CN202197405U - Wireless safe secret key apparatus and electronic business system - Google Patents

Wireless safe secret key apparatus and electronic business system Download PDF

Info

Publication number
CN202197405U
CN202197405U CN2011202845061U CN201120284506U CN202197405U CN 202197405 U CN202197405 U CN 202197405U CN 2011202845061 U CN2011202845061 U CN 2011202845061U CN 201120284506 U CN201120284506 U CN 201120284506U CN 202197405 U CN202197405 U CN 202197405U
Authority
CN
China
Prior art keywords
module
wireless
information
business information
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN2011202845061U
Other languages
Chinese (zh)
Inventor
常钧
徐玮
张露露
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2011202845061U priority Critical patent/CN202197405U/en
Application granted granted Critical
Publication of CN202197405U publication Critical patent/CN202197405U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The utility model provides a wireless safe secret key apparatus and an electronic business system. The wireless safe secret key apparatus includes a storage module, a business request module and a first wireless transmission module. The storage module is used for storing a public key and a private key. The business request module is connected with the storage module; the business request module is used for generating a signature for received business information according the private key; and business request information is generated and emitted. The first wireless transmission module is connected with the business request module; and the first wireless transmission module is used for emitting the wirelessly received business information to the business request module, and wirelessly emitting the business request information received by the business request module. In the wireless safe secret key apparatus and the electronic business system provided in the utility model, the signature and encryption process to the business information is finished in the wireless safe secret key apparatus, the signature and encryption process can be prevented from being broken by a Trojan program, and the security of electronic business carried out by mobile terminals is substantially raised.

Description

Wireless security key devices and electronic commerce affair system
Technical field
The utility model relates to the portable terminal safe practice, relates in particular to a kind of wireless security key devices and electronic commerce affair system.
Background technology
Along with the extensive use of 3G network and smart mobile phone, more and more users is carried out electronic commerce affair through smart mobile phone.Traditional ecommerce is based on the general internet user's, and this type of user carries out E-business applications through PC, and the safe practice on the PC is comparative maturity relatively.And the operating system of intelligent terminal is all poor with the support of the safety insert that prevents wooden horse to digital certificate with its built-in browser, can not guarantee the electronic commerce affair safety of portable terminal.The private key of on portable terminal, storing in order to carry out professional signature is intercepted and captured by rogue programs such as wooden horses, and user's identity just might be by counterfeit, and the user is caused damage.
The utility model content
The utility model provides a kind of wireless security key devices and electronic commerce affair system, carries out safety of electrical business to improve through portable terminal.
The utility model provides a kind of wireless security key devices, comprising:
Memory module is used for storage of public keys and private key;
The service request module links to each other with said memory module, and said service request module is used for according to said private key the business information that receives being signed, and generates service requesting information and transmission;
First wireless transport module; Link to each other with said service request module; Said first wireless transport module be used for wireless receiving to said business information send to said service request module, and the service requesting information wireless transmission that will receive from said service request module.
Aforesaid wireless security key devices also comprises:
Key production module; Link to each other with said first wireless transport module with said memory module respectively; Said key production module is used for when receiving the certificate request instruction; Generate said private key and said PKI according to preset key schedule, said private key and said PKI are sent to said memory module, and said PKI is sent to said first wireless transport module;
Correspondingly; Said first wireless transport module also links to each other with said memory module; Said first wireless transport module also is used for the said PKI wireless transmission that receives from said key production module; And the corresponding digital certificate of the said PKI of wireless receiving, and said digital certificate sent to said memory module;
Said memory module also is used to store said digital certificate;
Said service request module also is used for the business information packing behind said digital certificate and the signature is generated said service requesting information.
Aforesaid wireless security key devices also comprises:
Input module links to each other with said service request module, and said input module is used for generating the first signature indication information according to the operational order that receives, and the said first signature indication information is sent to said service request module;
Display module is connected with said first wireless transport module, and said display module is used for generating display message and demonstration according to the said business information that said first wireless transport module receives;
Correspondingly, said service request module also is used for the said business information that receives being signed according to said private key if judge when knowing the said first signature indication information for the execution signature operation.
Aforesaid wireless security key devices also comprises:
The earphone module is used for first audio signal that receives is decoded, and generates first acoustic information;
Microphone module is used for second acoustic information that receives is encoded, and generates second audio signal and transmission;
Correspondingly; Said first wireless transport module also links to each other with said microphone module with said earphone module respectively; Said first wireless transport module also be used for wireless receiving to said first audio signal send to said earphone module, and will receive the said second audio signal wireless transmission from said microphone module.
Aforesaid wireless security key devices also comprises:
Sound identification module; Link to each other with said earphone module, said microphone module and said service request module respectively; Said sound identification module is used for extracting the customer information of said first audio signal or said second audio signal; Extract the control information in said second audio signal, generate the second signature indication information, and the said second signature indication information is sent to said service request module according to said control information;
Voice cue module; Link to each other with said earphone module with said first wireless transport module respectively; Said voice cue module is used for producing voice messaging according to the said business information that said first wireless transport module receives, and said voice messaging is sent to said earphone module;
Correspondingly, said service request module also is used for according to said private key the said business information that receives being signed, and said customer information being added in the said business information if judge when knowing the said second signature indication information for the execution signature operation.
The utility model provides a kind of electronic commerce affair system, comprises the wireless security key devices that portable terminal, e-commerce server and the utility model provide;
Said portable terminal comprises second wireless transport module, wireless communication module and business information generation module;
Said business information generation module is used to generate business information and sends;
Said second wireless transport module links to each other with said wireless communication module with said business information generation module respectively; Said second wireless transport module is used for the said business information that receives from said business information generation module is wirelessly sent to said wireless security key devices, and will from said wireless security key devices wireless receiving to service requesting information send to said wireless communication module;
Said wireless communication module is used for said service requesting information is wirelessly sent to said e-commerce server;
Said e-commerce server is used for according to PKI the said service requesting information that receives being carried out signature verification, if the signature verification success is then carried out said service requesting information corresponding service and handled.
Can know by technique scheme; Wireless security key devices that the utility model provides and electronic commerce affair system; The wireless security key devices is signed to the business information of portable terminal wireless transmission according to private key, generates service requesting information, is wirelessly sent to portable terminal; Portable terminal offers e-commerce server with this service requesting information, so that e-commerce server carries out signature authentication according to obtaining PKI in advance to this service requesting information.Because this private key is stored in the wireless security key devices all the time, and is not stored in the portable terminal, even portable terminal has suffered rogue programs such as wooden horse, this private key can not intercepted and not captured yet.And the ciphering process of business information accomplished in the wireless security key devices, realized preventing that the encrypted signature process from being cracked by trojan horse program, improved greatly through portable terminal and carried out safety of electrical business.
Description of drawings
A kind of wireless security key devices structural representation that Fig. 1 provides for the utility model embodiment;
The another kind of wireless security key devices structural representation that Fig. 2 provides for the utility model embodiment;
The electronic commerce affair system configuration sketch map that Fig. 3 provides for the utility model embodiment.
Reference numeral:
51-wireless security key devices; The 52-portable terminal;
The 53-e-commerce server; The 1-memory module;
11-service request module; 12-first wireless transport module;
The 13-key production module; The 14-input module;
The 15-display module; 16-earphone module;
The 17-microphone module; The 18-sound identification module;
The 19-voice cue module; 21-second wireless transport module;
The 22-wireless communication module; 23-business information generation module.
Embodiment
For the purpose, technical scheme and the advantage that make the utility model embodiment is clearer, will combine the utility model embodiment below, to the technical scheme among the utility model embodiment carry out clear, intactly describe.Need to prove that in accompanying drawing or specification, similar or components identical is all used identical Reference numeral.
A kind of wireless security key devices structural representation that Fig. 1 provides for the utility model embodiment.The wireless security key devices 51 that present embodiment provides specifically can be at the portable terminal 52 through having wireless transport module like smart mobile phone, personal digital assistant (Personal Digital Assistant; Be called for short PDA) or personal computer etc. business information is carried out encrypted signature when carrying out electronic commerce affair, electronic commerce affair can be Internet-based banking services, contactless payment business etc.The wireless security key devices 51 that present embodiment provides specifically comprises memory module 1, service request module 11 and first wireless transport module 12.Memory module 1 is used for storage of public keys and private key.Service request module 11 links to each other with memory module 1, and service request module 11 is used for according to private key the business information that receives being signed, and generates service requesting information and transmission.First wireless transport module 12 links to each other with service request module 11, first wireless transport module 12 be used for wireless receiving to business information send to service request module 11, and the service requesting information wireless transmission that will receive from professional request module 11.
Concrete, PKI and private key can generate in advance, are stored in the memory module 1 of wireless security key devices 51, also can be that wireless security key devices 51 generates according to service needed according to preset key schedule, and be stored in the memory module 1.Business information can be in the electronic commerce affair process; The user imports through the input equipment of portable terminal 52; Specifically can comprise account information, encrypted message and Transaction Information etc.; Portable terminal 52 is this business information wireless transmission, this business information of first wireless transport module, 12 wireless receivings of wireless security key devices 51, and this business information is offered service request module 11 handle.First wireless transport module 12 specifically can be bluetooth module, infrared module, radio universal serial bus (Universal Serial Bus; Abbreviation USB) module, WiMAX (Wireless Fidelity is called for short WiFi) module or ZigBee (purple peak) interface module etc. have the module of wireless transmission function.Service request module 11 through private key to the business information generation service requesting information of signing, again with this service requesting information through first wireless transport module, 12 wireless transmission moved back terminals 52.
In ensuing electronic commerce affair process; Portable terminal 52 sends to e-commerce server 53 with this service requesting information; This e-commerce server 53 can be Unionpay's server or other service provider's servers; E-commerce server 53 has above-mentioned PKI, this PKI can obtain from wireless security key devices 51 for portable terminal 52, and offers e-commerce server 53.When e-commerce server 53 receives this service requesting information, service requesting information is carried out signature verification,, then carry out corresponding service processing if verify successfully through PKI.If authentication failed then can be returned Fail Transaction information.
The wireless security key devices 51 that present embodiment provides through the setting of memory module 1, stores PKI and private key, and service request module 11 is signed to the business information that portable terminal 52 sends according to this private key.Because this private key is stored in the memory module 1 of wireless security key devices 51 all the time, and is not stored in 52 li of portable terminals, even portable terminal 52 has suffered rogue programs such as wooden horse, this private key can not intercepted and not captured yet.And the encrypted signature process of business information accomplished in wireless security key devices 51, realized preventing that the encrypted signature process from being cracked by trojan horse program, improved greatly through portable terminal 52 and carried out safety of electrical business.
The another kind of wireless security key devices structural representation that Fig. 2 provides for the utility model embodiment.As shown in Figure 2, in the present embodiment, this wireless security key devices 51 specifically also comprises key production module 13.Key production module 13 links to each other with first wireless transport module 12 with memory module 1 respectively; Key production module 13 is used for when receiving the certificate request instruction; Generate private key and PKI according to preset key schedule; Private key and PKI are sent to memory module 1, and PKI is sent to first wireless transport module 12.Correspondingly; First wireless transport module 12 also links to each other with memory module 1; First wireless transport module 12 also is used for the PKI wireless transmission that receives from key production module 13, and the corresponding digital certificate of wireless receiving PKI, and digital certificate is sent to memory module 1.Memory module 1 also is used to store digital certificate.Service request module 11 also is used for the business information packing behind digital certificate and the signature is generated service requesting information.
The certificate request instruction is concrete also can be the instruction in order to designation number certificate request of user through the input equipment input of portable terminal; Portable terminal 52 is with this certificate request instruction wireless transmission; First wireless transport module, the 12 acceptance certificate applications instruction of wireless security key devices 51; And send to key production module 13; Key production module 13 is when receiving this certificate request instruction; Generate PKI and private key according to preset key schedule, preset key schedule specifically can be RSA (Rivest-Shamir-Adleman), Elgamal, knapsack algorithm, Rabin or elliptic curve cipher coding theory asymmetric-key encryption algorithms such as (Elliptic Curves Cryptography are called for short ECC).Key production module 13 is stored in the private key and the PKI that generate in the memory module 1, in the electronic commerce affair process, through private key business information is signed.Key production module 13 is wirelessly sent to portable terminal 52 with PKI through first wireless transport module 12; Portable terminal 52 sends to e-commerce server 53 with this PKI again; E-commerce server 53 generates digital certificate according to this PKI and user profile, specifically can comprise the signing messages of user profile, PKI and e-commerce server 53 in the digital certificate.The personal information that user profile can provide to bank or ecommerce provider when electronic commerce affair is handled in application for the user; Bank or ecommerce provider store this identity information in the database into; And be that the user distributes the authorization code corresponding with identity information; The user provides this authorization code to e-commerce server 53 when carrying out applying digital certificate, so that e-commerce server 53 obtains corresponding identity information with it.Identity information also can be the personal information of user through portable terminal 52 submissions, and user profile can comprise name information, ID card information etc.E-commerce server 53 sends to digital certificate and transfers the terminal, and portable terminal 52 is wirelessly sent to digital certificate first wireless transport module 12 of wireless security key devices 51 again.
When storing PKI, private key and digital certificate in the memory module 1; The user carries out in the electronic commerce affair process; Business information is wirelessly sent to first wireless transport module 12 of wireless security key devices 51 through portable terminal 52; First transport module sends to service request module 11 with business information; The business information packing of service request module 11 with digital certificate and after signing generates service requesting information, and is wirelessly sent to portable terminal 52 through first wireless transport module 12, and portable terminal 52 is submitted to e-commerce server 53 with this service requesting information.E-commerce server 53 is verified the digital certificate of service requesting information earlier; According to the PKI that comprises in the digital certificate service requesting information is carried out signature verification again; If all successes of digital certificate checking and signature verification; Then carry out the service requesting information corresponding service processing, if authentication failed is then returned Fail Transaction information to portable terminal 52.
In the present embodiment, service request module 11 can also generate the business information summary through preset digest algorithm according to business information earlier, again summary of the business information after this business information, the private key signature and digital certificate packing is formed service requesting information.Portable terminal 52 sends to e-commerce server 53 with this service requesting information; E-commerce server 53 at first verifies the digital certificate in this service requesting information, deciphers the business information summary after obtaining deciphering through the business information summary of PKI after to private key signature.Through preset digest algorithm the business information that receives is carried out digest calculations and generate server end business information summary.Whether the business information summary after the comparison deciphering is consistent with server end business information summary then.If consistent, explain that service requesting information do not distorted by intercepting and capturing, with the fail safe in the raising service requesting information transmission course.
In the present embodiment; Setting through key production module 13; Generate PKI and private key, and PKI is radioed to portable terminal 52 through first wireless transport module 12, portable terminal 52 sends to e-commerce server 53 with PKI; Obtaining the corresponding digital certificate of PKI, the business information packing generation service requesting information of service request module 11 after with digital certificate and private key signature.The e-commerce server 53 that receives this service requesting information can verify whether the identity that the user of this service requesting information is sent in checking is trusty, can further improve the fail safe of electronic commerce affair to digital certificate.And this digital certificate also is stored in the memory module 1 of wireless security key devices 51, avoided being prone in the portable terminal 52 to be intercepted and captured or portable terminal 52 is lost the problem that back PKI, private key, digital certificate are lost simultaneously because of being stored in.
In the present embodiment; This wireless security key devices 51 can also comprise input module 14 and display module 15; Input module 14 links to each other with service request module 11; Input module 14 is used for generating the first signature indication information according to the operational order that receives, and the first signature indication information is sent to service request module 11.Display module 15 links to each other with first wireless transport module 12, and the business information that display module 15 is used for receiving according to first wireless transport module 12 generates display message and shows.Correspondingly, service request module 11 also is used for the business information that receives being signed according to private key if judge when knowing the first signature indication information for the execution signature operation.
Input module 14 specifically can be keyboard or touch-screen or fingerprint identification module etc., and display module 15 can be LCDs or light-emitting diode (Light Emitting Diode is called for short LED) display screen etc.Display module 15 can generate display message and demonstration with business information; Concrete; Transaction Information that in the electronic commerce affair process, produces and confirmation can show for the user through display module 15; The user can confirm and operation acknowledgement information through input module 14 input operations instruction, carry out signature operation with 11 pairs of business information of control service request module.The business information of sending when portable terminal 52 is not by Client-initiated; But initiate by trojan horse program; If then the user does not pass through input module 14 input operation confirmation commands in the certain hour; Then this electronic commerce affair is cancelled automatically, has further improved through portable terminal 52 and has carried out the fail safe of electronic commerce affair.
In the present embodiment, this wireless security key devices 51 specifically can also comprise earphone module 16 and microphone module 17.Earphone module 16 is used for first audio signal that receives is decoded, and generates first acoustic information.Microphone module 17 is used for second acoustic information that receives is encoded, and generates second audio signal and transmission.Correspondingly; First wireless transport module 12 also links to each other with microphone module 17 with earphone module 16 respectively; First wireless transport module 12 also be used for wireless receiving to first audio signal send to earphone module 16, and will receive the second audio signal wireless transmission from microphone module 17.
Through earphone module 16 and microphone module 17 are set in wireless security key devices 51; Can make earphone module 16 and microphone module 17 all carry out data interaction with portable terminal 52 through first wireless transport module 12; In electronic commerce affair, carry out communication, improved the utilance of resource.
In the present embodiment; This wireless security key devices 51 specifically can also comprise sound identification module 18 and voice cue module 19; Sound identification module 18 links to each other with earphone module 16, microphone module 17 and service request module 11 respectively; Sound identification module 18 is used for extracting the customer information of first audio signal or second audio signal; Extract the control information in second audio signal, generate the second signature indication information, and the second signature indication information is sent to service request module 11 according to control information.Voice cue module 19 links to each other with earphone module 16 with first wireless transport module 12 respectively, and the business information that voice cue module 19 is used for receiving according to first wireless transport module 12 produces voice messaging, and voice messaging is sent to earphone module 16.Correspondingly, service request module 11 also is used for according to private key the said business information that receives being signed, and customer information being added in the business information if judge when knowing the second signature indication information for the execution signature operation.
Concrete voice cue module 19 can be Text To Speech (Text To Speech is called for short TTS) voice module.Sound identification module 18 can identification extraction first audio signal or second audio signal in customer information and the control information in second audio signal; Customer information specifically can comprise number of the account, name and the amount information etc. that the user need transfer accounts; Control information specifically can be the operational order of information or operation acknowledgement; Generate the second signature indication information according to this control information, carry out signature process with 11 pairs of business information of control service request module.Need not the input module 14 of user through portable terminal 52 or wireless security key devices 51 and carry out manual operation, sound identification module 18 not only can be discerned the phonetic order that user oneself sends, and can also discern the account information with the opposing party of user's communication.When the needs user confirmed relationship trading information, the TTS voice module was used speech synthesis technique and is listened through earphone module 16 thoughts relevant information to the user.
In the present embodiment, this wireless security key devices 51 specifically also comprises battery and power management module (not shown).This battery can be arranged in the wireless security key devices 51, also can be arranged on outside the wireless security key devices 51, is 51 power supplies of wireless security key devices.Power management module is used for managing power supply strategies such as power supply and standby, the dormancy of each module.For some portable terminal 52, this battery and power management module can also charge to portable terminal 52, guarantee that portable terminal has enough electric power to accomplish relationship trading and application.
The electronic commerce affair system configuration sketch map that Fig. 3 provides for the utility model embodiment.As shown in Figure 3, the electronic commerce affair system that present embodiment provides comprises the wireless security key devices 51 that portable terminal 52, e-commerce server 53 and the utility model any embodiment provide.Portable terminal 52 comprises second wireless transport module 21, wireless communication module 22 and business information generation module 23.Business information generation module 23 is used to generate business information and sends.Second wireless transport module 21 links to each other with wireless communication module 22 with business information generation module 23 respectively; Second wireless transport module 21 is used for the business information that receives from professional information generating module 23 is wirelessly sent to wireless security key devices 51, and will from wireless security key devices 51 wireless receivings to service requesting information send to wireless communication module 22.Wireless communication module 22 is used for service requesting information is wirelessly sent to e-commerce server 53.E-commerce server 53 is used for according to PKI the service requesting information that receives being carried out signature verification, if the signature verification success is then carried out the service requesting information corresponding service and handled.
The wireless security key devices 51 that present embodiment provides can be realized the described electronic commerce affair process of the foregoing description, and this repeats no more.
The electronic commerce affair system that present embodiment provides; Setting through wireless security key devices 51; Can store PKI and the private key encrypted in order to business datum; Wireless security key devices 51 is signed to the business information of portable terminal 52 wireless transmissions according to private key, generates service requesting information, is wirelessly sent to portable terminal 52; Portable terminal 52 offers e-commerce server 53 with this service requesting information, so that e-commerce server 53 carries out signature authentication according to obtaining PKI in advance to this service requesting information.Because this private key is stored in the wireless security key devices 51 all the time, and is not stored in 52 li of portable terminals, even portable terminal 52 has suffered rogue programs such as wooden horse, this private key can not intercepted and not captured yet.And the encrypted signature process of business information accomplished in wireless security key devices 51, realized preventing that ciphering process from being cracked by trojan horse program, improved greatly through portable terminal 52 and carried out safety of electrical business.
Wireless security key devices that the utility model any embodiment provides and electronic commerce affair system can carry out following electronic commerce affair method.This electronic commerce affair method specifically comprises:
The business information that step 10, wireless security key devices wireless receiving portable terminal send;
Step 20, wireless security key devices are signed to business information according to private key, generate service requesting information;
Step 30, wireless security key devices are to portable terminal wireless transmission service requesting information.
The wireless security key devices is signed to the business information of portable terminal wireless transmission according to private key; Generate service requesting information; Be wirelessly sent to portable terminal; Portable terminal offers e-commerce server with this service requesting information, so that e-commerce server carries out signature authentication according to obtaining PKI in advance to this service requesting information.Because this private key is stored in the wireless security key devices all the time, and is not stored in the portable terminal, even portable terminal has suffered rogue programs such as wooden horse, this private key can not intercepted and not captured yet.And the ciphering process of business information accomplished in the wireless security key devices, realized preventing that the encrypted signature process from being cracked by trojan horse program, improved greatly through portable terminal and carried out safety of electrical business.
In technique scheme, step 10 before the business information that wireless security key devices wireless receiving portable terminal sends, specifically can also comprise the steps:
Step 40, when wireless security key devices wireless receiving during to certificate request instruction that portable terminal sends, generate private key according to preset key schedule and also store with PKI;
Step 50, wireless security key devices are to portable terminal wireless transmission PKI;
Digital certificate that the PKI that step 60, wireless security key devices wireless receiving portable terminal send is corresponding and storage;
Correspondingly, step 20, wireless security key devices are signed to business information according to private key, generate service requesting information, specifically can comprise:
Step 201, wireless security key devices are signed to business information according to private key, again the business information packing behind digital certificate and the signature are generated service requesting information.
In technique scheme, step 30, the wireless security key devices specifically can also comprise after portable terminal wireless transmission service requesting information:
Step 70, portable terminal send to e-commerce server with service requesting information;
Step 80, e-commerce server carry out signature verification according to PKI to the service requesting information that receives; And the digital certificate in the said service requesting information verified; If signature verification and all successes of digital certificate checking are then carried out the service requesting information corresponding service and are handled.
In technique scheme, step 50, wireless security key devices before the digital certificate and storage that the PKI that step 60, wireless security key devices wireless receiving portable terminal send is corresponding, also comprise after portable terminal wireless transmission PKI:
Step 90, portable terminal are wirelessly sent to e-commerce server with PKI;
Step 100, e-commerce server generate digital certificate according to user profile that gets access to and PKI, and digital certificate are wirelessly sent to portable terminal.
What should explain at last is: above embodiment is only in order to the technical scheme of explanation the utility model, but not to its restriction; Although the utility model has been carried out detailed explanation with reference to previous embodiment; Those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that previous embodiment is put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these are revised or replacement, do not make the spirit and the scope of each embodiment technical scheme of essence disengaging the utility model of relevant art scheme.

Claims (6)

1. a wireless security key devices is characterized in that, comprising:
Memory module is used for storage of public keys and private key;
The service request module links to each other with said memory module, and said service request module is used for according to said private key the business information that receives being signed, and generates service requesting information and transmission;
First wireless transport module; Link to each other with said service request module; Said first wireless transport module be used for wireless receiving to said business information send to said service request module, and the service requesting information wireless transmission that will receive from said service request module.
2. wireless security key devices according to claim 1 is characterized in that, also comprises:
Key production module; Link to each other with said first wireless transport module with said memory module respectively; Said key production module is used for when receiving the certificate request instruction; Generate said private key and said PKI according to preset key schedule, said private key and said PKI are sent to said memory module, and said PKI is sent to said first wireless transport module;
Correspondingly; Said first wireless transport module also links to each other with said memory module; Said first wireless transport module also is used for the said PKI wireless transmission that receives from said key production module; And the corresponding digital certificate of the said PKI of wireless receiving, and said digital certificate sent to said memory module;
Said memory module also is used to store said digital certificate;
Said service request module also is used for the business information packing behind said digital certificate and the signature is generated said service requesting information.
3. wireless security key devices according to claim 1 and 2 is characterized in that, also comprises:
Input module links to each other with said service request module, and said input module is used for generating the first signature indication information according to the operational order that receives, and the said first signature indication information is sent to said service request module;
Display module is connected with said first wireless transport module, and said display module is used for generating display message and demonstration according to the said business information that said first wireless transport module receives;
Correspondingly, said service request module also is used for the said business information that receives being signed according to said private key if judge when knowing the said first signature indication information for the execution signature operation.
4. wireless security key devices according to claim 3 is characterized in that, also comprises:
The earphone module is used for first audio signal that receives is decoded, and generates first acoustic information;
Microphone module is used for second acoustic information that receives is encoded, and generates second audio signal and transmission;
Correspondingly; Said first wireless transport module also links to each other with said microphone module with said earphone module respectively; Said first wireless transport module also be used for wireless receiving to said first audio signal send to said earphone module, and will receive the said second audio signal wireless transmission from said microphone module.
5. wireless security key devices according to claim 4 is characterized in that, also comprises:
Sound identification module; Link to each other with said earphone module, said microphone module and said service request module respectively; Said sound identification module is used for extracting the customer information of said first audio signal or said second audio signal; Extract the control information in said second audio signal, generate the second signature indication information, and the said second signature indication information is sent to said service request module according to said control information;
Voice cue module; Link to each other with said earphone module with said first wireless transport module respectively; Said voice cue module is used for producing voice messaging according to the said business information that said first wireless transport module receives, and said voice messaging is sent to said earphone module;
Correspondingly, said service request module also is used for according to said private key the said business information that receives being signed, and said customer information being added in the said business information if judge when knowing the said second signature indication information for the execution signature operation.
6. electronic commerce affair system is characterized in that: comprise portable terminal, e-commerce server and like the arbitrary described wireless security key devices of claim 1-5;
Said portable terminal comprises second wireless transport module, wireless communication module and business information generation module;
Said business information generation module is used to generate business information and sends;
Said second wireless transport module links to each other with said wireless communication module with said business information generation module respectively; Said second wireless transport module is used for the said business information that receives from said business information generation module is wirelessly sent to said wireless security key devices, and will from said wireless security key devices wireless receiving to service requesting information send to said wireless communication module;
Said wireless communication module is used for said service requesting information is wirelessly sent to said e-commerce server;
Said e-commerce server is used for according to PKI the said service requesting information that receives being carried out signature verification, if the signature verification success is then carried out said service requesting information corresponding service and handled.
CN2011202845061U 2011-08-05 2011-08-05 Wireless safe secret key apparatus and electronic business system Expired - Lifetime CN202197405U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011202845061U CN202197405U (en) 2011-08-05 2011-08-05 Wireless safe secret key apparatus and electronic business system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011202845061U CN202197405U (en) 2011-08-05 2011-08-05 Wireless safe secret key apparatus and electronic business system

Publications (1)

Publication Number Publication Date
CN202197405U true CN202197405U (en) 2012-04-18

Family

ID=45952303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011202845061U Expired - Lifetime CN202197405U (en) 2011-08-05 2011-08-05 Wireless safe secret key apparatus and electronic business system

Country Status (1)

Country Link
CN (1) CN202197405U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102263792A (en) * 2011-08-05 2011-11-30 常钧 Wireless security key equipment, electronic commerce service system and method
CN103577763A (en) * 2012-07-24 2014-02-12 鸿富锦精密工业(深圳)有限公司 Mobile terminal device with data protection function and data protection method
WO2016177172A1 (en) * 2015-10-21 2016-11-10 中兴通讯股份有限公司 Management method, system and terminal, key management system and terminal manufacturer system
CN107257284A (en) * 2016-06-24 2017-10-17 收付宝科技有限公司 A kind of method and apparatus for carrying out virtual card transaction

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102263792A (en) * 2011-08-05 2011-11-30 常钧 Wireless security key equipment, electronic commerce service system and method
CN103577763A (en) * 2012-07-24 2014-02-12 鸿富锦精密工业(深圳)有限公司 Mobile terminal device with data protection function and data protection method
WO2016177172A1 (en) * 2015-10-21 2016-11-10 中兴通讯股份有限公司 Management method, system and terminal, key management system and terminal manufacturer system
CN107257284A (en) * 2016-06-24 2017-10-17 收付宝科技有限公司 A kind of method and apparatus for carrying out virtual card transaction
CN107257284B (en) * 2016-06-24 2020-05-19 收付宝科技有限公司 Method and device for carrying out virtual card transaction

Similar Documents

Publication Publication Date Title
US9294287B2 (en) Interrogating an authentication device
US9137025B2 (en) Managing data for authentication devices
CN102737308B (en) The method and system of a kind of mobile terminal and inquiry smart card information thereof
CN101527633B (en) Method for intelligent key devices to obtain digital certificates
CN101860525B (en) Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal
CN102263792A (en) Wireless security key equipment, electronic commerce service system and method
CN102081769A (en) Method and system for processing payment data, payment terminal and payment server
CN102867366B (en) Portable bank card data processing device, system and method
CN104079581A (en) Identity authentication method and device
CN103747012A (en) Security verification method, device and system of network transaction
CN111464315B (en) Digital signature processing method, device, computer equipment and storage medium
CN101860824B (en) Digital signature authentication system based on short message and digital signature method
CN111931209B (en) Contract information verification method and device based on zero knowledge proof
CN202696901U (en) Mobile terminal identity authentication system based on digital certificate
CN101790166A (en) Digital signing method based on mobile phone intelligent card
CN102523095A (en) User digital certificate remote update method with intelligent card protection function
WO2020057314A1 (en) Method, device and system for issuing esim certificate online
CN202197405U (en) Wireless safe secret key apparatus and electronic business system
CN101944216A (en) Two-factor online transaction safety authentication method and system
CN103778528A (en) Payment processing method, payment processing system and payment processing device
CN103530768A (en) Mobile communication payment system and cost payment method thereof
CN104301288A (en) Method and system for online identity authentication, online transaction certification, and online certification protection
CN101931530B (en) Generation method, authentication method and device for dynamic password and network system
CN105681256B (en) Audio communication method and voice communication application apparatus
CN111709747B (en) Intelligent terminal authentication method and system

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term

Granted publication date: 20120418

CX01 Expiry of patent term