ID authentication device based on intelligent terminal
Technical field
The utility model is related to a kind of field of identity authentication and mobile payment field, more particularly to a kind of to be based on intelligent terminal
ID authentication device.
Background technology
With the development of internet, online transaction is increasingly popularized.Shopping online, ecommerce, e-bank, virtually
The network applications such as article trading bring great advantage to the user, and substantial amounts of fund and Transaction Information circulate on the net.But
While online transaction offers convenience to everybody, there is also many potential potential safety hazards, the moment threatens the money of user
The safety of gold and Transaction Information, user becomings increasingly concerned with for the safety precautions in whole payment process.
Initially, user typically carries out encryption and decryption and authentication using document certificate and file private key, with the hair of technology
Exhibition and the raising of safety measure, current certificate and private key typically all use general-purpose serial bus USB Key as carrier, are stored in
In USBKey, USBKey can control the access rights of private key file to protect the safety of private key file according to safe condition.USBKey
U shields are commonly called as, built-in miniature smartcard processor is encrypted to online data using asymmetric key algorithm, decrypted and numeral
Signature, it is ensured that confidentiality, authenticity, integrality and the non-repudiation of online transaction.First generation USBKey can provide electronics
Signature and digital identity authentication function, but because that can not be interacted with user, so initiating illegal hand in the presence of by rogue program
Easily application or Transaction Information such as are tampered at the safety problem.Second generation USBKey added on the basis of the first generation display screen and
Button, for showing the crucial Transaction Information such as dealing money and account, while also needing user to pass through ability after the confirmation of button physics
Operation is completed, therefore, second generation USBKey can more effectively avoid the safety problem that first generation USBKey is present, and further protect
Hinder the security of online transaction.
But whether be first generation USBKey, or the second generation USBKey, USBKey are presently mainly to be used as an independence
Equipment, be attached by the equipment such as the modes such as USB interface, COBBAIF or wave point and computer or mobile phone, therefore, use
Family must carry with USBKey when in use, and this makes troubles to the routine use of individual subscriber, and the mechanism such as bank is single
Management cost and financial cost that solely distribution USBKey is also brought along.
In order to solve the problem of above is present, people are seeking a kind of preferable technical solution always.
Utility model content
The purpose of this utility model is there is provided one kind existing authentication can be overcome to set in view of the shortcomings of the prior art
The standby not enough body based on intelligent terminal existed in terms of the ease of use and in terms of increase management cost and financial cost
Part authenticating device.
To achieve these goals, the technical scheme that the utility model is used is:A kind of identity based on intelligent terminal
Authenticating device, the ID authentication device includes security module and intelligent terminal;The intelligent terminal is pressed including main control module, first
Key module, the second key-press module, the first display module and communication module, the main control module show mould with described first respectively
Block, the second key-press module and communication module connection;The security module is embedded or is inserted in the intelligent terminal;It is described
Security module is electrically connected with first key-press module, and the button triggered with responding and handling first key-press module is believed
Number, the security module is electrically connected with the main control module.
Based on above-mentioned, the security module is safety chip, state's private counsel cryptographic algorithm bag that the safety chip is supported
Include SM1, SM2, SM3 and SM4;Cryptographic algorithm is commonly used in the world of support includes 3DES, AES, RSA, SHA-1 and SHA-256;It is described
The cryptographic service that safety chip is provided includes:For storing individual digital letter of identity and signature private key, being provided for intelligent terminal
Digital signature, signature verification and data encrypting and deciphering;Secure memory space is provided in the safety chip, for preserving key and use
Family private data;The hardware interface that the safety chip is supported includes:SPI, SD and USB.
Based on above-mentioned, first key-press module is the dedicated button module on the intelligent terminal, the dedicated button
Module is realizes key-press module that the identity authentication function of the security module is designed.
Based on above-mentioned, the intelligent terminal is smart mobile phone, tablet personal computer or notebook computer.
Based on above-mentioned, the communication module includes mobile communication module, Wi-Fi module, bluetooth module, infrared module, NFC
One or more in module, RFID module.
Based on above-mentioned, the intelligent terminal also power module including being used to provide supply voltage.
Based on above-mentioned, the intelligent terminal also includes memory module;The memory module is connected with the main control module.
Based on above-mentioned, the security module internal memory contains public and private key digital certificate.
Based on above-mentioned, first key-press module includes one kind or several in upturning key, downturning key, acknowledgement key and cancel key
Kind.
Based on above-mentioned, second key-press module includes the power key of the intelligent terminal.
Based on above-mentioned, the security module is directly connected to first display module, for by inside the security module
The information of display is needed to directly display first display module.
Based on above-mentioned, the intelligent terminal also includes the second display module, the security module and the described second display mould
Block is directly electrically connected, for the information that display is needed inside the security module to be directly displayed into second display module.
Based on above-mentioned, first display module is the display screen or display of the intelligent terminal.
Based on above-mentioned, second display module is LCD liquid crystal display screen or OLED organic light-emitting diode (OLED) display screens.
The utility model compared with the prior art have substantive distinguishing features and progress, specifically, the utility model by
Intelligent terminal is embedded or inserts security module, and security module is directly electrically connected with key-press module by circuit realiration, comes real
Existing security module is merchandised directly in response to the push button signalling triggered with processing key-press module so as to play a part of confirmation.Further
Ground, by the way that security module is directly electrically connected with corresponding display module by circuit realiration, come realize security module by its
Inside needs the information of display to directly display the display module to play a part of preventing rogue program from distorting Transaction Information,
Ensure the safety of online transaction.ID authentication device of the present utility model based on intelligent terminal is also simultaneously one with safe mould
The intelligent terminal with identity authentication function of block, user is using the identity provided by the utility model based on intelligent terminal
During authenticating device, it is not necessary to carry with a single USBKey equipment again, and the mechanism such as bank also need not be issued individually again
USBKey equipment is so as to reduce corresponding management cost and financial cost.
Brief description of the drawings
Fig. 1 is the structural representation of the utility model one embodiment.
Fig. 2 is the structural representation of another embodiment of the utility model.
Fig. 3 is the structural representation of another embodiment of the utility model.
Fig. 4 is the structural representation of another embodiment of the utility model.
Fig. 5 is the structural representation of another embodiment of the utility model.
Fig. 6 is the structural representation of another embodiment of the utility model.
Fig. 7 is the structural representation of another embodiment of the utility model.
Fig. 8 is the structural representation of another embodiment of the utility model.
Fig. 9 is the structural representation of another embodiment of the utility model.
Figure 10 is the structural representation of another embodiment of the utility model.
Embodiment
Below by embodiment, the technical solution of the utility model is described in further detail.
As shown in figure 1, a kind of ID authentication device based on intelligent terminal, the ID authentication device include security module and
Intelligent terminal;The intelligent terminal includes main control module, the first key-press module, the second key-press module, the first display module and led to
Believe module, the main control module is connected with first display module, the second key-press module and the communication module respectively;It is described
Security module is embedded or is inserted in the intelligent terminal;The security module is electrically connected with first key-press module, with sound
The push button signalling that should be triggered with processing first key-press module, the security module is electrically connected with the main control module.
Specifically, the security module is a kind of safety chip, state's private counsel of support cryptographic algorithm include SM1, SM2,
SM3 and SM4;Cryptographic algorithm is commonly used in the world of support includes 3DES, AES, RSA, SHA-1 and SHA-256;The safety chip is carried
The cryptographic service of confession includes:For storing individual digital letter of identity and signature private key, digital signature is provided for intelligent terminal, label
Name checking and data encrypting and deciphering;Secure memory space is provided in the safety chip, for preserving key and user's private data;
The hardware interface that the safety chip is supported includes:SPI, SD and USB.The safety chip internal memory contains public and private key numeral card
Book.
In other embodiments, first key-press module and second key-press module are special on the intelligent terminal
With key-press module, first key-press module includes the one or more in upturning key, downturning key, acknowledgement key and cancel key, institute
Stating the second key-press module includes the power key of the intelligent terminal.In this embodiment it is possible to by upturning key, downturning key, confirmation
Key or cancel key are defined as the acknowledgement key, cancel key and the one or more of combinations for circulating page turning key of online transaction, coordinate institute
State the identity authentication function that security module realizes the security module.
The intelligent terminal can be from mobile intelligent terminals such as smart mobile phone, tablet personal computer or notebook computers.
As shown in Fig. 2 the security module is directly electrically connected with first display module by circuit realiration, it is used for
The information that display is needed inside the security module is directly displayed first display module by the security module.In the implementation
In example, the security module realizes second generation USBKey work(together with first display module and first key-press module
Energy.Specifically, first display module is the display screen or display of the intelligent terminal.
As shown in figure 3, the intelligent terminal also includes the second display module, the security module and the described second display mould
Block is directly electrically connected by circuit realiration, for the security module that the information that display is needed inside the security module is direct
It is shown to second display module.In this embodiment, the security module is pressed with the second display module and described first
Key module realizes second generation USBKey functions together.Have specifically, second display module is LCD liquid crystal display screen or OLED
Machine light emitting diode (LED) display screen.
As shown in figs. 4 through 10, when implementing, the main control module includes central processor CPU and peripheral circuit.
The peripheral circuit includes random access memory ram, read only memory ROM, a variety of input and output I/O interfaces, A/D converter circuit
With the one or more in network function interface.The communication module include mobile communication module, Wi-Fi module, bluetooth module,
One or more in infrared module, NFC module, RFID module.The intelligent terminal also includes power module, the power supply mould
Block respectively with the security module, the main control module, the communication module, first key-press module, second button
Module, first display module are connected with second display module, for providing supply voltage.The intelligent terminal is also
Including memory module;The memory module is connected with the main control module, and the memory module is Flash flash memories or hard disk.
Finally it should be noted that:Above example is only to illustrate the technical solution of the utility model rather than it is limited
System;Although the utility model is described in detail with reference to preferred embodiment, those of ordinary skill in the art should
Understand:Still embodiment of the present utility model can be modified or some technical characteristics are equally replaced
Change;Without departing from the spirit of technical solutions of the utility model, it all should cover in the claimed technical scheme of the utility model
Among scope.