The system and method for safe handling third party confidential information
Technical field
The invention belongs to information security field, belong to the safety input of information, encrypt and transmit and handle.
Background technology
At present, when between two systems alternatively process information the time, all be to be to trust mutually between two systems of supposition.
Such as two systems are arranged: Party A and Party B; If relate to Party B's information, and these information are to obtain after the system handles by the Party A.Like this, the Party A system usually is an information of having known the Party B simultaneously.Common situation does not have any problem like this; But when relate to be Party B's confidential information the time, will bring a lot of question of liability.At this time, suppose that usually the Party A is well-meant, or believable, can protect the safety of Party B's information.But when Party B's confidential information leakage problem occurring, the Party A obviously can't avoid possible responsibility: such as Party A internal staff crime or maloperation and responsibility of causing etc. in Party A's self system.Because the Party A is the real information that can access the Party B.
This situation exists in the use of reality in a large number, and is especially more in financial transaction system.Bank card holder's password PIN is a confidential information, such as the interconnection and interflow between the bank, and being connected of banking system and system of Unionpay; According to present processing, the receiving bank of bank card and the system of Unionpay all can obtain the confidential information of credit card issuer: holder's password.Like this, if the password leakage problem is arranged, in fact receiving bank and Unionpay can not break away from own responsibility from technical finesse.
The present invention proposes for the question of liability that solves above-mentioned the two sides concerned and safety problem just.
Summary of the invention
The invention discloses a kind of system and method for safe handling third party confidential information.
Party concerned who wherein relates to and third party are definition like this.Referring to Fig. 1.
For example the processing with the consumer sale of bank card is illustrated.
The user of issuing bank uses its bank card of holding in the system of receiving bank, need input holder password.Password is a most important confidential information in the bank transaction; And encrypted message leaves in the database of system of issuing bank.
In use, need be password in the input of the system of receiving bank, and in conjunction with card number, the system handles by receiving bank and be delivered to issuing bank together.In this process, security how to guarantee holder's password is exactly an extremely important problem, and the link that relates to comprises input element and transmits and handle.
This is wherein:
The party concerned systemBeing exactly the system of receiving bank in the bank card business dealing, is the system that the user directly uses;
The third party systemBeing exactly the system of issuing bank in the bank card business dealing, is the affiliated systems of confidential information such as holder's password,
The userBeing exactly the bank card possessor in the transaction, is third-party directly affiliated user.
The system of a kind of safe handling third party confidential information of the present invention is characterized in that, described system comprises:
● be used in the processing and control module of party concerned system: be used to control the input of third party's confidential information; Produce random number, temporal information, sequence number information; The calculation check sign indicating number also uses the embedded PKI of module to encrypt; Output to party concerned's system.
● be used in the matching treatment module of third party system: be used for third-party system, carry out the processing of alignment processing control module.
● be used in the administration module of the processing and control module of third party system: be used for third-party system; Produce, dispose, activate and the renewal processing and control module.
Described in the party concerned system, can use how tame third-party processing and control module simultaneously.
The administration module of described processing and control module in the third party system is kept the processing and control module of a plurality of activation simultaneously, and along with the time regularly and/or is aperiodically upgraded processing and control module.
The method of a kind of safe handling third party confidential information of the present invention is characterized in that, performing step comprises 3 following aspects:
● in party concerned's system, embed and use third-party processing and control module.
● in the third party system, carry out the processing of matching treatment control module.
● in the third party system, processing and control module is managed.
The described third party's processing and control module that embeds and use in the party concerned system, the step of its further processing comprises:
● the input of controller confidential information.
● control generation time information;
● control produces sequence number information;
● control produces random number information;
● above-mentioned information combination is got up the calculation check sign indicating number;
● to described information combination and check code thereof, use the embedded PKI of processing and control module to encrypt;
● to described enciphered message, add the code of processing and control module in front;
● the described later information of block code that added is outputed in the party concerned system.
Described in the third party system, carry out the processing of matching treatment control module, its further step comprises:
● receive by the later confidential information of the encryption of party concerned's systems communicate etc.;
● be stored in the database, the data recording within the regular hour compares, and judges whether it is the transaction of repetition;
● according to the code of processing and control module, use the corresponding private key of in the third party system, storing to be decrypted;
● according to decryption information and check code wherein, judge the legitimacy of information combination;
● according to the temporal information in the decryption information, judge the validity of information;
● the confidential information that affirmation obtains;
● the joining day sign, and the information before the record deciphering is in database.
Described third party system manages processing and control module, and its further step comprises:
● produce and finish the processing and control module of described function;
● produce PKI, private key is right; And PKI is configured in the processing and control module, and private key is stored in the third-party system;
● dispose the code of described processing and control module, and be stored in together in the third-party system simultaneously with corresponding private key;
● the effective simultaneously and a plurality of processing and control module of activation; Surpass certain time limit, perhaps along with time calcellation/renewal processing and control module;
Realized the function of third party's processing and control module, can in the party concerned system, realize safety input, encryption and transmission third party's confidential information.
The matching treatment control module is carried out corresponding processing in third-party system, and binding time, is stored in the recording status in the third party system, judges non-repeatability, legitimacy and the validity of input information, confirms the confidential information of input.Wherein the time of the validity of time is judged yardstick, with remain on database in the time scale of not decryption information in the regular hour be consistent.
In the third party system, third party's processing module is managed; Comprise: produce, dispose, cancel, upgrade or the like.
Finish top processing, can realize principle of the present invention and method: finish safe handling third party's confidential information.
In party concerned's system, can embed a family or a how tame third-party processing and control module simultaneously.
Third-party processing and control module provides in the mode of component software usually, like this, embeds this assembly module and get final product in party concerned's software systems are handled; Processing and control module also can be a hardware unit that possesses described processing and control module function.
Description of drawings
Fig. 1 system module configuration diagram of the present invention;
The configuration diagram of Fig. 2 third party's processing and control module;
Fig. 3 third party's internal system treatment scheme diagrammatic sketch;
The administration module treatment scheme diagrammatic sketch of Fig. 4 third party system.
Embodiment
With reference to figure 1.In party concerned's system, embed and use third-party processing and control module, in input third party confidential information, control user's input, and produce out of Memory, make up, encrypt, add processing such as code by it; Then output in party concerned's the system processing of mating to the third party system by party concerned's systems communicate.
In an embodiment, the party concerned system is the interface of user interaction process with the computer system.Third-party processing and control module provides with the form of component software.
Enforcement of the present invention relates to 4 following aspects and implements:
● the processing of party concerned system;
● the realization of third-party processing and control module;
● the processing of matching treatment control module in the third party system;
● the third party system is to the management of processing and control module.Go explanation respectively from these 4 aspects:
● the processing of party concerned system
The processing of party concerned system is fairly simple, promptly calls the processing and control module that the third party system provides.
In the time of needs input third party confidential information, call this module; By the input of this module controls information, the generation of control time information, sequence number information, random number information; And make up them, and produce and the adding check code, encrypt; Output to then in party concerned's the system.The party concerned system passes to the third party system with the information that obtains.
● the realization of third-party processing and control module
Referring to Fig. 2.
A) use the mode of soft keyboard to control input
When input third party confidential information, call third-party processing and control module control and eject the soft keyboard prompting, import by soft keyboard.
Soft keyboard refers to the figure that is presented at computer screen upper keyboard shape by software control, selects with cursor that wherein numeral and character are imported.It ejects in use, uses and finishes to disappear later on.
On the interface of prompting input, there is the third party system significantly to indicate to show the responsibility of law, as trade mark, sign etc.
By soft keyboard is in order to avoid confidential information to be intercepted and captured in the monitoring of keyboard mouth input; Also avoided simultaneously of the control of party concerned system to input.Because soft keyboard is provided by third party's module controls.
The inputting interface of soft keyboard can be selected to change randomly.
B) processing and control module self produces out of Memory, and combination and calculation check sign indicating number
By third party's processing and control module generation time information;
Produce sequence number information by third party's processing and control module;
Produce random number information by third party's processing and control module;
Confidential information, temporal information, sequence number information, random number information are made up, and the calculation check sign indicating number.
C) processing and control module uses public-key and encrypts and export
Processing and control module uses embedded PKI that aforesaid combined information and check code thereof are encrypted;
In described enciphered message, add the code of processing and control module self;
The information of described adding code is outputed in party concerned's the system.
● the processing of matching treatment control module in the third party system
Referring to Fig. 3.The step of third party's system handles is as follows:
1) the third party system receives the own processing and control module of the process of coming by party concerned's systems communicate and encrypts later confidential information;
2), judge the non-repeatability of information according to the record in third party's system database;
3) according to the code of processing and control module, use corresponding private key to be decrypted, the information combination before obtaining encrypting comprises: confidential information, temporal information, sequence number information, random number information, check code or the like.
4), judge whether information combination is legal according to check code;
5), judge real-time, the validity of information according to temporal information;
6) confidential information of affirmation input, and transmission is further processed;
7) add time tag, the information before the record deciphering is in database.This database keeps the data recording in the certain hour, so that prevent the information input of repeatability.
● the third party system is to the management of processing and control module
The third party system relates to following processing to the management of processing and control module:
1) produces processing and control module;
2) generation is public, private key is right;
3) configuration process control module.PKI is assembled in the processing and control module, corresponding private key is stored in the third party system;
4) allocation of codes and be assemblied in processing and control module neutralization and be stored in the third party system;
5) the same time, a plurality of processing and control module activate effectively;
6) along with time calcellation/renewal processing and control module.
Embed the party concerned system of third party's processing and control module, need, guaranteed correctly to realize the processing capacity of setting and do not had other security breaches through third-party test and appraisal and authentication.
To sum up, in party concerned's system, embed third-party processing and control module, input, combination, encryption by its control third party confidential information, and then the systems communicate by the party concerned is in third-party system, be decrypted and corresponding other processing, can realize that input safely, encryption and the transmission of third party's confidential information handled.Correspondingly, in third-party system, the processing and control module of oneself is managed.