CN206195801U - A cloud platform, subscriber equipment and system for CPU card encryption authentication - Google Patents

A cloud platform, subscriber equipment and system for CPU card encryption authentication Download PDF

Info

Publication number
CN206195801U
CN206195801U CN201621242788.8U CN201621242788U CN206195801U CN 206195801 U CN206195801 U CN 206195801U CN 201621242788 U CN201621242788 U CN 201621242788U CN 206195801 U CN206195801 U CN 206195801U
Authority
CN
China
Prior art keywords
mac
cloud platform
information
module
cpu card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201621242788.8U
Other languages
Chinese (zh)
Inventor
范小雨
穆青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING WEISEN TECHNOLOGY Co Ltd
Original Assignee
BEIJING WEISEN TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING WEISEN TECHNOLOGY Co Ltd filed Critical BEIJING WEISEN TECHNOLOGY Co Ltd
Priority to CN201621242788.8U priority Critical patent/CN206195801U/en
Application granted granted Critical
Publication of CN206195801U publication Critical patent/CN206195801U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model discloses a cloud platform, subscriber equipment and system for CPU card encryption authentication relates to communication security domain. This cloud platform is including electric first information encryption unit, first encryption information transmitting section, the MAC who connects reads the command generation unit in proper order, MAC reads order transmitting element and encrypt data information deciphering unit, the utility model discloses the CPU card can be improved and the security of authentication is encrypted. In addition, the utility model discloses directly adopting the cloud platform to accomplish and encrypting the authentication, the user need not to carry the PSAM card, has saved the PSAM card and has damaged and the risk such as lose.

Description

Cloud platform, user equipment and system for CPU card encryption certification
Technical field
The utility model is related to field of communication security, more particularly to a kind of cloud platform, user that certification is encrypted for CPU card Equipment and system.
Background technology
CPU card improves many because of its security relative to common IC-card, be widely used in finance, insurance, traffic, The multiple fields such as government industry, with user's space is big, reading speed fast, the features such as support one card for multiple uses, and have passed through The People's Bank of state and the certification of the national secret committee of business;CPU card is contained within randomizer, hardware DES (Data Encryption Standard, data encryption standards), 3DES (Triple DES, triple DEAs) etc., OS in engagement tabs (Operating System, operating system), can reach the safe class of financial rank.CPU card is especially in financial transaction Conventional method is progressively instead of with the application in identification, becomes the application technology of main flow.
Traditional CPU card complete authentication mode be mainly by the catalogue to encryption information carry out external authentication come The reading or modification of the encryption information of completion, so as to realize authentication and identification.Traditional CPU card encryption authentication mode is as schemed Shown in 1, CPU card certification is necessarily required to use PSAM cards, and PSAM cards are a kind of CPU cards with property, are mainly used in depositing Key and AES are put, the password authentification in transaction can be completed and encrypted, be mutually authenticated, decrypting computing, be mainly used as identity Mark.PSAM can be used in the equipment of various end ends, be responsible for safety control.
CPU card AES and randomizer are with the key authentication card (PSAM cards) being arranged in read-write equipment mutually Send the random number of certification, it is possible to achieve following functions:
(1) certification to card is realized by PSAM cards on terminal device.
(2) the PSAM cards on contactless CPU card and terminal device are mutually authenticated, and realize the certification to card terminal.
(3) data read operation is carried out to contactless CPU card by PSAM cards, realizes the security of digital independent.
(4) data transmitted in terminal device and contactless CPU card are encrypted transmissions.
(5) by contactless CPU card is sent to random number MAC1, the PSAM card of SAM cards be sent to contactless CPU with The machine number MAC2 and random number TAC returned by contactless CPU card, it is possible to achieve the calculating of data transmission validation.And MAC1, MAC2 Be exactly that same contactless CPU card is all every time different during transmission with TAC, thus cannot using it is aerial receive doing Method cracks the key of contactless CPU card.
But prior art there are many drawbacks, for example, hardware medium PSAM cards are depended on, it is necessary to properly be protected to PSAM cards Pipe, PSAM cards and card reader are it is possible that lose or stolen situation, and hardware medium has possibility of damage etc., this nothing Doubt the risk that increased in safety certification.
Utility model content
A technical problem to be solved in the utility model is to provide a kind of cloud platform, use for CPU card encryption certification Family equipment and system can improve the security that CPU card encrypts certification.
, there is provided a kind of cloud platform of for CPU card encrypting certification, including it is sequentially connected electrically according to the utility model on the one hand First information ciphering unit, the first encryption information transmitting element, MAC reading orders generation unit, MAC reading orders send single Unit and ciphered data information decryption unit, wherein:The first information generation the of the CPU card that first information ciphering unit will be received One encryption information, is sent to user equipment the first encryption information by the first encryption information transmitting element, so as to user equipment Associative directory to CPU card carries out external authentication, the second information life of the CPU card that MAC reading orders generation unit will be received Into safe packet authentication code MAC reading orders, MAC reading orders are sent to user by MAC reading orders transmitting element is set It is standby, the ciphered data information under CPU card associative directory, ciphered data information are read according to MAC reading orders so as to user equipment Decryption unit is solved after receiving the ciphered data information that user equipment sends according to MAC certification key pair encryption data messages It is close.
Further, also including the first information receiving unit electrically connected with the first ciphering unit, wherein:The first information connects Receive associative directory external authentication random number and ID that unit receives the CPU card that user equipment sends, first information encryption Unit generates external authentication key according to ID, and encrypts external authentication random number by external authentication key, and first adds Confidential information transmitting element sends to user equipment the external authentication random number after encryption.
Further, also including the second information receiving unit electrically connected with MAC reading order generation units, wherein:The Two information receiving units receive user equipment send CPU card MAC data random number, MAC reading orders generation unit according to MAC data generating random number MAC certifications key and MAC reading orders.
Further, also including the user equipment authentication unit electrically connected with first information receiving unit, wherein:User sets User equipment is authenticated after the MAC Address and authorization data of standby authentication unit reception user equipment.
According to another aspect of the present utility model, it is also proposed that a kind of user equipment that certification is encrypted for CPU card, including the One module and the second module, the first module are electrically connected with the second module;Wherein:First module passes through the first information of CPU card Second module is sent to cloud platform, so that cloud platform generates the first encryption information according to the first information;Cloud platform is also received to pass through The first encryption information that second module sends, external authentication is carried out according to the first encryption information to the associative directory of CPU card;To also Second information of CPU card is sent to cloud platform by the second module, and life is read so that cloud platform generates MAC according to the second information Order;The MAC reading orders that cloud platform is sent by the second module are also received, CPU card associative directory is read according to MAC reading orders Under ciphered data information;Also ciphered data information is sent to cloud platform by the second module, so that cloud platform is recognized according to MAC Card key pair encryption data message is decrypted.
Further, the associative directory external authentication random number and ID of CPU card are also passed through second by the first module Module is sent to cloud platform, so that cloud platform generates external authentication key according to ID, and is added by external authentication key Close external authentication random number;It is random by the external authentication after the encryption that the second module sends that first module also receives cloud platform Number, so that the associative directory to CPU card carries out external authentication.
Further, the first module is also sent to cloud platform the MAC data random number of CPU card by the second module, with Just cloud platform is according to MAC data generating random number MAC certifications key and MAC reading orders;First module also receives cloud platform and leads to The MAC reading orders of the second module transmission are crossed, the ciphered data information under CPU card associative directory is read according to MAC reading orders.
Further, the first module is also sent to cloud platform itself MAC Address and authorization data by the second module, So that cloud platform is authenticated to the first module.
Further, the first module is reader device, and the second module is mobile terminal.
According to another aspect of the present utility model, it is also proposed that a kind of system that certification is encrypted for CPU card, its feature exists In, including above-mentioned cloud platform and above-mentioned user equipment.
Compared with prior art, the first information generation first of the CPU card that the utility model cloud platform will be received is encrypted Information, and the first encryption information is sent to user equipment, recognize so that user equipment carries out outside to the associative directory of CPU card Card;The second information generation safe packet authentication code MAC reading orders of the CPU card that will be received, and MAC reading orders are sent To user equipment, the ciphered data information under CPU card associative directory is read according to MAC reading orders so as to user equipment;Receive It is decrypted according to MAC certification key pair encryption data messages after the ciphered data information sent to user equipment, it is possible to increase CPU card encrypts the security of certification, in addition, the embodiment eliminates PSAM cards for doing the encryption authentication mode of master card, directly Complete to encrypt certification using cloud platform, user need not carry PSAM cards, eliminate PSAM cards and damage and lose equivalent risk.
By referring to the drawings to the detailed description of exemplary embodiment of the present utility model, it is of the present utility model other Feature and its advantage will be made apparent from.
Brief description of the drawings
The Description of Drawings embodiment of the present utility model of a part for specification is constituted, and is used together with the description In explanation principle of the present utility model.
Referring to the drawings, according to following detailed description, the utility model can be more clearly understood from, wherein:
Fig. 1 is the schematic flow sheet that CPU card encrypts certification in the prior art.
Fig. 2 is the structural representation of the one embodiment for the cloud platform that the utility model is used for CPU card encryption certification.
Fig. 3 is the structural representation of the further embodiment of the cloud platform that the utility model is used for CPU card encryption certification.
Fig. 4 is the structural representation of the one embodiment for the user equipment that the utility model is used for CPU card encryption certification.
Fig. 5 is the structural representation of the one embodiment for the system that the utility model is used for CPU card encryption certification.
Fig. 6 is the structural representation of the one embodiment for the system that the utility model is used for CPU card encryption certification.
Specific embodiment
Describe various exemplary embodiments of the present utility model in detail now with reference to accompanying drawing.It should be noted that:Unless another Illustrate outward, the part and the positioned opposite of step, numerical expression and numerical value for otherwise illustrating in these embodiments are not limited Make scope of the present utility model.
Simultaneously, it should be appreciated that for the ease of description, the size of the various pieces shown in accompanying drawing is not according to reality Proportionate relationship draw.
The description only actually at least one exemplary embodiment is illustrative below, never as to this practicality New and its application or any limitation for using.
May be not discussed in detail for technology, method and apparatus known to person of ordinary skill in the relevant, but suitable In the case of, the technology, method and apparatus should be considered as authorizing a part for specification.
In all examples shown here and discussion, any occurrence should be construed as merely exemplary, without It is as limitation.Therefore, the other examples of exemplary embodiment can have different values.
It should be noted that:Similar label and letter represents similar terms in following accompanying drawing, therefore, once a certain Xiang Yi It is defined in individual accompanying drawing, then it need not be further discussed in subsequent accompanying drawing.
To make the purpose of this utility model, technical scheme and advantage become more apparent, below in conjunction with specific embodiment, and Referring to the drawings, the utility model is further described.
Fig. 2 is the structural representation of the one embodiment for the cloud platform that the utility model is used for CPU card encryption certification.The cloud Platform include first information ciphering unit 210, the first encryption information transmitting element 220, MAC reading orders generation unit 230, MAC reading orders transmitting element 240 and ciphered data information decryption unit 250, first information ciphering unit 210, first are encrypted Information transmitting unit 220, MAC reading orders generation unit 230, MAC reading orders transmitting element 240 and ciphered data information solution Close unit 250 can be realized by circuit and combination and other hardware devices, can be PLC, integrated circuit, associated components etc. The specific hardware unit of composition.Wherein:
First information ciphering unit 210 is electrically connected with the first encryption information transmitting element 220, and the first encryption information sends single Unit 220 electrically connects with MAC reading orders generation unit 230, and MAC reading orders generation unit 230 sends single with MAC reading orders Unit 240 is electrically connected, and MAC reading orders transmitting element 240 is electrically connected with ciphered data information decryption unit 250.
The first information of the CPU card that first information ciphering unit 210 will be received generates the first encryption information.For example, cloud Platform receives the associative directory external authentication random number and UID (User of the CPU card of user equipment transmission Identification, ID) after, first information ciphering unit 210 generates external authentication key according to ID, and External authentication random number is encrypted by external authentication key, the wherein user equipment can be with NFC (Near Field Communication, the short distance wireless communication technology) function mobile terminal, or reader device and mobile terminal.
First encryption information transmitting element 220 sends to user equipment the first encryption information, so that user equipment is to CPU The associative directory of card carries out external authentication.For example, the external authentication random number after encryption is sent to user equipment, set by user The standby external authentication random number using after the encryption completes the associative directory external authentication of CPU card.
The second information generation MAC (Message of the CPU card that MAC reading orders generation unit 230 will be received Authentication Code, safe packet authentication code) reading order.For example receive the CPU card of user equipment transmission After MAC data random number, MAC reading orders generation unit 230 is read according to MAC data generating random number MAC certifications key and MAC Take order.
MAC reading orders transmitting element 240 sends to user equipment MAC reading orders, so that user equipment is according to MAC Reading order reads the ciphered data information under CPU card associative directory.
Ciphered data information decryption unit 250 receive user equipment transmission ciphered data information after according to MAC certifications Key pair encryption data message is decrypted.Ciphered data information under CPU card associative directory is sent to cloud and put down by user equipment Platform, after cloud platform is decrypted according to MAC certification key pair encryptions data message, the actual content just to data is asymmetric by RSA Decryption, cloud platform can be shown the data is activation after decryption to user equipment.
In this embodiment, the first information of the CPU card that cloud platform will be received generates the first encryption information, and by first Encryption information is sent to user equipment, so that user equipment carries out external authentication to the associative directory of CPU card;By what is received The second information generation safe packet authentication code MAC reading orders of CPU card, and MAC reading orders are sent to user equipment, with Just user equipment reads the ciphered data information under CPU card associative directory according to MAC reading orders;Receive user equipment transmission Ciphered data information after be decrypted according to MAC certification key pair encryption data messages, it is possible to increase CPU card encryption certification Security, in addition, the embodiment eliminates PSAM cards for doing the encryption authentication mode of master card, is directly completed using cloud platform Encryption certification, user need not carry PSAM cards, eliminate PSAM cards and damage and lose equivalent risk.
Fig. 3 is the structural representation of the further embodiment of the cloud platform that the utility model is used for CPU card encryption certification.Should Cloud platform includes that user equipment authentication unit 310, first information receiving unit 320, first information ciphering unit 330, first add Confidential information transmitting element 340, the second information receiving unit 350, MAC reading orders generation unit 360, MAC reading orders send Unit 370 and ciphered data information decryption unit 380, user equipment authentication unit 310, first information receiving unit 320, first Information ciphering unit 330, the first encryption information transmitting element 340, the second information receiving unit 350, the generation of MAC reading orders are single Unit 360, MAC reading orders transmitting element 370 and ciphered data information decryption unit 380 can by circuit and combination and its Its hardware device is realized, can be the specific hardware unit of the compositions such as PLC, integrated circuit, associated components.Wherein:
User equipment authentication unit 310 is electrically connected with first information receiving unit 320, first information receiving unit 320 with First information ciphering unit 330 is electrically connected, and first information ciphering unit 330 is electrically connected with the first encryption information transmitting element 340, First encryption information transmitting element 340 is electrically connected with the second information receiving unit 350, and the second information receiving unit 350 is read with MAC Take order generation unit 360 to electrically connect, MAC reading orders generation unit 360 is electrically connected with MAC reading orders transmitting element 370, MAC reading orders transmitting element 370 is electrically connected with ciphered data information decryption unit 380.
User equipment is recognized after the MAC Address and authorization data of the reception user equipment of user equipment authentication unit 310 Card.The user equipment can include reader device and mobile terminal, after user is in mobile terminal login account and password, Yun Ping Platform can be to mobile terminal authentication;After mobile terminal is matched with reader device, mobile terminal can read the MAC ground of reader device Location and authorization data, and the MAC Address and authorization data are sent to cloud platform, cloud platform can authenticate the legal of reader device Property.If the user equipment is the mobile terminal with NFC function, only mobile terminal can be authenticated.
First information receiving unit 320 receive user equipment send CPU card associative directory external authentication random number and ID.First information ciphering unit 330 generates external authentication key according to ID, and is added by external authentication key Close external authentication random number.External authentication random number after first encryption information transmitting element 340 is just encrypted is sent to user Equipment, so that user equipment carries out external authentication to the associative directory of CPU card.Second information receiving unit 350 receives user and sets The MAC data random number of the CPU card that preparation is sent.MAC reading orders generation unit 360 is recognized according to MAC data generating random number MAC Card key and MAC reading orders.MAC reading orders transmitting element 370 sends to user equipment MAC reading orders, so as to Family equipment reads the ciphered data information under CPU card associative directory according to MAC reading orders.Ciphered data information decryption unit It is decrypted according to MAC certification key pair encryption data messages after the ciphered data information that 380 reception user equipmenies send.Yun Ping After platform is decrypted according to MAC certification key pair encryptions data message, just actual data content, Yun Ping are decrypted by the way that RSA is asymmetric Platform can be shown the data is activation after decryption to user equipment.
In this embodiment, PSAM cards are eliminated for doing the encryption authentication mode of master card, directly using cloud platform come complete Into encryption certification, user need not carry PSAM cards, eliminate PSAM cards and damage and lose equivalent risk;Further, since using cloud platform Carry out certification CPU card, cloud platform data space is big, and actual content that can be to card catalogue when hair fastener uses RSA Asymmetric encryption, can be obtained key data content is decrypted using RSA asymmetric decryption during certification from platform database, Asymmetric encryption and decryption, the security of data is higher;Furthermore, key is directly managed by cloud platform, can at any time be updated and be cancelled Issued CPU card, safeguards more convenient safety.
Fig. 4 is the structural representation of the one embodiment for the user equipment that the utility model is used for CPU card encryption certification.Should User equipment includes the first module 410 and the second module 420, and the first module 410 and the second module 420 are electrically connected, the first module 410 and second module 420 can be integrated in the mobile terminal with NFC function, or respectively reader device and it is mobile eventually End.
First module 410 sends to cloud platform the first information of CPU card by the second module 420, so as to cloud platform root The first encryption information is generated according to the first information, for example, the associative directory external authentication random number and ID of CPU card are passed through Second module 420 is sent to cloud platform, and cloud platform generates external authentication key according to ID, and by external authentication key Encryption external authentication random number.
First module 410 also receives the first encryption information that cloud platform is sent by the second module 420, according to the first encryption Information carries out external authentication to the associative directory of CPU card;For example, after the second module 420 receives the encryption that cloud platform sends External authentication random number, the associative directory to CPU card carries out external authentication.
First module 410 is also sent to cloud platform the second information of CPU card by the second module 420, so as to cloud platform MAC reading orders are generated according to the second information;For example, by the MAC data random number of CPU card by the second module 420 send to Cloud platform, cloud platform is according to MAC data generating random number MAC certifications key and MAC reading orders.
First module 410 also receives the MAC reading orders that cloud platform is sent by the second module 420, is read according to MAC and ordered The ciphered data information under CPU card associative directory is read in order.
First module 410 is also sent to cloud platform ciphered data information by the second module 420, so as to cloud platform according to MAC certification key pair encryption data messages are decrypted;After cloud platform is decrypted according to MAC certification key pair encryptions data message, Actual data content just is decrypted by the way that RSA is asymmetric, cloud platform can be carried out the data is activation after decryption to user equipment Display.
Information and display ciphered data information content that forwarding the first module 410 of second module 420 sends.
In this embodiment, user equipment sends to cloud platform the first information of CPU card, so that cloud platform is according to first Information generates the first encryption information;The first encryption information that cloud platform sends is received, according to the first encryption information to the phase of CPU card Closing catalogue carries out external authentication;Second information of CPU card is sent to cloud platform, so that cloud platform is generated according to the second information MAC reading orders;The MAC reading orders that cloud platform sends are received, is read under CPU card associative directory according to MAC reading orders Ciphered data information;Ciphered data information is sent to cloud platform, so that cloud platform is believed according to MAC certification key pair encryptions data Breath is decrypted, and can lift the security that CPU card encrypts certification;In addition, directly completing to encrypt certification, nothing using cloud platform PSAM cards need to be carried, PSAM cards is eliminated and is damaged and lose equivalent risk;Combined with intelligent terminal is used, and to increase PC etc. aobvious without extra Show terminal, additionally it is possible to reduce equipment volume, using more convenient.
In another embodiment of the present utility model, the first module 410 is additionally operable to the MAC Address of itself and authorizes number Sent to cloud platform according to by the second module 420, to be authenticated in cloud platform.The user equipment can include reader device And mobile terminal, after user is in mobile terminal login account and password, cloud platform can be to mobile terminal authentication;Mobile terminal After reader device pairing, mobile terminal can read the MAC Address and authorization data of reader device, and by the MAC Address and Authorization data is sent to cloud platform, and cloud platform can be assumed that the legitimacy of reader device.If the user equipment is with NFC work( The mobile terminal of energy, then only can be authenticated to mobile terminal.
In this embodiment, under the wide variety of background of the fast-developing and smart mobile phone of current mobile Internet, Using user equipmenies such as smart mobile phones as medium, by key management, the mode of hardware is transferred to cloud with traditional PSAM cards Platform virtual medium completes key management and certification, can effectively eliminate the weak point that traditional approach brings.
In the above-described embodiments, by the agency of user equipment can include reader device and mobile terminal, it is also possible to will read Card device is integrated into mobile terminal, wherein including above-mentioned user equipment 510 and above-mentioned cloud for the system of CPU card encryption certification Platform 520, Fig. 5 adds so that user equipment 510 includes reader device 511 and mobile terminal 512 as an example to CPU card of the present utility model The system of close certification is introduced device 511 can include the Card Reader chip of 13.56MHA, and with bluetooth mode.
User opens mobile terminal administration software and 3G, 4G, WIFI function of surfing the Net, input management account number and password, system Automatically prompting bluetooth BLE functions can be opened, opens the power switch of reader device 511, management software can automatically search reader device 511, the reader device 511 that selection system finds is matched, and after completing pairing, can directly use the Card Reader of reader device 511, i.e., The interaction between CPU card, reader device 511, mobile terminal 512 and cloud platform 520 can be automatically performed.
User is authenticated in the login account of mobile terminal 512, password by cloud platform 520.Mobile terminal 512 and Card Reader Device 511 is matched, and reads the MAC Address and authorization data of reader device 511, and by the MAC Address of reader device 511 and mandate Data is activation to cloud platform 520, by the legitimacy of the certification reader device 511 of cloud platform 520.Reader device 511 reads CPU card Associative directory external authentication random number R 1 and ID UID, and (Bluetooth Low Energy, low-power consumption is blue by BLE Tooth) send to mobile terminal 512, mobile terminal 512 sends information to cloud platform 520.Cloud platform 520 is according to ID UID, generates external authentication key k1, and add by the generation of external authentication key k1 encryption external authentications random number R 1 from cipher key store Close external authentication random number k 1 (R1).Reader device 511 is after mobile terminal 512 receives the encryption that cloud platform 520 sends External authentication random number k 1 (R1).Reader device 511 carries out external authentication using this k1 (R1) to the associative directory of CPU card. Reader device 511 obtains the MAC data random number R 2 of CPU card, and is sent to cloud platform 520 by mobile terminal 512.Cloud platform 520 generate MAC certification key k2 and MAC reading orders C according to MAC data random number R 2.Cloud platform 520 passes through mobile terminal 512 send MAC reading orders C to reader device 511.Reader device 511 reads CPU card associative directory by MAC reading orders C Under ciphered data information E (data).Reader device 511 is sent extremely ciphered data information E (data) by mobile terminal 512 Cloud platform 520.Cloud platform 520 is decrypted according to MAC certification key k2 to ciphered data information E (data).Cloud platform 520 After being decrypted according to MAC certification key pair encryptions data message, just the actual content to data decrypts actual number by the way that RSA is asymmetric According to content data.Information data after cloud platform 520 decrypts CPU card sends to mobile terminal 512 and is shown.
In the above-described embodiments, exchanged by mobile networks such as WIFI between reader device 511 and CPU card, it is main to use DES and 3DES are authenticated, i.e., the cipher mode that the CPU card of standard is supported;Reader device 511 interacts master with mobile terminal 512 Use AES encryption and bluetooth BLE link layer encryptions;Pass through 3G, 4G, WIFI wide area between mobile terminal 512 and cloud platform 520 The network interactions such as net, data interaction uses AES encryption algorithm for encryption;Cloud platform 520 is non-right using RSA to CPU card directory content The mode of encryption and decryption is claimed to carry out encryption and decryption actual data content.
For the mobile terminal for supporting NFC function, the embodiment can also directly save reader device part, such as Fig. 6 institutes Show, be changed to mobile terminal 610 directly with CPU card operate, then with cloud platform 620 complete encryption certification, this kind of mode with it is above-mentioned The verification process for being distinguished as eliminating reader device of description, is directly replaced by the NFC function of mobile terminal 610, realizes card -- Mobile phone -- directly interacted between platform.Flow is exchanged the step of reduce reader device certification, other the step of as will be mobile The Card Reader operation of the data transfer and reader device of terminal is merged on intelligent terminal to complete, and flow is easier.
In the above-described embodiments, the encryption certification mode of CPU card is revised as directly passing through cloud platform by traditional PASM cards To complete certification, eliminate PSAM cards and damage and lose equivalent risk.Traditional reader device Card Reader certification is revised as combined with intelligent The mode more convenient and quicker of mobile terminal;Using cloud platform memory data output it is big the characteristics of can support RSA asymmetric encryption pair The actual content of card catalogue carries out RSA asymmetric encryption, it is ensured that data authentication security higher, and key is directly by cloud Platform is managed, and can at any time update and cancel issued CPU card, safeguards more convenient safety.
So far, the utility model is described in detail.In order to avoid covering design of the present utility model, without description originally Some details well known to field.Those skilled in the art can be appreciated how to implement public here as described above, completely The technical scheme opened.
Although being described in detail to some specific embodiments of the present utility model by example, this area It is to be understood by the skilled artisans that above example is merely to illustrate, rather than in order to limit scope of the present utility model.This Field it is to be understood by the skilled artisans that can be in the case where scope and spirit of the present utility model not be departed from, to above example Modify.Scope of the present utility model is defined by the following claims.

Claims (10)

1. a kind of cloud platform that certification is encrypted for CPU card, it is characterised in that encrypted including the first information that is sequentially connected electrically single Unit, the first encryption information transmitting element, MAC reading orders generation unit, MAC reading orders transmitting element and ciphered data information Decryption unit, wherein:
The first information of the CPU card that the first information ciphering unit will be received generates the first encryption information, by described the One encryption information transmitting element sends to user equipment first encryption information, so that the user equipment is to the CPU The associative directory of card carries out external authentication, the second information of the CPU card that the MAC reading orders generation unit will be received Generation safe packet authentication code MAC reading orders, are sent out the MAC reading orders by the MAC reading orders transmitting element The user equipment is delivered to, so that the user equipment is read under the CPU card associative directory according to the MAC reading orders Ciphered data information, the ciphered data information decryption unit receives the ciphered data information that the user equipment sends The ciphered data information is decrypted according to MAC certifications key afterwards.
2. cloud platform according to claim 1, it is characterised in that also including electrically connected with first ciphering unit One information receiving unit, wherein:
The associative directory external authentication that the first information receiving unit receives the CPU card that the user equipment sends is random Number and ID, the first information ciphering unit generate external authentication key according to the ID, and by described External authentication key encrypts the external authentication random number, and the first encryption information transmitting element is by the external authentication after encryption Random number is sent to the user equipment.
3. cloud platform according to claim 1, it is characterised in that also including with MAC reading orders generation unit electricity Second information receiving unit of connection, wherein:
Second information receiving unit receives the MAC data random number of the CPU card that the user equipment sends, described MAC reading orders generation unit is according to the MAC data generating random number MAC certifications key and MAC reading orders.
4. according to any described cloud platforms of claim 1-3, it is characterised in that also including with the first information receiving unit The user equipment authentication unit of electrical connection, wherein:
The user equipment is entered after the MAC Address and authorization data of the user equipment authentication unit reception user equipment Row certification.
5. it is a kind of for CPU card encrypt certification user equipment, it is characterised in that it is described including the first module and the second module First module is electrically connected with second module;Wherein:
First module sends to cloud platform the first information of CPU card by second module, so as to the cloud platform First encryption information is generated according to the first information;Also receive the cloud platform is sent by second module described One encryption information, external authentication is carried out according to first encryption information to the associative directory of the CPU card;Also by the CPU Second information of card is sent to the cloud platform by second module, so that the cloud platform is generated according to the second information MAC reading orders;The MAC reading orders that the cloud platform is sent by second module are also received, is read according to the MAC The ciphered data information under the CPU card associative directory is read in order;The ciphered data information is also passed through into second mould Block is sent to the cloud platform, so that the cloud platform is decrypted according to MAC certifications key to the ciphered data information.
6. user equipment according to claim 5, it is characterised in that first module is also by the correlation of the CPU card Catalogue external authentication random number and ID are sent to the cloud platform by second module, so as to the cloud platform root External authentication key is generated according to the ID, and the external authentication random number is encrypted by the external authentication key; First module also receives the cloud platform by the external authentication random number after the encryption that second module sends, so as to Associative directory to the CPU card carries out external authentication.
7. user equipment according to claim 5, it is characterised in that first module is also by the MAC number of the CPU card Sent to the cloud platform by second module according to random number, so that the cloud platform is according to the MAC data random number Generation MAC certifications key and MAC reading orders;First module is also received the cloud platform and is sent by second module MAC reading orders, the ciphered data information under the CPU card associative directory is read according to the MAC reading orders.
8. according to any described user equipmenies of claim 5-7, it is characterised in that first module is also by the MAC of itself Address and authorization data are sent to the cloud platform by second module, so that the cloud platform is entered to first module Row certification.
9. according to any described user equipmenies of claim 5-7, it is characterised in that first module is reader device, institute The second module is stated for mobile terminal.
10. a kind of system that certification is encrypted for CPU card, it is characterised in that including any described cloud platforms of claim 1-4 Described user equipment any with claim 5-9.
CN201621242788.8U 2016-11-15 2016-11-15 A cloud platform, subscriber equipment and system for CPU card encryption authentication Active CN206195801U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201621242788.8U CN206195801U (en) 2016-11-15 2016-11-15 A cloud platform, subscriber equipment and system for CPU card encryption authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201621242788.8U CN206195801U (en) 2016-11-15 2016-11-15 A cloud platform, subscriber equipment and system for CPU card encryption authentication

Publications (1)

Publication Number Publication Date
CN206195801U true CN206195801U (en) 2017-05-24

Family

ID=58726710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201621242788.8U Active CN206195801U (en) 2016-11-15 2016-11-15 A cloud platform, subscriber equipment and system for CPU card encryption authentication

Country Status (1)

Country Link
CN (1) CN206195801U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108075887A (en) * 2016-11-15 2018-05-25 北京维森科技有限公司 For method, cloud platform, user equipment and the system of CPU card encryption certification

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108075887A (en) * 2016-11-15 2018-05-25 北京维森科技有限公司 For method, cloud platform, user equipment and the system of CPU card encryption certification
CN108075887B (en) * 2016-11-15 2024-07-02 北京维森科技有限公司 Method, cloud platform, user equipment and system for encryption authentication of CPU card

Similar Documents

Publication Publication Date Title
JP6531092B2 (en) How to secure wireless communication between a mobile application and a gateway
CN106161359B (en) It authenticates the method and device of user, register the method and device of wearable device
Chen et al. NFC mobile transactions and authentication based on GSM network
CN101938520B (en) Mobile terminal signature-based remote payment system and method
CN103747443B (en) One kind is based on cellphone subscriber's identification card Multi-security domain device and its method for authenticating
CN102867366B (en) Portable bank card data processing device, system and method
CN102625294B (en) Method for managing mobile service by taking universal serial bus (USB) as virtual subscriber identity module (SIM) card
CN101729244B (en) Method and system for distributing key
CN106527673A (en) Method and apparatus for binding wearable device, and electronic payment method and apparatus
US9445269B2 (en) Terminal identity verification and service authentication method, system and terminal
CN103259667A (en) Method and system for eID authentication on mobile terminal
CN101641976A (en) An authentication method
CN106327723B (en) A kind of mPOS transaction systems based on intelligent platform
CN103237305B (en) Password protection method for smart card on facing moving terminal
CN106096947A (en) Half off-line anonymous method of payment based on NFC
CN104393993A (en) A security chip for electricity selling terminal and the realizing method
CN103268511A (en) Integrated circuit card, safety information processing system and operating method of safety information processing system
CN102118385A (en) Security domain management method and device
CN101944216A (en) Two-factor online transaction safety authentication method and system
CN103329589A (en) System and method for issuing an authentication key for authenticating a user in a cpns environment
CN103077460A (en) System and method for financial certificate transaction by mobile device
CN103560890A (en) Networked transaction system and method based on mobile terminal
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
CN106789000A (en) A kind of secret phone system and method based on TEE technologies and wearable device
CN206195801U (en) A cloud platform, subscriber equipment and system for CPU card encryption authentication

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant