CN107038571B - For being inserted into the encrypted card in mobile terminal - Google Patents
For being inserted into the encrypted card in mobile terminal Download PDFInfo
- Publication number
- CN107038571B CN107038571B CN201710245447.9A CN201710245447A CN107038571B CN 107038571 B CN107038571 B CN 107038571B CN 201710245447 A CN201710245447 A CN 201710245447A CN 107038571 B CN107038571 B CN 107038571B
- Authority
- CN
- China
- Prior art keywords
- user
- card
- signal
- mobile terminal
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of for being inserted into the encrypted card in mobile terminal, the structure of encrypted card is ferrule structure or membrane structure, and encrypted card is inserted into SIM card in the same SIM card card slot of mobile terminal simultaneously;Wherein, encrypted card includes:Wireless communication module, sensor, safety chip and power interface;Wireless communication module, for establishing communication port between encrypted card and mobile terminal;Sensor, for detecting user's confirmation signal of user;Safety chip is connected respectively with wireless communication module and sensor, for the user's confirmation signal detected according to sensor, user information is encrypted operation or decryption oprerations;The power interface of encrypted card is connected with the power interface of the SIM card card slot of mobile terminal, and the power interface for passing through the SIM card card slot of mobile terminal provides electric energy for encrypted card.The technical solution facilitates user to obtain, carries with using encrypted card, improving the safety of transactional operation.
Description
Technical field
The present invention relates to fields of communication technology, and in particular to a kind of encrypted card for being used to be inserted into mobile terminal.
Background technology
Mobile payment refers to that user carries out account payment using mobile terminals such as mobile phones to the commodity consumed or service.By
In mobile payment there are advantages, more and more users such as convenient, fast to like being paid by way of mobile payment, so
And the transactional operation safety problem in thing followed mobile payment is also more and more prominent.For example, in mobile terminal by bank's account
Number, during the user informations such as password are transmitted to the far-end servers such as bank server, it is easy to by Trojan attack, be hacked
The illegal molecules malicious intercepted such as visitor, so as to threaten the account safety of user.
Therefore, it in data transmission procedure, needs to take encrypted transmission mode.In the prior art, people have had developed
Some are used to be the encrypted technical solution of communication of mobile terminal, for example, using external encryption device or by SIM card
The mode of built-in security chip is encrypted for communication of mobile terminal.The prior art has the disadvantage that:External encryption device needs
User is wanted individually to carry, and user is needed aperiodically to charge for it, it has not been convenient to which user is used;It is and built-in in SIM card
Although the mode of safety chip carries convenient for user, need to cooperate hair fastener with SIM card operator, hair fastener flow compared with
Long, user is difficult easily to obtain, in addition, safety chip is built in SIM card, is chronically at working condition, can not be had
The user of effect confirms that there is by the risk of Trojan attack.
Invention content
In view of the above problems, it is proposed that the present invention overcomes the above problem in order to provide one kind or solves at least partly
State the encrypted card for being used to be inserted into mobile terminal of problem.
The present invention provides a kind of for being inserted into encrypted card in mobile terminal, the structure of encrypted card for ferrule structure or
Membrane structure, encrypted card are inserted into SIM card in the same SIM card card slot of mobile terminal simultaneously;
Wherein, encrypted card includes:Wireless communication module, sensor, safety chip and power interface;
Wireless communication module, for establishing communication port between encrypted card and mobile terminal, with mobile terminal into line number
According to communication;
Sensor, for detecting user's confirmation signal of user;
Safety chip is connected respectively with wireless communication module and sensor, for the user detected according to sensor
User information is encrypted operation or decryption oprerations in confirmation signal;
The power interface of encrypted card is connected with the power interface of the SIM card card slot of mobile terminal, mobile whole for passing through
The power interface of the SIM card card slot at end provides electric energy for encrypted card.
Further, safety chip is additionally operable to:The user information operation from mobile terminal is received from wireless communication module
Instruction, generates random goal verification signal, and compare user's confirmation signal that sensor detects and the target generated
Whether confirmation signal is consistent, if comparing, to obtain user's confirmation signal consistent with goal verification signal, and user information is added
Close operation or decryption oprerations.
Further, when the structure of encrypted card is ferrule structure, the appearance and size of encrypted card and the SIM card of mobile terminal
The appearance and size of card slot matches, and the groove of encrypted card is embedded in SIM of the geomery less than or equal to the geomery of groove
Card;When the structure of encrypted card is membrane structure, encrypted card is attached to SIM card and is provided on the surface of hard contact.
Further, sensor is additionally operable to:Detect the user control signal of user;
Safety chip is additionally operable to:The user control signal detected according to sensor starts or closes radio communication mold
The communication function of block.
Further, user information operational order includes personal recognition code;
Safety chip is additionally operable to:According to the personal recognition code that prestores, the personal identification in user information operational order is verified
The legitimacy of password.
Further, goal verification signal includes target gesture behavior signal, and user's confirmation signal includes user gesture row
For signal;And/or goal verification signal includes targeted voice signal, user's confirmation signal includes user voice signal.
Further, safety chip is additionally operable to:When goal verification signal includes target gesture behavior signal, user's confirmation letter
When number including user gesture behavior signal, judge that the user gesture behavior signal that sensor detects is believed with the behavior of target gesture
Whether number time being consistent is more than prefixed time interval, if judging to obtain user gesture behavior signal and target gesture behavior
The time that signal is consistent is more than prefixed time interval, then operation or decryption oprerations user information are encrypted.
Further, safety chip is additionally operable to:The goal verification generated is believed respectively by the communication port established
Number and user's confirmation signal for detecting of sensor be sent to mobile terminal.
Further, sensor includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sound wave sensing
Device.
Further, wireless communication module includes:Bluetooth communication and/or WIFI communication modules.
Communication port is established in the connection of the bluetooth module of bluetooth communication and mobile terminal, realizes mobile terminal and encrypted card
Communication, further realize interconnecting between encrypted card, mobile terminal and far-end computer information system three.
WIFI communication modules and the WIFI module or external routes equipment of mobile terminal connect, and realize that encrypted card is set with outside
Standby connection, external equipment include mobile terminal or far-end computer information system, by the connection of WIFI communication modules, realize
Interconnecting between encrypted card, mobile terminal and far-end computer information system three.
According to technical solution provided by the invention, encryption card issuing with third parties such as SIM card operators without being closed
Make hair fastener, obtained convenient for user;The structure of encrypted card is ferrule structure or membrane structure, and encrypted card can be inserted simultaneously with SIM card
Enter to the same SIM card card slot of mobile terminal, can not only be encryption by the power interface of the SIM card card slot of mobile terminal
Card provides electric energy, but also carries and use convenient for user;Wireless communication module in encrypted card can be in encrypted card and movement
Communication port is established between terminal, the data realized between encrypted card and mobile terminal communicate, and efficiently solve certain shiftings
Dynamic terminal due to various limitations be difficult with encrypted card into row data communication the problem of;Sensor in encrypted card is used for detecting
User's confirmation signal at family, the sensor is independently of mobile terminal so that mobile terminal can not directly invoke the sensor, eradicate
The risk that sensor is called by long-range malice;User's confirmation signal that safety chip is detected according to sensor, to user
Operation or decryption oprerations are encrypted in information, so as to prevent the Trojan attack in process of exchange, improve transactional operation
Safety.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, below the special specific embodiment for lifting the present invention.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this field
Technical staff will become clear.Attached drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the structural representation of the encrypted card according to an embodiment of the invention for being used to be inserted into mobile terminal
Figure;
Fig. 2 shows according to an embodiment of the invention for being inserted into the functional structure frame of the encrypted card in mobile terminal
Figure;
Fig. 3 shows the method for work of the encrypted card according to an embodiment of the invention for being used to be inserted into mobile terminal
Flow diagram;
Fig. 4 shows the method for work of the encrypted card in accordance with another embodiment of the present invention for being used to be inserted into mobile terminal
Flow diagram.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Completely it is communicated to those skilled in the art.
The present invention provides a kind of for being inserted into encrypted card in mobile terminal, the structure of the encrypted card for ferrule structure or
Person's membrane structure, encrypted card are inserted into SIM card in the same SIM card card slot of mobile terminal simultaneously, and user is facilitated to carry with making
With, and solve the carrying problem of encrypted card.Specifically, mobile terminal can be the terminal that mobile phone etc. has SIM card card slot.It needs
, it is emphasized that the encrypted card and SIM card described in the present invention is two independent products, it is not the composition portion of identical product
Point, the work of encrypted card is independently of the work of SIM card, and only when user is wanted using encrypted card, user needs to add
Close card and SIM card are inserted into after being assembled in the same SIM card card slot of mobile terminal together again, so as to not influence to use
The power interface that the SIM card card slot of mobile terminal is utilized in the case of SIM card in the normal use mobile terminal of family is encrypted card
Electric energy is provided.
When the structure of encrypted card is ferrule structure, the appearance and size of encrypted card and the SIM card card slot of mobile terminal it is outer
Shape size matches, and therefore, encrypted card is inserted into the SIM card card slot of mobile terminal, when specifically used, encrypted card
Groove is embedded in SIM card of the geomery less than or equal to the geomery of groove.Wherein, geomery is less than or equal to groove
The SIM card of geomery can be the smaller SIM card of geomery in the prior art, or ruler obtained from clipped
Very little smaller SIM card.
Fig. 1 shows the structural representation of the encrypted card according to an embodiment of the invention for being used to be inserted into mobile terminal
Figure, wherein, the structure of encrypted card 110 shown in FIG. 1 is ferrule structure, when specifically used, in the groove 111 of encrypted card 110
Embedded geomery is less than or equal to the SIM card of the geomery of groove 111.
In the prior art, SIM card has had evolved to three types, and specially size is the standard of 15mm × 25mm
SIM card, the Micro-SIM cards that size is 15mm × 12mm and Nano-SIM cards that size is 12.3mm × 8.8mm.With movement
For terminal is mobile phone, for the mobile phone that SIM card card slot is Nano-SIM card card slots, using technical solution provided by the invention,
It can be by the structure fabrication of encrypted card into the ferrule structure to match with Nano-SIM card card slots, and due in the prior art
The geomery of SIM card chip inside Nano-SIM cards is less than the geomery of Nano-SIM cards, therefore using cutting card
Nano-SIM cards are further cut into smaller geomery by device, without being caused to the SIM card chip inside Nano-SIM cards
Clipped SIM card, is then embedded in the groove in the encrypted card of ferrule structure by damage, thus by encrypted card and SIM card
It is inserted into the same SIM card card slot of mobile phone simultaneously.And for the mobile phone that SIM card card slot is Micro-SIM card card slots, utilize this
Invent provide technical solution, can by the structure fabrication of encrypted card into the ferrule structure to match with Micro-SIM card card slots, and
And the geomery of the groove in the encrypted card of ferrule structure is fabricated to the geomery that can be embedded in Nano-SIM cards, pass through
Nano-SIM cards can need to be only embedded in the encrypted card of ferrule structure by this set, user without being cut to SIM card
In groove, then the encrypted card for the ferrule structure for being embedded with Nano-SIM cards is inserted into the Micro-SIM card card slots of mobile phone,
So as to which encrypted card and SIM card are inserted into simultaneously in the same SIM card card slot of mobile phone.In addition, it is standard for SIM card card slot
The mobile phone of SIM card card slot, using technical solution provided by the invention, can by the structure fabrication of encrypted card into standard SIM card card
The ferrule structure that slot matches, and the geomery of the groove in the encrypted card of ferrule structure is fabricated to and can be embedded in
The geomery of Micro-SIM cards or Nano-SIM cards, by this set, user can only need without being cut to SIM card
Micro-SIM cards or Nano-SIM cards are embedded in the groove in the encrypted card of ferrule structure, then will be embedded with Micro-
The encrypted card of the ferrule structure of SIM card or Nano-SIM cards is inserted into the SIM card card slot of mobile phone, thus by encrypted card and SIM
Card is inserted into the same SIM card card slot of mobile phone simultaneously.Furthermore it is possible to using Recovery card shape for Nano-SIM card shapes
Encrypted card becomes the shape of Micro-SIM cards or the shape of standard SIM card;Can also utilize Recovery card shape be Micro-
The encrypted card of SIM card shape becomes the shape of standard SIM card.
When the structure of encrypted card is membrane structure, encrypted card is attached to SIM card and is provided on the surface of hard contact.Tool
Body, encrypted card can make the product form of film, and match with the power contact with the SIM card card slot of mobile terminal
Power contact, encrypted card is in parallel with SIM card on mobile terminals so that the power contact of SIM card and the SIM card of mobile terminal
The power contact of card slot remains able to the normal use normally connected without influencing SIM card, thus by encrypted card and SIM card simultaneously
The problem of being inserted into the same SIM card card slot of mobile phone, having well solved the carrying and power supply of encrypted card.
It should be noted that encrypted card provided by the invention does not have the function of SIM card, different from of the prior art
SIM card.In electrical connection, the power contact of the encrypted card and the power contact of SIM cards of mobile phones card slot simultaneously connect to solve to encrypt
The power supply powerup issue of card.The surface of encrypted card is additionally provided with ISO7816 docking interfaces, with bluetooth pasting card phase in the prior art
Than the ISO7816 docking interfaces in the present invention set by encrypted card surface are totally different from bluetooth pasting card in the prior art
Set principal and subordinate's ISO7816 interfaces, the in the prior art effect of principal and subordinate's ISO7816 interfaces set in bluetooth pasting card are
Realize that bluetooth pasting card communicates with SIM card, bluetooth pasting card with the data of mobile phone, and encrypted card surface in the present invention
The effect of ISO7816 docking interfaces is totally different from the effect of principal and subordinate's ISO7816 interfaces in bluetooth pasting card in the prior art, this
The effect of the ISO7816 docking interfaces on encrypted card surface is to realize mobile phone card slot ISO7816 interfaces and SIM card in invention
The electrical docking of ISO7816 interfaces so that the ISO7816 interfaces of SIM cards of mobile phones card slot and the ISO7816 interfaces of SIM card it is each
Contact is directly connected.In addition, in the prior art it is developed that bluetooth SIM card, bluetooth SIM card are actually a tool
There is the SIM card of Bluetooth function, it can be by ISO7816 interfaces and mobile phone into row data communication.With bluetooth SIM card phase in the prior art
Than encrypted card provided by the invention does not have the function of SIM card, does not move identification code, it is impossible to be used as SIM card, not yet
With ISO7816 interfaces, it is impossible to by ISO7816 interfaces and mobile phone into row data communication.In addition, added due to provided by the invention
Do not have mobile identification code in close card, therefore encrypt card issuing and cooperate hair without with third parties such as SIM card operators
Card, user can more easily obtain encrypted card.
Fig. 2 shows according to an embodiment of the invention for being inserted into the functional structure frame of the encrypted card in mobile terminal
Figure, as shown in Fig. 2, the encrypted card includes:Wireless communication module 210, sensor 220, safety chip 230 and power interface (figure
In be not shown).
Wherein, wireless communication module 210 between encrypted card and mobile terminal for establishing communication port, with mobile terminal
Into row data communication.Wireless communication module 210 is additionally operable to establish communication port between encrypted card and external routes equipment, and outer
Portion's routing device is into row data communication.Therefore, wireless communication module 210 can be in encrypted card, mobile terminal and external routes equipment
Between establish communication port, with mobile terminal or external routes equipment into row data communication.Wireless communication module 210 includes:
Bluetooth communication and/or WIFI communication modules.Specifically, when wireless communication module 210 includes bluetooth communication, encryption
Bluetooth communication in card is connected with the bluetooth module of mobile terminal, so as to be established between encrypted card and mobile terminal
Bluetooth communication channel, can be with the bluetooth module in mobile terminal into row data communication;When wireless communication module 210 includes WIFI
During communication module, the WIFI communication modules in encrypted card can both be connected with the WIFI module of mobile terminal, can also with it is outer
Portion's routing device establishes WIFI connections.It is established after WIFI connect in encrypted card and external routes equipment, passes through external routes equipment
It achieves that and communication port is established between encrypted card and far-end computer information system, and far-end computer information system also may be used
It communicates with mobile terminal, so as to be established between encrypted card, mobile terminal and far-end computer information system three mutually
Join the communication port of intercommunication;When wireless communication module 210 not only includes bluetooth communication, but also during including WIFI communication modules, use
Family can be selected through bluetooth approach or WIFI modes according to actual needs into row data communication.In the present invention, pass through indigo plant
Tooth mode or WIFI modes can conveniently realize the number between encrypted card, mobile terminal and far-end computer information system three
According to communication, it is difficult with encrypted card into row data communication due to various limitations to efficiently solve the problems, such as certain mobile terminals.
Sensor 220 is used to detect user's confirmation signal of user.Specifically, sensor 220 includes:Acceleration sensing
Device, geomagnetic sensor, gyro sensor and/or sonic sensor.Those skilled in the art can be according to actual needs to sensing
Device is combined and selects, and does not limit herein.Sensor 220 in encrypted card is independently of mobile terminal, the behaviour of mobile terminal
Sensor 220 can not be called by making system, so as to eradicate the risk that sensor is called by long-range malice, improve transactional operation
Safety.
Safety chip 230 is connected respectively with wireless communication module 210 and sensor 220, for being examined according to sensor 220
The user's confirmation signal measured, is encrypted user information operation or decryption oprerations.Safety chip 230 be further used for from
Wireless communication module 210 receives user information operational order, generates random goal verification signal, and compare sensor 220 and examine
Whether the user's confirmation signal measured and the goal verification signal generated are consistent, and user's confirmation signal and mesh are obtained if comparing
It is consistent to mark confirmation signal, then operation or decryption oprerations user information are encrypted.When wireless communication module 210 in encrypted card and
When communication port is established between mobile terminal, safety chip 230 can receive the use from mobile terminal from wireless communication module 210
Family information operational order;When wireless communication module 210 establishes communication port between encrypted card and far-end computer information system
When, safety chip 230 can be received from wireless communication module 210 from far-end computer information system user information operation refer to
It enables;When wireless communication module 210 establishes communication port between encrypted card, mobile terminal and far-end computer information system three
When, safety chip 230 can receive the user from mobile terminal or far-end computer information system from wireless communication module 210
Information operational order.
For example, when user is traded payment using mobile terminal, mobile terminal sends user information behaviour to encrypted card
It instructs, the wireless communication module 210 in encrypted card receives the user information operational order, and safety chip 230 is according to the user
Information operational order using random algorithm, generates random goal verification signal, and passes through the use that sensor 220 detects user
Family confirmation signal, then safety chip 230 compares the obtained user's confirmation signal of the detection of sensor 220 and the target generated is true
Whether consistent recognize signal, to obtain user's confirmation signal consistent with goal verification signal if comparing, using being stored in safety chip
Key and algorithm in 230, are encrypted user information operation or decryption oprerations.Those skilled in the art can be according to practical need
Random algorithm is selected, is not limited herein.
Wherein, goal verification signal includes target gesture behavior signal, and user's confirmation signal is believed including user gesture behavior
Number;And/or goal verification signal includes targeted voice signal, user's confirmation signal includes user voice signal.For example, when passing
When sensor 220 includes acceleration transducer, geomagnetic sensor and/or gyro sensor, goal verification signal includes target hand
Gesture behavior signal, user's confirmation signal include user gesture behavior signal, then safety chip 230 compares sensor 220 and detects
Whether obtained user gesture behavior signal and the target gesture behavior signal generated are consistent;When sensor 220 is passed for sound wave
During sensor, goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal, then safety chip
230 compare sensor 220 using speech recognition technology detects obtained user voice signal and the targeted voice signal generated
It is whether consistent;When sensor 220 is including except acceleration transducer, geomagnetic sensor and/or gyro sensor, further including sound
During wave sensor, goal verification signal includes target gesture behavior signal and targeted voice signal, and user's confirmation signal includes using
Family gesture behavior signal and user voice signal, then safety chip 230 compares sensor 220 and detects obtained user gesture row
It is whether consistent by signal and the target gesture behavior signal that generates, and compare sensor 220 and detect obtained user speech letter
It is number whether consistent with the targeted voice signal that is generated.
In addition, when having further included personal recognition code in the user information operational order that safety chip 230 receives, example
Such as PIN code, safety chip 230 verifies that individual's identification in the user information operational order is close according to the personal recognition code that prestores
The legitimacy of code.Specifically, if safety chip 230 verifies the PIN code obtained in user information operational order and the PIN code that prestores
Unanimously, then it is legal PIN code to illustrate the PIN code, then safety chip 230 is according to user information operational order, and generation is at random
Goal verification signal;If safety chip 230 verifies the PIN code obtained in user information operational order and prestores PIN code not
Unanimously, then it is illegal PIN code to illustrate the PIN code, then safety chip 230 need not generate random goal verification signal,
The result of personal recognition code authentication failed can directly be returned.
Further, it is provided by the invention when personal recognition code verifies that identification number is more than preset maximum times
Encrypted card locks automatically, needs to unlock by the external authentication instruction of higher permission.
Goal verification signal in the present invention is not changeless goal verification signal, but by safety chip 230
It generates at random, so as to efficiently reduce the risk that goal verification signal is remotely maliciously cracked;In addition, safety chip
230 need whether to detect obtained user's confirmation signal and the goal verification signal generated unanimously come really according to sensor 220
It is fixed whether user information to be encrypted operation or decryption oprerations, so as to prevent the Trojan attack in process of exchange, into one
Step improves the safety of transactional operation.
Wherein, user information operational order can be divided into but be not limited to user information encrypted instruction or user information decryption refer to
It enables.When user information operational order is user information encrypted instruction, the comparison of safety chip 230 obtains sensor 220 and detects
To real-time user's confirmation signal it is consistent with the goal verification signal generated at random after, then using being stored in safety chip 230
User information is encrypted operation in interior key and algorithm;When user information operational order is user information decryption instructions,
Safety chip 230, which compares, obtains the obtained real-time user's confirmation signal of the detection of sensor 220 and the goal verification generated at random
After signal is consistent, then user information is decrypted operation using the key and algorithm that are stored in safety chip 230.It is above-mentioned to add
It is close or decryption oprerations as a result, module 210 returns by radio communication.
Specifically, user's confirmation letter that safety chip 230 detects sensor 220 in predetermined registration operation time interval
Number and goal verification signal compare and analyze, calculate the similarity of user's confirmation signal and goal verification signal.If pre-
If the similarity being calculated in operating time interval is more than default similarity threshold, then safety chip 230 determines that user confirms
Signal is consistent with goal verification signal, illustrates that user successfully confirmed this time to operate, then right according to user information operational order
Operation or decryption oprerations are encrypted in user information;If the similarity being calculated in predetermined registration operation time interval is less than
Similarity threshold is preset, then safety chip 230 determines that user's confirmation signal and goal verification signal are inconsistent, illustrates operation overtime
User is caused not successfully to confirm this time to operate, then do not carry out user information any operation, and the result returned operation failure.
Wherein, those skilled in the art can according to actual needs be configured default similarity threshold and predetermined registration operation time interval,
It does not limit herein.For example, default similarity threshold can be set as 0.9.
If the wireless communication module 210 in encrypted card is chronically at opening, then not there is only power consumption problem, and
And also there is the risks maliciously connected by other people.To solve the above-mentioned problems, in the present invention, sensor 220 is additionally operable to examine
The user control signal of user is surveyed, safety chip 230 is additionally operable to detect obtained user control signal according to sensor 220, open
Communication function that is dynamic or closing wireless communication module 210.Specifically, safety chip 230 compares sensor 220 and detects obtained use
Whether family controls signal and default control signal consistent, if to obtain user control signal consistent with default control signal for comparison,
Start or close the communication function of wireless communication module 210.
Specifically, sensor 220 includes sonic sensor, and default control signal is default audio controls, specifically may be used
Including default speech onset signal and default voice shutdown signal.Safety chip 230 utilizes speech recognition technology, compares sound wave and passes
Whether the user control signal that sensor detects consistent with default speech onset signal, if compare obtain user control signal with
Default speech onset signal is consistent, then starts the communication function of wireless communication module 210;Safety chip 230 utilizes speech recognition
Technology, whether the user control signal that comparison sonic sensor detects is consistent with default voice shutdown signal, if comparing
It is consistent with default voice shutdown signal to user control signal, then close the communication function of wireless communication module 210.
Assuming that it is " opening encrypted card communication function " with the corresponding voice messaging of default speech onset signal, with default language
The corresponding voice messaging of sound shutdown signal is " closing encrypted card communication function ", if user wants to open the nothing in encrypted card
The communication function of line communication module 210 then need to only say against the mobile terminal for being equipped with encrypted card and " open encryption cartoon letters work(
Can " these words, the sensor 220 in encrypted card detects " opening encrypted card communication function " corresponding voice signal, this
When, which is user control signal, and safety chip 230 obtains the user control signal through comparison and opened with default voice
Dynamic signal is consistent, then starts the communication function of wireless communication module 210.After user completes transaction payment, need to close wireless
During the communication function of communication module 210, it similarly need to only be said against the mobile terminal for being equipped with encrypted card and " close encryption cartoon letters
These words of function ", the sensor 220 in encrypted card detect " closing encrypted card communication function " corresponding voice signal,
At this point, the voice signal is user control signal, safety chip 230 obtains the user control signal and default voice through comparing
Shutdown signal is consistent, then closes the communication function of wireless communication module 210.
Optionally, default control signal can be also default gesture behaviour control signal, specifically may include default gesture behavior
Enabling signal and default gesture behavior shutdown signal, wherein, default gesture behavior enabling signal can be closed with default gesture behavior
Signal is identical or different, and those skilled in the art can be configured according to actual needs, not limit herein.
Optionally, when encrypted card completes the operation of user or during user's operation time-out, safety chip 230 is then automatic
The communication function for closing wireless communication module 210 is actively closed without user.
Safety chip 230 detects obtained user control signal and default gesture behaviour control signal according to sensor 220
The mode of communication function to start or close wireless communication module 210 is detected with above-mentioned safety chip 230 according to sensor 220
Obtained user control signal and default audio controls come start or close wireless communication module 210 communication function side
Formula is similar, and details are not described herein again.
When goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture behavior signal
When, in order to avoid there is the situation that safety chip 230 is made to perform operation due to the false triggering of user, safety chip 230 is also used
In:Judging the time that the user gesture behavior signal that the detection of sensor 220 obtains is consistent with target gesture behavior signal is
No is more than prefixed time interval, if judging to obtain the time that user gesture behavior signal is consistent with target gesture behavior signal
More than prefixed time interval, then operation or decryption oprerations user information are encrypted.
Those skilled in the art can set prefixed time interval according to actual needs, not limit herein.For example, when default
When time interval is 1s, if the judgement of safety chip 230 obtains user gesture behavior signal and is kept with target gesture behavior signal
The consistent time is more than 1s, then operation or decryption oprerations user information are encrypted;If the judgement of safety chip 230 is used
Family gesture behavior signal is less than 1s with the time that target gesture behavior signal is consistent, then user information is not carried out any
Operation, and the result returned operation failure is to mobile terminal.
User's confirmation signal is sent out for the ease of the goal verification signal that user is generated according to safety chip 230, safety
Chip 230 is additionally operable to:The goal verification signal generated and sensor 220 are detected respectively by the communication port established
To user's confirmation signal be sent to mobile terminal.Specifically, when goal verification signal includes target gesture behavior signal, user
When confirmation signal includes user gesture behavior signal, the target gesture row that is generated for the ease of user according to safety chip 230
Gesture is made for signal and adjusts gesture, the target hand that safety chip 230 will be generated respectively by the communication port established
The user gesture behavior signal that gesture behavior signal and sensor detect is sent to mobile terminal, so that mobile terminal is in screen
It is middle display with the corresponding target gesture of target gesture behavior signal and with the corresponding user gesture of user gesture behavior signal.
By the position relationship of display target gesture and user gesture, friendly man-machine interface is provided a user and has guided gesture operation.
The screen of mobile terminal is utilized to user's display target gesture and user gesture in the technical solution, facilitates user according to target
Gesture makes required gesture.
By mobile terminal for for mobile phone, mobile phone is after target gesture behavior signal is had received, in the screen of mobile phone
Middle display is with the corresponding target gesture of target gesture behavior signal, the hand-holdable mobile phone of user and according to shown in mobile phone screen
Target gesture make required gesture.When the user gesture behavior signal that sensor 220 detects, safety chip 230
Sensor 220 is detected to obtained user gesture behavior signal and is also sent to mobile phone, mobile phone is having received user gesture behavior
After signal, display and the corresponding user gesture of user gesture behavior signal in the screen of mobile phone, user can be according to mobile phone
Shown target gesture and current user gesture in time make adjustment to the gesture of oneself in screen, so as to make institute
The gesture made is consistent with target gesture.
For example, it is to carry out gesture shifting along certain mobile route with the corresponding target gesture of target gesture behavior signal
It is dynamic, then shown target gesture can be target mobile route in mobile phone, and user can be according to shown in mobile phone screen
Target mobile route cell phone, and it is timely according to target mobile route and current mobile route shown in mobile phone screen
Ground adjusts the moving direction of mobile phone so that the mobile route of mobile phone can be overlapped with target mobile route, so as to facilitate user
Gesture is made according to target gesture.
For another example, when goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal, peace
The targeted voice signal generated is sent to mobile terminal by full chip 230 by the communication port established, and mobile terminal exists
Display and the corresponding target voice information of targeted voice signal in screen, if target voice information is " payment ", then carry out
During specific implementation, can be shown in the screen of mobile terminal " please read following word:The prompt message of payment ", then user
According to target voice delivering user voice signal, the sonic sensor in sensor 220 detects user voice signal, safety
Chip 230 utilizes speech recognition technology, compare the user voice signal that detects of sonic sensor whether with target language message
It is number consistent, obtain that user voice signal is consistent with targeted voice signal if comparing, it is close in safety chip 230 using being stored in
User information is encrypted operation or decryption oprerations in key and algorithm.
When encrypted card is installed in the SIM card card slot of mobile terminal, the power interface of encrypted card and the SIM of mobile terminal
The power interface of card card slot is connected, and the power interface for passing through the SIM card card slot of mobile terminal provides electric energy for encrypted card.
The encrypted card provided according to embodiments of the present invention, encryption card issuing without with the third parties such as SIM card operator into
Row cooperation hair fastener obtains convenient for user;The structure of encrypted card is ferrule structure or membrane structure, and encrypted card can be same with SIM card
When be inserted into the same SIM card card slot of mobile terminal, can not only be by the power interface of the SIM card card slot of mobile terminal
Encrypted card provides electric energy, but also carries and use convenient for user;Wireless communication module in encrypted card can be in encrypted card, shifting
It is dynamic to establish the communication port to interconnect between terminal and far-end computer information system three, realize encrypted card, movement eventually
Data communication between end and far-end computer information system three, efficiently solves certain mobile terminals due to various limitations
And be difficult with encrypted card into row data communication the problem of;Sensor in encrypted card is used to detect user's confirmation signal of user,
The sensor is independently of mobile terminal so that mobile terminal can not directly invoke the sensor, eradicated sensor and remotely disliked
The risk for calling of anticipating;The goal verification signal that safety chip is generated is random goal verification signal, can be efficiently reduced
The risk that goal verification signal is remotely maliciously cracked, in addition, safety chip is believed also according to the random goal verification generated
Number with whether user's confirmation signal that sensor detects consistent determines whether user information to be encrypted operation or solution
Close operation so as to be effectively prevented the Trojan attack in process of exchange, improves the safety of transactional operation.
Fig. 3 shows the method for work of the encrypted card according to an embodiment of the invention for being used to be inserted into mobile terminal
Flow diagram, wherein, encrypted card is inserted into SIM card in the same SIM card card slot of mobile terminal simultaneously, passes through mobile terminal
The power interface of SIM card card slot provide electric energy for encrypted card.As shown in figure 3, this method comprises the following steps:
Step S300, by the wireless communication module in encrypted card, in encrypted card, mobile terminal and far-end computer information
The communication port to interconnect is established between system three.
Specifically, wireless communication module between encrypted card and mobile terminal for establishing communication port, with mobile terminal
Into row data communication.Wireless communication module is additionally operable to establish communication port between encrypted card and external routes equipment, with outside
Routing device is into row data communication.Therefore, wireless communication module can be built between encrypted card, mobile terminal and external routes equipment
Vertical communication port, with mobile terminal or external routes equipment into row data communication.
Wireless communication module includes:Bluetooth communication and/or WIFI communication modules.Specifically, work as wireless communication module
During including bluetooth communication, the bluetooth communication in encrypted card is connected with the bluetooth module of mobile terminal, so as to add
Bluetooth communication channel is established between close card and mobile terminal, it can be with the bluetooth module in mobile terminal into row data communication;
When wireless communication module includes WIFI communication modules, the WIFI communication modules in encrypted card both can be with the WIFI of mobile terminal
Module is connected, and can also establish WIFI with external routes equipment and connect.WIFI is established in encrypted card and external routes equipment to connect
After connecing, achieved that by external routes equipment and communication port is established between encrypted card and far-end computer information system, and it is remote
End computer information system can also communicate with mobile terminal, so as in encrypted card, mobile terminal and far-end computer information
The communication port to interconnect is established between system three;When wireless communication module not only include bluetooth communication, but also including
During WIFI communication modules, user can be selected through bluetooth approach or WIFI modes according to actual needs into row data communication.
In the present invention, encrypted card, mobile terminal and far-end computer can be conveniently realized by bluetooth approach or WIFI modes to believe
Data communication between breath system three, it is difficult to be sticked into encryption to efficiently solve certain mobile terminals due to various limitations
The problem of row data communication.
When encrypted card only establishes communication port with mobile terminal, and do not communicate with the foundation of far-end computer information system
During road, this method also can continue to perform.
Step S301 receives user information operational order.
When wireless communication module establishes communication port between encrypted card and mobile terminal, can be received in step S301
From the user information operational order of mobile terminal;When wireless communication module is between encrypted card and far-end computer information system
When establishing communication port, the user information operational order from far-end computer information system can be received in step S301;When
When wireless communication module establishes communication port between encrypted card, mobile terminal and far-end computer information system three, in step
The user information operational order from mobile terminal or far-end computer information system can be received in rapid S301.
When user is traded payment using mobile terminal, mobile terminal sends user information operation to encrypted card and refers to
It enables, encrypted card receives the user information operational order that mobile terminal is sent.
Step S302 according to user information operational order, generates random goal verification signal.
After step S301 receives user information operational order, in step s 302, referred to according to user information operation
It enables, using random algorithm, generates random goal verification signal.Those skilled in the art can select to calculate at random according to actual needs
Method does not limit herein.
Step S303 passes through user's confirmation signal of the sensor senses user in encrypted card.
Wherein, the sensor in encrypted card includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sound
Wave sensor.Those skilled in the art can be combined and select to sensor according to actual needs, not limit herein.Encryption
Sensor in card is independently of mobile terminal, and the operating system of mobile terminal can not call sensor, so as to eradicate sensor
The risk called by long-range malice, improves the safety of transactional operation.
Step S304, compare user's confirmation signal for detecting of sensor and the goal verification signal generated whether one
It causes;If so, perform step S305;If it is not, then this method terminates.
Wherein, goal verification signal includes target gesture behavior signal, and user's confirmation signal is believed including user gesture behavior
Number;And/or goal verification signal includes targeted voice signal, user's confirmation signal includes user voice signal.For example, work as mesh
It marks confirmation signal and includes target gesture behavior signal, when user's confirmation signal includes user gesture behavior signal, in step S304
Whether the user gesture behavior signal that middle comparison sensor detects and the target gesture behavior signal generated are consistent;Work as mesh
It marks confirmation signal and includes targeted voice signal, when user's confirmation signal includes user voice signal, compare pass in step s 304
Whether the user voice signal that sensor detects and the targeted voice signal generated are consistent;When goal verification signal includes mesh
Gesture behavior signal and targeted voice signal are marked, user's confirmation signal includes user gesture behavior signal and user voice signal
When, the user gesture behavior signal that sensor detects and the target gesture behavior signal generated are compared in step s 304
It is whether consistent, and compare the user voice signal that sensor detects and whether the targeted voice signal generated be consistent.It should
Whether user's confirmation signal that method is detected according to sensor and the goal verification signal that is generated unanimously determine whether
Operation or decryption oprerations are encrypted to user information, so as to prevent the Trojan attack in process of exchange, further improve
The safety of transactional operation.
Specifically, user's confirmation signal and goal verification letter sensor detected in predetermined registration operation time interval
It number compares and analyzes, calculates the similarity of user's confirmation signal and goal verification signal.If in predetermined registration operation time interval
The similarity being inside calculated is more than default similarity threshold, it is determined that user's confirmation signal is consistent with goal verification signal, says
Bright user successfully confirmed this time to operate, then perform step S305;If it is calculated in predetermined registration operation time interval
Similarity is less than default similarity threshold, it is determined that user's confirmation signal and goal verification signal are inconsistent, illustrate that operation is super
When user is caused not successfully to confirm this time operate, then any operation is not carried out to user information, this method terminates.
Optionally, in the case where determining that user's confirmation signal and goal verification signal are inconsistent, this method may also include:
The step of result returned operation failure.Wherein, those skilled in the art can according to actual needs to default similarity threshold and
Predetermined registration operation time interval is configured, and is not limited herein.
User information is encrypted operation or decryption oprerations in step S305.
It is comparing to obtain user's confirmation signal that sensor detects and the goal verification letter generated through step S304
Under number unanimous circumstances, in step S305, according to user information operational order, user is believed using the key and algorithm to prestore
Operation or decryption oprerations are encrypted in breath.Wherein, user information operational order can be divided into but be not limited to user information encrypted instruction
Or user information decryption instructions.Specifically, when user information operational order is user information encrypted instruction, in step S305
User information is encrypted operation using the key and algorithm that prestore;When user information operational order refers to for user information decryption
When enabling, user information is decrypted operation using the key and algorithm that prestore in step S305.Optionally, above-mentioned encryption or
Decryption oprerations as a result, it is equal can by radio communication module return.
The method of work of the encrypted card provided according to embodiments of the present invention can be counted in encrypted card, mobile terminal and distal end
The communication port to interconnect is established between calculation machine information system three, realizes encrypted card, mobile terminal and far-end computer
Data communication between information system three efficiently solves certain mobile terminals due to various limitations and it is difficult to and encrypted card
The problem of into row data communication;Sensor in encrypted card is independently of mobile terminal so that mobile terminal can not directly invoke this
Sensor has eradicated the risk that sensor is called by long-range malice;The goal verification signal generated is random goal verification
Signal can efficiently reduce the risk that goal verification signal is remotely maliciously cracked, in addition, according to the random mesh generated
Whether mark confirmation signal and user's confirmation signal that sensor detects be consistent to determine whether user information is encrypted
Operation or decryption oprerations, so as to be effectively prevented the Trojan attack in process of exchange, improve the safety of transactional operation.
Fig. 4 shows the method for work of the encrypted card in accordance with another embodiment of the present invention for being used to be inserted into mobile terminal
Flow diagram, wherein, encrypted card and SIM card are inserted into simultaneously in the same SIM card card slot of mobile terminal, pass through it is mobile eventually
The SIM card interface at end provides electric energy for encrypted card.As shown in figure 4, this method comprises the following steps:
Step S400, by the wireless communication module in encrypted card, in encrypted card, mobile terminal and far-end computer information
The communication port to interconnect is established between system three.
Specifically, the structure of encrypted card is ferrule structure or membrane structure.When the structure of encrypted card is ferrule structure,
The appearance and size of encrypted card and the appearance and size of the SIM card card slot of mobile terminal match, and the groove of encrypted card is embedded in shape
Size is less than or equal to the SIM card of the geomery of groove, wherein, geomery is less than or equal to the geomery of groove
SIM card can be the smaller SIM card of geomery in the prior art, or clipped SIM card.When the structure of encrypted card
During for membrane structure, encrypted card is attached to SIM card and is provided on the surface of hard contact.
Wherein, the power interface of encrypted card is connected with the power interface of the SIM card card slot of mobile terminal.Radio communication mold
Block includes:Bluetooth communication and/or WIFI communication modules.When wireless communication module includes bluetooth communication, encrypted card
In bluetooth communication be connected with the bluetooth module of mobile terminal, so as to establishing indigo plant between encrypted card and mobile terminal
Tooth communication port, can be with the bluetooth module in mobile terminal into row data communication;When wireless communication module communicates including WIFI
During module, the WIFI communication modules in encrypted card can both be connected with the WIFI module of mobile terminal, can also be with external road
WIFI connections are established by equipment.It is established after WIFI connect in encrypted card and external routes equipment, it can by external routes equipment
Communication port is established in realization between encrypted card and far-end computer information system, and far-end computer information system also can be with shifting
Dynamic terminal communicates, mutual so as to establish interconnection between encrypted card, mobile terminal and far-end computer information system three
Logical communication port;When wireless communication module not only includes bluetooth communication, but also during including WIFI communication modules, user can basis
Actual needs selection is into row data communication by bluetooth approach or WIFI modes.
When encrypted card only establishes communication port with mobile terminal, and do not communicate with the foundation of far-end computer information system
During road, this method also can continue to perform.
Step S401 receives user information operational order.
When wireless communication module establishes communication port between encrypted card and mobile terminal, can be received in step S401
From the user information operational order of mobile terminal;When wireless communication module is between encrypted card and far-end computer information system
When establishing communication port, the user information operational order from far-end computer information system can be received in step S401;When
When wireless communication module establishes communication port between encrypted card, mobile terminal and far-end computer information system three, in step
The user information operational order from mobile terminal or far-end computer information system can be received in rapid S401.Wherein, user
Information operational order includes personal recognition code.
Step S402 according to the personal recognition code that prestores, verifies that the personal recognition code in user information operational order is
It is no legal;If so, perform step S403;If it is not, then this method terminates.
This method verifies the legitimacy of the personal recognition code in user information operational order, further improves
The safety of transactional operation.By personal recognition code for PIN code, to be obtained in user information operational order if verified
PIN code is consistent with the PIN code that prestores, then it is legal PIN code to illustrate the PIN code, then then performs step S403;If verification
It obtains PIN code in user information operational order and the PIN code that prestores is inconsistent, then illustrate the PIN code for illegal PIN code,
So this method terminates.Optionally, the illegal situation of personal recognition code in verification obtains user information operational order
Under, it also can return to the result of personal recognition code authentication failed.
Further, it is provided by the invention when personal recognition code verifies that identification number is more than preset maximum times
Encrypted card locks automatically, needs to unlock by the external authentication instruction of higher permission.
Step S403 according to user information operational order, generates random goal verification signal.
Specifically, according to user information operational order, using random algorithm, random goal verification signal is generated.
Step S404 passes through user's confirmation signal of the sensor senses user in encrypted card.
Wherein, the sensor in encrypted card includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sound
Wave sensor.Goal verification signal includes target gesture behavior signal, and user's confirmation signal includes user gesture behavior signal;
And/or goal verification signal includes targeted voice signal, user's confirmation signal includes user voice signal.
Step S405 is respectively detected the goal verification signal and sensor that are generated by the communication port established
To user's confirmation signal be sent to mobile terminal.
User's confirmation signal is sent out according to the goal verification signal generated for the ease of user, in step S405, is led to
User's confirmation signal that established communication port respectively detects the goal verification signal and sensor that are generated is crossed to send out
It send to mobile terminal.
Specifically, when goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture row
During for signal, gesture is made according to the target gesture behavior signal generated for the ease of user and adjusts gesture, encrypt cartoon
Cross the user gesture row that established communication port respectively detects the target gesture behavior signal and sensor that are generated
Mobile terminal is sent to for signal, so that mobile terminal is shown and the corresponding target hand of target gesture behavior signal in screen
Gesture and with the corresponding user gesture of user gesture behavior signal.By the position relationship of display target gesture and user gesture,
It has provided a user friendly man-machine interface and has guided gesture operation.
By mobile terminal for for mobile phone, mobile phone is after target gesture behavior signal is had received, in the screen of mobile phone
Middle display is with the corresponding target gesture of target gesture behavior signal, the hand-holdable mobile phone of user and according to shown in mobile phone screen
Target gesture make specific gesture.When the user gesture behavior signal that sensor detects, encrypted card examines sensor
The user gesture behavior signal measured is also sent to mobile phone, and mobile phone is after user gesture behavior signal is had received, in hand
Display and the corresponding user gesture of user gesture behavior signal in the screen of machine, what user can be according in mobile phone screen
Target gesture and current user gesture in time make adjustment to the gesture of oneself.
Whether step S406, the user's confirmation signal and goal verification signal that comparison sensor detects are consistent;If so,
Then perform step S407;If it is not, then this method terminates.
Optionally, user's confirmation signal and goal verification letter sensor detected in predetermined registration operation time interval
It number compares and analyzes, calculates the similarity of user's confirmation signal and goal verification signal.If in predetermined registration operation time interval
The similarity being inside calculated is more than default similarity threshold, it is determined that user's confirmation signal is consistent with goal verification signal, says
Bright user successfully confirmed this time to operate, then perform step S407;If it is calculated in predetermined registration operation time interval
Similarity is less than default similarity threshold, it is determined that user's confirmation signal and goal verification signal are inconsistent, illustrate that operation is super
When user is caused not successfully to confirm this time operate, then any operation is not carried out to user information, this method terminates.Optionally,
In the case where determining that user's confirmation signal and goal verification signal are inconsistent, this method may also include:It returns operation failure
As a result the step of.Wherein, those skilled in the art can be according to actual needs to default between similarity threshold and predetermined registration operation time
It is configured every value, does not limit herein.
User information is encrypted operation or decryption oprerations in step S407.
It is comparing to obtain user's confirmation signal that sensor detects and the goal verification letter generated through step S406
Under number unanimous circumstances, in step S 407, according to user information operational order, user is believed using the key and algorithm to prestore
Operation or decryption oprerations are encrypted in breath.Specifically, when user information operational order is user information encrypted instruction, in step
User information is encrypted operation using the key and algorithm that prestore in S407;When user information operational order is user information
During decryption instructions, user information is decrypted operation using the key and algorithm that prestore in step S 407.
Optionally, when goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture row
During for signal, in order to avoid there is the situation that encrypted card is made to perform operation due to the false triggering of user, sensed in comparison
Under user gesture behavior signal and target gesture behavior signal unanimous circumstances that device detects, this method may also include:Sentence
Whether the time that the user gesture behavior signal that link sensor detects is consistent with target gesture behavior signal is more than pre-
If the step of time interval.If it is determined that obtain the time that user gesture behavior signal is consistent with target gesture behavior signal
More than prefixed time interval, then operation or decryption oprerations user information are encrypted;If it is determined that obtain user gesture behavior
Signal is less than prefixed time interval with the time that target gesture behavior signal is consistent, then user information is not carried out any
Operation.
If the wireless communication module in encrypted card is chronically at opening, then not there is only power consumption problem, and
Also there is the risks maliciously connected by other people.To solve the above-mentioned problems, optionally, this method further includes:Pass through encrypted card
In sensor senses user user control signal, the user control signal detected according to sensor, start or close
The step of communication function of wireless communication module.Specifically, user control signal and the default control that sensor detects are compared
Whether signal processed is consistent, if comparing, to obtain user control signal consistent with default control signal, starts or closes and wirelessly communicates
The communication function of module.
Optionally, when encrypted card completes the operation of user or during user's operation time-out, encrypted card is then automatically closed
The communication function of wireless communication module in encrypted card is actively closed without user.
The method of work of the encrypted card provided according to embodiments of the present invention, the goal verification signal and sensor that will be generated
It detects obtained user's confirmation signal and is sent to mobile terminal, user is sent out according to the goal verification signal generated convenient for user
Confirmation signal has provided a user friendly man-machine interface and has guided operation;In addition, when goal verification signal includes target gesture row
For signal, when user's confirmation signal includes user gesture behavior signal, in the user gesture behavior signal that sensor detects
In the case of being more than prefixed time interval with the time that target gesture behavior signal is consistent and is consistent, just user is believed
Operation or decryption oprerations are encrypted in breath, the feelings so as to avoid the occurrence of due to the false triggering of user and encrypted card is made to perform operation
Condition effectively prevents the Trojan attack in process of exchange, improves the safety of transactional operation.
Wireless communication module mentioned in the present invention, sensor, safety chip are by hard-wired, for example, blue
Tooth communication module is the chip basic circuit set of integrated Bluetooth function, and safety chip may include operational amplifier, encryption chip
With deciphering chip etc..Although some of which module or integrated chip software, the claimed present invention is integrated software pair
The hardware circuit for the function of answering, rather than just software in itself.
So far, although those skilled in the art will appreciate that detailed herein have shown and described multiple showing for the present invention
Example property embodiment, still, without departing from the spirit and scope of the present invention, still can be directly true according to disclosure of invention
Determine or derive many other variations or modifications consistent with the principles of the invention.Therefore, the scope of the present invention is it should be understood that and recognize
It is set to and covers other all these variations or modifications.
It should be noted that although several modules of encrypted card are described in detail in explanation above, this stroke
Divide and be only exemplary, be not enforceable.It will be understood to those skilled in the art that indeed, it is possible to embodiment
In module adaptively changed, also can be by a module by multiple block combiners in embodiment into a module
It is divided into multiple modules.
In addition, although describing the present invention in the accompanying drawings with particular order implements operation, this is not required that or secretly
Desired knot must could be realized according to the particular order come the operation for performing these operations or having to carry out shown in whole by showing
Fruit.Certain steps are can be omitted, multiple steps are merged into a step execution or a step is divided into multiple steps and are held
Row.
In conclusion using technical solution provided by the invention, encryption card issuing without with the thirds such as SIM card operator
Side cooperates hair fastener, is obtained convenient for user;The structure of encrypted card is ferrule structure or membrane structure, encrypted card and SIM card
Can be inserted into simultaneously in the same SIM card card slot of mobile terminal, can facilitate user carry and use, in addition, encrypted card according to
Whether the random goal verification signal generated and user's confirmation signal that sensor detects are consistent to determine whether pair
Operation or decryption oprerations are encrypted in user information, so as to be effectively prevented the Trojan attack in process of exchange, improve
The safety of transactional operation.
The method and specific implementation method of the present invention are described in detail, and give corresponding implementation above
Example.Certainly, in addition to the implementation, the present invention can also have other embodiment, all to use equivalent substitution or equivalent transformation shape
Into technical solution, all fall within invention which is intended to be protected.
Claims (7)
1. a kind of encrypted card for being used to be inserted into mobile terminal, which is characterized in that
The structure of the encrypted card is ferrule structure or membrane structure, and the encrypted card is inserted into the shifting simultaneously with SIM card
In the same SIM card card slot of dynamic terminal;
Wherein, the encrypted card includes:Wireless communication module, sensor, safety chip and power interface;
The wireless communication module, for establishing communication port between the encrypted card and the mobile terminal, with the shifting
Terminal is moved into row data communication;
The sensor, for detecting user's confirmation signal of user;
The safety chip is connected respectively with the wireless communication module and the sensor, for being examined according to the sensor
The user's confirmation signal measured, is encrypted user information operation or decryption oprerations;
The power interface of the encrypted card is connected with the power interface of the SIM card card slot of the mobile terminal, for passing through
The power interface for stating the SIM card card slot of mobile terminal provides electric energy for the encrypted card;
Wherein,
The safety chip is additionally operable to:User information operation from wireless communication module reception from the mobile terminal refers to
It enables, using random algorithm, generates random goal verification signal, and compare user's confirmation signal that the sensor detects
It is whether consistent with the goal verification signal that is generated, obtain user's confirmation signal and the goal verification signal one if comparing
It causes, then operation or decryption oprerations user information is encrypted;
The goal verification signal includes target gesture behavior signal and/or targeted voice signal,
The safety chip is additionally operable to:By the communication port established respectively by the goal verification signal generated and the biography
User's confirmation signal that sensor detects is sent to the mobile terminal, so that the mobile terminal is shown and institute in screen
State the corresponding target gesture of target gesture behavior signal and/or with the corresponding target language message of the targeted voice signal
Breath;
Whether the user control signal and default control signal that comparison sensor detects are consistent, and user's control is obtained if comparing
Signal is consistent with default control signal, then starts or close the communication function of wireless communication module;
When encrypted card completes the operation of user or during user's operation time-out, the encrypted card is then automatically closed in encrypted card
The communication function of wireless communication module actively closed without user.
2. the encrypted card according to claim 1 for being used to be inserted into mobile terminal, which is characterized in that
When the structure of the encrypted card is ferrule structure, the appearance and size of the encrypted card and the SIM card of the mobile terminal
The appearance and size of card slot matches, and the groove of the encrypted card is embedded in the shape ruler that geomery is less than or equal to the groove
Very little SIM card;When the structure of the encrypted card is membrane structure, the encrypted card is attached to SIM card and is provided with hard contact
Surface on.
3. the encrypted card according to claim 1 for being used to be inserted into mobile terminal, which is characterized in that
The user information operational order includes personal recognition code;
The safety chip is additionally operable to:According to the personal recognition code that prestores, the individual in the user information operational order is verified
The legitimacy of recognition code.
4. the encrypted card according to claim 1 for being used to be inserted into mobile terminal, which is characterized in that
The goal verification signal includes target gesture behavior signal, and user's confirmation signal is believed including user gesture behavior
Number;And/or the goal verification signal includes targeted voice signal, user's confirmation signal includes user voice signal.
5. the encrypted card according to claim 4 for being used to be inserted into mobile terminal, which is characterized in that
The safety chip is additionally operable to:When the goal verification signal includes target gesture behavior signal, user's confirmation letter
When number including user gesture behavior signal, user gesture behavior signal and the target hand that the sensor detects are judged
The time that gesture behavior signal is consistent whether be more than prefixed time interval, if judge obtain the user gesture behavior signal with
The time that the target gesture behavior signal is consistent be more than prefixed time interval, then to user information be encrypted operation or
Decryption oprerations.
6. the encrypted card for being used to be inserted into mobile terminal according to claim 1-5 any one of them, which is characterized in that
The sensor includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sonic sensor.
7. the encrypted card for being used to be inserted into mobile terminal according to claim 1-5 any one of them, which is characterized in that
The wireless communication module includes:Bluetooth communication and/or WIFI communication modules.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710245447.9A CN107038571B (en) | 2017-04-14 | 2017-04-14 | For being inserted into the encrypted card in mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710245447.9A CN107038571B (en) | 2017-04-14 | 2017-04-14 | For being inserted into the encrypted card in mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107038571A CN107038571A (en) | 2017-08-11 |
CN107038571B true CN107038571B (en) | 2018-07-03 |
Family
ID=59536367
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710245447.9A Active CN107038571B (en) | 2017-04-14 | 2017-04-14 | For being inserted into the encrypted card in mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107038571B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109949466A (en) * | 2019-04-28 | 2019-06-28 | 桂林微网互联信息技术有限公司 | A kind of intelligent entrance guard control system and method |
CN110312236A (en) * | 2019-07-02 | 2019-10-08 | 桂林微网互联信息技术有限公司 | A kind of communication channel construction method |
CN111797379B (en) * | 2020-07-15 | 2023-01-06 | 上海瀚之友信息技术服务有限公司 | Processing method and device for improving information security |
CN112714109B (en) * | 2020-12-22 | 2022-04-22 | 北京握奇数据股份有限公司 | Key service system and key service method for smart card |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101594611A (en) * | 2009-06-29 | 2009-12-02 | 钱袋网(北京)信息技术有限公司 | The method of authentication and portable terminal, server and identity authorization system |
CN101599298A (en) * | 2009-06-29 | 2009-12-09 | 方秀芹 | Security certification memory, terminal device and terminal device safety certifying method |
KR102216877B1 (en) * | 2014-02-19 | 2021-02-18 | 삼성전자 주식회사 | Authentication method and apparatus based on biometric information in a electronic device |
CN104504563B (en) * | 2014-12-30 | 2018-05-15 | 中孚信息股份有限公司 | A kind of mobile message safety means and its method of work |
-
2017
- 2017-04-14 CN CN201710245447.9A patent/CN107038571B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107038571A (en) | 2017-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107038571B (en) | For being inserted into the encrypted card in mobile terminal | |
CN107016541B (en) | Encrypted card | |
KR101264791B1 (en) | Security certification and storage combined device having wireless communication function | |
CN105308898B (en) | For executing system, the method and apparatus of password authentification | |
WO2010032215A4 (en) | The system and method of contactless authorization of a payment | |
CN105827656B (en) | Identity identifying method and device based on NFC payment | |
JP2015511336A (en) | ID authentication | |
KR20150072438A (en) | System and method for secure remote access and remote payment using a mobile device and a powered display card | |
CN105631655A (en) | HCE-based mobile payment method, device and mobile terminal | |
KR101250091B1 (en) | Method for Processing Transaction of Electronic Cash by using Near Field Communication, Handheld Device and Automatic Teller Machine | |
CN107038572B (en) | Encrypted card and its working method | |
CN107026735A (en) | Method and managed devices that a kind of password is automatically entered | |
CN206788918U (en) | Encrypted card | |
CN112633864A (en) | Payment system and method based on TEE and Bluetooth type digital currency hardware wallet | |
CN206863807U (en) | For inserting the encrypted card in mobile terminal | |
CN101980309A (en) | Near field communication (NFC) mobile terminal and NFC safety payment realizing method | |
CN206863808U (en) | Encrypted card | |
CN103606081A (en) | Transaction protection method, transaction accepting device and transaction submitting device | |
CN107026817B (en) | System for automatically inputting password | |
CN104794430B (en) | A kind of method and system of fingerprint decryption | |
CN107124515A (en) | A kind of intelligent unlocking method and device | |
KR102193160B1 (en) | Method for Providing Transacting Linked Authentication Code | |
JP5207654B2 (en) | Communication device, pairing method between communication devices, method for pairing wearable key and IC card, and system comprising wearable key and IC card | |
KR102276916B1 (en) | Method for Authenticating Non-Faced Transaction by using Near Field Communication Card for Generating One Time Password | |
KR20160124336A (en) | Method for Providing Electronic Signature by using Secure Operating System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180529 Address after: 541004 1 buildings of D-08 Industrial Park, high-tech industrial park, Qixing District, Guilin, the Guangxi Zhuang Autonomous Region Applicant after: Guilin Micro Interconnection Information Technology Co., Ltd. Address before: 517336 Jixiang village, 69 Town, Longchuan, Heyuan, Guangdong Applicant before: Wen Yong |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |