CN105991539B - Data interactive method and system - Google Patents

Data interactive method and system Download PDF

Info

Publication number
CN105991539B
CN105991539B CN201510055907.2A CN201510055907A CN105991539B CN 105991539 B CN105991539 B CN 105991539B CN 201510055907 A CN201510055907 A CN 201510055907A CN 105991539 B CN105991539 B CN 105991539B
Authority
CN
China
Prior art keywords
cutting ferrule
simulation card
connection
binding
random factor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510055907.2A
Other languages
Chinese (zh)
Other versions
CN105991539A (en
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Publication of CN105991539A publication Critical patent/CN105991539A/en
Application granted granted Critical
Publication of CN105991539B publication Critical patent/CN105991539B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention provides a kind of data interactive method and systems, and wherein method includes: that cutting ferrule certificate is at least sent to update platform by cutting ferrule;It updates platform and generates the first update encryption key, encryption is carried out to cutting ferrule application program installation kit and obtains the first installation kit ciphertext, signature is carried out to the first installation kit ciphertext and obtains the first installation packet signature, encryption first updates encryption key and obtains the first update encryption key ciphertext, cutting ferrule more new information is sent to cutting ferrule, cutting ferrule receives cutting ferrule more new information, after verifying update platform credential passes through, after correct to the first installation packet signature progress sign test, decryption first updates encryption key ciphertext, obtain the first decruption key, decrypt the first installation kit ciphertext, obtain cutting ferrule application program installation kit, the data format for verifying cutting ferrule application program installation kit is correct, it is installed.By the data interactive method and system, cutting ferrule, simulation card, the data interaction in Truth cards manager application renewal process may be implemented, and safety is higher.

Description

Data interactive method and system
Technical field
The present invention relates to electronic information security technical field more particularly to a kind of data interactive method and systems.
Background technique
In existing transaction flow, such as: it withdraws the money or shopping is swiped the card, usual user needs to carry to handle from bank Bank card, user carries bank card, and there is a certain security risk, once losing, then is easy to cause to damage to the assets of user It loses.In addition, a user may possess the bank card of multiple different banks simultaneously since bank card type is varied, if you need to The bank card of multiple different banks is carried, it is also not portable enough, if only carried in multiple bank cards to be convenient for carrying Certain bank cards when, withdrawn the money or done shopping using these bank cards swipe the card when, it is understood that there may be inter-bank transaction, cause to hand over Unnecessary expense occurs in easily.
Therefore, it is badly in need of providing a kind of higher data interaction scheme of safety in the prior art to realize that data update.
Summary of the invention
Present invention seek to address that the above problem.
The main purpose of the present invention is to provide a kind of data interactive methods;
Another object of the present invention is to provide a kind of data interaction systems.
In order to achieve the above objectives, technical solution of the present invention is specifically achieved in that
One aspect of the present invention provides a kind of data interactive method, comprising: cutting ferrule certificate is at least sent to update by cutting ferrule Platform;It updates platform and generates the first update encryption key;It updates platform and updates encryption key to cutting ferrule application program using first Installation kit carries out encryption and obtains the first installation kit ciphertext;It updates platform and the first installation kit ciphertext is carried out using platform private key is updated Signature obtains the first installation packet signature;It updates platform and updates encryption key using the cutting ferrule public key encryption first in cutting ferrule certificate, It obtains first and updates encryption key ciphertext;It updates platform and cutting ferrule more new information is sent to cutting ferrule, wherein cutting ferrule more new packets It includes: updating platform credential, the first installation kit ciphertext, the first installation packet signature and the first update encryption key ciphertext;Cutting ferrule connects Cutting ferrule more new information is received, is verified using root certificate and updates platform credential;After cutting ferrule verifying update platform credential passes through, update is utilized Update platform public key in platform credential carries out sign test to the first installation packet signature;Cutting ferrule verifying the first installation packet signature is correct Afterwards, encryption key ciphertext is updated using cutting ferrule private key decryption first, obtains the first decruption key;Cutting ferrule utilizes the first decruption key The first installation kit ciphertext is decrypted, cutting ferrule application program installation kit is obtained;The data lattice of cutting ferrule verifying cutting ferrule application program installation kit Whether formula is correct;If the data format that cutting ferrule verifies cutting ferrule application program installation kit is correct, cutting ferrule is according to cutting ferrule application program Installation kit is installed.
Another aspect of the present invention provides a kind of data interactive method, comprising: Truth cards manager at least will really block Piece manager certificate is sent to update platform;It updates platform and generates third update encryption key;Platform is updated to update using third Encryption key carries out encryption to Truth cards manager application installation kit and obtains third installation kit ciphertext;Platform is updated to utilize It updates platform private key and signature acquisition third installation packet signature is carried out to third installation kit ciphertext;It updates platform and utilizes Truth cards pipe The Truth cards manager public key encryption third managed in device certificate updates encryption key, obtains third and updates encryption key ciphertext; It updates platform and Truth cards manager more new information is sent to Truth cards manager, wherein Truth cards manager updates Information includes: to update platform credential, third installation kit ciphertext, third installation packet signature and third to update encryption key ciphertext; Truth cards manager receives Truth cards manager more new information, is verified using root certificate and updates platform credential;Truth cards After manager verifying update platform credential passes through, packet signature is installed to third using the update platform public key updated in platform credential Carry out sign test;Truth cards manager verify third installation packet signature it is correct after, utilize Truth cards manager private key decryption the Three update encryption key ciphertext, obtain third decruption key;Truth cards manager is pacified using third decryption key decryption third Packet ciphertext is filled, Truth cards manager application installation kit is obtained;Truth cards manager verifying Truth cards manager is answered It is whether correct with the data format of program installation kit;If Truth cards manager verifies Truth cards manager application peace The data format for filling packet is correct, and Truth cards manager is installed according to Truth cards manager application installation kit.
Another aspect of the invention provides a kind of data interactive method, comprising: cutting ferrule obtains analog card from simulation card Analog card piece certificate is at least sent to update platform by piece certificate;It updates platform and generates the second update encryption key;Update platform Encryption is carried out to simulation card application program installation kit using the second update encryption key and obtains the second installation kit ciphertext;It updates flat Platform carries out signature to the second installation kit ciphertext using update platform private key and obtains the second installation packet signature;Platform is updated using simulation Simulation card public key encryption second in card certificate updates encryption key, obtains second and updates encryption key ciphertext;It updates flat Platform will simulate card update information and be sent to cutting ferrule, wherein it includes: to update platform credential, the second peace that simulation card, which updates information, Fill packet ciphertext, the second installation packet signature and the second update encryption key ciphertext;Cutting ferrule receives simulation card and updates information, concurrently It send to simulation card;It simulates card and receives the simulation card update information that cutting ferrule is sent, update platform using root certificate verifying and demonstrate,prove Book;After simulation card verifying update platform credential passes through, installed using the update platform public key updated in platform credential to second Packet signature carries out sign test;After simulation card verifying the second installation packet signature is correct, the second update of decryption of simulation card private key is utilized Encryption key ciphertext obtains the second decruption key;It simulates card and utilizes second decryption key decryption the second installation kit ciphertext, obtain Simulate card application program installation kit;Whether the data format for simulating card verifying simulation card application program installation kit is correct; If the data format for simulating card verifying simulation card application program installation kit is correct, simulation card is according to simulation card application Program installation kit is installed.
In addition, cutting ferrule is obtained from simulation card before simulating card certificate, data interactive method further include: cutting ferrule and mould Quasi- card establishes secure connection.
In addition, cutting ferrule and simulation card establish secure connection, to include: cutting ferrule be used to indicate foundation peace to simulation card transmission The the first secure connection instruction connected entirely, wherein the instruction of the first secure connection includes: that cutting ferrule utilizes the mould in simulation card certificate Quasi- card public key carries out the first of encryption acquisition to the first connection random factor of the first binding factor of cutting ferrule end and generation and connects Ciphertext is connect, cutting ferrule carries out signature acquisition to the first binding factor of cutting ferrule end and the first connection random factor using cutting ferrule private key First connection signature;It simulates card and receives the instruction of the first secure connection, the first connection ciphertext is carried out using simulation card private key Decryption obtains cutting ferrule end first and binds decryption factor and the first connection decryption random factor;It simulates card and utilizes cutting ferrule certificate In cutting ferrule public key, cutting ferrule end first bind decryption factor and first connection decryption random factor pair first connection signature carry out Verifying;After simulating the first connection of card verifying signature correctly, verifying cutting ferrule end first is bound decryption factor and is tied up with simulation Card-terminal Whether identical determine the factor;After simulation card verifying cutting ferrule end first binding decryption factor is identical as simulation Card-terminal binding factor, Generate the second connection random factor;Simulate card using the cutting ferrule public key in cutting ferrule certificate to the first connection decryption random factor with And second connection random factor carry out encryption obtain second connection ciphertext, using simulation card private key to first connection decryption random The factor and the second connection random factor carry out signature and obtain the second connection signature;Simulation card sends the first safety to cutting ferrule and connects Connect response, wherein the response of the first secure connection includes: the second connection ciphertext and the second connection signature;Cutting ferrule receives the first peace Full connection response, using cutting ferrule private key to second connection ciphertext be decrypted, after being decrypted first connect decryption random because Son and the second connection decryption random factor;Cutting ferrule utilizes the simulation card public key in simulation card certificate, the first company after decryption It connects the decryption random factor and the second connection connection signature of decryption random factor pair second is verified;Cutting ferrule verifying the second connection label After name is correct, whether the first connection decryption random factor after verifying decryption with first connect random factor identical;Cutting ferrule verifying After decryption first connection the decryption random factor with first connection random factor it is identical after, at least with second connect decryption random The factor generates cutting ferrule and simulates cutting ferrule end the first safe transmission key between card;It is random at least with the second connection to simulate card The factor generates cutting ferrule and simulates the simulation Card-terminal safe transmission key between card.
In addition, it includes: the simulation card life that cutting ferrule receives that simulation card is sent that cutting ferrule, which establishes secure connection with simulation card, At third connection random factor and simulation card unique identification;Cutting ferrule is used to indicate foundation safety to simulation card transmission and connects The the second secure connection instruction connect, wherein the instruction of the second secure connection includes: cutting ferrule unique identification, cutting ferrule utilization simulation card The 4th connection random factor that simulation card public key in certificate connects random factor and generation to third carries out encryption acquisition Third connection ciphertext, cutting ferrule using cutting ferrule private key to third connect random factor and the 4th connection random factor sign The third of acquisition connects signature;It simulates card and receives the instruction of the second secure connection, judge cutting ferrule unique identification whether in analog card In bit end list of bindings;If cutting ferrule unique identification is in simulation Card-terminal list of bindings, simulation card is private using simulation card Third connection ciphertext is decrypted in key, obtains the third connection decryption random factor and the 4th connection decryption random factor;Mould Quasi- card utilizes cutting ferrule public key, the third connection decryption random factor and the 4th connection decryption random factor pair in cutting ferrule certificate Third connection signature is verified;After simulating card verifying third connection signature correctly, verifying third connects the decryption random factor It is whether identical that random factor is connect with third;If it is identical as third connection random factor that third connects the decryption random factor, mould Quasi- card connects the decryption random factor to third using simulation card private key and the 4th connection decryption random factor is signed Obtain the 4th connection signature;It simulates card and sends the response of the second secure connection to cutting ferrule, wherein the second secure connection response bag It includes: the 4th connection signature;Cutting ferrule receives the response of the second secure connection, using in simulation card certificate simulation card public key, the Three connection random factors and the 4th connection random factor verify the 4th connection signature;The 4th connection signature of cutting ferrule verifying is just After really, cutting ferrule is generated at least with the 4th connection random factor and the first binding factor of cutting ferrule end and simulates the cutting ferrule between card Hold the first safe transmission key;Card is simulated at least with the 4th connection decryption random factor and simulation Card-terminal binding factor It generates cutting ferrule and simulates the simulation Card-terminal safe transmission key between card;Cutting ferrule utilizes the first safe transmission of cutting ferrule end key pair Third connection random factor and the 4th connection random factor are sent to simulation card after carrying out the first processing;Card is simulated to utilize It simulates the Card-terminal safe transmission key pair third connection decryption random factor and the 4th connection decryption random factor carries out first Cutting ferrule is sent to after processing;Cutting ferrule receives the data that simulation card is sent, and is docked using cutting ferrule end the first safe transmission key The data received carry out second processing, and the data after comparing second processing connect random factor with third and the 4th connection is random Whether the factor is identical;It simulates card and receives the data that cutting ferrule is sent, and received using simulation Card-terminal safe transmission key pair Data carry out second processing, the data after comparing second processing connect with third the decryption random factor and the 4th connect at random Whether decryption factor is identical.
In addition, before cutting ferrule and simulation card establish secure connection, data interactive method further include: cutting ferrule and analog card Piece executes bindings.
In addition, cutting ferrule with simulation card execute bindings include: cutting ferrule reception be used to indicate with simulate card tied up Fixed trigger command;Cutting ferrule sends the first binding instruction to simulation card, wherein the first binding instruction includes: what cutting ferrule generated First binding random factor, cutting ferrule certificate and cutting ferrule unique identification;It simulates card and receives the first binding instruction, utilize root certificate Cutting ferrule certificate is verified;After simulation card verifying cutting ferrule certificate is legal, the second binding random factor is generated;Simulate card benefit Are carried out by encryption and obtains first for the first binding random factor and the second binding random factor with the cutting ferrule public key in cutting ferrule certificate Ciphertext is bound, are carried out by signature and obtains for the first binding random factor and the second binding random factor using simulation card private key One binding signature;Simulate card to cutting ferrule send the first binding response, wherein the first binding response include: the first binding ciphertext, First binding signature, simulation card certificate and simulation card unique identification;Cutting ferrule receives the first binding response, utilizes root certificate Simulation card certificate is verified;After cutting ferrule verifying simulation card certificate is legal, using cutting ferrule private key to the first binding ciphertext It is decrypted, obtains the first binding decryption random factor and the second binding decryption random factor;Cutting ferrule utilizes simulation card certificate In simulation card public key, first binding the decryption random factor and second binding decryption random factor pair first binding sign into Row verifying;After cutting ferrule verifying the first binding signature is correct, the first binding decryption random factor of verifying and the first binding random factor It is whether identical;After the first binding decryption random factor of cutting ferrule verifying is identical as the first binding random factor, simulation card is prompted only One mark;Cutting ferrule is received for confirming the simulation correct trigger command of card unique identification, is bound using cutting ferrule private key to first Random factor and the second binding decryption random factor are signed, and obtain the second binding signature, and storage simulation card is only One mark simulates card certificate and the first binding factor of cutting ferrule end to the first list of bindings of cutting ferrule end, wherein cutting ferrule end first Binding factor is the second binding decryption random factor;Cutting ferrule sends the second binding signature to simulation card;It simulates card and receives the Two binding signatures, using cutting ferrule public key, the first binding random factor and the second binding random factor in cutting ferrule certificate to the Two binding signatures are verified;Simulate card verifying the second binding signature it is correct after, storage cutting ferrule unique identification, cutting ferrule certificate with And simulation Card-terminal binding factor to simulation Card-terminal list of bindings, wherein simulation Card-terminal binding factor be second binding with The machine factor.
In addition, the data that simulation card is sent to cutting ferrule utilize mould after cutting ferrule and simulation card establish secure connection Quasi- Card-terminal safe transmission key is sent after carrying out the first processing, and cutting ferrule receives first treated data, utilizes cutting ferrule end Safe transmission key carries out second processing;The data that cutting ferrule is sent to simulation card utilize cutting ferrule end safe transmission key progress the It is sent after one processing, simulation card receives first treated data, carries out the using simulation Card-terminal safe transmission key Two processing.
In addition, the first processing includes: encryption, second processing includes: decryption processing;Or first processing include: school Calculation processing is tested, second processing includes: verification verifying calculation processing;Or first processing include: encryption and verification calculation processing, Second processing includes: decryption and verification verifying calculation processing.
In addition, carrying out safety instruction when cutting ferrule detects that simulation card exceeds the efficient communication range of cutting ferrule.
In addition, cutting ferrule is mobile device.
In addition, cutting ferrule is mobile device and electronic signature equipment or cutting ferrule is electronic signature equipment.
One aspect of the present invention additionally provides a kind of data interaction system, comprising: cutting ferrule and update platform;Cutting ferrule is used for Cutting ferrule certificate is at least sent to update platform;Platform is updated, updates encryption key for generating first;It updates and adds using first Close key pair cutting ferrule application program installation kit carries out encryption and obtains the first installation kit ciphertext;Pacified using platform private key is updated to first Dress packet ciphertext carries out signature and obtains the first installation packet signature;It is close that encryption is updated using the cutting ferrule public key encryption first in cutting ferrule certificate Key obtains first and updates encryption key ciphertext;Cutting ferrule more new information is sent to cutting ferrule, wherein cutting ferrule more new packets include: more New platform credential, the first installation kit ciphertext, the first installation packet signature and first update encryption key ciphertext;Cutting ferrule is also used to Cutting ferrule more new information is received, is verified using root certificate and updates platform credential;It is flat using updating after verifying update platform credential passes through Update platform public key in platform certificate carries out sign test to the first installation packet signature;After verifying the first installation packet signature is correct, utilize Cutting ferrule private key decryption first updates encryption key ciphertext, obtains the first decruption key;Pacified using the first decryption key decryption first Packet ciphertext is filled, cutting ferrule application program installation kit is obtained;Whether the data format for verifying cutting ferrule application program installation kit is correct;If The data format that cutting ferrule verifies cutting ferrule application program installation kit is correct, is installed according to cutting ferrule application program installation kit.
Another aspect of the present invention additionally provides a kind of data interaction system, comprising: Truth cards manager and update are flat Platform;Truth cards manager, for Truth cards manager certificate to be at least sent to update platform;Platform is updated, for giving birth to Encryption key is updated at third;Encryption key is updated using third to encrypt Truth cards manager application installation kit Obtain third installation kit ciphertext;Signature acquisition third installation kit label are carried out to third installation kit ciphertext using platform private key is updated Name;Encryption key is updated using the Truth cards manager public key encryption third in Truth cards manager certificate, obtains third Update encryption key ciphertext;Truth cards manager more new information is sent to Truth cards manager, wherein Truth cards pipe Reason device more new packets include: it is close to update platform credential, third installation kit ciphertext, third installation packet signature and third update encryption Key ciphertext;Truth cards manager is also used to receive Truth cards manager more new information, is verified using root certificate and updates platform Certificate;After verifying update platform credential passes through, packet signature is installed to third using the update platform public key updated in platform credential Carry out sign test;After verifying third installation packet signature is correct, Truth cards manager private key decryption third is utilized to update encryption key Ciphertext obtains third decruption key;Using third decryption key decryption third installation kit ciphertext, obtains Truth cards manager and answer With program installation kit;Whether the data format for verifying Truth cards manager application installation kit is correct;If Truth cards The data format that manager verifies Truth cards manager application installation kit is correct, according to Truth cards manager application journey Sequence installation kit is installed.
Another aspect of the invention additionally provides a kind of data interaction system, comprising: simulation card, cutting ferrule and update are flat Platform;Analog card piece certificate is at least sent to update platform for obtaining simulation card certificate from simulation card by cutting ferrule;More New platform updates encryption key for generating second;Encryption key is updated to simulation card application program installation kit using second It carries out encryption and obtains the second installation kit ciphertext;The second peace of signature acquisition is carried out to the second installation kit ciphertext using platform private key is updated Fill packet signature;Encryption key is updated using the simulation card public key encryption second in simulation card certificate, the second update is obtained and adds Key ciphertext;Simulation card is updated into information and is sent to cutting ferrule, wherein it includes: to update platform card that simulation card, which updates information, Book, the second installation kit ciphertext, the second installation packet signature and second update encryption key ciphertext;Cutting ferrule is also used to receive simulation Card more new information, and it is sent to simulation card;Card is simulated, the simulation card for receiving cutting ferrule transmission updates information, benefit It is verified with root certificate and updates platform credential;After verifying update platform credential passes through, the update platform updated in platform credential is utilized Public key carries out sign test to the second installation packet signature;After verifying the second installation packet signature is correct, simulation card private key decryption the is utilized Two update encryption key ciphertext, obtain the second decruption key;Using second decryption key decryption the second installation kit ciphertext, mould is obtained Quasi- card application program installation kit;Whether the data format of verifying simulation card application program installation kit is correct;If analog card The data format of piece verifying simulation card application program installation kit is correct, is pacified according to simulation card application program installation kit Dress.
In addition, cutting ferrule, is also used to establish safety with simulation card before obtaining simulation card certificate in simulation card Connection.
In addition, cutting ferrule, it is used to indicate the first secure connection for establishing secure connection specifically for being sent to simulation card and refers to It enables, wherein the instruction of the first secure connection includes: that cutting ferrule utilizes the simulation card public key in simulation card certificate to cutting ferrule end first Binding factor and the first connection random factor of generation carry out the first connection ciphertext of encryption acquisition, and cutting ferrule utilizes cutting ferrule private key The first connection signature of signature acquisition is carried out to the first binding factor of cutting ferrule end and the first connection random factor;Card is simulated, Specifically for receiving the instruction of the first secure connection, the first connection ciphertext is decrypted using simulation card private key, obtains cutting ferrule The first binding decryption factor of end and the first connection decryption random factor;Utilize the cutting ferrule public key in cutting ferrule certificate, cutting ferrule end One binding decryption factor and the first connection connection signature of decryption random factor pair first are verified;Verifying the first connection signature After correct, decryption factor is bound at verifying cutting ferrule end first and whether simulation Card-terminal binding factor is identical;Verify cutting ferrule end first After binding decryption factor is identical as simulation Card-terminal binding factor, the second connection random factor is generated;Using in cutting ferrule certificate Cutting ferrule public key carries out encryption to the first connection decryption random factor and the second connection random factor and obtains the second connection ciphertext, benefit Signature is carried out to the first connection decryption random factor and the second connection random factor with simulation card private key and obtains the second connection Signature;The response of the first secure connection is sent to cutting ferrule, wherein the response of the first secure connection includes: the second connection ciphertext and the Two connection signatures;Cutting ferrule is specifically also used to receive the response of the first secure connection, is carried out using cutting ferrule private key to the second connection ciphertext Decryption, the first connection decryption random factor and the second connection decryption random factor after being decrypted;Utilize simulation card certificate In simulation card public key, the first connection decryption random factor after decryption and the second connection decryption random factor pair second connect Signature is verified;After verifying the second connection signature is correct, the first connection decryption random factor after verifying decryption connects with first Whether identical connect random factor;Verifying decryption after first connection the decryption random factor with first connect random factor it is identical after, Cutting ferrule is generated at least with the second connection decryption random factor and simulates cutting ferrule end the first safe transmission key between card;Simulation Card, the simulation Card-terminal that is specifically also used to generate cutting ferrule at least with the second connection random factor and simulate between card pass safely Defeated key.
In addition, cutting ferrule, specifically for receive the third connection random factor that the simulation card that simulation card is sent generates with And simulation card unique identification;It is sent to simulation card and is used to indicate the second secure connection for establishing secure connection instruction, wherein Second secure connection instruction include: cutting ferrule unique identification, cutting ferrule using simulation card certificate in simulation card public key to third Connection random factor and the 4th connection random factor of generation carry out the third connection ciphertext of encryption acquisition, cutting ferrule utilizes cutting ferrule Private key connects random factor to third and the 4th connection random factor carries out the third connection signature of signature acquisition;Analog card Whether piece is specifically used for receiving the instruction of the second secure connection, judge cutting ferrule unique identification in simulation Card-terminal list of bindings;Such as Fruit cutting ferrule unique identification is decrypted third connection ciphertext in simulation Card-terminal list of bindings, using simulation card private key, Obtain the third connection decryption random factor and the 4th connection decryption random factor;Using in cutting ferrule certificate cutting ferrule public key, The three connection decryption random factors and the 4th connection decryption random factor pair third connection signature are verified;Verify third connection After signature is correct, whether the verifying third connection decryption random factor connect random factor with third identical;If third connection with Machine decryption factor and third connection random factor are identical, connect the decryption random factor and the to third using simulation card private key The four connection decryption random factors carry out signature and obtain the 4th connection signature;The response of the second secure connection is sent to cutting ferrule, wherein the The response of two secure connections includes: the 4th connection signature;Cutting ferrule is specifically also used to receive the response of the second secure connection, utilizes simulation Simulation card public key, third connection random factor and the 4th connection random factor in card certificate carry out the 4th connection signature Verifying;It is raw at least with the 4th connection random factor and the first binding factor of cutting ferrule end after verifying the 4th connection signature correctly At cutting ferrule end the first safe transmission key between cutting ferrule and simulation card;Card is simulated, is specifically also used to connect at least with the 4th It connects the decryption random factor and simulates Card-terminal binding factor and generate cutting ferrule and simulate the simulation Card-terminal safe transmission between card Key;The cutting ferrule is specifically also used to connect random factor and the 4th using the first safe transmission of cutting ferrule end key pair third Connection random factor is sent to simulation card after carrying out the first processing;Card is simulated, is specifically also used to pacify using simulation Card-terminal Full transmission key is sent to after connecting the decryption random factor and the 4th connection decryption random factor the first processing of progress to third Cutting ferrule;The cutting ferrule is specifically also used to receive the data that simulation card is sent, and utilizes the first safe transmission of cutting ferrule end key pair The data that receive carry out second processing, the data after comparing second processing connect with third random factor and the 4th connect with Whether the machine factor is identical;Card is simulated, is specifically also used to receive the data of cutting ferrule transmission, and utilize simulation Card-terminal safe transmission Data that key pair receives carry out second processing, the data after comparing second processing connect with third the decryption random factor and Whether the 4th connection decryption random factor is identical.
In addition, cutting ferrule, is also used to before establishing secure connection with simulation card, bindings are executed with simulation card.
In addition, cutting ferrule, specifically for receiving the trigger command for being used to indicate and being bound with simulation card;To simulation card Send first binding instruction, wherein first binding instruction include: cutting ferrule generate first binding random factor, cutting ferrule certificate with And cutting ferrule unique identification;Card is simulated, is specifically used for receiving the first binding instruction, cutting ferrule certificate is tested using root certificate Card;After verifying cutting ferrule certificate is legal, the second binding random factor is generated;It is bound using the cutting ferrule public key in cutting ferrule certificate to first Random factor and the second binding random factor carry out encryption and obtain the first binding ciphertext, are tied up using simulation card private key to first Determine random factor and the second binding random factor carries out signature and obtains the first binding signature;The first binding is sent to cutting ferrule to ring It answers, wherein the first binding response includes: the first binding ciphertext, the first binding signature, simulation card certificate and simulates card only One mark;Cutting ferrule is specifically also used to receive the first binding response, is verified using root certificate to simulation card certificate;Verifying Simulate card certificate it is legal after, using cutting ferrule private key to first binding ciphertext be decrypted, obtain first binding decryption random because Son and the second binding decryption random factor;Using simulation card certificate in simulation card public key, first binding decryption random because Son and the second binding binding signature of decryption random factor pair first are verified;After verifying the first binding signature is correct, verifying Whether the first binding decryption random factor and the first binding random factor are identical;The first binding decryption random factor of verifying and first After binding random factor is identical, simulation card unique identification is prompted;It receives for confirming that simulation card unique identification is correctly touched It says the word, is signed using cutting ferrule private key to the first binding random factor and the second binding decryption random factor, obtain the Two binding signatures, and storage simulate card unique identification, simulation card certificate and the first binding factor of cutting ferrule end to cutting ferrule Hold the first list of bindings, wherein the first binding factor of cutting ferrule end is the second binding decryption random factor;The is sent to simulation card Two binding signatures;Simulate card, be specifically also used to receive the second binding signature, using in cutting ferrule certificate cutting ferrule public key, first Binding random factor and the second binding random factor verify the second binding signature;Verifying the second binding signature is correct Afterwards, cutting ferrule unique identification, cutting ferrule certificate and simulation Card-terminal binding factor are stored to simulation Card-terminal list of bindings, wherein Simulating Card-terminal binding factor is the second binding random factor.
In addition, simulation card, is also used to after cutting ferrule and simulation card establish secure connection, the data sent to cutting ferrule It is sent after carrying out the first processing using simulation Card-terminal safe transmission key, cutting ferrule, is also used to receive first treated number According to, utilize cutting ferrule end safe transmission key carry out second processing;Cutting ferrule is also used to establish secure connection in cutting ferrule and simulation card Later, the data sent to simulation card are sent after carrying out the first processing using cutting ferrule end safe transmission key, simulate card, also Data that treated for receiving first, utilize simulation Card-terminal safe transmission key to carry out second processing.
In addition, the first processing includes: encryption, second processing includes: decryption processing;Or first processing include: school Calculation processing is tested, second processing includes: verification verifying calculation processing;Or first processing include: encryption and verification calculation processing, Second processing includes: decryption and verification verifying calculation processing.
In addition, cutting ferrule carries out safety instruction when being also used to detect that simulation card exceeds the efficient communication range of cutting ferrule.
In addition, cutting ferrule is mobile device.
In addition, cutting ferrule is mobile device and electronic signature equipment or cutting ferrule is electronic signature equipment.
As seen from the above technical solution provided by the invention, it by the data interactive method and system, may be implemented Cutting ferrule, simulation card, the data interaction in Truth cards manager application renewal process, and safety is higher.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the flow chart of cutting ferrule application program update in data interactive method provided in an embodiment of the present invention;
Fig. 2 is the process that Truth cards manager application updates in data interactive method provided in an embodiment of the present invention Figure;
Fig. 3 is the flow chart that card application program update is simulated in data interactive method provided in an embodiment of the present invention;
Fig. 4 is that cutting ferrule and simulation card establish safe connection mode one in data interactive method provided in an embodiment of the present invention Flow chart;
Fig. 5 is that cutting ferrule and simulation card establish safe connection mode two in data interactive method provided in an embodiment of the present invention Flow chart;
Fig. 6 is the process that cutting ferrule and simulation card execute bindings in data interactive method provided in an embodiment of the present invention Figure;
Fig. 7 is the structural schematic diagram of cutting ferrule application program update in data interaction system provided in an embodiment of the present invention;
Fig. 8 is the structure that Truth cards manager application updates in data interaction system provided in an embodiment of the present invention Schematic diagram;
Fig. 9 is the structural representation that card application program update is simulated in data interaction system provided in an embodiment of the present invention Figure.
Specific embodiment
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, belongs to protection scope of the present invention.
In the description of the present invention, it is to be understood that, term " center ", " longitudinal direction ", " transverse direction ", "upper", "lower", The orientation or positional relationship of the instructions such as "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outside" is It is based on the orientation or positional relationship shown in the drawings, is merely for convenience of description of the present invention and simplification of the description, rather than instruction or dark Show that signified device or element must have a particular orientation, be constructed and operated in a specific orientation, therefore should not be understood as pair Limitation of the invention.In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply opposite Importance or quantity or position.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with attached drawing.
The present invention provides a kind of frameworks of data interaction, both user are facilitated to carry to provide, and the higher friendship of safety Easy solution.The data interaction framework includes: simulation card, cutting ferrule and Truth cards manager.
Wherein:
Card is simulated, may include one or more, and the simulation card can may be for separately fabricated card It is reserved with the Truth cards of simulation card function.The simulation card is identical as existing bank's card dimensions, in notebook data interaction frame In structure, substitution Truth cards complete transaction.Simulating card has contact and/or non-contact interface, existing to cooperate Transaction terminal (such as ATM machine, POS machine, bus card top-up machines etc.) completes transaction.Simulation card also has wireless interface, simulates Card can carry out data interaction by the wireless interface and cutting ferrule.Wherein, contact interface can be contact etc., contactless Interface can for NFC interface etc., the wireless interface can for blue tooth interface, infrared interface, 2.4GHz interface, WIFI interface, RFID interface etc..
Cutting ferrule may include one or more cutting ferrules, and the cutting ferrule can manage one or more simulation card, every mould Quasi- card can only belong to a cutting ferrule and be managed by it.The cutting ferrule can for it is separately fabricated be card envelope shape equipment, Can be the mobile device with the cutting ferrule function of being provided in notebook data framework, comprising: smart phone, tablet computer (PAD), PDA (such as palm PC, learning machine), laptop, E-book reading device, wearable device (such as intelligent wristwatch, intelligence Energy glasses etc.) etc..Cutting ferrule can have contact and/or non-contact interface, so as to cooperate simulation card contact and/or Non-contact interface carries out data interaction, and cutting ferrule also can have wireless interface, will pass through the wireless interface and simulation card Corresponding interface carries out data interaction, wherein contact interface can be contact etc., and non-contact interface can be NFC interface It can be blue tooth interface, infrared interface, 2.4GHz interface, WIFI interface, RFID interface etc. Deng, the wireless interface;Cutting ferrule also has There is network interface, carry out data interaction will pass through network interface network interface corresponding with Truth cards manager, wherein The network interface can be WIFI interface, mobile interchange network interface (such as 3G, 4G network) etc..In addition, cutting ferrule can also be shifting The combination of dynamic equipment and electronic signature equipment, wherein the network interface of cutting ferrule is realized by means of the network interface of mobile device, He can be respectively positioned in electronic signature equipment interface (such as wireless interface, contact and/or non-contact interface etc.), or should Other interfaces can also be respectively positioned in mobile device or other interfaces in part of interface be located in electronic signature equipment, portion Tap mouth is located in mobile device;The processing operation that cutting ferrule executes executes in electronic signature equipment;Cutting ferrule can moreover be only Electronic signature equipment.Wherein, electronic signature equipment can be key equipment, such as industrial and commercial bank's U-shield, agricultural bank's K treasured etc..
Truth cards manager, can manage multiple cutting ferrules, and the Truth cards manager have multiple contacts (such as Card slot etc.) interface and/or contactless (such as NFC etc.) interface, to facilitate Truth cards manager that can pass through different modes Connect different types of Truth cards, wherein Truth cards manager is connected at least one Truth cards, and is stored with true Real card management device end Truth cards information list, Truth cards manager end Truth cards information list include and Truth cards The Truth cards information of the Truth cards of manager connection, which may include: card number, card authentication information etc. Information, the card authentication information be authenticate Truth cards whether be regular channel (such as bank, public transport company etc.) distribution card Piece information;The Truth cards can be function card (such as bus card, mess card, purchase card, member card, accumulating card etc.) or bank The bank card issued;Optionally, Truth cards manager can be set to save whole in Truth cards connected to it or The Truth cards information of part Truth cards, so that user makes different settings, example according to the security requirement to Truth cards The Truth cards information for allowing to obtain certain Truth cards can be such as set not on Truth cards manager, to guarantee these The safety of Truth cards.Truth cards manager also has network interface, corresponding with cutting ferrule will pass through the network interface Network interface carries out data interaction, wherein the network interface can be WIFI interface, mobile interchange network interface (such as 3G, 4G net Network) etc..
In notebook data interworking architecture, simulates card and Truth cards are smart chip card.
Hereinafter, being illustrated to the term in the present invention:
First processing includes: encryption, and second processing includes: decryption processing;Specifically, simple encryption guarantees that data pass Defeated safety can be handled when data to be transmitted security level required is higher using such mode.Or
First processing includes: verification calculation processing, and second processing includes: verification verifying calculation processing;Specifically, simple school Test guarantee data transfer integrity, prevent from distorting, treat integrity of data transmission it is more demanding when, such mode can be used It is handled.Or
First processing includes: encryption and verification calculation processing, and second processing includes: decryption and verification verifying calculation processing. Specifically, it using encryption and verification hybrid mode guarantee data transmission security and completely, is wanted to data security levels to be transmitted When seeking highest, it can be handled using such mode.
Based on above-mentioned data interaction framework, cutting ferrule can be updated or pacify to the application program that itself had been installed New application is filled, to expand the types of applications of cutting ferrule or to upgrade to the existing application of cutting ferrule.
The present invention provides a kind of data interactive method, and by the data interactive method, cutting ferrule application program may be implemented more Data interaction during new, and safety is higher.
A kind of specific implementation of cutting ferrule application program update presented below, but the present invention is not limited thereto:
Fig. 1 shows the flow chart of cutting ferrule application program update in data interactive method provided in an embodiment of the present invention, ginseng See Fig. 1, cutting ferrule application program update of the invention, comprising:
Cutting ferrule certificate is at least sent to update platform by cutting ferrule;Specifically, safe update platform is separately provided so as to complete At the update of cutting ferrule application program.Cutting ferrule certificate is sent to update platform by cutting ferrule, knows it is which cutting ferrule to update platform It needs to update, while the identity of cutting ferrule can also be verified;Cutting ferrule can also will need the application program identification that update or other It informs that updating platform needs the information for the application program for updating or downloading to be sent to update platform, knows to need to update platform Which application program installation kit is sent to cutting ferrule.
It updates platform and generates the first update encryption key;Specifically, platform itself is updated to generate for encrypting application program The update encryption key of installation kit, the update encryption key for carrying out generation when application program update every time can be identical or not Together, different then can prevent from being cracked, improve safety.
It updates platform and the first installation of encryption acquisition is carried out to cutting ferrule application program installation kit using the first update encryption key Packet ciphertext;Specifically, platform is updated using the update encryption keys cutting ferrule application program installation kit generated, to guarantee card Cover the safety of application program installation kit transmission.
It updates platform and signature acquisition the first installation packet signature is carried out to the first installation kit ciphertext using update platform private key;Tool Body, it updates platform and signs to the first installation kit ciphertext, so that subsequent cutting ferrule verifies the identity for updating platform.
It updates platform and updates encryption key using the cutting ferrule public key encryption first in cutting ferrule certificate, obtain first and update encryption Key ciphertext;Specifically, it updates platform and updates encryption key using cutting ferrule public key encryption, it is ensured that update encryption key transmission Safety, meanwhile, guarantee only have cutting ferrule that can just decrypt update encryption key, improve the peace of application program installation kit transmission Quan Xing.
It updates platform and cutting ferrule more new information is sent to cutting ferrule, wherein cutting ferrule more new packets include: update platform credential, First installation kit ciphertext, the first installation packet signature and first update encryption key ciphertext;Specifically, platform is updated to send more It is carried in new information and updates platform credential so that cutting ferrule is authenticated to platform is updated, it is close that the first installation kit is carried in more new information Text guarantees the safety of application program installation kit transmission, and the first installation packet signature is carried in more new information to guarantee that subsequent cutting ferrule can Update encryption key ciphertext is carried to authenticate to the legitimacy for updating platform identity, in more new information guarantees that update encryption is close The safety of key transmission.
Cutting ferrule receives cutting ferrule more new information, is verified using root certificate and updates platform credential;Specifically, root is stored in advance in cutting ferrule Certificate completes the verifying to platform credential is updated using the root certificate, subsequent using the safety for updating platform credential to guarantee.
After cutting ferrule verifying update platform credential passes through, installed using the update platform public key updated in platform credential to first Packet signature carries out sign test;Specifically, cutting ferrule is using the update platform public key in the update platform credential after being verified to update The signature that platform is sent is verified, to ensure the legitimate origin of data.
After cutting ferrule verifying the first installation packet signature is correct, encryption key ciphertext is updated using cutting ferrule private key decryption first, is obtained Obtain the first decruption key;Specifically, cutting ferrule decrypts decruption key using cutting ferrule private key, so that subsequent decryption installation kit ciphertext obtains Obtain cutting ferrule application program installation kit.
Cutting ferrule utilizes first decryption key decryption the first installation kit ciphertext, obtains cutting ferrule application program installation kit;
Whether the data format that cutting ferrule verifies cutting ferrule application program installation kit is correct;Specifically, cutting ferrule is also verified cutting ferrule and is answered It is whether correct with the data format of program installation kit, if the data format of cutting ferrule application program installation kit is incorrect, do not hold Row installation operation, if the data format of cutting ferrule application program installation kit is correct, executes installation.
If the data format that cutting ferrule verifies cutting ferrule application program installation kit is correct, cutting ferrule is installed according to cutting ferrule application program Packet is installed.Specifically, if cutting ferrule is updated to the application program installed, mounted answer can be covered With program, perhaps mounted application program is upgraded or is carried out again newly after unloading mounted application program in advance The installation of application program can be mounted directly the application program if cutting ferrule is new installation application program.
Update based on cutting ferrule of the invention to application program can both update mounted application program, can also be following New application program and installation are carried, the function of cutting ferrule has been expanded, it is user-friendly.
Based on above-mentioned data interaction framework, Truth cards manager can be carried out the application program that itself had been installed It updates and new application is perhaps installed to expand the types of applications of Truth cards manager or to Truth cards manager Existing application is upgraded.
The present invention provides a kind of data interactive method, and by the data interactive method, Truth cards manager may be implemented Data interaction during application program update, and safety is higher.
The specific implementation that a kind of Truth cards manager application presented below updates, but the present invention does not limit to In this:
It is updated Fig. 2 shows Truth cards manager application in data interactive method provided in an embodiment of the present invention Flow chart, referring to fig. 2, Truth cards manager application of the invention update, comprising:
Truth cards manager certificate is at least sent to update platform by Truth cards manager;Specifically, it is separately provided The update platform of safety is to complete the update of Truth cards manager application.Truth cards manager is by Truth cards pipe Reason device certificate is sent to update platform, knows which Truth cards manager needs to update to update platform, while can also To verify the identity of Truth cards manager;Truth cards manager can also will need the application program identification that update or its He informs that updating platform needs the information for the application program for updating or downloading to be sent to update platform, knows to update platform Need to send which application program installation kit to Truth cards manager.
It updates platform and generates third update encryption key;Specifically, platform itself is updated to generate for encrypting application program The update encryption key of installation kit, the update encryption key for carrying out generation when application program update every time can be identical or not Together, different then can prevent from being cracked, improve safety.
Update platform carries out encryption to Truth cards manager application installation kit using third update encryption key and obtains Obtain third installation kit ciphertext;Specifically, platform is updated using the update encryption keys Truth cards manager application generated Program installation kit, to guarantee the safety of Truth cards manager application installation kit transmission.
It updates platform and signature acquisition third installation packet signature is carried out to third installation kit ciphertext using update platform private key;Tool Body, it updates platform and signs to third installation kit ciphertext, so that subsequent Truth cards manager is to the identity for updating platform It is verified.
It updates platform and updates encryption using the Truth cards manager public key encryption third in Truth cards manager certificate Key obtains third and updates encryption key ciphertext;Specifically, it updates platform and is updated using Truth cards manager public key encryption and add Key, it is ensured that the safety of encryption key transmission is updated, meanwhile, guarantee only have Truth cards manager that can just decrypt Encryption key is updated out, improves the safety of application program installation kit transmission.
It updates platform and Truth cards manager more new information is sent to Truth cards manager, wherein Truth cards pipe Reason device more new packets include: it is close to update platform credential, third installation kit ciphertext, third installation packet signature and third update encryption Key ciphertext;Specifically, it updates in the more new information that platform is sent to carry and updates platform credential so that Truth cards manager is to more New platform is authenticated, and the safety that third installation kit ciphertext guarantees the transmission of application program installation kit is carried in more new information, more Third installation packet signature is carried in new information to guarantee that subsequent Truth cards manager can be to the legitimacy for updating platform identity It is authenticated, is carried in more new information and update the safety that encryption key ciphertext guarantees update encryption key transmission.
Truth cards manager receives Truth cards manager more new information, is verified using root certificate and updates platform credential; Specifically, root certificate is stored in advance in Truth cards manager, completes the verifying to platform credential is updated using the root certificate, to protect It demonstrate,proves subsequent using the safety for updating platform credential.
After Truth cards manager verifying update platform credential passes through, the update platform public key updated in platform credential is utilized Sign test is carried out to third installation packet signature;Specifically, Truth cards manager is using in the update platform credential after being verified Update platform public key to update platform send signature verify, to ensure the legitimate origin of data.
After Truth cards manager verifying third installation packet signature is correct, Truth cards manager private key is utilized to decrypt third Encryption key ciphertext is updated, third decruption key is obtained;Specifically, Truth cards manager utilizes Truth cards manager private key Decruption key is decrypted, so that subsequent decryption installation kit ciphertext obtains Truth cards manager application installation kit.
Truth cards manager utilizes third decryption key decryption third installation kit ciphertext, obtains Truth cards manager and answers With program installation kit;
Whether the data format that Truth cards manager verifies Truth cards manager application installation kit is correct;Specifically Ground, whether the data format that Truth cards manager also verifies Truth cards manager application installation kit is correct, such as truly The data format of real card management device application program installation kit is incorrect, then installation operation is not executed, if Truth cards management The data format of device application program installation kit is correct, then executes installation.
If the data format that Truth cards manager verifies Truth cards manager application installation kit is correct, really Card management device is installed according to Truth cards manager application installation kit.Specifically, if Truth cards manager It is to be updated to the application program installed, then can covers mounted application program, or to mounted application Program is upgraded, or unloads the installation for carrying out new application program after mounted application program again in advance, if really Card management device is new installation application program, then can be mounted directly the application program.
Update based on Truth cards manager of the invention to application program can both update mounted using journey Sequence can also download new application program and installation, expand the function of Truth cards manager, user-friendly.
Based on above-mentioned data interaction framework, simulate card the application program that itself had been installed can be updated or Person installs new application, to expand the types of applications of simulation card or to upgrade to the existing application of simulation card.
The present invention provides a kind of data interactive method, and by the data interactive method, simulation card application journey may be implemented Data interaction in sequence renewal process, and safety is higher.
A kind of specific implementation for simulating card application program update presented below, but the present invention is not limited thereto:
Fig. 3 shows the process that card application program update is simulated in data interactive method provided in an embodiment of the present invention Figure, referring to Fig. 3, simulation card application program update of the invention, comprising:
Cutting ferrule obtains simulation card certificate from simulation card, and analog card piece certificate is at least sent to update platform;Tool Body, cutting ferrule can obtain simulation card certificate from simulation card in the following way: cutting ferrule is by contact or non-connects After touch detects simulation card, the request for obtaining simulation card certificate is sent to simulation card, simulation card receives cutting ferrule After the request of transmission, simulation card certificate is sent to cutting ferrule;Either cutting ferrule passes through contact or non-contact detection to mould After quasi- card, simulation card certificate is actively sent to cutting ferrule by simulation card.Optional alternative solution: cutting ferrule by contact or After person's non-contact detection to simulation card, the request for obtaining simulation card unique identification is sent to simulation card, simulates card After the request for receiving cutting ferrule transmission, simulation card unique identification is sent to cutting ferrule, cutting ferrule receives simulation card and uniquely marks Simulation card can also be obtained after knowledge from the first list of bindings of cutting ferrule end being locally stored according to the simulation card unique identification The corresponding simulation card certificate of unique identification;After either cutting ferrule is by contact or non-contact detection to simulation card, mould Simulation card unique identification is actively sent to cutting ferrule by quasi- card, and cutting ferrule can also basis after receiving simulation card unique identification It is corresponding that the simulation card unique identification obtains simulation card unique identification from the first list of bindings of cutting ferrule end being locally stored Simulate card certificate.In addition, safe update platform is separately provided to complete the update of simulation card application program.Cutting ferrule will Simulation card certificate is sent to update platform, knows which simulation card needs to update to update platform, while can also be with The identity of verifying simulation card;The application program identification for needing to update or other informings can also be updated platform needs by cutting ferrule It updates or the information of the application program of downloading is sent to update platform, which knows to need to send using journey to update platform Sequence installation kit is to simulating card.
It updates platform and generates the second update encryption key;Specifically, platform itself is updated to generate for encrypting application program The update encryption key of installation kit, the update encryption key for carrying out generation when application program update every time can be identical or not Together, different then can prevent from being cracked, improve safety.
It updates platform and encryption acquisition second is carried out to simulation card application program installation kit using the second update encryption key Installation kit ciphertext;Specifically, it updates platform and simulates card application program installation kit using the update encryption keys generated, from And guarantee the safety of simulation card application program installation kit transmission.
It updates platform and signature acquisition the second installation packet signature is carried out to the second installation kit ciphertext using update platform private key;Tool Body, it updates platform and signs to the second installation kit ciphertext, so that subsequent simulation card tests the identity for updating platform Card.
It updates platform and updates encryption key using the simulation card public key encryption second in simulation card certificate, obtain second Update encryption key ciphertext;Specifically, it updates platform and updates encryption key using simulation card public key encryption, it is ensured that update The safety of encryption key transmission, meanwhile, guarantee that only simulation card can just decrypt update encryption key, improves and apply journey The safety of sequence installation kit transmission.
It updates platform and simulation card update information is sent to cutting ferrule, wherein it includes: to update to put down that simulation card, which updates information, Platform certificate, the second installation kit ciphertext, the second installation packet signature and second update encryption key ciphertext;Specifically, platform is updated It is carried in the more new information sent and updates platform credential to simulate card to platform is updated and to authenticate, carried in more new information Second installation kit ciphertext guarantees the safety of application program installation kit transmission, and the second installation packet signature is carried in more new information to protect The legitimacy for updating platform identity can be authenticated by demonstrate,proving subsequent simulation card, and it is close that update encryption key is carried in more new information Text guarantees to update the safety of encryption key transmission.
Cutting ferrule receives simulation card and updates information, and is sent to simulation card;
It simulates card and receives the simulation card update information that cutting ferrule is sent, verified using root certificate and update platform credential;Tool Body, root certificate is stored in advance in simulation card, the verifying to platform credential is updated is completed using the root certificate, to guarantee subsequent make With the safety for updating platform credential.
After simulation card verifying update platform credential passes through, using the update platform public key updated in platform credential to second Packet signature is installed and carries out sign test;Specifically, simulation card is public using the update platform in the update platform credential after being verified Key is verified to the signature that platform is sent is updated, to ensure the legitimate origin of data.
After simulation card verifying the second installation packet signature is correct, simulation card private key decryption the second update encryption key is utilized Ciphertext obtains the second decruption key;Specifically, simulation card decrypts decruption key using simulation card private key, so as to subsequent It decrypts installation kit ciphertext and obtains simulation card application program installation kit.
It simulates card and utilizes second decryption key decryption the second installation kit ciphertext, obtain simulation card application program installation Packet;
Whether the data format for simulating card verifying simulation card application program installation kit is correct;Specifically, card is simulated Whether the data format of also verifying simulation card application program installation kit is correct, if the number of simulation card application program installation kit It is incorrect according to format, then installation operation is not executed, if the data format of simulation card application program installation kit is correct, is executed Installation.
If the data format for simulating card verifying simulation card application program installation kit is correct, card is simulated according to simulation Card application program installation kit is installed.Specifically, if simulation card is updated to the application program installed, Mounted application program can be then covered, perhaps mounted application program is upgraded or unloading has been installed in advance Application program after carry out the installation of new application program again, can be direct if simulation card is new installation application program The application program is installed.
Based on the update of the simulation corresponding program of card of the invention, mounted application program can be both updated, it can also To download new application program and installation, the function of simulation card has been expanded, it is user-friendly.
Based on above-mentioned data interaction framework, the peace of simulation card application program update is improved in data interactive method Quan Xing in process shown in Fig. 3, can also include that cutting ferrule and simulation card establish secure connection, obtain cutting ferrule and analog card Cutting ferrule end the first safe transmission key of data security transmission and the process of simulation Card-terminal safe transmission key are carried out between piece:
In the present invention, cutting ferrule and simulation card can establish in the following way secure connection:
Mode one, cutting ferrule and simulation card mutual authentication other side identity (such as mutual authentication other side signed data), and During mutual authentication other side's identity, whether the binding factor for comparing both sides' storage is identical, in the binding of relatively both sides storage After the factor is identical and mutual authentication other side's identity passes through, generates cutting ferrule and simulate the safety for carrying out data security transmission between card Transmission key (cutting ferrule end the first safe transmission key and simulation Card-terminal safe transmission key).
It is worth noting that if performing above-mentioned cutting ferrule and mould before cutting ferrule and simulation card establish secure connection Quasi- card mutual authentication other side certificate and other side's identity, and after both sides authenticate and pass through, it is respectively stored in verification process raw At binding factor bindings, then in the method one, cutting ferrule and simulation card mutual authentication other side's identity be cutting ferrule With simulation card mutual authentication other side identity again.
Hereinafter, a kind of specific implementation of presentation mode one of the present invention:
Fig. 4 shows cutting ferrule and simulation card in data interactive method provided in an embodiment of the present invention and establishes secure connection side The flow chart of formula one, referring to fig. 4, cutting ferrule establish secure connection with simulation card and include:
Cutting ferrule sends to simulation card and is used to indicate the first secure connection for establishing secure connection instruction, wherein the first peace Full link order includes: that cutting ferrule utilizes the simulation card public key in simulation card certificate to the first binding factor of cutting ferrule end and life At the first connection random factor carry out the first connection ciphertext of encryption acquisition, cutting ferrule ties up cutting ferrule end first using cutting ferrule private key Determine the factor and the first connection random factor carries out the first connection signature of signature acquisition;Specifically, cutting ferrule and simulation are being used Before card carries out data interaction, optionally, secure connection is established between cutting ferrule and simulation card, to improve follow-up data friendship Mutual safety.Wherein, cutting ferrule it is received be used to indicate establish the first secure connection instruction of secure connection can be individually to set Set what the connection physical button on cutting ferrule generated, or can be generated for the connection virtual key on the touch screen of cutting ferrule, or Person can correctly generate afterwards for start-up password verification, perhaps can will simulate generated after card is extracted from cutting ferrule or It can be selection linkage function generation in the menu shown on cutting ferrule screen, or can be true to obtain cutting ferrule end in cutting ferrule Real card image list, what user therefrom selected to generate after Truth cards.It is, of course, also possible to generated for other any modes, In the present invention and with no restriction.Wherein, first the random number, random character or its that random factor can be cutting ferrule generation are connected Combination after generation first connects random factor, can also verify the randomness of the first connection random factor certainly, To improve the randomness of the first connection random factor, prevent from being cracked;Specifically, cutting ferrule is using simulation card public key to cutting ferrule end First binding factor and the first connection random factor carry out being encrypted to ensure that the first binding factor of cutting ferrule end and the first connection The safety of random factor transmission, cutting ferrule is using cutting ferrule private key to the first binding factor of cutting ferrule end and the first connection random factor It signs, to guarantee that subsequent simulation card can authenticate the legitimacy of cutting ferrule identity.By cutting ferrule end first binding because Son is sent to simulation card, the binding factor phase whether stored with it so as to subsequent simulation card to the first binding factor of cutting ferrule end It is same to be judged, to judge whether the cutting ferrule is bound with the simulation card.Optionally, before this step, cutting ferrule inspection After measuring simulation card, cutting ferrule, which may determine that, simulates card whether in the first list of bindings of cutting ferrule end, such as: it can be by such as Under type is judged: being fastened in after detecting simulation card, is received the simulation card image that simulation card is sent and (such as simulate Card unique identification and/or simulation card certificate etc.), according to the simulation card image received, whether judge the simulation card In the first list of bindings of cutting ferrule end;And/or cutting ferrule can also be judged whether in simulation Card-terminal list of bindings by simulation card In, such as: it can be judged in the following way: be fastened in after detecting simulation card, (such as cutting ferrule is unique by cutting ferrule information Mark and/or cutting ferrule certificate etc.) it is sent to simulation card, card is simulated according to the cutting ferrule information received, judges that the cutting ferrule is It is no simulation Card-terminal list of bindings in;Only after judging other side in the list of bindings of itself, follow-up process is just executed, it is excellent Change process, improves efficiency.
It simulates card and receives the instruction of the first secure connection, the first connection ciphertext is decrypted using simulation card private key, It obtains cutting ferrule end first and binds decryption factor and the first connection decryption random factor;Specifically, simulation card private key pair is utilized First connection ciphertext is decrypted, if data transmission fault has occurred in the data transmission, or occurs in the data transmission Distort, then will lead to can not successful decryption, or the cutting ferrule end first that decrypts bind decryption factor and the first connection with Machine decryption factor is different from the first binding factor of cutting ferrule end and the first connection random factor.And it is carried out by simulation card public key Encryption, only simulation card private key can be with successful decryption, thus it is also ensured that the safety of data deciphering.
Simulate card using the cutting ferrule public key in cutting ferrule certificate, cutting ferrule end first bind decryption factor and the first connection with Machine decryption factor verifies the first connection signature;Specifically, the signature that simulation card utilizes cutting ferrule public key to send cutting ferrule It is verified, to ensure the legitimate origin of data.
After simulating the first connection of card verifying signature correctly, decryption factor and simulation Card-terminal are bound in verifying cutting ferrule end first Whether binding factor is identical;Specifically, simulation card also verify the cutting ferrule end first that decrypts bind decryption factor whether with mould Whether the simulation Card-terminal binding factor of quasi- card itself storage is identical, if identical, illustrates that this is fastened in and simulation card Establish before secure connection, have been completed the operation of binding, be based on this, simulation card may determine that cutting ferrule whether with analog card Piece is bound.
After simulation card verifying cutting ferrule end first binding decryption factor is identical as simulation Card-terminal binding factor, second is generated Connect random factor;Specifically, random number, random character or its group that the second connection random factor can generate for analog card piece It closes, certainly, after generation second connects random factor, the randomness of the second connection random factor can also be verified, with The randomness for improving the second connection random factor, prevents from being cracked.
Simulate card using the cutting ferrule public key in cutting ferrule certificate to the first connection decryption random factor and the second connection with The machine factor carries out encryption and obtains the second connection ciphertext, using simulation card private key to the first connection decryption random factor and second Connection random factor carries out signature and obtains the second connection signature;Specifically, simulation card using cutting ferrule public key to first connection with Machine decryption factor and the second connection random factor carry out being encrypted to ensure that the first connection decryption random factor and the second connection The safety of random factor transmission, simulation card connect the first connection decryption random factor and second using simulation card private key It connects random factor to sign, to guarantee that subsequent cutting ferrule can authenticate the legitimacy of simulation card identity.
It simulates card and sends the response of the first secure connection to cutting ferrule, wherein the response of the first secure connection includes: the second connection Ciphertext and the second connection signature;Specifically, the second connection ciphertext and the second connection signature are sent to cutting ferrule by simulation card, with Just cutting ferrule is decrypted and verifies to the data received.
Cutting ferrule receives the response of the first secure connection, is decrypted, is decrypted to the second connection ciphertext using cutting ferrule private key The first connection decryption random factor and the second connection decryption random factor afterwards;Specifically, it is connected using cutting ferrule private key to second Ciphertext is decrypted, if data transmission fault has occurred in the data transmission, or is distorted in the data transmission, then Will lead to can not the first connection decryption random factor and the second connection decryption random factor and the after successful decryption, or decryption One connection random factor and the second connection random factor are different.And encrypted by cutting ferrule public key, only cutting ferrule private key can be with Successful decryption, thus it is also ensured that the safety of data deciphering.
Cutting ferrule utilizes the simulation card public key in simulation card certificate, the first connection decryption random factor after decryption and the The two connection connection signatures of decryption random factor pair second are verified;Specifically, cutting ferrule is using simulation card public key to analog card The signature that piece is sent is verified, to ensure the legitimate origin of data.
After cutting ferrule verifying the second connection signature is correct, the first connection decryption random factor after verifying decryption is connect with first Whether random factor is identical;Specifically, the first connection random factor that cutting ferrule verifies itself generation is connect with first after decryption The decryption random factor is identical, it is ensured that data are simultaneously not tampered with, and the data source encrypted is that cutting ferrule sends the first company really Connect the object of random factor.
Cutting ferrule verifying decryption after first connection the decryption random factor with first connect random factor it is identical after, at least with The second connection decryption random factor generates cutting ferrule and simulates cutting ferrule end the first safe transmission key between card;Simulate card at least Cutting ferrule is generated using the second connection random factor and simulates the simulation Card-terminal safe transmission key between card.Specifically, cutting ferrule It can use the second connection decryption random factor to generate cutting ferrule and simulate cutting ferrule end the first safe transmission key between card, it can also Pacified with generating cutting ferrule using the first connection random factor, the second connection decryption random factor and simulating the cutting ferrule end first between card Full transmission key can also be bound using the first connection random factor, the second connection decryption random factor and cutting ferrule end first The factor generates cutting ferrule and simulates cutting ferrule end the first safe transmission key between card;Likewise, simulation card also can use the Two connection random factors generate cutting ferrule and simulate the simulation Card-terminal safe transmission key between card, also can use the first connection The decryption random factor, the second connection random factor generate cutting ferrule and simulate the simulation Card-terminal safe transmission key between card, also Can use the first connection decryption random factor, second connection random factor and simulation Card-terminal binding factor generate cutting ferrule with Simulate the simulation Card-terminal safe transmission key between card;As long as cutting ferrule and simulation card use the identical algorithm of identical parameter Generate safe transmission key.It can be seen that in the present invention, safe transmission cryptographic key factor can connect at cutting ferrule end for second Connect the decryption random factor or the second connection decryption random factor and the first connection random factor;Safe transmission cryptographic key factor Simulation Card-terminal can for second connection random factor or second connection random factor and first connection decryption random because Son.In addition, safe transmission key may include encryption and decryption key and/or check key, number can be participated in using encryption and decryption key The safety that can guarantee data transmission according to transmission, the complete of data transmission can be guaranteed by participating in data transmission using check key Property, in the present invention it is possible to safe transmission key is selectively used according to the safety grades of transmission data.
Certainly, in the present invention, simulation card generates between cutting ferrule and simulation card at least with the second connection random factor The step of simulating Card-terminal safe transmission key is not limited to step in the method one, can also generate the in simulation card Simulation Card-terminal safe transmission key is generated after two connection random factors, it can also be in the first connection after cutting ferrule verifies decryption After the decryption random factor is identical as the first connection random factor, simulation Card-terminal peace is generated after receiving the successful information that cutting ferrule is sent Full transmission key.
It can be seen that the safety of data transmission can be improved based on the secure connection that above-mentioned cutting ferrule and simulation card are established Property, whether bound at the same time it can also verify both sides, further improves safety.
If cutting ferrule and simulation card are established before secure connection, performs and the operation such as bind manually and store binding factor (description that the operation may refer to binding part), then in the method one, cutting ferrule and simulation card are in addition to mutual authentication other side Except identity, it is also necessary to mutual authentication other side's certificate.
In addition, the invention is not limited to above-mentioned cutting ferrules to initiate the foundation of secure connection, it can also be triggered and be simulated by cutting ferrule Card initiate secure connection foundation, at this point, by simulation card send the first secure connection instruct to cutting ferrule, other processes with it is upper State flow implementation main body can be realized on the contrary, and this is no longer going to repeat them.
Mode two, cutting ferrule and simulation card mutual authentication other side identity (such as mutual authentication other side signed data), and Safe transmission cryptographic key factor is generated during mutual authentication other side identity, after mutual authentication other side's identity passes through, at least with The binding factor and safe transmission cryptographic key factor of storage generate cutting ferrule and simulate the safety for carrying out data security transmission between card Transmission key (cutting ferrule end the first safe transmission key and simulation Card-terminal safe transmission key), and verify the safety of both sides' generation Whether transmission key is identical.
It is worth noting that if performing above-mentioned cutting ferrule and mould before cutting ferrule and simulation card establish secure connection Quasi- card mutual authentication other side certificate and other side's identity, and after both sides authenticate and pass through, it is respectively stored in verification process raw At binding factor bindings, then in the method two, cutting ferrule and simulation card mutual authentication other side's identity be cutting ferrule With simulation card mutual authentication other side identity again.
Hereinafter, a kind of specific implementation of presentation mode two of the present invention:
Fig. 5 shows cutting ferrule and simulation card in data interactive method provided in an embodiment of the present invention and establishes secure connection side The flow chart of formula two, referring to Fig. 5, cutting ferrule establishes secure connection with simulation card and includes:
Cutting ferrule receives the third connection random factor that the simulation card that simulation card is sent generates and simulation card is unique Mark;Specifically, third connection random factor can be random number that analog card piece generates, random character or combinations thereof, certainly, After generating third connection random factor, the randomness that can also connect random factor to third is verified, to improve third The randomness for connecting random factor, prevents from being cracked.Before this step, simulation card generates third and connects random factor, After cutting ferrule detects the simulation card, the third is connected random factor with simulation card and simulation card unique identification is sent to Cutting ferrule.
Cutting ferrule sends to simulation card and is used to indicate the second secure connection for establishing secure connection instruction, wherein the second peace Full link order include: cutting ferrule unique identification, cutting ferrule using the simulation card public key in simulation card certificate to third connection with The machine factor and the 4th connection random factor of generation carry out the third connection ciphertext of encryption acquisition, cutting ferrule utilizes cutting ferrule private key pair Third connection random factor and the 4th connection random factor carry out the third connection signature of signature acquisition;Specifically, it is using Before cutting ferrule and simulation card carry out data interaction, optionally, secure connection is established between cutting ferrule and simulation card, to improve The safety of follow-up data interaction.Wherein, cutting ferrule it is received be used to indicate establish secure connection the second secure connection instruction can Think what the connection physical button being provided separately on cutting ferrule generated, or can be the connection virtual key on the touch screen of cutting ferrule Generation perhaps can be that start-up password verification correctly generates afterwards or can be raw after cutting ferrule extraction for that will simulate card At, it is can perhaps being generated for selection linkage function in the menu that is shown on cutting ferrule screen or can be to be obtained in cutting ferrule Cutting ferrule end Truth cards information list, what user therefrom selected to generate after Truth cards.It is, of course, also possible to be other any sides What formula generated, in the present invention and with no restriction.Specifically, cutting ferrule using simulation card public key to third connect random factor with And the 4th connection random factor generated carries out being encrypted to ensure that the 4th connection of third connection random factor and generation is random The safety of factor transmission, cutting ferrule connect the 4th connection random factor of random factor and generation using cutting ferrule private key to third It signs, to guarantee that subsequent simulation card can authenticate the legitimacy of cutting ferrule identity.In addition, the 4th connection it is random because Son can be that random number, random character of cutting ferrule generation or combinations thereof after generating the 4th connection random factor, may be used also certainly It is verified with the randomness to the 4th connection random factor, to improve the randomness of the 4th connection random factor, prevents from being broken Solution;Optionally, before this step, after cutting ferrule receives simulation card unique identification, cutting ferrule can be according to simulation card only One mark judges to simulate card whether in the first list of bindings of cutting ferrule end, only ties up in judgement simulation card at cutting ferrule end first After determining in list, follow-up process is just executed, process is optimized, improves efficiency.
It simulates card and receives the instruction of the second secure connection, judge cutting ferrule unique identification whether in simulation Card-terminal list of bindings In;Specifically, whether simulation card judges the cutting ferrule in simulation Card-terminal list of bindings according to the cutting ferrule unique identification received In;Only after judgement is fastened in simulation Card-terminal list of bindings, follow-up process is just executed, process is optimized, improves effect Rate.
If cutting ferrule unique identification, in simulation Card-terminal list of bindings, simulation card is using simulation card private key to third Connection ciphertext is decrypted, and obtains the third connection decryption random factor and the 4th connection decryption random factor;Specifically, it utilizes Third connection ciphertext is decrypted in simulation card private key, if data transmission fault has occurred in the data transmission, Huo Zhe Data transmission in distorted, then will lead to can not successful decryption, or obtain third connection the decryption random factor and The 4th connection decryption random factor connects random factor from third and the 4th connection random factor is different.And pass through simulation card Public key is encrypted, and only simulation card private key can be with successful decryption, thus it is also ensured that the safety of data deciphering.
It simulates card and connects the decryption random factor and the 4th connection at random using the cutting ferrule public key in cutting ferrule certificate, third Decryption factor verifies third connection signature;Specifically, the signature that simulation card sends cutting ferrule using cutting ferrule public key into Row verifying, to ensure the legitimate origin of data.
After simulating card verifying third connection signature correctly, the verifying third connection decryption random factor is connect at random with third Whether the factor is identical;Specifically, the third connection random factor that simulation card verifies itself generation connect decryption random with third The factor is identical, it is ensured that data are simultaneously not tampered with, and encrypt data source really be simulation card send third connection with The object of the machine factor.
If it is identical as third connection random factor that third connects the decryption random factor, simulation card is private using simulation card Key connects the decryption random factor to third and the 4th connection decryption random factor carries out the 4th connection of signature acquisition and signs;Specifically Ground, simulation card connects the decryption random factor to third using simulation card private key and the 4th connection decryption random factor carries out Signature, to guarantee that subsequent cutting ferrule can authenticate the legitimacy of simulation card identity.
It simulates card and sends the response of the second secure connection to cutting ferrule, wherein the response of the second secure connection includes: the 4th connection Signature;Specifically, the 4th connection signature is sent to cutting ferrule by simulation card, so that cutting ferrule verifies the data received.
Cutting ferrule receive the second secure connection response, using simulation card certificate in simulation card public key, third connection with The machine factor and the 4th connection random factor verify the 4th connection signature;Specifically, cutting ferrule utilizes simulation card public key pair The signature that simulation card is sent is verified, to ensure the legitimate origin of data.
After the 4th connection signature of cutting ferrule verifying is correct, bound at least with the 4th connection random factor and cutting ferrule end first The factor generates cutting ferrule and simulates cutting ferrule end the first safe transmission key between card;It is random at least with the 4th connection to simulate card Decryption factor and simulation Card-terminal binding factor generate cutting ferrule and simulate the simulation Card-terminal safe transmission key between card;Tool Body, cutting ferrule can use the 4th connection random factor and the first binding factor of cutting ferrule end generates between cutting ferrule and simulation card Cutting ferrule end the first safe transmission key also can use third connection random factor, the 4th connection random factor and cutting ferrule end First binding factor generates cutting ferrule and simulates cutting ferrule end the first safe transmission key between card;Likewise, simulation card can also To generate cutting ferrule using the 4th connection decryption random factor and simulation Card-terminal binding factor and simulate the analog card between card Bit end safe transmission key also can use third connection random factor, the 4th connection decryption random factor and simulation card It holds binding factor to generate cutting ferrule and simulates the simulation Card-terminal safe transmission key between card;As long as cutting ferrule and simulation card use The identical algorithm of identical parameter generates safe transmission key.It can be seen that in the present invention, safe transmission cryptographic key factor At cutting ferrule end random factor and the 4th connection random factor can be connected for the 4th connection random factor or third;Safety The transmission key factor can connect random factor and the in simulation Card-terminal for the 4th connection decryption random factor or third The four connection decryption random factors.In addition, safe transmission key may include encryption and decryption key and/or check key, solved using adding Key, which can participate in data transmission, can guarantee the safety of data transmission, and participating in data transmission using check key can protect Demonstrate,prove the integrality of data transmission, in the present invention it is possible to selectively use safe biography according to the safety grades of transmission data Defeated key.
Cutting ferrule utilizes the first safe transmission of cutting ferrule end key pair third connection random factor and the 4th connection random factor Simulation card is sent to after carrying out the first processing;Card is simulated to connect at random using simulation Card-terminal safe transmission key pair third Decryption factor and the 4th connection decryption random factor are sent to cutting ferrule after carrying out the first processing;Specifically, both sides are using respectively The safe transmission data key of generation is sent to other side after carrying out the first processing, passes so that other side verifies the safety that both sides generate Whether defeated key is identical.
Cutting ferrule receives the data that simulation card is sent, and the data received using cutting ferrule end the first safe transmission key pair Carry out second processing, the data after comparing second processing connect with third random factor and the 4th connect random factor whether phase Together;It simulates card and receives the data that cutting ferrule is sent, and carried out using the data that simulation Card-terminal safe transmission key pair receives Second processing, the data after comparing second processing connect the decryption random factor with third and the 4th connection decryption random factor is It is no identical.Specifically, after both sides carry out second processing using the data that the safe transmission key pair of each self-generating receives, respectively Whether the data after comparing second processing are identical as the data respectively sent, if identical, the safety for illustrating that both sides generate is passed Defeated key is identical, to guarantee that the subsequent safe transmission key that can use each self-generating of both sides carries out data security transmission.Separately Outside, the safe transmission key generated in verifying both sides is identical it is also possible to verify the binding factor that respectively stores identical, into It is true bound object that one step, which demonstrate,proves other side, further increases the safety of subsequent data transmission.
Certainly, in the present invention, simulation card generates the step of simulating Card-terminal safe transmission key and is not limited to we It is close can also to generate simulation Card-terminal safe transmission after decryption obtains the 4th connection decryption random factor for step in formula two Key, can also be after the 4th connection signature that cutting ferrule verifies simulation card transmission be errorless, after receiving the successful information that cutting ferrule is sent Generate simulation Card-terminal safe transmission key;The step of cutting ferrule generation the first safe transmission of cutting ferrule end key, is also not limited to we Step in formula two can also generate the first safe transmission of cutting ferrule end key after cutting ferrule generates the 4th connection random factor.
It can be seen that the safety of data transmission can be improved based on the secure connection that above-mentioned cutting ferrule and simulation card are established Property.At the same time it can also verify whether both sides are bound, safety is further improved.
If cutting ferrule and simulation card are established before secure connection, performs and the operation such as bind manually and store binding factor (description that the operation may refer to binding part), then in the method two, cutting ferrule and simulation card are in addition to mutual authentication other side Except identity, it is also necessary to mutual authentication other side's certificate.
In addition, the invention is not limited to above-mentioned cutting ferrules to initiate the foundation of secure connection, it can also be triggered and be simulated by cutting ferrule Card initiate secure connection foundation, at this point, by simulation card send the second secure connection instruct to cutting ferrule, other processes with it is upper State flow implementation main body can be realized on the contrary, and this is no longer going to repeat them.
Certainly, cutting ferrule is being generated in aforesaid way one and mode two and is simulating the peace of progress data security transmission between card During full transmission key, the binding factor used is cutting ferrule and the binding simulating card and generate and save in binding procedure The factor, the binding factor can be for by above-mentioned cutting ferrules and simulation card mutual authentication other side certificate and other side's identity, and double After just certification passes through, it is respectively stored in the binding factor generated in verification process, or can be to pass through the side bound manually The binding factor that formula is inputted and stored.
In addition, being adopted in aforesaid way one and mode two if being not carried out bindings between cutting ferrule and simulation card Binding factor can be the random value being manually entered during establishing secure connection;Or establishing secure connection process In, safe transmission key is only generated by random factor, not binding factor verify or does not use binding factor raw At safe transmission key.
Based on secure connection is carried out between above-mentioned cutting ferrule and simulation card, it ensure that data are handed between cutting ferrule and simulation card Mutual safety, at this point, the data that simulation card is sent to cutting ferrule utilize after cutting ferrule and simulation card establish secure connection Simulation Card-terminal safe transmission key is sent after carrying out the first processing, and cutting ferrule receives first treated data, utilizes cutting ferrule Safe transmission key is held to carry out second processing;Cutting ferrule is carried out to the data that simulation card is sent using cutting ferrule end safe transmission key It is sent after first processing, simulation card receives first treated data, and simulation Card-terminal safe transmission key is utilized to carry out Second processing.Specifically, such as cutting ferrule shown in Fig. 3 receives simulation card and updates information, and is sent to simulation card, simulates Card receives the simulation card that cutting ferrule is sent and updates in information Step, and simulation card can be specifically received using cutting ferrule and updates letter Breath is updated after information carries out the first processing using cutting ferrule end the first safe transmission key pair simulation card and is sent to simulation card, It simulates card and receives the data that cutting ferrule is sent, carried out at second using the data that simulation Card-terminal safe transmission key pair receives After reason, the mode that simulation card updates information is obtained;When based on cutting ferrule using secure connection is established between cutting ferrule and simulation card The safe transmission key pair simulation card of generation, which updates after information is handled, to be transmitted, and the safety of data transmission can be improved.
Before cutting ferrule and simulation card establish secure connection, in order to guarantee the authenticity of data interaction both sides' identity, card Bindings can also be performed with simulation card in set:
In the present invention, cutting ferrule can be bound in the following way with simulation card:
Cutting ferrule and simulation card mutual authentication other side certificate and other side's identity, and after both sides authenticate and pass through, respectively deposit Store up the binding factor generated in verification process.
Hereinafter, providing the specific implementation of a kind of cutting ferrule and simulation card execution bindings:
Fig. 6 shows cutting ferrule and simulation card in data interactive method provided in an embodiment of the present invention and executes bindings Flow chart, referring to Fig. 6, cutting ferrule executes bindings with simulation card and includes:
Cutting ferrule receives the trigger command for being used to indicate and being bound with simulation card;It specifically, can before cutting ferrule use To execute power-on operation to cutting ferrule in advance, at this point, optionally, cutting ferrule prompts user to input startup password, and user's input is received Startup password, verify user input startup password correctness, verifying user input startup password it is correct after, execute Power-on operation, cutting ferrule enter operating mode.Before carrying out data interaction using cutting ferrule and simulation card, optionally, by cutting ferrule It is bound with simulation card, to improve the safety of follow-up data interaction.Wherein, cutting ferrule is received is used to indicate cutting ferrule and mould The trigger command that quasi- card is bound can be that the binding physical key being provided separately on cutting ferrule generates, or can be What the binding virtual key on the touch screen of cutting ferrule generated, it is perhaps can correctly being generated afterwards for start-up password verification or can be with It will simulate after card is inserted into cutting ferrule and generate, or can be to select binding function in the menu shown on cutting ferrule screen It generates, it is, of course, also possible to generated for other any modes, in the present invention and with no restriction.
Cutting ferrule is instructed to the first binding of transmission of simulation card, wherein first, which binds instruction includes: cutting ferrule generation first, ties up Determine random factor, cutting ferrule certificate and cutting ferrule unique identification;Specifically, cutting ferrule can be connected by contact (passes through contact Interface) to simulation card send the first binding instruction, cutting ferrule can also by contactless connection (by non-contact interface or Person's wireless interface) to transmission the first binding instruction of simulation card, binding safety can be improved in the former, and binding can be improved in the latter Convenience.The first binding random factor is carried in first binding instruction can prevent Replay Attack, carry in the first binding instruction Cutting ferrule certificate authenticates to simulate card to cutting ferrule, carries cutting ferrule unique identification in the first binding instruction to simulate card Know which cutting ferrule is bound with it;Wherein, first the random number, random character or its that random factor can be cutting ferrule generation are bound Combination after random factor is bound in generation first, can also verify the randomness of the first binding random factor certainly, To improve the randomness of the first binding random factor, prevent from being cracked;Cutting ferrule unique identification can be known for cutting ferrule sequence number, equipment Other code, MAC Address etc. are any or combinations thereof with the mark of unique identification cutting ferrule.
It simulates card and receives the first binding instruction, cutting ferrule certificate is verified using root certificate;Specifically, card is simulated Root certificate is stored in advance, the verifying to cutting ferrule certificate is completed using the root certificate, to guarantee the subsequent safety using cutting ferrule certificate Property.
After simulation card verifying cutting ferrule certificate is legal, the second binding random factor is generated;Specifically, second binding it is random because Son can be random number, random character of the generation of analog card piece or combinations thereof;Certainly, after random factor is bound in generation second, The randomness of second binding random factor can also be verified, to improve the randomness of the second binding random factor, be prevented It is cracked.
Simulate card using the cutting ferrule public key in cutting ferrule certificate it is random to the first binding random factor and the second binding because Son carries out encryption and obtains the first binding ciphertext, random to the first binding random factor and the second binding using simulation card private key The factor carries out signature and obtains the first binding signature;Specifically, simulation card using cutting ferrule public key to first binding random factor with And second binding random factor be encrypted to ensure that the peace of the first binding random factor and the second binding random factor transmission Quan Xing, simulation card sign to the first binding random factor and the second binding random factor using simulation card private key, To guarantee that subsequent cutting ferrule can authenticate the legitimacy of simulation card identity.
It simulates card and sends the first binding response to cutting ferrule, wherein the first binding response includes: the first binding ciphertext, the One binding signature, simulation card certificate and simulation card unique identification;Specifically, the first binding response that simulation card is sent Middle carrying simulation card certificate authenticates simulation card so as to cutting ferrule, and simulation card is carried in the first binding response and is uniquely marked Know so that cutting ferrule knows which simulation card is bound with it;Wherein, simulation card unique identification can for analog card piece sequence number, Any or combinations thereof mark with unique identification simulation card such as EIC equipment identification code, MAC Address.
Cutting ferrule receives the first binding response, is verified using root certificate to simulation card certificate;Specifically, cutting ferrule is preparatory Root certificate is stored, completes the verifying to simulation card certificate using the root certificate, to guarantee that subsequent use simulates card certificate Safety.
After cutting ferrule verifying simulation card certificate is legal, the first binding ciphertext is decrypted using cutting ferrule private key, obtains the The one binding decryption random factor and the second binding decryption random factor;Specifically, using cutting ferrule private key to first binding ciphertext into Row decryption, if data transmission fault has occurred in the data transmission, or is distorted in the data transmission, then will lead to Can not successful decryption, or decrypt first binding the decryption random factor and second binding the decryption random factor tied up with first Determine random factor and the second binding random factor is different.And encrypted by cutting ferrule public key, only cutting ferrule private key can be at Function decryption, thus it is also ensured that the safety of data deciphering.
Cutting ferrule utilizes simulation card public key, the first binding decryption random factor and the second binding in simulation card certificate The binding signature of decryption random factor pair first is verified;Specifically, cutting ferrule utilizes the simulation card public key pair after being verified The signature that simulation card is sent is verified, to ensure the legitimate origin of data.
After cutting ferrule verifying the first binding signature is correct, the first binding decryption random factor of verifying and the first binding random factor It is whether identical;Specifically, cutting ferrule verifies the first binding random factor itself generated and the first binding decryption random factor is identical, The data source that can guarantee data and be not tampered with, and encrypt is the object that cutting ferrule sends the first binding random factor really.
After the first binding decryption random factor of cutting ferrule verifying is identical as the first binding random factor, prompt simulation card unique Mark;Specifically, cutting ferrule can show simulation card unique identification, can also be played with voice (such as loudspeaker play or pass through Headset earpiece broadcasting etc.) simulation card unique identification, so that authenticity of the user to simulation card confirms that raising binding is pacified Quan Xing.
Cutting ferrule is received for confirming the simulation correct trigger command of card unique identification, is bound using cutting ferrule private key to first Random factor and the second binding decryption random factor are signed, and obtain the second binding signature, and storage simulation card is only One mark simulates card certificate and the first binding factor of cutting ferrule end to the first list of bindings of cutting ferrule end, wherein cutting ferrule end first Binding factor is the second binding decryption random factor;Specifically, cutting ferrule is received for confirming that simulation card unique identification is correct Trigger command can be that the confirmation physical button being provided separately on cutting ferrule generates, or can be on the touch screen of cutting ferrule Confirm virtual key generate, in the menu perhaps shown on cutting ferrule screen select confirmation function generation or can be Voice that the voice acquisition device (such as Mike) of cutting ferrule receives confirmation indicates and generates when being verified rear, or can be with It receives fingerprint identification for the fingerprint acquisition device of cutting ferrule and indicates and generate after being verified, or can be the iris of cutting ferrule Acquisition device receives iris confirmation and indicates and generate after being verified, it is, of course, also possible to generated for other any modes, In the present invention and with no restriction;Using cutting ferrule private key to first binding random factor and second binding the decryption random factor into Row signature authenticates the identity of cutting ferrule so as to subsequent simulation card;Certainly, cutting ferrule can also store the binding of cutting ferrule end first List, first list of bindings of cutting ferrule end are used to record the relevant information with the simulation card of cutting ferrule binding, such as: simulation card Unique identification, simulation card certificate etc., in addition, the first list of bindings of cutting ferrule end is also used to store the first binding factor of cutting ferrule end, First binding factor of cutting ferrule end is the second binding random factor of ciphertext transmission, is that ciphertext passes based on the second binding random factor Defeated, therefore, which is safety and is not tampered with.
Cutting ferrule sends the second binding signature to simulation card;Specifically, cutting ferrule sends the second binding signature to simulation card, It is authenticated to simulate card to cutting ferrule identity.
Simulate card receive second binding signature, using in cutting ferrule certificate cutting ferrule public key, first binding random factor with And second binding random factor to second binding signature verify;Specifically, simulation card utilizes the cutting ferrule after being verified The signature that public key sends cutting ferrule is verified, to ensure the legitimate origin of data.
After simulating the second binding of card verifying signature correctly, storage cutting ferrule unique identification, cutting ferrule certificate and simulation card Hold binding factor to simulation Card-terminal list of bindings, wherein simulation Card-terminal binding factor is the second binding random factor.Specifically Ground, simulation card can also store simulation Card-terminal list of bindings, and the simulation Card-terminal list of bindings is for record and analog card The relevant information of the cutting ferrule of piece binding, such as: cutting ferrule unique identification, cutting ferrule certificate etc., in addition, simulation Card-terminal list of bindings is also For store simulate Card-terminal binding factor, the simulation Card-terminal binding factor be simulate card generate second bind it is random because Son.
It can be seen that based on above-mentioned cutting ferrule and simulation card bound, it is ensured that subsequent cutting ferrule and simulation card it Between data interaction safety.
In addition, the step of above-mentioned cutting ferrule and simulation card execute the operation of binding not necessarily, according to different application scene Demand, can choose do not execute above-mentioned cutting ferrule and simulate card execute binding operation.
Certainly, above-mentioned cutting ferrule and simulation card execute the operation of binding, it is not limited to the implementation of above-mentioned offer, example The mark of simulation card to be bound using binding manually, i.e., under trusted context, can also be such as inputted on cutting ferrule as card The first binding factor of end is covered, the mark of simulation card default simulation card is as simulation Card-terminal binding factor;Or by cutting ferrule Contact connection is carried out with simulation card, any random value is inputted on cutting ferrule as the first binding factor of cutting ferrule end, cutting ferrule is logical It crosses contact connection and the random value of input is sent to simulation card as simulation Card-terminal binding factor etc., as long as can make Cutting ferrule obtains identical binding factor and is within the scope of protection of the invention with card is simulated.
In all embodiments of the invention, normal data interactive process all between cutting ferrule and simulation card, simulation Card is respectively positioned within the scope of the efficient communication of cutting ferrule, if cutting ferrule detects that simulation card has exceeded the efficient communication model of cutting ferrule It encloses, then cutting ferrule can be prompted or cutting ferrule will be prompted to information and be sent to the user terminal (such as smart phone, tablet computer Deng) at prompted, so that the position for prompting user to simulate card occurs abnormal, thus improve simulation card safety in utilization.
Based on the process of cutting ferrule application program update in data interactive method shown in FIG. 1, the present invention also provides a kind of numbers According to interactive system, the data interaction system is for realizing cutting ferrule application program update, using process shown in FIG. 1, herein no longer It is described in detail, only the structure of the data interaction system is briefly described, referring specifically to Fig. 7, cutting ferrule application in data interaction system The structure that program updates, comprising: cutting ferrule and update platform;Wherein,
Cutting ferrule, for cutting ferrule certificate to be at least sent to update platform;
Platform is updated, updates encryption key for generating first;Encryption key is updated to cutting ferrule application program using first Installation kit carries out encryption and obtains the first installation kit ciphertext;Signature acquisition is carried out to the first installation kit ciphertext using platform private key is updated First installation packet signature;Encryption key is updated using the cutting ferrule public key encryption first in cutting ferrule certificate, first is obtained and updates encryption Key ciphertext;Cutting ferrule more new information is sent to cutting ferrule, wherein cutting ferrule more new packets include: updating platform credential, the first installation Packet ciphertext, the first installation packet signature and first update encryption key ciphertext;
Cutting ferrule is also used to receive cutting ferrule more new information, is verified using root certificate and updates platform credential;Verifying updates platform card After book passes through, sign test is carried out to the first installation packet signature using the update platform public key updated in platform credential;The first peace of verifying After dress packet signature is correct, utilizes cutting ferrule private key decryption first to update encryption key ciphertext, obtain the first decruption key;Utilize first Decryption key decryption the first installation kit ciphertext obtains cutting ferrule application program installation kit;Verify the number of cutting ferrule application program installation kit It is whether correct according to format;If the data format that cutting ferrule verifies cutting ferrule application program installation kit is correct, according to cutting ferrule application program Installation kit is installed.
Based on data interaction system of the invention, the data interaction during cutting ferrule application program update may be implemented, and Safety is higher.Meanwhile update of the cutting ferrule to application program, mounted application program can be both updated, can also be downloaded new Application program and installation, expanded the function of cutting ferrule, it is user-friendly.
Based on the process that Truth cards manager application in data interactive method shown in Fig. 2 updates, the present invention is also A kind of data interaction system is provided, the data interaction system is for realizing the update of Truth cards manager application, using Fig. 2 Shown in process, this will not be detailed here, is only briefly described to the structure of the data interaction system, referring specifically to Fig. 8, data The structure that Truth cards manager application updates in interactive system, comprising: Truth cards manager and update platform;Its In,
Truth cards manager, for Truth cards manager certificate to be at least sent to update platform;
Platform is updated, updates encryption key for generating third;Encryption key is updated to Truth cards management using third Device application program installation kit carries out encryption and obtains third installation kit ciphertext;Using update platform private key to third installation kit ciphertext into Row signature obtains third and installs packet signature;Utilize the Truth cards manager public key encryption third in Truth cards manager certificate Encryption key is updated, third is obtained and updates encryption key ciphertext;Truth cards manager more new information is sent to Truth cards Manager, wherein Truth cards manager more new packets include: platform credential, third installation kit ciphertext, third installation kit are updated Signature and third update encryption key ciphertext;
Truth cards manager is also used to receive Truth cards manager more new information, is updated using root certificate verifying flat Platform certificate;After verifying update platform credential passes through, using the update platform public key updated in platform credential to third installation kit label Name carries out sign test;After verifying third installation packet signature is correct, it is close that encryption is updated using Truth cards manager private key decryption third Key ciphertext obtains third decruption key;Using third decryption key decryption third installation kit ciphertext, Truth cards manager is obtained Application program installation kit;Whether the data format for verifying Truth cards manager application installation kit is correct;If true card The data format that piece manager verifies Truth cards manager application installation kit is correct, according to Truth cards manager application Program installation kit is installed.
Based on data interaction system of the invention, the number in Truth cards manager application renewal process may be implemented According to interaction, and safety is higher.Meanwhile update of the Truth cards manager to application program, it can both update mounted answer With program, new application program and installation can also be downloaded, has expanded the function of Truth cards manager, it is user-friendly.
Based on the process for simulating card application program update in data interactive method shown in Fig. 3, the present invention also provides one Kind of data interaction system, the data interaction system is for realizing simulation card application program update, using process shown in Fig. 3, This will not be detailed here, is only briefly described to the structure of the data interaction system, referring specifically to Fig. 9, in data interaction system Simulate the structure of card application program update, comprising: simulation card, cutting ferrule and update platform;Wherein,
It is flat to be at least sent to update for obtaining simulation card certificate from simulation card by cutting ferrule for analog card piece certificate Platform;
Platform is updated, updates encryption key for generating second;Encryption key is updated to simulation card application using second Program installation kit carries out encryption and obtains the second installation kit ciphertext;It is signed using platform private key is updated to the second installation kit ciphertext Obtain the second installation packet signature;Encryption key is updated using the simulation card public key encryption second in simulation card certificate, is obtained Second updates encryption key ciphertext;Simulation card is updated into information and is sent to cutting ferrule, wherein simulation card updates information and includes: Update platform credential, the second installation kit ciphertext, the second installation packet signature and the second update encryption key ciphertext;
Cutting ferrule is also used to receive simulation card and updates information, and is sent to simulation card;
Card is simulated, the simulation card for receiving cutting ferrule transmission updates information, verifies update platform using root certificate and demonstrate,proves Book;Verifying updates after platform credential passes through, using the update platform public key updated in platform credential to the second installation packet signature into Row sign test;After verifying the second installation packet signature is correct, encryption key ciphertext is updated using simulation card private key decryption second, is obtained Second decruption key;Using second decryption key decryption the second installation kit ciphertext, simulation card application program installation kit is obtained;It tests Whether the data format of card simulation card application program installation kit is correct;If simulating card verifying simulation card application program peace The data format for filling packet is correct, is installed according to simulation card application program installation kit.
Based on data interaction system of the invention, the data friendship during simulation card application program update may be implemented Mutually, and safety is higher.Meanwhile the update of the corresponding program of card is simulated, and mounted application program can be both updated, it can also To download new application program and installation, the function of simulation card has been expanded, it is user-friendly.
In addition, in order to guarantee to simulate the safety of data interaction during card application program update, based on shown in Fig. 9 In data interaction system, cutting ferrule is also used to establish and pacify with simulation card before obtaining simulation card certificate in simulation card Full connection.
The realization that cutting ferrule and simulation card establish secure connection can in the following way, and following several modes are all made of Fig. 4 and the method shown in fig. 5 for establishing secure connection are stated, this will not be detailed here, only establishes safety with simulation card to cutting ferrule and connects The mode connect is briefly described:
Mode one:
Cutting ferrule is used to indicate the first secure connection for establishing secure connection instruction specifically for sending to simulation card, In, the instruction of the first secure connection includes: that cutting ferrule binds cutting ferrule end first using the simulation card public key in simulation card certificate The factor and the first connection random factor of generation carry out the first connection ciphertext of encryption acquisition, and cutting ferrule is using cutting ferrule private key to card Set the first binding factor of end and the first connection random factor carry out the first connection signature of signature acquisition;
Card is simulated, is specifically used for receiving the instruction of the first secure connection, using simulation card private key to the first connection ciphertext It is decrypted, obtains cutting ferrule end first and bind decryption factor and the first connection decryption random factor;Using in cutting ferrule certificate Cutting ferrule public key, cutting ferrule end first bind decryption factor and the first connection connection signature of decryption random factor pair first is tested Card;After the first connection of verifying is signed correctly, verifying cutting ferrule end first binds decryption factor and whether simulates Card-terminal binding factor It is identical;Verify cutting ferrule end first bind decryption factor with simulation Card-terminal binding factor it is identical after, generate second connect it is random because Son;The first connection decryption random factor and the second connection random factor are encrypted using the cutting ferrule public key in cutting ferrule certificate Obtain second connection ciphertext, using simulation card private key to first connection the decryption random factor and second connection random factor into Row signature obtains the second connection signature;The response of the first secure connection is sent to cutting ferrule, wherein the first secure connection, which responds, includes: Second connection ciphertext and the second connection signature;
Cutting ferrule is specifically also used to receive the response of the first secure connection, is solved using cutting ferrule private key to the second connection ciphertext It is close, the first connection decryption random factor and the second connection decryption random factor after being decrypted;Using in simulation card certificate Simulation card public key, the first connection decryption random factor after decryption and the second connection connection label of decryption random factor pair second Name is verified;After verifying the second connection signature is correct, the first connection decryption random factor after verifying decryption is connect with first Whether random factor is identical;Verifying decryption after first connection the decryption random factor with first connect random factor it is identical after, until Cutting ferrule is generated using the second connection decryption random factor less and simulates cutting ferrule end the first safe transmission key between card;
Card is simulated, be specifically also used to generate cutting ferrule at least with the second connection random factor and simulates the simulation between card Card-terminal safe transmission key.
Mode two:
Cutting ferrule, specifically for receiving the third connection random factor and simulation that the simulation card that simulation card is sent generates Card unique identification;It is sent to simulation card and is used to indicate the second secure connection for establishing secure connection instruction, wherein the second peace Full link order include: cutting ferrule unique identification, cutting ferrule using the simulation card public key in simulation card certificate to third connection with The machine factor and the 4th connection random factor of generation carry out the third connection ciphertext of encryption acquisition, cutting ferrule utilizes cutting ferrule private key pair Third connection random factor and the 4th connection random factor carry out the third connection signature of signature acquisition;
Card is simulated, is specifically used for receiving the instruction of the second secure connection, judges cutting ferrule unique identification whether in simulation card It holds in list of bindings;If cutting ferrule unique identification connects third in simulation Card-terminal list of bindings, using simulation card private key It connects ciphertext to be decrypted, obtains the third connection decryption random factor and the 4th connection decryption random factor;Utilize cutting ferrule certificate In cutting ferrule public key, third connection the decryption random factor and the 4th connection decryption random factor pair third connection signature tested Card;After verifying third connection signature correctly, whether the verifying third connection decryption random factor connect random factor with third identical; If it is identical as third connection random factor that third connects the decryption random factor, third is connected using simulation card private key random Decryption factor and the 4th connection decryption random factor carry out signature and obtain the 4th connection signature;The second safety is sent to cutting ferrule to connect Connect response, wherein the response of the second secure connection includes: the 4th connection signature;
Cutting ferrule, be specifically also used to receive the second secure connection response, using simulation card certificate in simulation card public key, Third connection random factor and the 4th connection random factor verify the 4th connection signature;It is correct to verify the 4th connection signature Afterwards, cutting ferrule is generated at least with the 4th connection random factor and the first binding factor of cutting ferrule end and simulate the cutting ferrule end between card First safe transmission key;
Card is simulated, is specifically also used at least with the 4th connection decryption random factor and simulation Card-terminal binding factor It generates cutting ferrule and simulates the simulation Card-terminal safe transmission key between card;
Cutting ferrule is specifically also used to connect using the first safe transmission of cutting ferrule end key pair third connection random factor and the 4th It connects after random factor carries out the first processing and is sent to simulation card;
Simulate card, be specifically also used to using simulation Card-terminal safe transmission key pair third connection the decryption random factor with And the 4th connection the decryption random factor carry out first processing after be sent to cutting ferrule;
Cutting ferrule is specifically also used to receive the data that simulation card is sent, and utilizes the first safe transmission of cutting ferrule end key pair The data that receive carry out second processing, the data after comparing second processing connect with third random factor and the 4th connect with Whether the machine factor is identical;
Card is simulated, is specifically also used to receive the data of cutting ferrule transmission, and utilize simulation Card-terminal safe transmission key pair The data received carry out second processing, and the data after comparing second processing connect the decryption random factor and the 4th company with third Whether identical connect the decryption random factor.
Further, in order to guarantee cutting ferrule and simulate the authenticity of identity when card establishes secure connection, based on shown in Fig. 9 Data interaction system in, cutting ferrule, be also used to simulation card establish secure connection before, with simulation card execute binding behaviour Make.
The realization that cutting ferrule and simulation card execute bindings can in the following way, and use above-mentioned shown in fig. 6 The method of binding, this will not be detailed here, only carries out bindings with simulation card to cutting ferrule and is briefly described:
Cutting ferrule, specifically for receiving the trigger command for being used to indicate and being bound with simulation card;It is sent to simulation card First binding instruction, wherein the first binding instruction includes: the first binding random factor, cutting ferrule certificate and the card that cutting ferrule generates Cover unique identification;
Card is simulated, is specifically used for receiving the first binding instruction, cutting ferrule certificate is verified using root certificate;Verifying card After set certificate is legal, the second binding random factor is generated;Using the cutting ferrule public key in cutting ferrule certificate to the first binding random factor And second binding random factor carry out encryption obtain first binding ciphertext, using simulation card private key to first binding it is random because Son and the second binding random factor carry out signature and obtain the first binding signature;The first binding response is sent to cutting ferrule, wherein the One binding response includes: the first binding ciphertext, the first binding signature, simulation card certificate and simulation card unique identification;
Cutting ferrule is specifically also used to receive the first binding response, is verified using root certificate to simulation card certificate;Verifying Simulate card certificate it is legal after, using cutting ferrule private key to first binding ciphertext be decrypted, obtain first binding decryption random because Son and the second binding decryption random factor;Using simulation card certificate in simulation card public key, first binding decryption random because Son and the second binding binding signature of decryption random factor pair first are verified;After verifying the first binding signature is correct, verifying Whether the first binding decryption random factor and the first binding random factor are identical;The first binding decryption random factor of verifying and first After binding random factor is identical, simulation card unique identification is prompted;It receives for confirming that simulation card unique identification is correctly touched It says the word, is signed using cutting ferrule private key to the first binding random factor and the second binding decryption random factor, obtain the Two binding signatures, and storage simulate card unique identification, simulation card certificate and the first binding factor of cutting ferrule end to cutting ferrule Hold the first list of bindings, wherein the first binding factor of cutting ferrule end is the second binding decryption random factor;The is sent to simulation card Two binding signatures;
Card is simulated, is specifically also used to receive the second binding signature, utilizes the cutting ferrule public key in cutting ferrule certificate, the first binding Random factor and the second binding random factor verify the second binding signature;After verifying the second binding signature is correct, deposit Card storage covers unique identification, cutting ferrule certificate and simulation Card-terminal binding factor to simulation Card-terminal list of bindings, wherein analog card Bit end binding factor is the second binding random factor.
In addition, being simulated between card and cutting ferrule also to improve the safety of data interaction between simulation card and cutting ferrule It can use the safe transmission key generated during establishing secure connection and carry out data interaction:
Card is simulated, is also used to after cutting ferrule and simulation card establish secure connection, the data sent to cutting ferrule utilize Simulation Card-terminal safe transmission key is sent after carrying out the first processing, cutting ferrule, is also used to receive first treated data, benefit Second processing is carried out with cutting ferrule end safe transmission key;
Cutting ferrule is also used to after cutting ferrule and simulation card establish secure connection, and the data sent to simulation card utilize Cutting ferrule end safe transmission key is sent after carrying out the first processing, simulates card, is also used to receive first treated data, benefit Second processing is carried out with simulation Card-terminal safe transmission key.
Wherein, the first processing includes: encryption, and second processing includes: decryption processing;Or first processing include: school Calculation processing is tested, second processing includes: verification verifying calculation processing;Or first processing include: encryption and verification calculation processing, Second processing includes: decryption and verification verifying calculation processing.
Optionally, cutting ferrule when being also used to detect that simulation card exceeds the efficient communication range of cutting ferrule, carries out safety and mentions Show.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiment or examples in can be combined in any suitable manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art are not departing from the principle of the present invention and objective In the case where can make changes, modifications, alterations, and variations to the above described embodiments within the scope of the invention.The scope of the present invention By appended claims and its equivalent limit.

Claims (28)

1. a kind of data interactive method characterized by comprising
Cutting ferrule certificate is at least sent to update platform by cutting ferrule;
The update platform generates first and updates encryption key;
The update platform carries out encryption to cutting ferrule application program installation kit using the first update encryption key and obtains first Installation kit ciphertext;
The update platform carries out signature to the first installation kit ciphertext using update platform private key and obtains the first installation kit label Name;
The platform that updates obtains first and updates using the update encryption key of cutting ferrule public key encryption first in the cutting ferrule certificate Encryption key ciphertext;
Cutting ferrule more new information is sent to the cutting ferrule by the update platform, wherein the cutting ferrule more new packets include: being updated flat Platform certificate, the first installation kit ciphertext, the first installation packet signature and described first update encryption key ciphertext;
The cutting ferrule receives the cutting ferrule more new information, verifies the update platform credential using root certificate;
After the cutting ferrule verifying update platform credential passes through, the update platform public key pair in the update platform credential is utilized The first installation packet signature carries out sign test;
After cutting ferrule verifying the first installation packet signature is correct, described first is decrypted using cutting ferrule private key and updates encryption key Ciphertext obtains the first decruption key;
The cutting ferrule obtains the cutting ferrule application program peace using the first installation kit ciphertext described in first decryption key decryption Dress packet;
Whether the data format that the cutting ferrule verifies the cutting ferrule application program installation kit is correct;
If the data format that the cutting ferrule verifies the cutting ferrule application program installation kit is correct, the cutting ferrule is according to the cutting ferrule Application program installation kit is installed.
2. a kind of data interactive method characterized by comprising
Truth cards manager certificate is at least sent to update platform by Truth cards manager;
The update platform generates third and updates encryption key;
The update platform updates encryption key using the third and adds to Truth cards manager application installation kit Close acquisition third installation kit ciphertext;
The update platform carries out signature to the third installation kit ciphertext using update platform private key and obtains third installation kit label Name;
The platform that updates is updated using the Truth cards manager public key encryption third in the Truth cards manager certificate Encryption key obtains third and updates encryption key ciphertext;
Truth cards manager more new information is sent to the Truth cards manager by the update platform, wherein described true Real card management device more new packets include: update platform credential, the third installation kit ciphertext, the third installation packet signature with And the third updates encryption key ciphertext;
The Truth cards manager receives the Truth cards manager more new information, verifies described update using root certificate and puts down Platform certificate;
After the Truth cards manager verifying update platform credential passes through, the update in the update platform credential is utilized Platform public key carries out sign test to third installation packet signature;
After the Truth cards manager verifying third installation packet signature is correct, Truth cards manager private key is utilized to decrypt The third updates encryption key ciphertext, obtains third decruption key;
The Truth cards manager is obtained described true using third installation kit ciphertext described in the third decryption key decryption Card management device application program installation kit;
Whether the data format that the Truth cards manager verifies the Truth cards manager application installation kit is correct;
If the data format that the Truth cards manager verifies the Truth cards manager application installation kit is correct, The Truth cards manager is installed according to the Truth cards manager application installation kit.
3. a kind of data interactive method characterized by comprising
Cutting ferrule obtains simulation card certificate from simulation card, and the simulation card certificate is at least sent to update platform;
The update platform generates second and updates encryption key;
The update platform carries out encryption acquisition to simulation card application program installation kit using the second update encryption key Second installation kit ciphertext;
The update platform carries out signature to the second installation kit ciphertext using update platform private key and obtains the second installation kit label Name;
The platform that updates is obtained using the update encryption key of simulation card public key encryption second in the simulation card certificate Second updates encryption key ciphertext;
The update platform will simulate card update information and be sent to the cutting ferrule, wherein the simulation card updates packet It includes: updating platform credential, the second installation kit ciphertext, the second installation packet signature and the second update encryption key Ciphertext;
The cutting ferrule receives the simulation card and updates information, and is sent to the simulation card;
The simulation card receives the simulation card that the cutting ferrule is sent and updates information, verifies the update using root certificate Platform credential;
After the simulation card verifying update platform credential passes through, utilize the update platform in the update platform credential public Key carries out sign test to the second installation packet signature;
After simulation card verifying the second installation packet signature is correct, described second is decrypted using simulation card private key and is updated Encryption key ciphertext obtains the second decruption key;
The simulation card obtains the simulation card and answers using the second installation kit ciphertext described in second decryption key decryption With program installation kit;
Whether the data format that the simulation card verifies the simulation card application program installation kit is correct;
If the data format that the simulation card verifies the simulation card application program installation kit is correct, the simulation card It is installed according to the simulation card application program installation kit.
4. according to the method described in claim 3, it is characterized in that, the cutting ferrule obtains simulation card certificate from simulation card Before, further includes: the cutting ferrule and the simulation card establish secure connection.
5. according to the method described in claim 4, it is characterized in that, the cutting ferrule and the simulation card establish secure connection packet It includes:
The cutting ferrule sends to the simulation card and is used to indicate the first secure connection for establishing secure connection instruction, wherein institute Stating the instruction of the first secure connection includes: that the cutting ferrule ties up cutting ferrule end first using the simulation card public key in simulation card certificate Determine the factor and generation first connects the first connection ciphertext that random factor carries out encryption acquisition, and the cutting ferrule is private using cutting ferrule The first connection that key carries out signature acquisition to first binding factor of cutting ferrule end and the first connection random factor is signed;
The simulation card receives the first secure connection instruction, using simulation card private key to the first connection ciphertext into Row decryption obtains cutting ferrule end first and binds decryption factor and the first connection decryption random factor;
The simulation card utilizes the cutting ferrule public key in cutting ferrule certificate, the cutting ferrule end first binding decryption factor and described the First connection signature described in one connection decryption random factor pair is verified;
After simulation card verifying the first connection signature is correct, verifies the cutting ferrule end first and bind decryption factor and mould Whether quasi- Card-terminal binding factor is identical;
After the simulation card verifying binding of cutting ferrule end first decryption factor is identical as the simulation Card-terminal binding factor, Generate the second connection random factor;
The simulation card using the cutting ferrule public key in the cutting ferrule certificate to the first connection decryption random factor with And the second connection random factor carries out encryption and obtains the second connection ciphertext, using simulation card private key to first connection The decryption random factor and the second connection random factor carry out signature and obtain the second connection signature;
The simulation card sends the response of the first secure connection to the cutting ferrule, wherein first secure connection, which responds, includes: The second connection ciphertext and the second connection signature;
The cutting ferrule receives the first secure connection response, is solved using the cutting ferrule private key to the second connection ciphertext It is close, the first connection decryption random factor and the second connection decryption random factor after being decrypted;
The cutting ferrule is random using the simulation card public key in the simulation card certificate, the first connection after the decryption Second connection signature described in decryption factor and the second connection decryption random factor pair is verified;
After cutting ferrule verifying the second connection signature is correct, the first connection decryption random factor after verifying the decryption with Whether the first connection random factor is identical;
The cutting ferrule verify the first connection decryption random factor after the decryption with described first connect random factor it is identical after, The cutting ferrule end first between the cutting ferrule and the simulation card is generated at least with the second connection decryption random factor Safe transmission key;The simulation card generates the cutting ferrule and the analog card at least with the second connection random factor The simulation Card-terminal safe transmission key between piece.
6. according to the method described in claim 4, it is characterized in that, the cutting ferrule and the simulation card establish secure connection packet It includes:
The cutting ferrule receives the third connection random factor and simulation that the simulation card that the simulation card is sent generates Card unique identification;
The cutting ferrule sends to the simulation card and is used to indicate the second secure connection for establishing secure connection instruction, wherein institute State the second secure connection instruction include: cutting ferrule unique identification, the cutting ferrule using simulation card certificate in simulation card public key The third for carrying out encryption acquisition to the 4th connection random factor of third connection random factor and generation connects ciphertext, institute It states cutting ferrule and signature acquisition is carried out to third connection random factor and the 4th connection random factor using cutting ferrule private key Third connect signature;
Whether the simulation card receives the second secure connection instruction, judge the cutting ferrule unique identification in simulation Card-terminal In list of bindings;
If the cutting ferrule unique identification, in the simulation Card-terminal list of bindings, the simulation card is private using simulation card Key to the third connection ciphertext be decrypted, obtain third connection the decryption random factor and the 4th connection decryption random because Son;
The simulation card connects the decryption random factor and the described 4th using the cutting ferrule public key in cutting ferrule certificate, the third Third connection signature described in connection decryption random factor pair is verified;
The simulation card verify the third connection signature it is correct after, verify the third connection decryption random factor with it is described Whether third connects random factor identical;
If the third connection decryption random factor is identical as third connection random factor, the simulation card utilizes institute Simulation card private key is stated to sign to the third connection decryption random factor and the 4th connection decryption random factor Obtain the 4th connection signature;
The simulation card sends the response of the second secure connection to the cutting ferrule, wherein second secure connection, which responds, includes: The 4th connection signature;
The cutting ferrule receives the second secure connection response, public using the simulation card in the simulation card certificate Key, third connection random factor and the 4th connection random factor verify the 4th connection signature;
After cutting ferrule verifying the 4th connection signature is correct, at least with the 4th connection random factor and cutting ferrule end First binding factor generates the first safe transmission of cutting ferrule end key between the cutting ferrule and the simulation card;The simulation Card at least with the 4th connection decryption random factor and simulation Card-terminal binding factor generate the cutting ferrule with it is described Simulate the simulation Card-terminal safe transmission key between card;
The cutting ferrule connects random factor and the described 4th using third described in the first safe transmission of cutting ferrule end key pair Connection random factor is sent to the simulation card after carrying out the first processing;The simulation card is pacified using the simulation Card-terminal Full transmission key connects the decryption random factor to the third and the 4th connection decryption random factor carries out the first processing After be sent to the cutting ferrule;
The cutting ferrule receives the data that the simulation card is sent, and is received using cutting ferrule end the first safe transmission key pair The data arrived carry out second processing, and the data after comparing second processing connect random factor and the 4th company with the third Whether identical connect random factor;The simulation card receives the data that the cutting ferrule is sent, and is pacified using the simulation Card-terminal Full transmission key carries out second processing to the data received, and the data after comparing second processing connect RANDOM SOLUTION with the third Whether the close factor and the 4th connection decryption random factor are identical.
7. according to the method described in claim 4, it is characterized in that, establishing secure connection in the cutting ferrule and the simulation card Before, further includes:
The cutting ferrule and the simulation card execute bindings.
8. method according to claim 5 or 6, which is characterized in that establish safety in the cutting ferrule and the simulation card Before connection, further includes:
The cutting ferrule and the simulation card execute bindings.
9. according to the method described in claim 8, it is characterized in that, the cutting ferrule includes: with simulation card execution bindings
The cutting ferrule receives the trigger command for being used to indicate and being bound with the simulation card;
The cutting ferrule sends the first binding instruction to the simulation card, wherein the first binding instruction includes: the cutting ferrule The first binding random factor, cutting ferrule certificate and the cutting ferrule unique identification generated;
The simulation card receives the first binding instruction, is verified using root certificate to the cutting ferrule certificate;
After the simulation card verifying cutting ferrule certificate is legal, the second binding random factor is generated;
The simulation card is using the cutting ferrule public key in the cutting ferrule certificate to the first binding random factor and described the Two binding random factors carry out encryption and obtain the first binding ciphertext, using simulation card private key to the first binding random factor And the second binding random factor carries out signature and obtains the first binding signature;
The simulation card sends the first binding response to the cutting ferrule, wherein first binding response includes: described first Bind ciphertext, the first binding signature, simulation card certificate and simulation card unique identification;
The cutting ferrule receives first binding response, is verified using root certificate to the simulation card certificate;
After the cutting ferrule verifying simulation card certificate is legal, the first binding ciphertext is carried out using the cutting ferrule private key Decryption obtains the first binding decryption random factor and the second binding decryption random factor;
The cutting ferrule using it is described simulation card certificate in simulation card public key, it is described first binding the decryption random factor and First binding signature described in the second binding decryption random factor pair is verified;
After cutting ferrule verifying the first binding signature is correct, the first binding decryption random factor and described first is verified Whether identical bind random factor;
After the cutting ferrule verifying first binding decryption random factor is identical as the first binding random factor, described in prompt Simulate card unique identification;
The cutting ferrule is received for confirming the correct trigger command of the simulation card unique identification, utilizes the cutting ferrule private key pair The first binding random factor and the second binding decryption random factor are signed, and the second binding signature is obtained, with And the simulation card unique identification, the simulation card certificate and the first binding factor of cutting ferrule end are stored to cutting ferrule end first List of bindings, wherein first binding factor of cutting ferrule end is the second binding decryption random factor;
The cutting ferrule sends the second binding signature to the simulation card;
The simulation card receives the second binding signature, using in the cutting ferrule certificate the cutting ferrule public key, first tie up Determine random factor and the second binding random factor verifies the second binding signature;
After simulation card verifying the second binding signature is correct, the cutting ferrule unique identification, the cutting ferrule certificate are stored And simulation Card-terminal binding factor extremely simulation Card-terminal list of bindings, wherein the simulation Card-terminal binding factor is described Second binding random factor.
10. according to the method described in claim 4, it is characterized in that,
After the cutting ferrule and the simulation card establish secure connection, the data simulating card and being sent to the cutting ferrule It is sent after carrying out the first processing using the simulation Card-terminal safe transmission key, after the cutting ferrule receives first processing Data, utilize the cutting ferrule end safe transmission key carry out second processing;The number that the cutting ferrule is sent to the simulation card According to sending after carrying out the first processing using the cutting ferrule end safe transmission key, the simulation card receives first processing Data afterwards carry out second processing using the simulation Card-terminal safe transmission key.
11. the method according to claim 6 or 10, which is characterized in that
First processing includes: encryption, and the second processing includes: decryption processing;Or
First processing includes: verification calculation processing, and the second processing includes: verification verifying calculation processing;Or
First processing includes: encryption and verification calculation processing, and the second processing includes: at decryption and verification verifying calculating Reason.
12. according to claim 3 to 7,9,10 described in any item methods, which is characterized in that the cutting ferrule detects the mould When quasi- card exceeds the efficient communication range of the cutting ferrule, safety instruction is carried out.
13. method according to claim 1 or 3, which is characterized in that the cutting ferrule is mobile device.
14. method according to claim 1 or 3, which is characterized in that the cutting ferrule is that mobile device and electronic signature are set The standby or described cutting ferrule is electronic signature equipment.
15. a kind of data interaction system characterized by comprising cutting ferrule and update platform;
The cutting ferrule, for cutting ferrule certificate to be at least sent to the update platform;
The update platform updates encryption key for generating first;Encryption key is updated to cutting ferrule application using described first Program installation kit carries out encryption and obtains the first installation kit ciphertext;The first installation kit ciphertext is carried out using platform private key is updated Signature obtains the first installation packet signature;Encryption key is updated using the cutting ferrule public key encryption first in the cutting ferrule certificate, is obtained First updates encryption key ciphertext;Cutting ferrule more new information is sent to the cutting ferrule, wherein the cutting ferrule more new packets include: It is close to update platform credential, the first installation kit ciphertext, the first installation packet signature and the first update encryption key Text;
The cutting ferrule is also used to receive the cutting ferrule more new information, verifies the update platform credential using root certificate;Verifying institute It states and updates after platform credential passes through, using the update platform public key in the update platform credential to the first installation packet signature Carry out sign test;Verify it is described first installation packet signature it is correct after, using cutting ferrule private key decrypt it is described first update encryption key it is close Text obtains the first decruption key;Using the first installation kit ciphertext described in first decryption key decryption, obtains the cutting ferrule and answer With program installation kit;Whether the data format for verifying the cutting ferrule application program installation kit is correct;If the cutting ferrule verifies institute The data format for stating cutting ferrule application program installation kit is correct, is installed according to the cutting ferrule application program installation kit.
16. a kind of data interaction system characterized by comprising Truth cards manager and update platform;
The Truth cards manager, for Truth cards manager certificate to be at least sent to the update platform;
The update platform updates encryption key for generating third;Encryption key is updated to Truth cards using the third Manager application installation kit carries out encryption and obtains third installation kit ciphertext;The third is installed using platform private key is updated Packet ciphertext carries out signature and obtains third installation packet signature;Utilize the Truth cards manager in the Truth cards manager certificate Public key encryption third updates encryption key, obtains third and updates encryption key ciphertext;Truth cards manager more new information is sent out It send to the Truth cards manager, wherein the Truth cards manager more new packets include: updating platform credential, described Third installation kit ciphertext, third installation packet signature and the third update encryption key ciphertext;
The Truth cards manager is also used to receive the Truth cards manager more new information, verifies institute using root certificate State update platform credential;It verifies after the update platform credential passes through, utilizes the update platform updated in platform credential public Key carries out sign test to third installation packet signature;Verify third installation packet signature it is correct after, utilize Truth cards management Device private key decrypts the third and updates encryption key ciphertext, obtains third decruption key;Utilize the third decryption key decryption The third installation kit ciphertext obtains the Truth cards manager application installation kit;Verify the Truth cards management Whether the data format of device application program installation kit is correct;If the Truth cards manager verifies the Truth cards management The data format of device application program installation kit is correct, is installed according to the Truth cards manager application installation kit.
17. a kind of data interaction system characterized by comprising simulation card, cutting ferrule and update platform;
The cutting ferrule at least sends the simulation card certificate for obtaining simulation card certificate from the simulation card To the update platform;
The update platform updates encryption key for generating second;Encryption key is updated to simulation card using described second Application program installation kit carries out encryption and obtains the second installation kit ciphertext;Using update platform private key to the second installation kit ciphertext It carries out signature and obtains the second installation packet signature;It is updated and is added using the simulation card public key encryption second in the simulation card certificate Key obtains second and updates encryption key ciphertext;Simulation card is updated into information and is sent to the cutting ferrule, wherein the mould Quasi- card more new packets include: updating platform credential, the second installation kit ciphertext, the second installation packet signature and described Second updates encryption key ciphertext;
The cutting ferrule is also used to receive the simulation card and updates information, and is sent to the simulation card;
The simulation card updates information for receiving the simulation card that the cutting ferrule is sent, verifies institute using root certificate State update platform credential;It verifies after the update platform credential passes through, utilizes the update platform updated in platform credential public Key carries out sign test to the second installation packet signature;Verify it is described second installation packet signature it is correct after, utilize simulation card private key decryption Described second updates encryption key ciphertext, obtains the second decruption key;Utilize the second peace described in second decryption key decryption Packet ciphertext is filled, the simulation card application program installation kit is obtained;Verify the data of the simulation card application program installation kit Whether format is correct;If the data format that the simulation card verifies the simulation card application program installation kit is correct, root It is installed according to the simulation card application program installation kit.
18. system according to claim 17, which is characterized in that
The cutting ferrule is also used to establish before obtaining simulation card certificate in the simulation card with the simulation card Secure connection.
19. system according to claim 18, which is characterized in that
The cutting ferrule is established the first secure connection of secure connection and is referred to specifically for sending to be used to indicate to the simulation card It enables, wherein the first secure connection instruction includes: that the cutting ferrule utilizes the simulation card public key in simulation card certificate to card Set the first binding factor of end and the first connection random factor of generation carry out the first connection ciphertext of encryption acquisition, the cutting ferrule The of signature acquisition is carried out to first binding factor of cutting ferrule end and the first connection random factor using cutting ferrule private key One connection signature;
The simulation card is specifically used for receiving the first secure connection instruction, using simulation card private key to described first Connection ciphertext is decrypted, and obtains cutting ferrule end first and binds decryption factor and the first connection decryption random factor;Utilize cutting ferrule Described in cutting ferrule public key, the cutting ferrule end first binding decryption factor and the first connection decryption random factor pair in certificate First connection signature is verified;Verify the first connection signature it is correct after, verify the binding of cutting ferrule end first decryption because Whether son and simulation Card-terminal binding factor are identical;It verifies the cutting ferrule end first and binds decryption factor and the simulation Card-terminal After binding factor is identical, the second connection random factor is generated;Using the cutting ferrule public key in the cutting ferrule certificate to described The one connection decryption random factor and the second connection random factor carry out encryption and obtain the second connection ciphertext, utilize analog card Piece private key carries out signature to the first connection decryption random factor and the second connection random factor and obtains the second connection Signature;The response of the first secure connection is sent to the cutting ferrule, wherein the first secure connection response includes: second company Connect ciphertext and the second connection signature;
The cutting ferrule, is specifically also used to receive the first secure connection response, is connected using the cutting ferrule private key to described second It connects ciphertext to be decrypted, the first connection decryption random factor and the second connection decryption random factor after being decrypted;Using institute State the simulation card public key in simulation card certificate, the first connection decryption random factor and described second after the decryption Second connection signature described in connection decryption random factor pair is verified;After verifying the second connection signature correctly, institute is verified Whether the first connection decryption random factor after stating decryption with described first connect random factor identical;After verifying the decryption After the first connection decryption random factor is identical as the first connection random factor, at least with the second connection decryption random The factor generates the first safe transmission of cutting ferrule end key between the cutting ferrule and the simulation card;
The simulation card is specifically also used to generate the cutting ferrule and the simulation at least with the second connection random factor The simulation Card-terminal safe transmission key between card.
20. system according to claim 18, which is characterized in that
The cutting ferrule connects random factor specifically for receiving the third that the simulation card that the simulation card is sent generates And simulation card unique identification;It sends to be used to indicate to the simulation card and establishes the second secure connection of secure connection and refer to It enables, wherein second secure connection instruction includes: that cutting ferrule unique identification, the cutting ferrule utilize the mould in simulation card certificate Quasi- card public key carries out the third of encryption acquisition to the 4th connection random factor of third connection random factor and generation Connect ciphertext, the cutting ferrule using cutting ferrule private key to the third connect random factor and it is described 4th connection random factor into The third that row signature obtains connects signature;
The simulation card is specifically used for receiving second secure connection instruction, judge the cutting ferrule unique identification whether It simulates in Card-terminal list of bindings;If the cutting ferrule unique identification utilizes simulation in the simulation Card-terminal list of bindings Third connection ciphertext is decrypted in card private key, obtains the third connection decryption random factor and the 4th connection RANDOM SOLUTION The close factor;At random using cutting ferrule public key, the third connection decryption random factor and the 4th connection in cutting ferrule certificate Decryption factor verifies third connection signature;After verifying the third connection signature correctly, verifies the third and connect Whether connecing the decryption random factor, with the third to connect random factor identical;If the third connection decryption random factor and institute It is identical to state third connection random factor, using the simulation card private key to the third connection decryption random factor and described The 4th connection decryption random factor carries out signature and obtains the 4th connection signature;The response of the second secure connection is sent to the cutting ferrule, Wherein, the second secure connection response includes: the 4th connection signature;
The cutting ferrule is specifically also used to receive the second secure connection response, described in the simulation card certificate Simulation card public key, third connection random factor and the 4th connection random factor test the 4th connection signature Card;After verifying the 4th connection signature correctly, bound at least with the 4th connection random factor and cutting ferrule end first The factor generates the first safe transmission of cutting ferrule end key between the cutting ferrule and the simulation card;
The simulation card is specifically also used at least with the 4th connection decryption random factor and simulation Card-terminal binding The factor generates the simulation Card-terminal safe transmission key between the cutting ferrule and the simulation card;
The cutting ferrule, be specifically also used to using the connection random factor of third described in the first safe transmission of cutting ferrule end key pair with And the simulation card is sent to after the first processing of the 4th connection random factor progress;
The simulation card is specifically also used to utilize the connection RANDOM SOLUTION of third described in the simulation Card-terminal safe transmission key pair The close factor and the 4th connection decryption random factor are sent to the cutting ferrule after carrying out the first processing;
The cutting ferrule is specifically also used to receive the data that the simulation card is sent, and is passed using first safety of cutting ferrule end Data that defeated key pair receives carry out second processing, the data after comparing second processing connect with the third random factor with And it is described 4th connection random factor it is whether identical;
The simulation card is specifically also used to receive the data that the cutting ferrule is sent, and is passed safely using the simulation Card-terminal Data that defeated key pair receives carry out second processing, the data after comparing second processing connect with the third decryption random because Whether the sub and described 4th connection decryption random factor is identical.
21. system according to claim 18, which is characterized in that
The cutting ferrule is also used to before establishing secure connection with the simulation card, executes binding behaviour with the simulation card Make.
22. 9 or 20 described in any item systems according to claim 1, which is characterized in that
The cutting ferrule is also used to before establishing secure connection with the simulation card, executes binding behaviour with the simulation card Make.
23. system according to claim 22, which is characterized in that
The cutting ferrule, specifically for receiving the trigger command for being used to indicate and being bound with the simulation card;To the simulation Card sends the first binding instruction, wherein the first binding instruction include: the first binding for generating of the cutting ferrule it is random because Son, cutting ferrule certificate and cutting ferrule unique identification;
The simulation card is specifically used for receiving the first binding instruction, be tested using root certificate the cutting ferrule certificate Card;Verify the cutting ferrule certificate it is legal after, generate second binding random factor;Utilize the cutting ferrule public key pair in the cutting ferrule certificate The first binding random factor and the second binding random factor carry out encryption and obtain the first binding ciphertext, utilize simulation Card private key carries out the first binding of signature acquisition to the first binding random factor and the second binding random factor and signs Name;The first binding response is sent to the cutting ferrule, wherein first binding response includes: the first binding ciphertext, described First binding signature, simulation card certificate and simulation card unique identification;
The cutting ferrule is specifically also used to receive first binding response, is carried out using root certificate to the simulation card certificate Verifying;Verify the simulation card certificate it is legal after, using the cutting ferrule private key to it is described first binding ciphertext be decrypted, obtain Obtain the first binding decryption random factor and the second binding decryption random factor;Utilize the simulation card in the simulation card certificate Public key, it is described first binding the decryption random factor and it is described second binding decryption random factor pair described in first binding sign into Row verifying;After verifying the first binding signature correctly, the first binding decryption random factor and first binding are verified Whether random factor is identical;Verify it is described first binding the decryption random factor with it is described first bind random factor it is identical after, mention Show the simulation card unique identification;It receives for confirming the correct trigger command of the simulation card unique identification, utilizes institute It states cutting ferrule private key to sign to the first binding random factor and the second binding decryption random factor, obtains second Binding signature, and the storage simulation card unique identification, the first binding factor of the simulation card certificate and cutting ferrule end To the first list of bindings of cutting ferrule end, wherein first binding factor of cutting ferrule end is the second binding decryption random factor;To The simulation card sends the second binding signature;
The simulation card is specifically also used to receive the second binding signature, utilizes the cutting ferrule in the cutting ferrule certificate Public key, the first binding random factor and the second binding random factor verify the second binding signature;Verifying After the second binding signature is correct, store the cutting ferrule unique identification, the cutting ferrule certificate and the binding of simulation Card-terminal because Son extremely simulation Card-terminal list of bindings, wherein the simulation Card-terminal binding factor is the second binding random factor.
24. system according to claim 18, which is characterized in that
The simulation card is also used to after the cutting ferrule and the simulation card establish secure connection, Xiang Suoshu cutting ferrule hair The data sent are sent after carrying out the first processing using the simulation Card-terminal safe transmission key, and the cutting ferrule is also used to receive To the described first treated data, the cutting ferrule end safe transmission key is utilized to carry out second processing;
The cutting ferrule is also used to after the cutting ferrule and the simulation card establish secure connection, is sent out to the simulation card The data sent are sent after carrying out the first processing using the cutting ferrule end safe transmission key, and the simulation card is also used to receive To the described first treated data, the simulation Card-terminal safe transmission key is utilized to carry out second processing.
25. the system according to claim 20 or 24, which is characterized in that
First processing includes: encryption, and the second processing includes: decryption processing;Or
First processing includes: verification calculation processing, and the second processing includes: verification verifying calculation processing;Or
First processing includes: encryption and verification calculation processing, and the second processing includes: at decryption and verification verifying calculating Reason.
26. 7 to 21,23,24 described in any item systems according to claim 1, which is characterized in that the cutting ferrule is also used to examine When measuring efficient communication range of the simulation card beyond the cutting ferrule, safety instruction is carried out.
27. system described in 5 or 17 according to claim 1, which is characterized in that the cutting ferrule is mobile device.
28. system described in 5 or 17 according to claim 1, which is characterized in that the cutting ferrule is that mobile device and electronic signature are set The standby or described cutting ferrule is electronic signature equipment.
CN201510055907.2A 2014-11-07 2015-02-03 Data interactive method and system Active CN105991539B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2014106429006 2014-11-07
CN201410642900 2014-11-07

Publications (2)

Publication Number Publication Date
CN105991539A CN105991539A (en) 2016-10-05
CN105991539B true CN105991539B (en) 2019-05-17

Family

ID=57037048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510055907.2A Active CN105991539B (en) 2014-11-07 2015-02-03 Data interactive method and system

Country Status (1)

Country Link
CN (1) CN105991539B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656510B (en) * 2017-01-04 2019-07-30 天地融科技股份有限公司 A kind of encryption key acquisition methods and system
CN113032828A (en) * 2021-03-23 2021-06-25 广东电网有限责任公司 Improved binary system interaction information encryption method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101267307A (en) * 2008-02-29 2008-09-17 北京中电华大电子设计有限责任公司 Method for realizing remote management of mobile phone digital certificate using OTA system
CN101567109A (en) * 2009-06-03 2009-10-28 普天信息技术研究院有限公司 Device integrating payment and gathering functions, system and trade method
CN101667240A (en) * 2009-08-20 2010-03-10 北京握奇数据系统有限公司 Intelligent card and card writing method, equipment and system thereof
CN101789934A (en) * 2009-11-17 2010-07-28 北京飞天诚信科技有限公司 Method and system for online security trading
CN101931532A (en) * 2009-09-08 2010-12-29 北京握奇数据系统有限公司 Telecommunication smart card-based digital certificate management method and telecommunication smart card
CN103218646A (en) * 2013-03-22 2013-07-24 舒唯家 All-in-one digital mobile card and implementation method thereof
CN103886455A (en) * 2012-12-19 2014-06-25 Nxp股份有限公司 Digital wallet device for virtual wallet
CN104063668A (en) * 2013-03-21 2014-09-24 深圳富泰宏精密工业有限公司 Application installation package signing system and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100088225A1 (en) * 2008-10-03 2010-04-08 Nokia Corporation Methods, apparatuses, and computer program products for providing electronic value certificates

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101267307A (en) * 2008-02-29 2008-09-17 北京中电华大电子设计有限责任公司 Method for realizing remote management of mobile phone digital certificate using OTA system
CN101567109A (en) * 2009-06-03 2009-10-28 普天信息技术研究院有限公司 Device integrating payment and gathering functions, system and trade method
CN101667240A (en) * 2009-08-20 2010-03-10 北京握奇数据系统有限公司 Intelligent card and card writing method, equipment and system thereof
CN101931532A (en) * 2009-09-08 2010-12-29 北京握奇数据系统有限公司 Telecommunication smart card-based digital certificate management method and telecommunication smart card
CN101789934A (en) * 2009-11-17 2010-07-28 北京飞天诚信科技有限公司 Method and system for online security trading
CN103886455A (en) * 2012-12-19 2014-06-25 Nxp股份有限公司 Digital wallet device for virtual wallet
CN104063668A (en) * 2013-03-21 2014-09-24 深圳富泰宏精密工业有限公司 Application installation package signing system and method
CN103218646A (en) * 2013-03-22 2013-07-24 舒唯家 All-in-one digital mobile card and implementation method thereof

Also Published As

Publication number Publication date
CN105991539A (en) 2016-10-05

Similar Documents

Publication Publication Date Title
CN104243451B (en) A kind of information interacting method, system and intelligent cipher key equipment
CN109600223A (en) Verification method, Activiation method, device, equipment and storage medium
CN104243162B (en) A kind of information interacting method, system and intelligent cipher key equipment
CN105827656B (en) Identity identifying method and device based on NFC payment
CN103996117B (en) Safe mobile phone
CN105320891B (en) A kind of method and device of computer security loading system mirror image
CN104618114B (en) ID card information acquisition methods, apparatus and system
CN109117674A (en) A kind of client validation encryption method, system, equipment and computer media
CN105939194A (en) Backup method and backup system for private key of electronic key device
CN105635164B (en) The method and apparatus of safety certification
CN105991539B (en) Data interactive method and system
CN105989481B (en) Data interaction method and system
CN103136667B (en) There is the smart card of electronic signature functionality, smart card transaction system and method
CN105989477A (en) Data interaction method
CN105991543B (en) Data interactive method
WO2016124032A1 (en) Data exchange method
CN105991527A (en) Data interaction system
CN105991530A (en) Data interaction system
CN105989475A (en) Data interaction method
CN110458551A (en) Data interaction system
EP3217620A1 (en) Data interaction method and system
CN110445748A (en) Data interactive method and system
WO2016070799A1 (en) Data interaction method and system
CN105989657A (en) Data interaction system
CN105991547A (en) Data interaction system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant