2.
Preferably, safety information interactive terminal 1 disclosed in this invention performs solution bindings as follows:(1) Perform the authentication operation between the safety barrier 2 and the safety information interactive terminal 1;(2)If certification success, is carried Show that user inputs the bound secret;(3)If the bound secret of user's input is correct, delete in the safety barrier 2 It is described in related binding logo symbol and the second binding authentication confidential information and the deletion safety information interactive terminal 1 Corresponding record in safety barrier list of bindings.If in addition, it can not be solved because safety information interactive terminal is damaged Tie up operation, then can be by the service provider of safety barrier(That is the supplier of safety barrier)Carry out the solution for the safety barrier Tie up operation.
As shown in figure 1, the invention discloses a kind of safety barrier 2, the safety barrier 2 is interacting eventually with safety information The safety information interactive terminal 1 is assisted to perform tying up for the safety barrier 2 after establishing communication link between end 1 first Determine authentication operation, and the result then operated according to the binding authentication performs related safety information interaction(Such as Payment transaction process in financial field).
Preferably, safety barrier 2 disclosed in this invention further comprises binding authentication module 5 and secure storage module 6. Wherein, the binding authentication module 5 is led to based on the data between the safety barrier 2 and the safety information interactive terminal 1 Letter assists to perform the binding authentication operation.The secure storage module 6 provides secure storage section to store binding authentication letter Breath, wherein, the binding authentication information includes binding logo symbol and binding authentication confidential information, and the binding logo symbol is and spy The associated unique mark of fixed binding relationship, and the binding authentication confidential information and the safety information interactive terminal Corresponding binding authentication confidential information is associated in 1.
Preferably, it is described after binding authentication operation successfully completes in safety barrier 2 disclosed in this invention When safety barrier 2 again connects to the safety information interactive terminal 1 bound in it, described in the use of binding authentication module 5 Binding authentication confidential information is authenticated to the safety information interactive terminal 1, and is permitted only in the case of certification is successful Perhaps the follow-up data between described safety barrier 2 and the safety information interactive terminal 1 communicate to perform related safety Property information interactive process.
Fig. 2 is the flow chart of safety information interaction method according to an embodiment of the invention.It is as shown in Fig. 2 of the invention Disclosed safety information interaction method comprises the following steps:(A1)Between safety barrier and safety information interactive terminal Communication link is established first;(A2)The safety information interactive terminal is based on the execution of safety barrier list of bindings and is directed to the peace The binding authentication operation of full carrier, and the result then operated according to the binding authentication performs related safety information and interacted Process(Such as the payment transaction process in financial field).
Preferably, in safety information interaction method disclosed in this invention, the step(A2)Further comprise: Before performing the binding authentication operation, the legitimacy of the safety barrier is verified in the safety information interactive terminal, and Only in the case where the result is " safety barrier is legal ", binding authentication described in subsequent execution operates.
Preferably, in safety information interaction method disclosed in this invention, in the safety barrier list of bindings Each record includes fields:Safety barrier identifier field and safety barrier confidential information field, wherein, the safety carries Body identifier field is used for the identifier for storing the safety barrier corresponding to the record, and the safety barrier confidential information field is used In the storage first binding authentication confidential information associated with the safety barrier.
Preferably, in safety information interaction method disclosed in this invention, the safety barrier 2 provides safe storage Region to store binding authentication information, wherein, the binding authentication information include binding logo symbol and the second binding authentication secret Information, binding logo symbol are the unique marks associated with specific binding relationship, and the second binding authentication machine Confidential information is associated with corresponding first binding authentication confidential information.
Preferably, in safety information interaction method disclosed in this invention, the binding authentication operation includes:(1) The safety information interactive terminal passes through the binding logo with safety barrier described in the data communication inquiry of the safety barrier 2 Symbol;(2)If it find that the safety barrier is not bound with any safety information interactive terminal(Binding logo is not present Symbol), then user is prompted to input bound secret, and the password generation inputted by predetermined computing mode based on user and the safety The associated safety barrier identifier of carrier, the first binding authentication confidential information, binding logo symbol and the second binding authentication secret Information;(3)New record is created in the safety barrier list of bindings, and the safety barrier identifier, first are bound Certification confidential information is stored in the record;(4)Binding logo symbol and the second binding authentication confidential information are sent to institute State safety barrier;(5)The binding logo symbol and the second binding authentication confidential information that the safety barrier storage receives.
Preferably, in safety information interaction method disclosed in this invention, the step(A2)Further comprise:When The safety information interaction that the safety barrier is again connected to bound in it after the binding authentication operation successfully completes is whole During end, the safety barrier is recognized the safety information interactive terminal using the second binding authentication confidential information Card, and only allow in the case of certification is successful it is follow-up between the safety barrier and the safety information interactive terminal Data communicate with perform correlation safety information interaction.
Preferably, in safety information interaction method disclosed in this invention, safety information interactive terminal energy Security context is enough provided(Such as SOS), and user inputs the bound secret under the security context, with And binding logo symbol and the second binding authentication confidential information are sent to the safety barrier under the security context.
Preferably, in safety information interaction method disclosed in this invention, solution bindings are performed as follows: (1)Perform the authentication operation between the safety barrier and the safety information interactive terminal;(2)If certification success, User is prompted to input the bound secret;(3)If the bound secret of user's input is correct, delete in the safety barrier It is described in related binding logo symbol and the second binding authentication confidential information and the deletion safety information interactive terminal Corresponding record in safety barrier list of bindings.If in addition, it can not be solved because safety information interactive terminal is damaged Tie up operation, then can be by the service provider of safety barrier(That is the supplier of safety barrier)Carry out the solution for the safety barrier Tie up operation.
Exemplarily, in the first embodiment of safety information interaction method disclosed in this invention, the safety Property information interactive terminal be mobile terminal, and crucial binding authentication operating process is as follows:User inputs 6 bit digital passwords and made For bound secret, mobile terminal is using the password that user inputs as sequence number number, public private key pair corresponding to lookup(The public private key pair is For binding authentication confidential information);Mobile terminal preserves private key, and public key is sent to safety barrier preservation;When safety barrier and movement When terminal connects, mobile terminal is by the peculiar information of some safety barriers(The random number sent such as safety barrier in this dialogue Deng)Safety barrier is sent to after carrying out private key encryption, safety barrier uses public key decryptions, the errorless then certification success of information.
Preferably, in safety information interaction method disclosed in this invention, a safety barrier can only be tied to one On individual safety information interactive terminal, and a safety information interactive terminal can bind multiple safety barriers.
Alternately, in safety information interaction method disclosed in this invention, a safety barrier can only be tied to On one safety information interactive terminal, and a safety information interactive terminal is also only capable of binding a safety barrier. In this case, need to perform the mutual authentication process between safety barrier and safety information interactive terminal.It is alternative for this Scheme, in the exemplary second embodiment of safety information interaction method disclosed in this invention, the security Information interactive terminal is mobile terminal, and the critical process of the two-way authentication is as follows:User inputs 6 bit digital password conducts Bound secret, mobile terminal by the password be converted to 16 byte lengths binary data and with specific 16 word in mobile terminal Section length data does XOR, and the data of generation are binding authentication confidential information, is stored in the secure storage areas of oneself concurrent Safety barrier is sent to be preserved;When safety barrier is attached with mobile terminal again, mobile terminal uses symmetric cryptography Algorithm 3DES, the peculiar information sent using the binding authentication confidential information encryption safe carrier(As safety barrier is right at this Random number sent in words etc.), safety barrier is sent the result to, safety barrier is believed using the binding authentication secret of oneself storage Breath decryption, the errorless then certification mobile terminal success of information;Mobile terminal certification safety barrier in the same way.
Therefore safety information interaction method disclosed in this invention has following advantages:Machine card can kept Avoid safety barrier internal information maliciously to be read in the case of unauthorized in the case of separation, be so as to considerably improve The security of system.
Although the present invention is described by above-mentioned preferred embodiment, its way of realization is not limited to Above-mentioned embodiment.It should be realized that:In the case where not departing from spirit and scope of the present invention, those skilled in the art can be with Different change and modifications is made to the present invention.

Claims (9)

1. a kind of safety information interaction method, the safety information interaction method comprises the following steps:
(A1)Communication link is established first between safety barrier and safety information interactive terminal;
(A2)The safety information interactive terminal performs the binding for the safety barrier based on safety barrier list of bindings Authentication operation, and the result then operated according to the binding authentication performs related safety information interaction, wherein, institute Stating binding authentication operation includes:(1)The safety information interactive terminal passes through the data communication inquiry with the safety barrier The binding logo symbol of the safety barrier;(2)If it find that the safety barrier not with any safety information interactive terminal Binding, then user is prompted to input bound secret, and the password generation inputted by predetermined computing mode based on user and the peace The associated safety barrier identifier of full carrier, the first binding authentication confidential information, binding logo symbol and the second binding authentication machine Confidential information;(3)New record is created in the safety barrier list of bindings, and the safety barrier identifier, first are tied up Determine certification confidential information to be stored in the record;(4)Binding logo symbol and the second binding authentication confidential information are sent to The safety barrier;(5)The binding logo symbol and the second binding authentication confidential information that the safety barrier storage receives,
Wherein, the binding logo symbol is the unique mark associated with specific binding relationship, and second binding is recognized Card confidential information is associated with corresponding first binding authentication confidential information,
Wherein, solution bindings are performed as follows:
(1)Perform the authentication operation between the safety barrier and the safety information interactive terminal;(2)If certification into Work(, then user is prompted to input the bound secret;(3)If the bound secret of user's input is correct, deletes the safety and carry In related binding logo symbol and the second binding authentication confidential information and the deletion safety information interactive terminal in body The safety barrier list of bindings in corresponding record,
Wherein, a safety barrier can only be tied on a safety information interactive terminal, and a safety information interaction Terminal can bind multiple safety barriers.
2. safety information interaction method according to claim 1, it is characterised in that the step(A2)Further bag Include:Before the binding authentication operation is performed, the legitimacy of the safety barrier is verified in the safety information interactive terminal, And only in the case where the result is " safety barrier is legal ", binding authentication described in subsequent execution operates.
3. safety information interaction method according to claim 2, it is characterised in that in the safety barrier list of bindings Each record include fields:Safety barrier identifier field and safety barrier confidential information field, wherein, the safety Signal of carrier symbol field is used for the identifier for storing the safety barrier corresponding to the record, the safety barrier confidential information field For storing the first binding authentication confidential information associated with the safety barrier.
4. safety information interaction method according to claim 3, it is characterised in that the safety barrier provides safety and deposited Storage area domain to store binding authentication information, wherein, the binding authentication information include binding logo symbol and the second binding authentication machine Confidential information.
5. safety information interaction method according to claim 4, it is characterised in that the step(A2)Further bag Include:The safety information that the safety barrier is again connected to bound in it after binding authentication operation successfully completes is handed over During mutual terminal, the safety barrier is carried out using the second binding authentication confidential information to the safety information interactive terminal Certification, and only after allowing between the safety barrier and the safety information interactive terminal in the case of certification is successful Continuous data communicate to perform the safety information interaction of correlation.
6. safety information interaction method according to claim 5, it is characterised in that the safety information interactive terminal Security context can be provided, and user inputs the bound secret under the security context, and in the security context It is lower that binding logo symbol and the second binding authentication confidential information are sent to the safety barrier.
7. a kind of security information interaction system, the security information interaction system includes safety information interactive terminal and peace Full carrier, wherein, it is described after establishing communication link first between the safety barrier and the safety information interactive terminal Safety information interactive terminal is operated based on binding authentication of the safety barrier list of bindings execution for the safety barrier, and with The result operated afterwards according to the binding authentication performs related safety information interaction,
Wherein, the binding authentication operation includes:(1)The safety information interactive terminal passes through the number with the safety barrier Accorded with according to the binding logo of safety barrier described in communication inquiry;(2)If it find that the safety barrier is not believed with any security Interactive terminal binding is ceased, then prompts user to input bound secret, and the password inputted by predetermined computing mode based on user The generation safety barrier identifier associated with the safety barrier, the first binding authentication confidential information, binding logo symbol and second Binding authentication confidential information;(3)New record is created in the safety barrier list of bindings, and the safety barrier is identified Symbol, the first binding authentication confidential information are stored in the record;(4)By binding logo symbol and the second binding authentication secret letter Breath is sent to the safety barrier;(5)The binding logo symbol and the second binding authentication that the safety barrier storage receives Confidential information,
Wherein, the binding logo symbol is the unique mark associated with specific binding relationship, and second binding is recognized Card confidential information is associated with corresponding first binding authentication confidential information,
Wherein, solution bindings are performed as follows:
(1)Perform the authentication operation between the safety barrier and the safety information interactive terminal;(2)If certification into Work(, then user is prompted to input the bound secret;(3)If the bound secret of user's input is correct, deletes the safety and carry In related binding logo symbol and the second binding authentication confidential information and the deletion safety information interactive terminal in body The safety barrier list of bindings in corresponding record,
Wherein, a safety barrier can only be tied on a safety information interactive terminal, and a safety information interaction Terminal can bind multiple safety barriers.
8. a kind of safety information interactive terminal, communication chain is being established in the safety information interactive terminal first with safety barrier The binding authentication operation for the safety barrier is performed based on safety barrier list of bindings behind road, and then according to the binding The result of authentication operation performs related safety information interaction,
Wherein, the binding authentication operation includes:(1)The safety information interactive terminal passes through the number with the safety barrier Accorded with according to the binding logo of safety barrier described in communication inquiry;(2)If it find that the safety barrier is not believed with any security Interactive terminal binding is ceased, then prompts user to input bound secret, and the password inputted by predetermined computing mode based on user The generation safety barrier identifier associated with the safety barrier, the first binding authentication confidential information, binding logo symbol and second Binding authentication confidential information;(3)New record is created in the safety barrier list of bindings, and the safety barrier is identified Symbol, the first binding authentication confidential information are stored in the record;(4)By binding logo symbol and the second binding authentication secret letter Breath is sent to the safety barrier;(5)The binding logo symbol and the second binding authentication that the safety barrier storage receives Confidential information,
Wherein, the binding logo symbol is the unique mark associated with specific binding relationship, and second binding is recognized Card confidential information is associated with corresponding first binding authentication confidential information,
Wherein, solution bindings are performed as follows:
(1)Perform the authentication operation between the safety barrier and the safety information interactive terminal;(2)If certification into Work(, then user is prompted to input the bound secret;(3)If the bound secret of user's input is correct, deletes the safety and carry In related binding logo symbol and the second binding authentication confidential information and the deletion safety information interactive terminal in body The safety barrier list of bindings in corresponding record,
Wherein, a safety barrier can only be tied on a safety information interactive terminal, and a safety information interaction Terminal can bind multiple safety barriers.
9. a kind of safety barrier, the safety barrier is assisted after establishing communication link first between safety information interactive terminal The safety information interactive terminal is helped to perform the binding authentication operation for the safety barrier, and then according to the binding The result of authentication operation performs related safety information interaction,
Wherein, the binding authentication operation includes:(1)The safety information interactive terminal passes through the number with the safety barrier Accorded with according to the binding logo of safety barrier described in communication inquiry;(2)If it find that the safety barrier is not believed with any security Interactive terminal binding is ceased, then prompts user to input bound secret, and the password inputted by predetermined computing mode based on user The generation safety barrier identifier associated with the safety barrier, the first binding authentication confidential information, binding logo symbol and second Binding authentication confidential information;(3)New record is created in the safety barrier list of bindings, and the safety barrier is identified Symbol, the first binding authentication confidential information are stored in the record;(4)By binding logo symbol and the second binding authentication secret letter Breath is sent to the safety barrier;(5)The binding logo symbol and the second binding authentication that the safety barrier storage receives Confidential information,
Wherein, the binding logo symbol is the unique mark associated with specific binding relationship, and second binding is recognized Card confidential information is associated with corresponding first binding authentication confidential information,
Wherein, solution bindings are performed as follows:
(1)Perform the authentication operation between the safety barrier and the safety information interactive terminal;(2)If certification into Work(, then user is prompted to input the bound secret;(3)If the bound secret of user's input is correct, deletes the safety and carry In related binding logo symbol and the second binding authentication confidential information and the deletion safety information interactive terminal in body The safety barrier list of bindings in corresponding record,
Wherein, a safety barrier can only be tied on a safety information interactive terminal, and a safety information interaction Terminal can bind multiple safety barriers.
CN201310222736.9A 2013-06-06 2013-06-06 Security information interaction system, apparatus and method Active CN104243152B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310222736.9A CN104243152B (en) 2013-06-06 2013-06-06 Security information interaction system, apparatus and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310222736.9A CN104243152B (en) 2013-06-06 2013-06-06 Security information interaction system, apparatus and method

Publications (2)

Publication Number Publication Date
CN104243152A CN104243152A (en) 2014-12-24
CN104243152B true CN104243152B (en) 2018-01-12

Family

ID=52230563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310222736.9A Active CN104243152B (en) 2013-06-06 2013-06-06 Security information interaction system, apparatus and method

Country Status (1)

Country Link
CN (1) CN104243152B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1798437A (en) * 2004-12-28 2006-07-05 华为技术有限公司 Method for validating security of mobile terminal in CDMA network
CN101330387A (en) * 2008-07-24 2008-12-24 深圳华为通信技术有限公司 Method for authentication of machine card, communication apparatus and authentication system
CN101465019A (en) * 2009-01-14 2009-06-24 北京华大智宝电子系统有限公司 Method and system for implementing network authentication
CN101610241A (en) * 2008-06-16 2009-12-23 华为技术有限公司 A kind of mthods, systems and devices of binding authentication
CN101931941A (en) * 2010-09-26 2010-12-29 联通兴业科贸有限公司 Method and system for authentication/binding of telecom smart card and mobile terminal
CN102257790A (en) * 2009-11-26 2011-11-23 华为技术有限公司 Method, system and device for user dial authentication
CN102404113A (en) * 2010-09-08 2012-04-04 中国银联股份有限公司 Method and system both for safety information interaction
CN102833067A (en) * 2011-06-15 2012-12-19 中兴通讯股份有限公司 Trilateral authentication method and system and authentication state management method of terminal equipment
CN102833068A (en) * 2011-06-15 2012-12-19 中兴通讯股份有限公司 Method for bidirectional authentication of terminal and smart card, protocol and smart card
CN102843669A (en) * 2012-08-17 2012-12-26 中兴通讯股份有限公司 Data access method and device
US8380819B2 (en) * 2009-05-14 2013-02-19 Avaya Inc. Method to allow seamless connectivity for wireless devices in DHCP snooping/dynamic ARP inspection/IP source guard enabled unified network

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1798437A (en) * 2004-12-28 2006-07-05 华为技术有限公司 Method for validating security of mobile terminal in CDMA network
CN101610241A (en) * 2008-06-16 2009-12-23 华为技术有限公司 A kind of mthods, systems and devices of binding authentication
CN101330387A (en) * 2008-07-24 2008-12-24 深圳华为通信技术有限公司 Method for authentication of machine card, communication apparatus and authentication system
CN101465019A (en) * 2009-01-14 2009-06-24 北京华大智宝电子系统有限公司 Method and system for implementing network authentication
US8380819B2 (en) * 2009-05-14 2013-02-19 Avaya Inc. Method to allow seamless connectivity for wireless devices in DHCP snooping/dynamic ARP inspection/IP source guard enabled unified network
CN102257790A (en) * 2009-11-26 2011-11-23 华为技术有限公司 Method, system and device for user dial authentication
CN102404113A (en) * 2010-09-08 2012-04-04 中国银联股份有限公司 Method and system both for safety information interaction
CN101931941A (en) * 2010-09-26 2010-12-29 联通兴业科贸有限公司 Method and system for authentication/binding of telecom smart card and mobile terminal
CN102833067A (en) * 2011-06-15 2012-12-19 中兴通讯股份有限公司 Trilateral authentication method and system and authentication state management method of terminal equipment
CN102833068A (en) * 2011-06-15 2012-12-19 中兴通讯股份有限公司 Method for bidirectional authentication of terminal and smart card, protocol and smart card
CN102843669A (en) * 2012-08-17 2012-12-26 中兴通讯股份有限公司 Data access method and device

Also Published As

Publication number Publication date
CN104243152A (en) 2014-12-24

Similar Documents

Publication Publication Date Title
US10135614B2 (en) Integrated contactless MPOS implementation
JP5959410B2 (en) Payment method, payment server for executing the method, program for executing the method, and system for executing the same
EP3794491A1 (en) Systems, methods, and devices for secure blockchain transaction and subnetworks
CN101448001B (en) System for realizing WAP mobile banking transaction security control and method thereof
US10791106B2 (en) Digital credential with embedded authentication instructions
CN106789018A (en) Secret key remote acquisition methods and device
RU2560810C2 (en) Method and system for protecting information from unauthorised use (versions thereof)
CN107784499B (en) Secure payment system and method of near field communication mobile terminal
US20200342459A1 (en) Trusted customer identity systems and methods
CN107423964A (en) A kind of online payment method, apparatus and system
CN102930435A (en) Authentication method and system for mobile payment
CN106936774A (en) Authentication method and system in credible performing environment
CN102202300A (en) System and method for dynamic password authentication based on dual channels
CN101399666A (en) Safety control method and system for digital certificate of file
CN106845304A (en) A kind of method and system for realizing reader and smart-tag authentication in rfid system
CN111131416A (en) Business service providing method and device, storage medium and electronic device
Alpár et al. Using NFC phones for proving credentials
CN104683109A (en) RFID authentication system and authentication method based on position privacy cloud
US20200244457A1 (en) Blockchain intelligent security implementation
CN110278180A (en) Exchange method, device, equipment and the storage medium of Financial Information
CN109711824A (en) Resource transfers method, apparatus, computer equipment and storage medium
CN105682092B (en) Bidirectional authentication method based on short-distance wireless communication technology
CN102693478A (en) Trading method of bid security during bidding procedure and system thereof
CA3239475A1 (en) Key recovery based on contactless card authentication
CN114143312A (en) Block chain-based edge computing terminal authentication method, system and equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant