CN104243162B - A kind of information interacting method, system and intelligent cipher key equipment - Google Patents

A kind of information interacting method, system and intelligent cipher key equipment Download PDF

Info

Publication number
CN104243162B
CN104243162B CN201410409471.8A CN201410409471A CN104243162B CN 104243162 B CN104243162 B CN 104243162B CN 201410409471 A CN201410409471 A CN 201410409471A CN 104243162 B CN104243162 B CN 104243162B
Authority
CN
China
Prior art keywords
key
intelligent cipher
data
server
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410409471.8A
Other languages
Chinese (zh)
Other versions
CN104243162A (en
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Priority to CN201410409471.8A priority Critical patent/CN104243162B/en
Publication of CN104243162A publication Critical patent/CN104243162A/en
Application granted granted Critical
Publication of CN104243162B publication Critical patent/CN104243162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention provides a kind of information interacting method, system and intelligent cipher key equipment, wherein, information interacting method includes:Server and intelligent cipher key equipment conversate key agreement operation, if success, server generates the first session key, and intelligent cipher key equipment generates the second session key, and the first session key and the second session key are key pair;Server by utilizing the first session key transaction data, encrypting transactions data is generated, encrypting transactions data is sent to terminal;Terminal receives encrypting transactions data, and encrypting transactions data is sent to intelligent cipher key equipment;Intelligent cipher key equipment receives encrypting transactions data, and encrypting transactions data is decrypted operation using the second session key, obtains transaction data, processing transaction data obtains transaction key message, and transaction key message is sent to terminal;Terminal receives and shows transaction key message, obtains after confirming instruction, generates confirmation, and will confirm that information is sent to intelligent cipher key equipment.

Description

A kind of information interacting method, system and intelligent cipher key equipment
Technical field
The present invention relates to a kind of electronic technology field, more particularly to a kind of information interacting method, system and intelligent key to set It is standby.
Background technology
In recent years, with the fast development of internet and finance informationalizing, Web bank with its facility, it is efficient the advantages that Rapid while obtain the generally high praise of user and bank's industry, transaction security problem also becomes increasingly conspicuous, and therefore, ensures transaction peace Full preferred mode is to use electronic key equipment while using Web bank, and at present, electronic key equipment can be intelligence Energy key devices, such as USB-KEY, audio KEY or bluetooth KEY or smart card, such as IC-card.Come from technical standpoint See, intelligent cipher key equipment be for sign electronically and data authentication instrument, its built-in miniature safety chip, using key algorithm Transaction data is encrypted, decrypted and digital signature, it is ensured that the confidentiality of online transaction, authenticity, integrality and could not Recognizing property.In intelligent cipher key equipment, private key that safety chip memory storage is generated by asymmetric key algorithm, the private key has can not Derived characteristic, the uniqueness and security of private key are ensured, the public key generated based on same algorithm, be then stored in bank's clothes It is engaged in device, the transaction data to be signed to intelligent cipher key equipment carries out sign test operation, and sign test is by then meaning transaction data It is authentic and valid, and then complete transaction.
In order to further ensure that the transaction data that user is signed using electronic key instrument is real not tampered number According to existing intelligent cipher key equipment typically can further set display screen and acknowledgement key, and transaction data is shown by display screen, use Read transaction data in family, it is believed that transaction data it is true it is errorless after, acknowledgement key can be pressed, indicating intelligent key devices are believed the transaction Breath carries out signature operation.But now, it is with increasingly raising of the user to the attention degree of transaction security, it is necessary to close using intelligence The transaction of key equipment is more and more, and the requirement of portability and property easy to use to intelligent cipher key equipment also improves therewith, The factor for influenceing the portability of intelligent cipher key equipment is the volume of the equipment, influences the principal element of the volume of intelligent cipher key equipment As display screen and acknowledgement key, and the factor for influenceing the property easy to use of intelligent cipher key equipment is needed at end to complete once transaction Dual operation is carried out on end and intelligent cipher key equipment.If removing display screen and acknowledgement key, it can effectively reduce intelligent key and set Standby volume, but intelligent cipher key equipment can not show transaction data, and terminal obtains transaction data in plain text and shown, if terminal is hacked Visitor's attack is infected and has distorted transaction data, then user can not know that transaction data is tampered, and can not also obtain true Real transaction data, user based on terminal show be tampered after transaction data carry out confirming to operate when, intelligent cipher key equipment The signature substantially carried out to illegal transaction data, causes the loss of user's property.Therefore, how one kind side is provided Method or system, terminal can not distort to transaction data in process of exchange, Transaction Safety, while simplify user and handing over Easily in operating process and reduce the volume of intelligent cipher key equipment, be this area technical problem urgently to be resolved hurrily.
The content of the invention
Present invention seek to address that one of above mentioned problem.
It is a primary object of the present invention to provide a kind of information interacting method, it is characterised in that:
Server and intelligent cipher key equipment conversate key agreement operation, if success, the server generation first Session key, the intelligent cipher key equipment generate the second session key, first session key and second session key For key pair;
First session key transaction data described in the server by utilizing, encrypting transactions data is generated, described will added Close transaction data is sent to terminal;
The terminal receives the encrypting transactions data, and the encrypting transactions data is sent to the intelligent key and set It is standby;
The intelligent cipher key equipment receives the encrypting transactions data, and using second session key to the encryption Operation is decrypted in transaction data, obtains the transaction data, handles the transaction data and obtains transaction key message, and by institute Transaction key message is stated to send to the terminal;
The terminal receives and shows the transaction key message, obtains after confirming instruction, generates confirmation, and by institute Confirmation is stated to send to the intelligent cipher key equipment.
In addition, the server and intelligent cipher key equipment conversate before key agreement operation, in addition to:The terminal The transaction prompt information that the server is sent is received, display input password prompt information, password is received and sends out the password Deliver to the intelligent cipher key equipment;The intelligent cipher key equipment receives the password and verifies whether the password is correct, if Correctly, then the intelligent cipher key equipment and the server conversate key agreement operation.
In addition, described send the confirmation to the intelligent cipher key equipment, in addition to:The intelligent key After equipment receives the confirmation, ciphering signature data are sent to the terminal, wherein, the ciphering signature data are intelligence Energy key devices are obtained using the second session key signed data, and the signed data is that the intelligent key is set It is standby that what is obtained is signed to the transaction data.
The key agreement operation in addition, the server and intelligent cipher key equipment conversate, including:The intelligent key is set The first random number of standby generation, and first random number and the first preset algorithm identification information are sent to the terminal;It is described Terminal receives first random number and the first preset algorithm identification information, and by first random number and described first Preset algorithm identification information is sent to the server;The server receives first random number and the described first pre- imputation Method identification information, whether supported and the described first pre- imputation according to server described in the first preset algorithm identification information judgment First preset algorithm corresponding to method identification information, if it is, the server generate the second random number, and by described second with Machine number is sent to the terminal with server certificate;The terminal receives second random number and the server certificate, and Second random number and the server certificate are sent to the intelligent cipher key equipment;The intelligent cipher key equipment receives institute The second random number and the server certificate are stated, verifies the server certificate, if random by checking, generation the 3rd Number, the server public key in the server certificate is extracted, and using the server public key according to first preset algorithm Encrypt the first encryption information of the 3rd generating random number, using the intelligent cipher key equipment private key to first random number with Second random number is signed to obtain the first signed data, and the intelligent cipher key equipment certificate, described first are encrypted Information is sent to the terminal with first signed data;The terminal receives the intelligent cipher key equipment certificate, described the One encryption information and first signed data, and by the intelligent cipher key equipment certificate, first encryption information with it is described First signed data is sent to the server;The server receives the intelligent cipher key equipment certificate, first encryption Information and first signed data, verify the intelligent cipher key equipment certificate, if be proved to be successful, it is close to extract the intelligence Intelligent cipher key equipment public key in key device certificate, first signed data is carried out using the intelligent cipher key equipment public key Sign test operates, and after sign test success, is believed using the privacy key according to first preset algorithm decryption, first encryption Breath obtains the 3rd random number, generates the first handshaking information, and first handshaking information is sent to the terminal;It is described Terminal receives first handshaking information, and first handshaking information is sent to the intelligent cipher key equipment;The intelligence Key devices receive first handshaking information, and verification operation is carried out to first handshaking information, and the is generated after being proved to be successful Two handshaking informations, second handshaking information is sent to the terminal, and it is random to described first according to the second preset algorithm Several, described second random number carries out computing with the 3rd random number and generates second session key;The terminal receives institute The second handshaking information is stated, and second handshaking information is sent to the server;The server receives described second and held Hand information, verification operation is carried out to second handshaking information, after being proved to be successful, according to second preset algorithm to described the One random number, second random number carry out computing with the 3rd random number and generate first session key.
Another aspect of the present invention also provides a kind of information interaction system, it is characterised in that including intelligent cipher key equipment, terminal And server,
The intelligent cipher key equipment, for being conversated key agreement operation with the server, if success, generate the Two session keys, the encrypting transactions data that receiving terminal is sent, and using second session key to the encryption number of deals According to operation is decrypted, the transaction data is obtained, the transaction data is handled and obtains transaction key message, and by the transaction Key message sends and to the terminal, receives the confirmation that the terminal is sent;
The terminal, the encrypting transactions data sent for receiving the server, the encrypting transactions data is sent To the intelligent cipher key equipment, receive and show the transaction key message, obtain after confirming instruction, generate the confirmation letter Breath, and the confirmation is sent to the intelligent cipher key equipment;
The server, for being conversated key agreement operation with the intelligent cipher key equipment, if success, generate the One session key, using the first session key transaction data, encrypting transactions data is generated, by the encryption number of deals According to transmission to terminal.
In addition, the terminal, is additionally operable to, the transaction prompt information that the server is sent is received, display input password carries Show information, receive password and send the password to the intelligent cipher key equipment;The intelligent cipher key equipment, is additionally operable to, and connects Receive the password and verify whether the password correct, if correctly, with the server conversate key agreement operation.
In addition, the intelligent cipher key equipment, is additionally operable to after receiving the confirmation, ciphering signature data are sent to institute Terminal is stated, wherein, the ciphering signature data are that intelligent cipher key equipment is obtained using the second session key signed data Arrive, the signed data intelligent cipher key equipment is signed to obtain to the transaction data;The terminal, is also used In the reception ciphering signature data.
In addition, the intelligent cipher key equipment, is additionally operable to, the first random number is generated, and by first random number and first Preset algorithm identification information is sent to the terminal, is received the second random number and server certificate, is verified the server certificate, If by checking, the 3rd random number is generated, extracts the server public key in the server certificate, and utilize the service Device public key encrypts the first encryption information of the 3rd generating random number according to the first preset algorithm, utilizes the intelligent cipher key equipment Private key is signed to obtain the first signed data to first random number and second random number, and by the intelligent key Device certificate, first encryption information and first signed data are sent to the terminal, receive the first handshaking information, right First handshaking information carries out verification operation, and the second handshaking information is generated after being proved to be successful, and second handshaking information is sent out The terminal is delivered to, and it is random to first random number, second random number and the described 3rd according to the second preset algorithm Number carries out computing and generates second session key;The terminal, is additionally operable to, and receives first random number and described first pre- Imputation method identification information, and first random number and the first preset algorithm identification information are sent to the server, Second random number and the server certificate are received, and second random number and the server certificate are sent to institute Intelligent cipher key equipment is stated, receives the intelligent cipher key equipment certificate, first encryption information and first signed data, and The intelligent cipher key equipment certificate, first encryption information and first signed data are sent to the server, connect First handshaking information is received, and first handshaking information is sent to the intelligent cipher key equipment, described second is received and holds Hand information, and second handshaking information is sent to the server;The server, is additionally operable to, receive described first with Machine number and the first preset algorithm identification information, according to server described in the first preset algorithm identification information judgment whether First preset algorithm corresponding with the first preset algorithm identification information is supported, if it is, the server generates Second random number, and second random number and the server certificate are sent to the terminal;Receive the intelligence Key devices certificate, first encryption information and first signed data, verify the intelligent cipher key equipment certificate, if It is proved to be successful, then extracts the intelligent cipher key equipment public key in the intelligent cipher key equipment certificate, utilize the intelligent cipher key equipment Public key carries out sign test operation to first signed data, after sign test success, using the privacy key according to described first Preset algorithm decrypts first encryption information and obtains the 3rd random number, generates first handshaking information, and by described in First handshaking information is sent to the terminal, receives second handshaking information, checking behaviour is carried out to second handshaking information Make, after being proved to be successful, according to second preset algorithm to first random number, second random number with the described 3rd with Machine number carries out computing and generates first session key.
The present invention provides a kind of intelligent cipher key equipment again, it is characterised in that the equipment is given birth to including at least the second session key Into module, the first receiving module, parsing module, the first sending module, the second receiving module and security module, wherein,
First receiving module, the encrypting transactions data sent for receiving terminal, sends to the security module, its In, the encrypting transactions data is server to conversate after key agreement operates successfully with the intelligent cipher key equipment, institute State server and generate the first session key, the encryption number of deals is generated using the first session key transaction data According to, and the encrypting transactions data is sent to the terminal;
Second session secret key generating module, it is close for being conversated in the intelligent cipher key equipment with the server After the success of key negotiation, the second session key is generated, second session key is sent to the security module, wherein, First session key and second session key are key pair;
The security module, for receiving the encrypting transactions data and second session key, utilize described second Session key decrypts the encrypting transactions data, obtains transaction data, the transaction data is sent to the parsing module, connect Receive the confirmation;
The parsing module, for parsing the transaction data, obtain transaction critical data and send to the described first hair Send module;
First sending module, for by it is described transaction critical data outgoing;
Second receiving module, for receiving the confirmation and sending to the security module.
In addition, the equipment also includes the second sending module, the security module, it is additionally operable to receive the confirmation Afterwards, ciphering signature data are sent to the second sending module, wherein, the ciphering signature data utilize institute for the security module State what the second session key signed data obtained, the signed data is that the security module is carried out to the transaction data What signature obtained;Second sending module, for receiving the ciphering signature data and outgoing.
As seen from the above technical solution provided by the invention, a kind of information interacting method provided by the invention and it is System, session key signed data is used using session key transaction data and intelligent cipher key equipment by server, Ensure that transaction data and signed data can only be obtained by server and intelligent cipher key equipment, terminal can only transmit encryption number of deals According to ciphering signature data, transaction data and signed data can not be distorted, ensure transaction security, in transaction flow In, transaction also need to be only confirmed in terminal, without carrying out secondary-confirmation on intelligent cipher key equipment, improves transaction flow just Victory, the intelligent cipher key equipment in this method and system need not set display screen and acknowledgement key, improve intelligent cipher key equipment Portability.Session key decryption encrypting transactions data can be used in intelligent cipher key equipment provided by the invention, obtains transaction data, and And send transaction critical data to terminal, transaction critical data is shown by terminal, user is participated in using the intelligent cipher key equipment During online transaction, it is only necessary to operated in terminal, improve the convenience of transaction, and the intelligent cipher key equipment is without set key Disk and display, the volume of intelligent cipher key equipment is reduced, improve the portability of equipment.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this For the those of ordinary skill in field, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is the flow chart for the information interacting method that the embodiment of the present invention 1 provides;
Fig. 2 is the structural representation for the information interaction system that the embodiment of the present invention 2 provides;
Fig. 3 is the intelligent cipher key equipment structural representation that the embodiment of the present invention 3 provides.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this The embodiment of invention, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to protection scope of the present invention.
In the description of the invention, it is to be understood that term " " center ", " longitudinal direction ", " transverse direction ", " on ", " under ", The orientation or position relationship of the instruction such as "front", "rear", "left", "right", " vertical ", " level ", " top ", " bottom ", " interior ", " outer " are Based on orientation shown in the drawings or position relationship, it is for only for ease of the description present invention and simplifies description, rather than instruction or dark Show that the device of meaning or element there must be specific orientation, with specific azimuth configuration and operation, thus it is it is not intended that right The limitation of the present invention.In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint are relative Importance or quantity or position.
In the description of the invention, it is necessary to illustrate, unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;Can To be mechanical connection or electrical connection;Can be joined directly together, can also be indirectly connected by intermediary, Ke Yishi The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with accompanying drawing.
Embodiment 1
In the present embodiment, intelligent cipher key equipment can be USB-KEY, audio KEY, bluetooth KEY or have signature function Smart card etc..Terminal can be that mobile phone or PC etc. can be with the equipment of server communication.Server can be bank's background service Device.The connection of intelligent cipher key equipment and terminal can be that contact (is such as connected, USB interface connects or DOCK by COBBAIF Interface connects) can also be contactless (such as being connected by way of infrared, bluetooth, WIFI or NFC), terminal and server Information exchange can also be wirelessly by wired mode.
Fig. 1 is a kind of schematic flow sheet of the embodiment of information interacting method provided by the invention.Method shown in Fig. 1 is real Example is applied, is comprised the following steps:
Step S101, server and intelligent cipher key equipment conversate key agreement operation, if success, the server The first session key is generated, the intelligent cipher key equipment generates the second session key, first session key and described second Session key is key pair;
Further, before this step, the terminal can receive the transaction prompt information that the server is sent, display Password prompt information is inputted, password is received and sends the password to the intelligent cipher key equipment;The intelligent cipher key equipment Receive the password and verify whether the password is correct, if correctly, the intelligent cipher key equipment enters with the server Row session key agreement operates.
Further, in this step, the server and intelligent cipher key equipment conversate key agreement operation, including: The intelligent cipher key equipment generates the first random number, and by first random number and the first preset algorithm identification information send to The terminal;The terminal receives first random number and the first preset algorithm identification information, and by described first with Machine number is sent to the server with the first preset algorithm identification information;The server receive first random number with The first preset algorithm identification information, according to server described in the first preset algorithm identification information judgment whether support with First preset algorithm corresponding to the first preset algorithm identification information, if it is, the server generates the second random number, And second random number and server certificate are sent to the terminal;The terminal receive second random number with it is described Server certificate, and second random number and the server certificate are sent to the intelligent cipher key equipment;The intelligence Key devices receive second random number and the server certificate, verify the server certificate, if by verifying, The 3rd random number is generated, extracts the server public key in the server certificate, and using the server public key according to First preset algorithm encrypts the first encryption information of the 3rd generating random number, using the intelligent cipher key equipment private key to described First random number and second random number are signed to obtain the first signed data, and by the intelligent cipher key equipment certificate, First encryption information is sent to the terminal with first signed data;The terminal receives the intelligent cipher key equipment Certificate, first encryption information and first signed data, and the intelligent cipher key equipment certificate, described first are encrypted Information is sent to the server with first signed data;The server receives the intelligent cipher key equipment certificate, institute The first encryption information and first signed data are stated, the intelligent cipher key equipment certificate is verified, if be proved to be successful, extracts Intelligent cipher key equipment public key in the intelligent cipher key equipment certificate, signed using the intelligent cipher key equipment public key to described first Name data carry out sign test operation, after sign test success, using the privacy key according to first preset algorithm decryption First encryption information obtains the 3rd random number, generates the first handshaking information, and first handshaking information is sent to institute State terminal;The terminal receives first handshaking information, and first handshaking information is sent to the intelligent key and set It is standby;The intelligent cipher key equipment receives first handshaking information, carries out verification operation to first handshaking information, verifies into The second handshaking information is generated after work(, second handshaking information is sent to the terminal, and according to the second preset algorithm to institute State the first random number, second random number carries out computing with the 3rd random number and generates second session key;It is described Terminal receives second handshaking information, and second handshaking information is sent to the server;The server receives Second handshaking information, verification operation is carried out to second handshaking information, after being proved to be successful, according to the described second pre- imputation It is close that method carries out computing generation first session to first random number, second random number with the 3rd random number Key.
In this step, server and intelligent cipher key equipment are conversated key agreement operation, and session is used by server Key encrypting transactions data and intelligent cipher key equipment use session key signed data, have ensured transaction data and number of signature According to can only be obtained by server and intelligent cipher key equipment, terminal can only transmit encrypting transactions data and ciphering signature data, can not Transaction data and signed data are obtained, i.e., transaction data and signed data can not be distorted, ensure transaction security.
Step S102, the first session key transaction data described in the server by utilizing, encrypting transactions data is generated, The encrypting transactions data is sent to terminal;
In this step, transaction data can be server send include user profile, spending amount and/or transaction bank The information of the contents such as title.
Step S103, the terminal receives the encrypting transactions data, and the encrypting transactions data is sent to described Intelligent cipher key equipment;
In this step, terminal can not be done due to that can not know the decruption key of encrypting transactions data to encrypting transactions data Any processing, intelligent cipher key equipment is directly sent it to after receiving encrypting transactions data, it is ensured that encrypting transactions data without Method is infected or distorted by terminal virus that may be present or trojan horse program, and then has ensured the safety of encrypting transactions data, improves The security of transaction.
Step S104, the intelligent cipher key equipment receives the encrypting transactions data, and utilizes second session key Operation is decrypted to the encrypting transactions data, obtains the transaction data, the transaction data is handled and obtains transaction key Information, and the transaction key message is sent to the terminal;
In this step, transaction key message can be the information such as dealing money, collecting account or transaction bank.
Step S105, the terminal receive and show the transaction key message, obtain after confirming instruction, generate confirmation letter Breath, and the confirmation is sent to the intelligent cipher key equipment.
In this step, terminal display transaction key message, so that user is confirmed, user compares the transaction that terminal is shown Whether key message and this transaction are consistent, if unanimously, user can be confirmed by modes such as button, voices, terminal After being confirmed information, then it will confirm that information is sent to intelligent cipher key equipment, so that intelligent cipher key equipment carries out the behaviour of next step Make, if user does not accept the content of transaction key message, can be operated without trade confirmation, or pass through button, voice etc. Mode Cancels Transaction, and has ensured transaction security.
Further, after this step, after the intelligent cipher key equipment receives the confirmation, by ciphering signature data Send to the terminal, wherein, the ciphering signature data are that intelligent cipher key equipment utilizes the second session key label Name data are obtained, and the signed data intelligent cipher key equipment is signed to obtain to the transaction data.Wherein, The key used the signature operation of transaction data is the private key for user in the safety chip of intelligent cipher key equipment, and private key for user has Can not derived characteristic, signature operation is techniques known, and idiographic flow will not be repeated here.In this step, by It is merely stored in the second session key in intelligent cipher key equipment, terminal can not obtain the second session key, ensured and used the Ciphering signature data obtained from two session key signed datas can not can not distort number of signature by terminal deciphering, terminal According to, ensured transaction security.
The information interacting method that the present embodiment provides, it is close using session key transaction data and intelligence by server Key equipment uses session key signed data, has ensured that transaction data and signed data can only be by servers and intelligent key Equipment obtains, and terminal can only transmit encrypting transactions data and ciphering signature data, can not obtain transaction data and signed data, i.e., Transaction data and signed data can not be distorted, ensure transaction security, also only need to be in terminal really in transaction flow Recognize transaction, without carrying out secondary-confirmation on intelligent cipher key equipment, improve the convenience of transaction flow, and critical data of merchandising Shown in terminal, intelligent cipher key equipment need not set display screen and acknowledgement key, improve the portable of intelligent cipher key equipment Property.
The present embodiment also provides a kind of information interaction system using above- mentioned information exchange method, and the system is and this method Correspondingly, it will not be repeated here, be only briefly described as follows:
Fig. 2 illustrates the structural representation of the information interaction system, referring to Fig. 2, information interaction system of the invention, and bag Include:Intelligent cipher key equipment 201, terminal 202 and server 203.
The intelligent cipher key equipment 201, for the server 203 conversate key agreement operation, if success, The second session key, the encrypting transactions data that receiving terminal 202 is sent are generated, and is added using second session key to described Operation is decrypted in close transaction data, obtains the transaction data, handles the transaction data and obtains transaction key message, and will The transaction key message, which is sent, to the terminal 202, receives the confirmation that the terminal 202 is sent;
Further, in the system, the intelligent cipher key equipment 201, it is additionally operable to after receiving the confirmation, will adds Close signed data is sent to the terminal 202, wherein, the ciphering signature data are that intelligent cipher key equipment 201 utilizes described the What two session key signed datas obtained, the signed data is the intelligent cipher key equipment 201 to the transaction data Signed what is obtained;The terminal 202, it is additionally operable to receive the ciphering signature data.
The terminal 202, the encrypting transactions data sent for receiving the server 203, by the encryption number of deals According to sending to the intelligent cipher key equipment 201, receive and show the transaction key message, obtain after confirming instruction, generate institute Confirmation is stated, and the confirmation is sent to the intelligent cipher key equipment 201;
Further, in the system, the terminal 202, it is additionally operable to receive the transaction prompt letter that the server 203 is sent Breath, display input password prompt information, receives password and sends the password to the intelligent cipher key equipment 201;The intelligence Energy key devices 201, are additionally operable to, receive the password and verify whether the password is correct, if correctly, with the service Device 203 conversate key agreement operation.
The server 203, for the intelligent cipher key equipment 201 conversate key agreement operation, if success, The first session key is generated, using the first session key transaction data, encrypting transactions data is generated, by the encryption Transaction data is sent to terminal 202.
Further, in the system, the intelligent cipher key equipment 201, it is additionally operable to, generates the first random number, and by described in First random number is sent to the terminal 202 with the first preset algorithm identification information, receives the second random number and server certificate, The server certificate is verified, if by checking, the 3rd random number is generated, extracts the server in the server certificate Public key, and the first encryption information of the 3rd generating random number is encrypted according to the first preset algorithm using the server public key, First random number and second random number are signed to obtain the first signature using the intelligent cipher key equipment private key Data, and the intelligent cipher key equipment certificate, first encryption information and first signed data were sent to the end End 202, the first handshaking information is received, verification operation is carried out to first handshaking information, second is generated after being proved to be successful and is shaken hands Information, second handshaking information is sent to the terminal 202, and according to the second preset algorithm to first random number, Second random number carries out computing with the 3rd random number and generates second session key;The terminal 202, is also used In, receive first random number and the first preset algorithm identification information, and by first random number and described first Preset algorithm identification information is sent to the server 203, receives second random number and the server certificate, and by institute State the second random number to send to the intelligent cipher key equipment 201 with the server certificate, receive the intelligent cipher key equipment card Book, first encryption information and first signed data, and the intelligent cipher key equipment certificate, first encryption are believed Breath is sent to the server 203 with first signed data, receives first handshaking information, and described first is shaken hands Information is sent to the intelligent cipher key equipment 201, receives second handshaking information, and by second handshaking information send to The server 203;The server 203, is additionally operable to, and receives first random number and believes with first preset algorithm mark Breath, believe according to whether server described in the first preset algorithm identification information judgment is supported to identify with first preset algorithm First preset algorithm corresponding to breath, if it is, the server generates second random number, and by described second with Machine number is sent to the terminal with the server certificate;Receive the intelligent cipher key equipment certificate, first encryption information With first signed data, the intelligent cipher key equipment certificate is verified, if be proved to be successful, the intelligent key is extracted and sets Intelligent cipher key equipment public key in standby certificate, sign test is carried out to first signed data using the intelligent cipher key equipment public key Operation, after sign test success, first encryption information is decrypted according to first preset algorithm using the privacy key and obtained The 3rd random number is obtained, generates first handshaking information, and first handshaking information is sent to the terminal, is received Second handshaking information, verification operation is carried out to second handshaking information, after being proved to be successful, according to the described second pre- imputation It is close that method carries out computing generation first session to first random number, second random number with the 3rd random number Key.The information interaction system that the present embodiment provides, session key transaction data and intelligent key are used by server 203 Equipment 201 uses session key signed data, has ensured that transaction data and signed data can only be by servers 203 and intelligence Key devices 201 obtain, and terminal 202 can only transmit encrypting transactions data and ciphering signature data, can not obtain transaction data and Signed data, i.e., transaction data and signed data can not be distorted, ensure transaction security, in transaction flow, also only Transaction need to be confirmed in terminal, without carrying out secondary-confirmation on intelligent cipher key equipment 201, improves the convenient of transaction flow Property, and critical data of merchandising is shown that intelligent cipher key equipment 201 need not set display screen and acknowledgement key in terminal 202, is carried The high portability of intelligent cipher key equipment 201.
Fig. 3 illustrates the structural representation of the embodiment of the intelligent cipher key equipment.Structure shown in Fig. 3, the equipment is at least Including:
First receiving module 301, the second session secret key generating module 302, security module 303, parsing module 304, first The receiving module 306 of sending module 305 and second, wherein,
First receiving module 301, the encrypting transactions data sent for receiving the terminal, sends to the safety Module 303, wherein, the encrypting transactions data is server to conversate key agreement behaviour with the intelligent cipher key equipment After making successfully, the server generates the first session key, using described in the first session key transaction data generation Encrypting transactions data, and the encrypting transactions data is sent to the terminal;
Second session secret key generating module 302, for entering guild in the intelligent cipher key equipment and the server After words key agreement operates successfully, the second session key is generated, second session key is sent to the security module 303, wherein, first session key and second session key are key pair;
The security module 303, for receiving the encrypting transactions data and second session key, utilize described Two session keys decrypt the encrypting transactions data, obtain transaction data, the transaction data is sent to the parsing module 304, receive confirmation;
The parsing module 304, for parsing the transaction data, obtain transaction critical data and send to described first Sending module 305;
First sending module 305, for by it is described transaction critical data outgoing;
Second receiving module 306, for receiving the confirmation and sending to the security module 303.
Further, in the present embodiment, the equipment also includes the second sending module, wherein, the security module 303 It is additionally operable to after receiving the confirmation, ciphering signature data is sent to the second sending module, wherein, the ciphering signature number Obtained according to the security module 303 using the second session key signed data, the signed data is described Security module 303 is signed what is obtained to the transaction data;Second sending module, for receiving the ciphering signature Data and outgoing.
The intelligent cipher key equipment that the present embodiment provides, it the second session key can be used to decrypt encrypting transactions data, handed over Easy data, and transaction critical data is sent to terminal, transaction critical data is shown by terminal, and because terminal is without the second meeting Key is talked about, encrypting transactions data can not be decrypted, transaction data can not be distorted, has ensured transaction security, user uses should When intelligent cipher key equipment participates in online transaction, it is only necessary to operated in terminal, without being operated on intelligent cipher key equipment, The convenience of transaction is improved, and the intelligent cipher key equipment need not set keyboard and display, reduce intelligent cipher key equipment Volume, improve the portability of equipment.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize specific logical function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, software that multiple steps or method can be performed in memory and by suitable instruction execution system with storage Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal Discrete logic, have suitable combinational logic gate circuit application specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, can also That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould Block can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and as independent production marketing or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any One or more embodiments or example in combine in an appropriate manner.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art is not departing from the principle and objective of the present invention In the case of above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention By appended claims and its equivalent limit.

Claims (10)

  1. A kind of 1. information interacting method, it is characterised in that:
    Server and intelligent cipher key equipment conversate key agreement operation, if success, the server generates the first session Key, the intelligent cipher key equipment generate the second session key, and first session key is close with second session key Key pair;
    First session key transaction data described in the server by utilizing, encrypting transactions data is generated, the encryption is handed over Easy data are sent to terminal;
    The terminal receives the encrypting transactions data, and the encrypting transactions data is sent to the intelligent cipher key equipment;
    The intelligent cipher key equipment receives the encrypting transactions data, and the encryption is merchandised using second session key Operation is decrypted in data, obtains the transaction data, handles the transaction data and obtains transaction key message, and by the friendship Easy key message is sent to the terminal;
    The terminal receives and shows the transaction key message, obtains after confirming instruction, generates confirmation, and will be described true Recognize information to send to the intelligent cipher key equipment.
  2. 2. according to the method for claim 1, it is characterised in that the server and intelligent cipher key equipment conversate key Before negotiation, in addition to:
    The terminal receives the transaction prompt information that the server is sent, and display input password prompt information, receives password simultaneously The password is sent to the intelligent cipher key equipment;
    The intelligent cipher key equipment receives the password and verifies whether the password is correct, if correctly, the intelligence is close Key equipment and the server conversate key agreement operation.
  3. 3. according to the method for claim 1, it is characterised in that described to send the confirmation to the intelligent key After equipment, in addition to:
    After the intelligent cipher key equipment receives the confirmation, ciphering signature data are sent to the terminal, wherein, it is described What ciphering signature data were obtained for intelligent cipher key equipment using the second session key signed data, the signed data The intelligent cipher key equipment is signed to obtain to the transaction data.
  4. 4. according to the method described in claim any one of 1-3, it is characterised in that the server is carried out with intelligent cipher key equipment Session key agreement operates, including:
    The intelligent cipher key equipment generates the first random number, and first random number and the first preset algorithm identification information are sent out Deliver to the terminal;
    The terminal receives first random number and the first preset algorithm identification information, and will first random number and The first preset algorithm identification information is sent to the server;
    The server receives first random number and the first preset algorithm identification information, according to the described first pre- imputation Whether server described in method identification information judgment supports first preset algorithm corresponding with the first preset algorithm identification information, If it is, the server generates the second random number, and second random number and server certificate were sent to the end End;
    The terminal receives second random number and the server certificate, and by second random number and the server Certificate is sent to the intelligent cipher key equipment;
    The intelligent cipher key equipment receives second random number and the server certificate, verifies the server certificate, such as Fruit then generates the 3rd random number, extracts the server public key in the server certificate, and utilize the server by checking Public key encrypts the first encryption information of the 3rd generating random number according to first preset algorithm, is set using the intelligent key Standby private key is signed to obtain the first signed data to first random number and second random number, and the intelligence is close Key device certificate, first encryption information and first signed data are sent to the terminal;
    The terminal receives the intelligent cipher key equipment certificate, first encryption information and first signed data, and will The intelligent cipher key equipment certificate, first encryption information and first signed data are sent to the server;
    The server receives the intelligent cipher key equipment certificate, first encryption information and first signed data, tests The intelligent cipher key equipment certificate is demonstrate,proved, if be proved to be successful, the intelligent key extracted in the intelligent cipher key equipment certificate is set Standby public key, sign test operation is carried out to first signed data using the intelligent cipher key equipment public key, after sign test success, is utilized The privacy key decrypts first encryption information according to first preset algorithm and obtains the 3rd random number, generation First handshaking information, and first handshaking information is sent to the terminal;
    The terminal receives first handshaking information, and first handshaking information is sent to the intelligent cipher key equipment;
    The intelligent cipher key equipment receives first handshaking information, and verification operation, checking are carried out to first handshaking information The second handshaking information is generated after success, second handshaking information is sent to the terminal, and according to the second preset algorithm pair First random number, second random number carry out computing with the 3rd random number and generate second session key;
    The terminal receives second handshaking information, and second handshaking information is sent to the server;
    The server receives second handshaking information, and verification operation is carried out to second handshaking information, after being proved to be successful, Computing life is carried out to first random number, second random number and the 3rd random number according to second preset algorithm Into first session key.
  5. A kind of 5. information interaction system, it is characterised in that including intelligent cipher key equipment, terminal and server,
    The intelligent cipher key equipment, for the server conversate key agreement operation, if success, generate the second meeting Key, the encrypting transactions data that receiving terminal is sent are talked about, and the encrypting transactions data is entered using second session key Row decryption oprerations, the transaction data is obtained, handle the transaction data and obtain transaction key message, and the transaction is crucial Information sends and to the terminal, receives the confirmation that the terminal is sent;
    The terminal, the encrypting transactions data sent for receiving the server, the encrypting transactions data is sent to institute Intelligent cipher key equipment is stated, receives and shows the transaction key message, obtains after confirming instruction, generates the confirmation, and The confirmation is sent to the intelligent cipher key equipment;
    The server, for the intelligent cipher key equipment conversate key agreement operation, if success, generate the first meeting Key is talked about, using the first session key transaction data, encrypting transactions data is generated, the encrypting transactions data is sent out Deliver to terminal.
  6. 6. system according to claim 5, it is characterised in that
    The terminal, is additionally operable to, and receives the transaction prompt information that the server is sent, display input password prompt information, connects Receive password and send the password to the intelligent cipher key equipment;
    The intelligent cipher key equipment, is additionally operable to, and receives the password and verifies whether the password is correct, if correctly, with The server conversate key agreement operation.
  7. 7. system according to claim 5, it is characterised in that
    The intelligent cipher key equipment, it is additionally operable to after receiving the confirmation, ciphering signature data is sent to the terminal, its In, the ciphering signature data are what intelligent cipher key equipment was obtained using the second session key signed data, described The signed data intelligent cipher key equipment is signed to obtain to the transaction data;
    The terminal, it is additionally operable to receive the ciphering signature data.
  8. 8. according to the system described in claim any one of 5-7, it is characterised in that
    The intelligent cipher key equipment, is additionally operable to, and generates the first random number, and by first random number and the first preset algorithm mark Know information to send to the terminal, receive the second random number and server certificate, the server certificate is verified, if by testing Card, then generate the 3rd random number, extract the server public key in the server certificate, and using the server public key according to First preset algorithm encrypts the first encryption information of the 3rd generating random number, using the intelligent cipher key equipment private key to described First random number and second random number are signed to obtain the first signed data, and by the intelligent cipher key equipment certificate, First encryption information is sent to the terminal with first signed data, the first handshaking information is received, to described first Handshaking information carries out verification operation, and the second handshaking information is generated after being proved to be successful, second handshaking information is sent to described Terminal, and first random number, second random number and the 3rd random number are transported according to the second preset algorithm Calculate and generate second session key;
    The terminal, is additionally operable to, and receives first random number and the first preset algorithm identification information, and by described first Random number is sent to the server with the first preset algorithm identification information, receives second random number and the service Device certificate, and second random number and the server certificate are sent to the intelligent cipher key equipment, receive the intelligence Key devices certificate, first encryption information and first signed data, and by the intelligent cipher key equipment certificate, described First encryption information is sent to the server with first signed data, receives first handshaking information, and by described in First handshaking information is sent to the intelligent cipher key equipment, receives second handshaking information, and by second handshaking information Send to the server;
    The server, is additionally operable to, and receives first random number and the first preset algorithm identification information, according to described the Whether server described in one preset algorithm identification information judgment is supported corresponding with the first preset algorithm identification information described First preset algorithm, if it is, the server generates second random number, and by second random number and the clothes Business device certificate is sent to the terminal;Receive the intelligent cipher key equipment certificate, first encryption information and the described first label Name data, verify the intelligent cipher key equipment certificate, if be proved to be successful, extract the intelligence in the intelligent cipher key equipment certificate Can key devices public key, using the intelligent cipher key equipment public key to first signed data carry out sign test operation, sign test into After work(, using the privacy key according to first preset algorithm decrypt first encryption information obtain the described 3rd with Machine number, first handshaking information is generated, and first handshaking information is sent to the terminal, received described second and shake hands Information, verification operation is carried out to second handshaking information, after being proved to be successful, according to second preset algorithm to described first Random number, second random number carry out computing with the 3rd random number and generate first session key.
  9. 9. a kind of intelligent cipher key equipment, it is characterised in that the equipment comprises at least the second session secret key generating module, the first reception Module, parsing module, the first sending module, the second receiving module and security module, wherein,
    First receiving module, the encrypting transactions data sent for receiving terminal, sends to the security module, wherein, The encrypting transactions data is server to conversate after key agreement operates successfully with the intelligent cipher key equipment, described Server generates the first session key, and the encrypting transactions data is generated using the first session key transaction data, And the encrypting transactions data is sent to the terminal;
    Second session secret key generating module, for being conversated key association in the intelligent cipher key equipment and the server After business operates successfully, the second session key is generated, second session key is sent to the security module, wherein, it is described First session key and second session key are key pair;
    The security module, for receiving the encrypting transactions data and second session key, utilize second session Encrypting transactions data described in secret key decryption, obtains transaction data, and the transaction data is sent to the parsing module, receives true Recognize information;
    The parsing module, for parsing the transaction data, obtain transaction critical data and send to described first to send mould Block;
    First sending module, for by it is described transaction critical data outgoing;
    Second receiving module, for receiving the confirmation and sending to the security module.
  10. 10. equipment according to claim 9, it is characterised in that the equipment also includes the second sending module,
    The security module, it is additionally operable to after receiving the confirmation, ciphering signature data is sent to the second sending module, its In, the ciphering signature data security module is obtained using the second session key signed data, described The signed data security module is signed to obtain to the transaction data;
    Second sending module, for receiving the ciphering signature data and outgoing.
CN201410409471.8A 2014-08-19 2014-08-19 A kind of information interacting method, system and intelligent cipher key equipment Active CN104243162B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410409471.8A CN104243162B (en) 2014-08-19 2014-08-19 A kind of information interacting method, system and intelligent cipher key equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410409471.8A CN104243162B (en) 2014-08-19 2014-08-19 A kind of information interacting method, system and intelligent cipher key equipment

Publications (2)

Publication Number Publication Date
CN104243162A CN104243162A (en) 2014-12-24
CN104243162B true CN104243162B (en) 2018-03-20

Family

ID=52230568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410409471.8A Active CN104243162B (en) 2014-08-19 2014-08-19 A kind of information interacting method, system and intelligent cipher key equipment

Country Status (1)

Country Link
CN (1) CN104243162B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681281B (en) * 2015-12-30 2019-02-12 北京金科联信数据科技有限公司 Encryption device based on embedded OS
CN107292611B (en) * 2016-04-05 2020-05-15 天地融科技股份有限公司 Transaction method and system
CN106888206B (en) * 2017-02-13 2020-06-09 海信集团有限公司 Key exchange method, device and system
CN110945553A (en) * 2018-06-07 2020-03-31 北京光合信诚科技有限公司 Transaction method, hardware wallet and transaction equipment
CN109639432A (en) * 2018-11-20 2019-04-16 中国电力科学研究院有限公司 A kind of method for being handled communication service data, cipher card and system
CN113037484B (en) * 2021-05-19 2021-08-24 银联商务股份有限公司 Data transmission method, device, terminal, server and storage medium
CN114745134A (en) * 2022-03-30 2022-07-12 恒玄科技(上海)股份有限公司 Method, system, equipment and computer readable medium for transferring media data stream

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335754A (en) * 2008-05-14 2008-12-31 北京深思洛克数据保护中心 Method for information verification using remote server
CN101393628A (en) * 2008-11-12 2009-03-25 北京飞天诚信科技有限公司 Novel network safe transaction system and method
CN101588243A (en) * 2008-05-21 2009-11-25 北京飞天诚信科技有限公司 A kind of electronic transaction historical record querying method and system
CN101848090A (en) * 2010-05-11 2010-09-29 武汉珞珈新世纪信息有限公司 Authentication device and system and method using same for on-line identity authentication and transaction
CN102790767A (en) * 2012-07-03 2012-11-21 北京神州绿盟信息安全科技股份有限公司 Information safety control method, information safety display equipment and electronic trading system
CN103942687A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN103973455A (en) * 2014-05-28 2014-08-06 天地融科技股份有限公司 Information interaction method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI546748B (en) * 2013-01-15 2016-08-21 hong-jian Zhou Portable electronic trading device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335754A (en) * 2008-05-14 2008-12-31 北京深思洛克数据保护中心 Method for information verification using remote server
CN101588243A (en) * 2008-05-21 2009-11-25 北京飞天诚信科技有限公司 A kind of electronic transaction historical record querying method and system
CN101393628A (en) * 2008-11-12 2009-03-25 北京飞天诚信科技有限公司 Novel network safe transaction system and method
CN101848090A (en) * 2010-05-11 2010-09-29 武汉珞珈新世纪信息有限公司 Authentication device and system and method using same for on-line identity authentication and transaction
CN102790767A (en) * 2012-07-03 2012-11-21 北京神州绿盟信息安全科技股份有限公司 Information safety control method, information safety display equipment and electronic trading system
CN103942687A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN103973455A (en) * 2014-05-28 2014-08-06 天地融科技股份有限公司 Information interaction method

Also Published As

Publication number Publication date
CN104243162A (en) 2014-12-24

Similar Documents

Publication Publication Date Title
CN104243451B (en) A kind of information interacting method, system and intelligent cipher key equipment
CN104243162B (en) A kind of information interacting method, system and intelligent cipher key equipment
JP6264674B2 (en) Authentication system and method using QR code
CN102801710B (en) A kind of network trading method and system
CN103532719B (en) Dynamic password generation method, dynamic password generation system, as well as processing method and processing system of transaction request
CN103516525B (en) Dynamic password generation method and system
CN103326862B (en) Electronically signing method and system
CN103116847B (en) Smart card, intelligent card transaction system and method with electronic signature functionality
CN107784499B (en) Secure payment system and method of near field communication mobile terminal
CN107077670A (en) Transaction message is sent
GB2512595A (en) Integrated contactless mpos implementation
CN102789607A (en) Network transaction method and system
CN104618114B (en) ID card information acquisition methods, apparatus and system
CN102710611A (en) Network security authentication method and system
CN106056419A (en) Method, system and device for realizing independent transaction by using electronic signature equipment
CN106100854A (en) The reverse authentication method of terminal unit based on authority's main body and system
CN104835038A (en) Networking payment device and networking payment method
CN104318143A (en) Financial IC (integrated circuit) card and password input method and device based on card
CN103746802A (en) Data processing method based on coordination secret keys and mobile phone
CN103136667B (en) There is the smart card of electronic signature functionality, smart card transaction system and method
CN103813333A (en) Data processing method based on negotiation keys
CN103973455B (en) A kind of information interacting method
CN105989481B (en) Data interaction method and system
CN103813321A (en) Agreement key based data processing method and mobile phone
CN103984906B (en) A kind of electronic key equipment of no button

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant