CN206863807U - For inserting the encrypted card in mobile terminal - Google Patents

For inserting the encrypted card in mobile terminal Download PDF

Info

Publication number
CN206863807U
CN206863807U CN201720398370.4U CN201720398370U CN206863807U CN 206863807 U CN206863807 U CN 206863807U CN 201720398370 U CN201720398370 U CN 201720398370U CN 206863807 U CN206863807 U CN 206863807U
Authority
CN
China
Prior art keywords
user
mobile terminal
signal
card
encrypted card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201720398370.4U
Other languages
Chinese (zh)
Inventor
温咏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin Micro Interconnection Information Technology Co Ltd
Original Assignee
Guilin Micro Interconnection Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin Micro Interconnection Information Technology Co Ltd filed Critical Guilin Micro Interconnection Information Technology Co Ltd
Priority to CN201720398370.4U priority Critical patent/CN206863807U/en
Application granted granted Critical
Publication of CN206863807U publication Critical patent/CN206863807U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The utility model discloses a kind of encrypted card for inserting in mobile terminal, the structure of encrypted card is ferrule structure or membrane structure, and encrypted card is inserted into the same SIM card neck of mobile terminal simultaneously with SIM card;Wherein, encrypted card includes:Wireless communication module, sensor, safety chip and power interface;Wireless communication module, for establishing communication port between encrypted card and mobile terminal;Sensor, for detecting user's confirmation signal of user;Safety chip is connected with wireless communication module and sensor respectively, for the user's confirmation signal for detecting to obtain according to sensor, user profile is encrypted operation or decryption oprerations;The power interface of encrypted card is connected with the power interface of the SIM card neck of mobile terminal, and the power interface for the SIM card neck by mobile terminal provides electric energy for encrypted card.The technical scheme facilitates user to obtain, carry and uses encrypted card, improves the security of transactional operation.

Description

For inserting the encrypted card in mobile terminal
Technical field
It the utility model is related to communication technical field, and in particular to a kind of encrypted card for inserting in mobile terminal.
Background technology
Mobile payment refers to that user carries out account payment using mobile terminals such as mobile phones to the commodity consumed or service.By There is the advantage such as convenient, fast in mobile payment, increasing user likes being paid by way of mobile payment, so And the transactional operation safety problem in thing followed mobile payment is also more and more prominent.For example, in mobile terminal by bank's account Number, during the user profile such as password transmitted to far-end servers such as bank servers, it is easy to by Trojan attack, be hacked The illegal molecule malicious intercepted such as visitor, so as to threaten the account safety of user.
Therefore, it is necessary to take encrypted transmission mode in data transmission procedure.In the prior art, people have developed Some are used for the technical scheme for communication of mobile terminal encryption, for example, using external encryption device or by SIM card The mode of built-in security chip is encrypted for communication of mobile terminal.Prior art has the disadvantage that:External encryption device needs User is wanted individually to carry, and it is aperiodically its charging to need user, it has not been convenient to which user is used;It is and built-in in SIM card Although the mode of safety chip is easy to user to carry, but need to cooperate hair fastener with SIM card operator, hair fastener flow compared with Long, user is difficult easily to obtain, in addition, safety chip is built in SIM card, is chronically at working condition, can not be had The user of effect confirms that there is by the risk of Trojan attack.
Utility model content
In view of the above problems, it is proposed that the utility model overcomes above mentioned problem to provide one kind or solved at least in part Certainly above mentioned problem for the encrypted card that inserts in mobile terminal.
The utility model provides a kind of encrypted card for inserting in mobile terminal, and the structure of encrypted card is ferrule structure Or membrane structure, encrypted card are inserted into the same SIM card neck of mobile terminal simultaneously with SIM card;
Wherein, encrypted card includes:Wireless communication module, sensor, safety chip and power interface;
Wireless communication module, for establishing communication port between encrypted card and mobile terminal, enter line number with mobile terminal According to communication;
Sensor, for detecting user's confirmation signal of user;
Safety chip is connected with wireless communication module and sensor respectively, for the user for detecting to obtain according to sensor Confirmation signal, user profile is encrypted operation or decryption oprerations;
The power interface of encrypted card is connected with the power interface of the SIM card neck of mobile terminal, for by mobile whole The power interface of the SIM card neck at end provides electric energy for encrypted card.
Further, safety chip is additionally operable to:The user profile operation from mobile terminal is received from wireless communication module Instruction, generates random goal verification signal, and compare sensor and detect obtained user's confirmation signal and the target generated Whether confirmation signal is consistent, if comparing, to obtain user's confirmation signal consistent with goal verification signal, and user profile is added Close operation or decryption oprerations.
Further, when the structure of encrypted card is ferrule structure, the appearance and size of encrypted card and the SIM card of mobile terminal The appearance and size of neck matches, and the groove of encrypted card is embedded in SIM of the geomery less than or equal to the geomery of groove Card;When the structure of encrypted card is membrane structure, encrypted card is attached to SIM card and is provided with the surface of hard contact.
Further, sensor is additionally operable to:Detect the user control signal of user;
Safety chip is additionally operable to:The user control signal for detecting to obtain according to sensor, start or close radio communication mold The communication function of block.
Further, user profile operational order includes personal recognition code;
Safety chip is additionally operable to:According to the personal recognition code that prestores, the personal identification in user profile operational order is verified The legitimacy of password.
Further, goal verification signal includes target gesture behavior signal, and user's confirmation signal includes user gesture row For signal;And/or goal verification signal includes targeted voice signal, user's confirmation signal includes user voice signal.
Further, safety chip is additionally operable to:When goal verification signal includes target gesture behavior signal, user's confirmation letter When number including user gesture behavior signal, judge that the user gesture behavior signal that sensor detects to obtain is believed with the behavior of target gesture Whether number time being consistent exceedes prefixed time interval, if judging to obtain user gesture behavior signal and target gesture behavior The time that signal is consistent exceedes prefixed time interval, then operation or decryption oprerations user profile are encrypted.
Further, safety chip is additionally operable to:Pass through established communication port respectively to believe the goal verification generated Number and sensor user's confirmation signal for detecting to obtain send to mobile terminal.
Further, sensor includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sound wave sensing Device.
Further, wireless communication module includes:Bluetooth communication and/or WIFI communication modules.
Communication port is established in the connection of the bluetooth module of bluetooth communication and mobile terminal, realizes mobile terminal and encrypted card Communication, further realize interconnecting between encrypted card, mobile terminal and far-end computer information system three.
WIFI communication modules and the WIFI module or external routes equipment of mobile terminal connect, and realize that encrypted card is set with outside Standby connection, external equipment include mobile terminal or far-end computer information system, by the connection of WIFI communication modules, realize Interconnecting between encrypted card, mobile terminal and far-end computer information system three.
According to technical scheme provided by the utility model, encryption card issuing with third parties such as SIM card operators without entering Row cooperation hair fastener, is easy to user to obtain;The structure of encrypted card is ferrule structure or membrane structure, and encrypted card can be same with SIM card When be inserted into the same SIM card neck of mobile terminal, can not only be by the power interface of the SIM card neck of mobile terminal Encrypted card provides electric energy, and is also convenient for user and carries and use;Wireless communication module in encrypted card can in encrypted card and Communication port is established between mobile terminal, the data realized between encrypted card and mobile terminal communicate, and efficiently solve certain A little mobile terminals are difficult the problem of entering row data communication with encrypted card due to various limitations;Sensor in encrypted card is used to examine User's confirmation signal of user is surveyed, the sensor is independently of mobile terminal so that mobile terminal can not directly invoke the sensor, The risk that sensor is called by long-range malice is eradicated;User's confirmation signal that safety chip detects to obtain according to sensor, it is right Operation or decryption oprerations are encrypted in user profile, so as to prevent the Trojan attack in process of exchange, improve transaction behaviour The security of work.
Described above is only the general introduction of technical solutions of the utility model, in order to better understand skill of the present utility model Art means, and being practiced according to the content of specification, and in order to allow above and other purpose of the present utility model, feature It can be become apparent with advantage, below especially exemplified by specific embodiment of the present utility model.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to this practicality New limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is shown to be shown according to the structure of the encrypted card for inserting in mobile terminal of the utility model one embodiment It is intended to;
Fig. 2 is shown according to the utility model one embodiment for the function knot of the encrypted card inserted in mobile terminal Structure block diagram;
Fig. 3 is shown according to the utility model one embodiment for the work side of the encrypted card inserted in mobile terminal The schematic flow sheet of method;
Fig. 4 is shown according to the utility model another embodiment for the work of the encrypted card inserted in mobile terminal The schematic flow sheet of method.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
The utility model provides a kind of encrypted card for inserting in mobile terminal, and the structure of the encrypted card is cutting ferrule knot Structure or membrane structure, encrypted card are inserted into the same SIM card neck of mobile terminal simultaneously with SIM card, facilitate user to carry With use, and solves the carrying problem of encrypted card.Specifically, mobile terminal can be the terminal that mobile phone etc. has SIM card neck. It is emphasized that the encrypted card and SIM card described in the utility model are two independent products, it is not identical product Part, the work of encrypted card is independently of the work of SIM card, simply when user wants to use encrypted card, user Need to be inserted into together again in the same SIM card neck of mobile terminal after being assembled encrypted card and SIM card, so as to The power interface of the SIM card neck in the case of the SIM card in user's normal use mobile terminal using mobile terminal is not influenceed Electric energy is provided for encrypted card.
When the structure of encrypted card is ferrule structure, the appearance and size of encrypted card and the SIM card neck of mobile terminal it is outer Shape size matches, and therefore, encrypted card is inserted into the SIM card neck of mobile terminal, when specifically used, encrypted card Groove is embedded in SIM card of the geomery less than or equal to the geomery of groove.Wherein, geomery is less than or equal to groove The SIM card of geomery can be the less SIM card of geomery in the prior art, or chi obtained from clipped Very little smaller SIM card.
Fig. 1 is shown to be shown according to the structure of the encrypted card for inserting in mobile terminal of the utility model one embodiment It is intended to, wherein, the structure of the encrypted card 110 shown in Fig. 1 is ferrule structure, when specifically used, the groove 111 of encrypted card 110 It is embedded in SIM card of the geomery less than or equal to the geomery of groove 111.
In the prior art, SIM card has had evolved to three types, and specially size is 15mm × 25mm standard SIM card, the Micro-SIM cards that size is 15mm × 12mm and Nano-SIM cards that size is 12.3mm × 8.8mm.With movement Terminal be mobile phone exemplified by, for SIM card neck be Nano-SIM card necks mobile phone, utilize technical side provided by the utility model Case, can be by the structure fabrication of encrypted card into the ferrule structure to match with Nano-SIM card necks, and due in the prior art The geomery of SIM card chip inside Nano-SIM cards is less than the geomery of Nano-SIM cards, therefore using cutting card Nano-SIM cards are further cut into smaller geomery by device, without being caused to the SIM card chip inside Nano-SIM cards Clipped SIM card, is then embedded in the groove in the encrypted card of ferrule structure by damage, so as to by encrypted card and SIM card It is inserted into simultaneously in the same SIM card neck of mobile phone.And for the mobile phone that SIM card neck is Micro-SIM card necks, utilize this The technical scheme that utility model provides, can be by the structure fabrication of encrypted card into the cutting ferrule knot to match with Micro-SIM card necks Structure, and the geomery of the groove in the encrypted card of ferrule structure is fabricated to the shape chi that can be embedded in Nano-SIM cards Very little, by this set, Nano-SIM cards can need to only be embedded in adding for ferrule structure by user without being cut to SIM card In groove in close card, then the encrypted card for the ferrule structure for being embedded with Nano-SIM cards is inserted into the Micro-SIM of mobile phone In card neck, so as to which encrypted card and SIM card are inserted into the same SIM card neck of mobile phone simultaneously.In addition, it is directed to SIM card card Groove is the mobile phone of standard SIM card neck, using technical scheme provided by the utility model, can by the structure fabrication of encrypted card into The ferrule structure that standard SIM card neck matches, and the geomery of the groove in the encrypted card of ferrule structure is fabricated to The geomery of Micro-SIM cards or Nano-SIM cards can be embedded in, by this set, user can be without carrying out to SIM card Cut, Micro-SIM cards or Nano-SIM cards need to be only embedded in the groove in the encrypted card of ferrule structure, then will be embedded The encrypted card for having the ferrule structure of Micro-SIM cards or Nano-SIM cards is inserted into the SIM card neck of mobile phone, so as to encrypt Card is inserted into the same SIM card neck of mobile phone simultaneously with SIM card.Furthermore it is possible to profile it is Nano-SIM using Recovery card The encrypted card of card shape becomes the profile of Micro-SIM cards or the profile of standard SIM card;Can also be profile using Recovery card The encrypted card of Micro-SIM card shapes becomes the profile of standard SIM card.
When the structure of encrypted card is membrane structure, encrypted card is attached to SIM card and is provided with the surface of hard contact.Tool Body, encrypted card can make the product form of film, and match with the power contact with the SIM card neck of mobile terminal Power contact, encrypted card is in parallel with SIM card on mobile terminals so that the power contact of SIM card and the SIM card of mobile terminal The power contact of neck remains able to normal use of the normal connection without influenceing SIM card, so that by encrypted card and SIM card simultaneously It is inserted into the same SIM card neck of mobile phone, solves the problems, such as the carrying and power supply of encrypted card well.
It should be noted that encrypted card provided by the utility model does not have the function of SIM card, different from the prior art SIM card.In electrical connection, the power contact of the encrypted card and the power contact of SIM cards of mobile phones neck and connect to solve plus The power supply powerup issue of close card.The surface of encrypted card is additionally provided with ISO7816 docking interfaces, with bluetooth pasting card in the prior art Compare, the ISO7816 docking interfaces in the utility model set by encrypted card surface are totally different from bluetooth patch in the prior art Set principal and subordinate's ISO7816 interfaces in film card, in the prior art principal and subordinate's ISO7816 interfaces set in bluetooth pasting card Effect is to realize that bluetooth pasting card communicates with SIM card, bluetooth pasting card with the data of mobile phone, and encrypted card table in the utility model The effect of the ISO7816 docking interfaces in face is totally different from the work of principal and subordinate's ISO7816 interfaces in bluetooth pasting card in the prior art With, in the utility model the effect of the ISO7816 docking interfaces on encrypted card surface be realize mobile phone neck ISO7816 interfaces with The electric docking of the ISO7816 interfaces of SIM card so that the ISO7816 interfaces of SIM cards of mobile phones neck and the ISO7816 of SIM card connect Each contact of mouth directly turns on.In addition, in the prior art it is developed that bluetooth SIM card, bluetooth SIM card are actually One SIM card with Bluetooth function, row data communication can be entered by ISO7816 interfaces and mobile phone.With bluetooth in the prior art SIM card is compared, and encrypted card provided by the utility model does not have the function of SIM card, does not move identification code, it is impossible to as SIM Card uses, also without ISO7816 interfaces, it is impossible to enters row data communication by ISO7816 interfaces and mobile phone.Further, since this Without mobile identification code in the encrypted card that utility model provides, therefore card issuing is encrypted without with SIM card operator etc. Third party cooperates hair fastener, and user can more easily obtain encrypted card.
Fig. 2 is shown according to the utility model one embodiment for the function knot of the encrypted card inserted in mobile terminal Structure block diagram, as shown in Fig. 2 the encrypted card includes:Wireless communication module 210, sensor 220, safety chip 230 and power interface (not shown).
Wherein, wireless communication module 210 is used to establish communication port between encrypted card and mobile terminal, with mobile terminal Enter row data communication.Wireless communication module 210 is additionally operable to establish communication port between encrypted card and external routes equipment, and outer Portion's routing device enters row data communication.Therefore, wireless communication module 210 can be in encrypted card, mobile terminal and external routes equipment Between establish communication port, enter row data communication with mobile terminal or external routes equipment.Wireless communication module 210 includes: Bluetooth communication and/or WIFI communication modules.Specifically, when wireless communication module 210 includes bluetooth communication, encryption Bluetooth communication in card is connected with the bluetooth module of mobile terminal, so as to be established between encrypted card and mobile terminal Bluetooth communication channel, row data communication can be entered with the bluetooth module in mobile terminal;When wireless communication module 210 includes WIFI During communication module, the WIFI communication modules in encrypted card can both be connected with the WIFI module of mobile terminal, can also with it is outer Portion's routing device establishes WIFI connections.Established in encrypted card and external routes equipment after WIFI is connected, pass through external routes equipment Achieve that and communication port is established between encrypted card and far-end computer information system, and far-end computer information system also may be used Communicated with mobile terminal, so as to be established between encrypted card, mobile terminal and far-end computer information system three mutually Join the communication port of intercommunication;When wireless communication module 210 both includes bluetooth communication, includes WIFI communication modules again, use Family can be to enter row data communication by bluetooth approach or WIFI modes according to selection is actually needed.In the utility model, lead to Crossing bluetooth approach or WIFI modes can conveniently realize between encrypted card, mobile terminal and far-end computer information system three Data communication, it is difficult with encrypted card to enter asking for row data communication to efficiently solve some mobile terminals due to various limitations Topic.
Sensor 220 is used for the user's confirmation signal for detecting user.Specifically, sensor 220 includes:Acceleration sensing Device, geomagnetic sensor, gyro sensor and/or sonic sensor.Those skilled in the art can according to be actually needed to sensing Device is combined and selected, and does not limit herein.Sensor 220 in encrypted card is independently of mobile terminal, the behaviour of mobile terminal Sensor 220 can not be called by making system, so as to eradicate the risk that sensor is called by long-range malice, improve transactional operation Security.
Safety chip 230 is connected with wireless communication module 210 and sensor 220 respectively, for being examined according to sensor 220 The user's confirmation signal measured, user profile is encrypted operation or decryption oprerations.Safety chip 230 be further used for from Wireless communication module 210 receives user profile operational order, generates random goal verification signal, and compare sensor 220 and examine Whether the user's confirmation signal measured and the goal verification signal generated are consistent, and user's confirmation signal and mesh are obtained if comparing It is consistent to mark confirmation signal, then operation or decryption oprerations user profile are encrypted.When wireless communication module 210 in encrypted card and When communication port is established between mobile terminal, safety chip 230 can receive the use from mobile terminal from wireless communication module 210 Family information operational order;When wireless communication module 210 establishes communication port between encrypted card and far-end computer information system When, safety chip 230 can be received from wireless communication module 210 from far-end computer information system user profile operation refer to Order;When wireless communication module 210 establishes communication port between encrypted card, mobile terminal and far-end computer information system three When, safety chip 230 can receive the user from mobile terminal or far-end computer information system from wireless communication module 210 Information operational order.
For example, when user is traded payment using mobile terminal, mobile terminal sends user profile behaviour to encrypted card Instruct, the wireless communication module 210 in encrypted card receives the user profile operational order, and safety chip 230 is according to the user Information operational order, using random algorithm, random goal verification signal is generated, and the use of user is detected by sensor 220 Family confirmation signal, the target that then safety chip 230 compares the obtained user's confirmation signal of the detection of sensor 220 and generated are true Whether consistent recognize signal, to obtain user's confirmation signal consistent with goal verification signal if comparing, using being stored in safety chip Key and algorithm in 230, user profile is encrypted operation or decryption oprerations.Those skilled in the art can be according to actual need Random algorithm is selected, is not limited herein.
Wherein, goal verification signal includes target gesture behavior signal, and user's confirmation signal is believed including user gesture behavior Number;And/or goal verification signal includes targeted voice signal, user's confirmation signal includes user voice signal.For example, when biography When sensor 220 includes acceleration transducer, geomagnetic sensor and/or gyro sensor, goal verification signal includes target hand Gesture behavior signal, user's confirmation signal include user gesture behavior signal, then safety chip 230 compares sensor 220 and detected Whether obtained user gesture behavior signal and the target gesture behavior signal generated are consistent;When sensor 220 passes for sound wave During sensor, goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal, then safety chip 230 compare sensor 220 using speech recognition technology detects obtained user voice signal and the targeted voice signal generated It is whether consistent;When sensor 220 is included outside acceleration transducer, geomagnetic sensor and/or gyro sensor, in addition to sound During wave sensor, goal verification signal includes target gesture behavior signal and targeted voice signal, and user's confirmation signal includes using Family gesture behavior signal and user voice signal, then safety chip 230 compares sensor 220 and detects obtained user gesture row It is whether consistent by signal and the target gesture behavior signal that generates, and compare sensor 220 and detect obtained user speech letter It is number whether consistent with the targeted voice signal that is generated.
In addition, when also including personal recognition code in the user profile operational order that safety chip 230 receives, example Such as PIN code, safety chip 230 verifies that individual's identification in the user profile operational order is close according to the personal recognition code that prestores The legitimacy of code.Specifically, if safety chip 230 verifies the PIN code obtained in user profile operational order and the PIN code that prestores Unanimously, then it is legal PIN code to illustrate the PIN code, then safety chip 230 is random according to user profile operational order, generation Goal verification signal;If safety chip 230 verifies the PIN code obtained in user profile operational order and prestores PIN code not Unanimously, then it is illegal PIN code to illustrate the PIN code, then safety chip 230 need not generate random goal verification signal, The result of personal recognition code authentication failed can directly be returned.
Further, when personal recognition code verifies that identification number exceedes default maximum times, the utility model carries The encrypted card of confession locks, it is necessary to can be unlocked by the external authentication instruction of higher authority automatically.
Goal verification signal in the utility model is not changeless goal verification signal, but by safety chip 230 generate at random, so as to efficiently reducing the risk that goal verification signal is remotely maliciously cracked;In addition, safe core Piece 230 need according to sensor 220 detect obtained user's confirmation signal and the goal verification signal generated whether unanimously come Determine whether user profile to be encrypted operation or decryption oprerations, so as to prevent the Trojan attack in process of exchange, enter One step improves the security of transactional operation.
Wherein, user profile operational order can be divided into but be not limited to user profile encrypted instruction or user profile decryption refer to Order.When user profile operational order is user profile encrypted instruction, the comparison of safety chip 230 obtains sensor 220 and detected To real-time user's confirmation signal it is consistent with the goal verification signal generated at random after, then using being stored in safety chip 230 Interior key and algorithm user profile is encrypted operation;When user profile operational order is user profile decryption instructions, Safety chip 230, which compares, obtains the obtained real-time user's confirmation signal of the detection of sensor 220 and the goal verification generated at random After signal is consistent, then user profile is decrypted operation using the key and algorithm that are stored in safety chip 230.It is above-mentioned to add Close or decryption oprerations results, are returned by wireless communication module 210.
Specifically, safety chip 230 detects in predetermined registration operation time interval sensor 220 obtained user's confirmation letter Number and goal verification signal be analyzed, calculate the similarity of user's confirmation signal and goal verification signal.If pre- If the similarity being calculated in operating time interval exceedes default similarity threshold, then safety chip 230 determines that user confirms Signal is consistent with goal verification signal, illustrates that user successfully confirms this time to operate, then right according to user profile operational order Operation or decryption oprerations are encrypted in user profile;If the similarity being calculated in predetermined registration operation time interval not less than Default similarity threshold, then the determination user's confirmation signal of safety chip 230 and goal verification signal are inconsistent, illustrate operation overtime User is caused to confirm this time to operate not successfully, then not carry out any operation, and the result returned operation failure to user profile. Wherein, those skilled in the art can be configured according to being actually needed to default similarity threshold and predetermined registration operation time interval, Do not limit herein.For example, default similarity threshold can be arranged to 0.9.
If the wireless communication module 210 in encrypted card is chronically at opening, then power consumption problem is not only existed, and And also there is the risk maliciously connected by other people.In order to solve the above problems, in the utility model, sensor 220 is also used In the user control signal of detection user, safety chip 230 is additionally operable to detect obtained user's control letter according to sensor 220 Number, startup or the communication function for closing wireless communication module 210.Specifically, safety chip 230 compares sensor 220 and detected Whether the user control signal arrived is consistent with default control signal, and user control signal and default control signal one are obtained if comparing Cause, then start or close the communication function of wireless communication module 210.
Specifically, sensor 220 includes sonic sensor, and default control signal is default audio controls, specifically may be used Including default speech onset signal and default voice shutdown signal.Safety chip 230 utilizes speech recognition technology, compares sound wave and passes Whether the user control signal that sensor detects to obtain consistent with default speech onset signal, if compare obtain user control signal with Default speech onset signal is consistent, then starts the communication function of wireless communication module 210;Safety chip 230 utilizes speech recognition Technology, whether the user control signal that comparison sonic sensor detects to obtain is consistent with default voice shutdown signal, if comparing It is consistent with default voice shutdown signal to user control signal, then close the communication function of wireless communication module 210.
Assuming that the voice messaging corresponding with default speech onset signal is " opening encrypted card communication function ", with default language The corresponding voice messaging of sound shutdown signal is " closing encrypted card communication function ", if user wants to open the nothing in encrypted card The communication function of line communication module 210, then it need to only be said against the mobile terminal for being provided with encrypted card and " open encryption cartoon letters work( Can " these words, the sensor 220 in encrypted card detects voice signal corresponding to " opening encrypted card communication function ", this When, the voice signal is user control signal, and safety chip 230 obtains the user control signal through comparison and opened with default voice Dynamic signal is consistent, then starts the communication function of wireless communication module 210., it is necessary to close wireless after user completes transaction payment During the communication function of communication module 210, it similarly need to only be said against the mobile terminal for being provided with encrypted card and " close encryption cartoon letters These words of function ", the sensor 220 in encrypted card detect voice signal corresponding to " closing encrypted card communication function ", Now, the voice signal is user control signal, and safety chip 230 obtains the user control signal and default voice through comparing Shutdown signal is consistent, then closes the communication function of wireless communication module 210.
Alternatively, default control signal can be also default gesture Behavior- Based control signal, specifically may include default gesture behavior Enabling signal and default gesture behavior shutdown signal, wherein, default gesture behavior enabling signal can close with default gesture behavior Signal is identical or different, and those skilled in the art can be configured according to being actually needed, and not limit herein.
Alternatively, when encrypted card completes the operation of user or during user's operation overtime, safety chip 230 is then automatic The communication function for closing wireless communication module 210 is actively closed without user.
Safety chip 230 detects obtained user control signal and default gesture Behavior- Based control signal according to sensor 220 The mode of communication function to start or close wireless communication module 210 detects with above-mentioned safety chip 230 according to sensor 220 Obtained user control signal and default audio controls come start or close wireless communication module 210 communication function side Formula is similar, and here is omitted.
When goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture behavior signal When, in order to avoid there is the situation for making safety chip 230 perform operation due to the false triggering of user, safety chip 230 is also used In:Judging the time that the user gesture behavior signal that the detection of sensor 220 obtains is consistent with target gesture behavior signal is It is no to exceed prefixed time interval, if judging to obtain the time that user gesture behavior signal is consistent with target gesture behavior signal More than prefixed time interval, then operation or decryption oprerations user profile are encrypted.
Those skilled in the art can not limit herein according to setting prefixed time interval is actually needed.For example, when default When time interval is 1s, if safety chip 230 judges that obtain user gesture behavior signal keeps with target gesture behavior signal More than 1s, then operation or decryption oprerations user profile are encrypted in the consistent time;If safety chip 230 judges to be used Family gesture behavior signal not less than 1s, is not then carried out any with the time that target gesture behavior signal is consistent to user profile Operation, and the result returned operation failure is to mobile terminal.
User's confirmation signal is sent for the ease of the goal verification signal that user is generated according to safety chip 230, safety Chip 230 is additionally operable to:Pass through established communication port respectively to detect the goal verification signal generated and sensor 220 To user's confirmation signal send to mobile terminal.Specifically, when goal verification signal includes target gesture behavior signal, user When confirmation signal includes user gesture behavior signal, the target gesture row that is generated for the ease of user according to safety chip 230 Gesture is made for signal and adjusts gesture, and safety chip 230 passes through the target hand that established communication port will be generated respectively The user gesture behavior signal that gesture behavior signal and sensor detect to obtain is sent to mobile terminal, so that mobile terminal is in screen Middle display and the corresponding target gesture of target gesture behavior signal and the user gesture corresponding with user gesture behavior signal. By the position relationship of display target gesture and user gesture, the man-machine interface for having provided a user close friend guides gesture operation. The technical scheme make use of the screen of mobile terminal to facilitate user according to target to user's display target gesture and user gesture Gesture makes required gesture.
So that mobile terminal is mobile phone as an example, mobile phone is after it have received target gesture behavior signal, in the screen of mobile phone The middle display target gesture corresponding with target gesture behavior signal, the hand-holdable mobile phone of user and according to shown by mobile phone screen Target gesture make required gesture.When the user gesture behavior signal that sensor 220 detects, safety chip 230 Sensor 220 is detected to obtained user gesture behavior signal and is also sent to mobile phone, mobile phone have received user gesture behavior After signal, the user gesture corresponding with user gesture behavior signal is shown in the screen of mobile phone, user can be according to mobile phone Shown target gesture and current user gesture are made adjustment to the gesture of oneself in time in screen, so as to make institute The gesture made is consistent with target gesture.
For example, the target gesture corresponding with target gesture behavior signal is to carry out gesture shifting along certain mobile route It is dynamic, then shown target gesture can be target mobile route in mobile phone, and user can be according to shown by mobile phone screen Target mobile route cell phone, and it is timely according to target mobile route and current mobile route shown in mobile phone screen Ground adjusts the moving direction of mobile phone so that the mobile route of mobile phone can overlap with target mobile route, so as to facilitate user Gesture is made according to target gesture.
And for example, when goal verification signal includes targeted voice signal, and user's confirmation signal includes user voice signal, peace Full chip 230, which passes through established communication port and sends the targeted voice signal generated to mobile terminal, mobile terminal, to exist The target voice information corresponding with targeted voice signal is shown in screen, if target voice information is " payment ", then carry out During specific implementation, can be shown in the screen of mobile terminal " please read following word:The prompt message of payment ", then user According to target voice delivering user voice signal, the sonic sensor in sensor 220 detects user voice signal, safety Chip 230 utilizes speech recognition technology, compare sonic sensor detect obtained user voice signal whether with target language message It is number consistent, obtain that user voice signal is consistent with targeted voice signal if comparing, it is close in safety chip 230 using being stored in Key and algorithm, user profile is encrypted operation or decryption oprerations.
When encrypted card is installed in the SIM card neck of mobile terminal, the power interface of encrypted card and the SIM of mobile terminal The power interface of card neck is connected, and the power interface for the SIM card neck by mobile terminal provides electric energy for encrypted card.
The encrypted card provided according to the utility model embodiment, encryption card issuing without with SIM card operator etc. the 3rd Side cooperates hair fastener, is easy to user to obtain;The structure of encrypted card is ferrule structure or membrane structure, encrypted card and SIM card It can simultaneously be inserted into the same SIM card neck of mobile terminal, can not only be connect by the power supply of the SIM card neck of mobile terminal Mouth provides electric energy for encrypted card, and is also convenient for user and carries and use;Wireless communication module in encrypted card can encrypted The communication port to interconnect is established between card, mobile terminal and far-end computer information system three, encrypted card is realized, moves Dynamic data communication between terminal and far-end computer information system three, some mobile terminals are efficiently solved due to various Limitation and be difficult with encrypted card enter row data communication the problem of;Sensor in encrypted card is used for the user's confirmation letter for detecting user Number, the sensor is independently of mobile terminal so that mobile terminal can not directly invoke the sensor, and it is long-range to have eradicated sensor The risk that malice is called;The goal verification signal that safety chip is generated is random goal verification signal, can effectively be subtracted The risk that few goal verification signal is remotely maliciously cracked, in addition, safety chip is always according to the random goal verification generated Signal and the sensor user's confirmation signal for detecting to obtain it is whether consistent come determine whether user profile is encrypted operation or Decryption oprerations, so as to effectively prevent the Trojan attack in process of exchange, improve the security of transactional operation.
Fig. 3 is shown according to the utility model one embodiment for the work side of the encrypted card inserted in mobile terminal The schematic flow sheet of method, wherein, encrypted card is inserted into the same SIM card neck of mobile terminal simultaneously with SIM card, passes through movement The power interface of the SIM card neck of terminal provides electric energy for encrypted card.As shown in figure 3, this method comprises the following steps:
Step S300, by the wireless communication module in encrypted card, in encrypted card, mobile terminal and far-end computer information The communication port to interconnect is established between system three.
Specifically, wireless communication module is used to establish communication port between encrypted card and mobile terminal, with mobile terminal Enter row data communication.Wireless communication module is additionally operable to establish communication port between encrypted card and external routes equipment, with outside Routing device enters row data communication.Therefore, wireless communication module can be built between encrypted card, mobile terminal and external routes equipment Vertical communication port, enters row data communication with mobile terminal or external routes equipment.
Wireless communication module includes:Bluetooth communication and/or WIFI communication modules.Specifically, wireless communication module is worked as During including bluetooth communication, the bluetooth communication in encrypted card is connected with the bluetooth module of mobile terminal, so as to add Bluetooth communication channel is established between close card and mobile terminal, row data communication can be entered with the bluetooth module in mobile terminal; When wireless communication module includes WIFI communication modules, the WIFI communication modules in encrypted card both can be with the WIFI of mobile terminal Module is connected, and can also establish WIFI with external routes equipment and be connected.WIFI is established in encrypted card and external routes equipment to connect After connecing, achieved that by external routes equipment and communication port is established between encrypted card and far-end computer information system, and it is remote End computer information system can also be communicated with mobile terminal, so as in encrypted card, mobile terminal and far-end computer information The communication port to interconnect is established between system three;When wireless communication module both includes bluetooth communication, include again During WIFI communication modules, user can be to enter row data communication by bluetooth approach or WIFI modes according to selection is actually needed. In the utility model, encrypted card, mobile terminal and distal end can be conveniently realized by bluetooth approach or WIFI modes and calculated Data communication between machine information system three, efficiently solve some mobile terminals is difficult and encryption due to various limitations The problem of sticking into row data communication.
When encrypted card only establishes communication port with mobile terminal, and do not establish and communicate with far-end computer information system During road, this method also can continue to perform.
Step S301, receive user profile operational order.
When wireless communication module establishes communication port between encrypted card and mobile terminal, can be received in step S301 From the user profile operational order of mobile terminal;When wireless communication module is between encrypted card and far-end computer information system When establishing communication port, the user profile operational order from far-end computer information system can be received in step S301;When When wireless communication module establishes communication port between encrypted card, mobile terminal and far-end computer information system three, in step The user profile operational order from mobile terminal or far-end computer information system can be received in rapid S301.
When user is traded payment using mobile terminal, mobile terminal sends user profile operation to encrypted card and referred to Order, encrypted card receive the user profile operational order that mobile terminal is sent.
Step S302, according to user profile operational order, generate random goal verification signal.
After step S301 receives user profile operational order, in step s 302, referred to according to user profile operation Order, using random algorithm, generates random goal verification signal.Those skilled in the art can selection is random to calculate according to being actually needed Method, do not limit herein.
Step S303, pass through user's confirmation signal of the sensor senses user in encrypted card.
Wherein, the sensor in encrypted card includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sound Wave sensor.Those skilled in the art can be combined and select according to being actually needed to sensor, not limit herein.Encryption Sensor in card is independently of mobile terminal, and the operating system of mobile terminal can not call sensor, so as to eradicate sensor The risk called by long-range malice, improve the security of transactional operation.
Step S304, compare sensor user's confirmation signal for detecting to obtain and the goal verification signal generated whether one Cause;If so, then perform step S305;If it is not, then this method terminates.
Wherein, goal verification signal includes target gesture behavior signal, and user's confirmation signal is believed including user gesture behavior Number;And/or goal verification signal includes targeted voice signal, user's confirmation signal includes user voice signal.For example, work as mesh Mark confirmation signal includes target gesture behavior signal, when user's confirmation signal includes user gesture behavior signal, in step S304 Whether the user gesture behavior signal that middle comparison sensor detects to obtain and the target gesture behavior signal generated are consistent;Work as mesh Mark confirmation signal includes targeted voice signal, when user's confirmation signal includes user voice signal, compares pass in step s 304 Whether the user voice signal that sensor detects to obtain and the targeted voice signal generated are consistent;When goal verification signal includes mesh Mark gesture behavior signal and targeted voice signal, user's confirmation signal include user gesture behavior signal and user voice signal When, the user gesture behavior signal that sensor detects to obtain and the target gesture behavior signal generated are compared in step s 304 It is whether consistent, and compare the user voice signal that sensor detects to obtain and whether the targeted voice signal generated be consistent.Should Whether method unanimously determines whether according to user's confirmation signal that sensor detects to obtain and the goal verification signal that is generated Operation or decryption oprerations are encrypted to user profile, so as to prevent the Trojan attack in process of exchange, further improve The security of transactional operation.
Specifically, sensor is detected to obtained user's confirmation signal and goal verification letter in predetermined registration operation time interval Number it is analyzed, calculates the similarity of user's confirmation signal and goal verification signal.If in predetermined registration operation time interval The similarity being inside calculated exceedes default similarity threshold, it is determined that user's confirmation signal is consistent with goal verification signal, says Bright user successfully confirms this time to operate, then performs step S305;If it is calculated in predetermined registration operation time interval Similarity is not less than default similarity threshold, it is determined that user's confirmation signal and goal verification signal are inconsistent, illustrate that operation is super When cause user to confirm this time to operate not successfully, then any operation is not carried out to user profile, this method terminates.
Alternatively, in the case of it is determined that user's confirmation signal and goal verification signal are inconsistent, this method may also include: The step of result returned operation failure.Wherein, those skilled in the art can according to being actually needed to default similarity threshold and Predetermined registration operation time interval is configured, and is not limited herein.
Step S305, user profile is encrypted operation or decryption oprerations.
Believe in the goal verification for comparing to obtain the sensor user's confirmation signal for detecting to obtain and generated through step S304 In the case of number consistent, in step S305, according to user profile operational order, user is believed using the key and algorithm to prestore Operation or decryption oprerations are encrypted in breath.Wherein, user profile operational order can be divided into but be not limited to user profile encrypted instruction Or user profile decryption instructions.Specifically, when user profile operational order is user profile encrypted instruction, in step S305 User profile is encrypted operation using the key and algorithm that prestore;When user profile operational order is that user profile decryption refers to When making, user profile is decrypted operation using the key and algorithm that prestore in step S305.Alternatively, above-mentioned encryption or The result of decryption oprerations, it can be returned by wireless communication module.
The method of work of the encrypted card provided according to the utility model embodiment, can be in encrypted card, mobile terminal and remote The communication port to interconnect is established between the computer information system three of end, encrypted card, mobile terminal and distal end is realized and counts Data communication between calculation machine information system three, it is difficult with adding to efficiently solve some mobile terminals due to various limitations Close the problem of sticking into row data communication;Sensor in encrypted card is independently of mobile terminal so that mobile terminal can not be adjusted directly With the sensor, the risk that sensor is called by long-range malice has been eradicated;The goal verification signal generated is random target Confirmation signal, the risk that goal verification signal is remotely maliciously cracked can be efficiently reduced, in addition, random according to what is generated Goal verification signal and the sensor user's confirmation signal for detecting to obtain whether consistent determine whether to carry out user profile Cryptographic operation or decryption oprerations, so as to effectively prevent the Trojan attack in process of exchange, improve the peace of transactional operation Quan Xing.
Fig. 4 is shown according to the utility model another embodiment for the work of the encrypted card inserted in mobile terminal The schematic flow sheet of method, wherein, encrypted card is inserted into the same SIM card neck of mobile terminal simultaneously with SIM card, passes through shifting The SIM card interface of dynamic terminal provides electric energy for encrypted card.As shown in figure 4, this method comprises the following steps:
Step S400, by the wireless communication module in encrypted card, in encrypted card, mobile terminal and far-end computer information The communication port to interconnect is established between system three.
Specifically, the structure of encrypted card is ferrule structure or membrane structure.When the structure of encrypted card is ferrule structure, The appearance and size of encrypted card and the appearance and size of the SIM card neck of mobile terminal match, and the groove of encrypted card is embedded in shape Size is less than or equal to the SIM card of the geomery of groove, wherein, geomery is less than or equal to the geomery of groove SIM card can be the less SIM card of geomery in the prior art, or clipped SIM card.When the structure of encrypted card For membrane structure when, encrypted card is attached to SIM card and is provided with the surface of hard contact.
Wherein, the power interface of encrypted card is connected with the power interface of the SIM card neck of mobile terminal.Radio communication mold Block includes:Bluetooth communication and/or WIFI communication modules.When wireless communication module includes bluetooth communication, encrypted card In bluetooth communication be connected with the bluetooth module of mobile terminal, so as to establishing indigo plant between encrypted card and mobile terminal Tooth communication port, row data communication can be entered with the bluetooth module in mobile terminal;When wireless communication module communicates including WIFI During module, the WIFI communication modules in encrypted card can both be connected with the WIFI module of mobile terminal, can also be with outside road WIFI connections are established by equipment.Established in encrypted card and external routes equipment after WIFI is connected, can by external routes equipment Communication port is established in realization between encrypted card and far-end computer information system, and far-end computer information system also can be with shifting Dynamic terminal is communicated, mutual so as to establish interconnection between encrypted card, mobile terminal and far-end computer information system three Logical communication port;When wireless communication module both includes bluetooth communication, includes WIFI communication modules again, user can basis It is to enter row data communication by bluetooth approach or WIFI modes to be actually needed selection.
When encrypted card only establishes communication port with mobile terminal, and do not establish and communicate with far-end computer information system During road, this method also can continue to perform.
Step S401, receive user profile operational order.
When wireless communication module establishes communication port between encrypted card and mobile terminal, can be received in step S401 From the user profile operational order of mobile terminal;When wireless communication module is between encrypted card and far-end computer information system When establishing communication port, the user profile operational order from far-end computer information system can be received in step S401;When When wireless communication module establishes communication port between encrypted card, mobile terminal and far-end computer information system three, in step The user profile operational order from mobile terminal or far-end computer information system can be received in rapid S401.Wherein, user Information operational order includes personal recognition code.
Step S402, according to the personal recognition code that prestores, verify that the personal recognition code in user profile operational order is It is no legal;If so, then perform step S403;If it is not, then this method terminates.
This method is verified to the legitimacy of the personal recognition code in user profile operational order, is further increased The security of transactional operation.So that personal recognition code is PIN code as an example, if checking is obtained in user profile operational order PIN code is consistent with the PIN code that prestores, then it is legal PIN code to illustrate the PIN code, then then performs step S403;If checking Obtain PIN code in user profile operational order and the PIN code that prestores is inconsistent, then it is illegal PIN code to illustrate the PIN code, So this method terminates.Alternatively, the illegal situation of personal recognition code in checking obtains user profile operational order Under, it also can return to the result of personal recognition code authentication failed.
Further, when personal recognition code verifies that identification number exceedes default maximum times, the utility model carries The encrypted card of confession locks, it is necessary to can be unlocked by the external authentication instruction of higher authority automatically.
Step S403, according to user profile operational order, generate random goal verification signal.
Specifically, according to user profile operational order, using random algorithm, random goal verification signal is generated.
Step S404, pass through user's confirmation signal of the sensor senses user in encrypted card.
Wherein, the sensor in encrypted card includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sound Wave sensor.Goal verification signal includes target gesture behavior signal, and user's confirmation signal includes user gesture behavior signal; And/or goal verification signal includes targeted voice signal, user's confirmation signal includes user voice signal.
Step S405, pass through established communication port and respectively detect the goal verification signal and sensor that are generated To user's confirmation signal send to mobile terminal.
User's confirmation signal is sent according to the goal verification signal generated for the ease of user, in step S405, led to Established communication port is crossed respectively to send out user's confirmation signal that the goal verification signal and sensor that are generated detect to obtain Deliver to mobile terminal.
Specifically, when goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture row For signal when, gesture is made according to the target gesture behavior signal generated for the ease of user and adjusts gesture, encrypt cartoon Cross established communication port and the target gesture behavior signal and sensor that are generated are detected into obtained user gesture row respectively Sent for signal to mobile terminal, so that mobile terminal shows the target hand corresponding with target gesture behavior signal in screen Gesture and the user gesture corresponding with user gesture behavior signal.By the position relationship of display target gesture and user gesture, The man-machine interface for having provided a user close friend guides gesture operation.
So that mobile terminal is mobile phone as an example, mobile phone is after it have received target gesture behavior signal, in the screen of mobile phone The middle display target gesture corresponding with target gesture behavior signal, the hand-holdable mobile phone of user and according to shown by mobile phone screen Target gesture make specific gesture.When the user gesture behavior signal that sensor detects, encrypted card examines sensor The user gesture behavior signal measured is also sent to mobile phone, and mobile phone is after it have received user gesture behavior signal, in hand The user gesture corresponding with user gesture behavior signal is shown in the screen of machine, what user can be according in mobile phone screen Target gesture and current user gesture are made adjustment to the gesture of oneself in time.
Step S406, comparison sensor detects obtained user's confirmation signal and whether goal verification signal is consistent;If so, Then perform step S407;If it is not, then this method terminates.
Alternatively, sensor is detected to obtained user's confirmation signal and goal verification letter in predetermined registration operation time interval Number it is analyzed, calculates the similarity of user's confirmation signal and goal verification signal.If in predetermined registration operation time interval The similarity being inside calculated exceedes default similarity threshold, it is determined that user's confirmation signal is consistent with goal verification signal, says Bright user successfully confirms this time to operate, then performs step S407;If it is calculated in predetermined registration operation time interval Similarity is not less than default similarity threshold, it is determined that user's confirmation signal and goal verification signal are inconsistent, illustrate that operation is super When cause user to confirm this time to operate not successfully, then any operation is not carried out to user profile, this method terminates.Alternatively, In the case of it is determined that user's confirmation signal and goal verification signal are inconsistent, this method may also include:Return operation failure As a result the step of.Wherein, those skilled in the art can be according to being actually needed to default between similarity threshold and predetermined registration operation time It is configured every value, does not limit herein.
Step S407, user profile is encrypted operation or decryption oprerations.
Believe in the goal verification for comparing to obtain the sensor user's confirmation signal for detecting to obtain and generated through step S406 In the case of number consistent, in step S 407, according to user profile operational order, user is believed using the key and algorithm to prestore Operation or decryption oprerations are encrypted in breath.Specifically, when user profile operational order is user profile encrypted instruction, in step User profile is encrypted operation using the key and algorithm that prestore in S407;When user profile operational order is user profile During decryption instructions, user profile is decrypted operation using the key and algorithm that prestore in step S 407.
Alternatively, when goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture row For signal when, in order to avoid there is the situation for making due to the false triggering of user encrypted card perform operation, sensed in comparison Device detect obtained user gesture behavior signal it is consistent with target gesture behavior signal in the case of, this method may also include:Sentence It is pre- whether the time that the user gesture behavior signal that link sensor detects to obtain is consistent with target gesture behavior signal exceedes If the step of time interval.If it is determined that obtain the time that user gesture behavior signal is consistent with target gesture behavior signal More than prefixed time interval, then operation or decryption oprerations user profile are encrypted;If it is determined that obtain user gesture behavior Signal not less than prefixed time interval, is not then carried out any with the time that target gesture behavior signal is consistent to user profile Operation.
If the wireless communication module in encrypted card is chronically at opening, then power consumption problem is not only existed, and Also there is the risk maliciously connected by other people.In order to solve the above problems, alternatively, this method also includes:Pass through encrypted card In sensor senses user user control signal, the user control signal for detecting to obtain according to sensor, start or close The step of communication function of wireless communication module.Specifically, the user control signal that sensor detects to obtain is compared to control with default Whether signal processed is consistent, if comparing, to obtain user control signal consistent with default control signal, starts or closing radio communication The communication function of module.
Alternatively, when encrypted card completes the operation of user or during user's operation overtime, encrypted card is then closed automatically The communication function of wireless communication module in encrypted card is actively closed without user.
The method of work of the encrypted card provided according to the utility model embodiment, the goal verification signal and biography that will be generated User's confirmation signal that sensor detects to obtain is sent to mobile terminal, is easy to user to be sent according to the goal verification signal generated User's confirmation signal, the man-machine interface for having provided a user close friend guide operation;In addition, when goal verification signal includes target hand Gesture behavior signal, when user's confirmation signal includes user gesture behavior signal, in the user gesture behavior that sensor detects to obtain In the case that the time that signal and target gesture behavior signal are consistent and be consistent exceedes prefixed time interval, just to Operation or decryption oprerations are encrypted in family information, encrypted card is performed operation so as to avoid the occurrence of due to the false triggering of user Situation, the Trojan attack in process of exchange is effectively prevent, improve the security of transactional operation.
Wireless communication module, sensor, the safety chip being previously mentioned in the utility model are by hard-wired, example Such as, bluetooth communication is the chip basic circuit set of integrated Bluetooth function, and safety chip may include operational amplifier, encryption Chip and deciphering chip etc..Although some of which module or integrated chip software, claimed the utility model is collection Into the hardware circuit of function corresponding to software, rather than just software in itself.
So far, although those skilled in the art will appreciate that herein it is detailed have shown and described it is of the present utility model more Individual exemplary embodiment, still, in the case where not departing from the spirit and scope of the utility model, it can still be disclosed according to utility model Content directly determine or derive many other variations or modifications for meeting the utility model principle.Therefore, the utility model Scope it should be understood that and regard as covering other all these variations or modifications.
It should be noted that although some modules of encrypted card are described in detail in superincumbent explanation, but this stroke Divide what is be merely exemplary, be not enforceable.It will be understood to those skilled in the art that indeed, it is possible to embodiment In module adaptively changed, also can be by a module by multiple block combiners in embodiment into a module It is divided into multiple modules.
In addition, although in the accompanying drawings with particular order describe the utility model implement operation, still, this do not require that or Person, which implies, to perform these operations according to the particular order, or the operation having to carry out shown in whole could realize expectation Result.Some steps can be omitted, multiple steps are merged into a step is performed, or a step is divided into multiple steps It is rapid to perform.
In summary, using technical scheme provided by the utility model, encryption card issuing is without with SIM card operator etc. Third party cooperates hair fastener, is easy to user to obtain;The structure of encrypted card is ferrule structure or membrane structure, encrypted card with SIM card can be inserted into the same SIM card neck of mobile terminal simultaneously, user can be facilitated to carry and use, in addition, encrypted card Determine to be according to whether the random goal verification signal generated and the sensor user's confirmation signal for detecting to obtain are consistent It is no user profile to be encrypted operation or decryption oprerations, so as to effectively prevent the Trojan attack in process of exchange, carry The high security of transactional operation.
The utility model is described in detail above, and gives corresponding embodiment.Certainly, except above-mentioned implementation Exception, the utility model can also have an other embodiment, all technical schemes formed using equivalent substitution or equivalent transformation, Fall within the utility model scope of the claimed.

Claims (10)

  1. A kind of 1. encrypted card for inserting in mobile terminal, it is characterised in that the structure of the encrypted card be ferrule structure or Person's membrane structure, the encrypted card are inserted into the same SIM card neck of the mobile terminal simultaneously with SIM card;
    Wherein, the encrypted card includes:Wireless communication module, sensor, safety chip and power interface;
    The wireless communication module, for establishing communication port between the encrypted card and the mobile terminal, with the shifting Dynamic terminal enters row data communication;
    The sensor, for detecting user's confirmation signal of user;
    The safety chip is connected with the wireless communication module and the sensor respectively, for being examined according to the sensor The user's confirmation signal measured, user profile is encrypted operation or decryption oprerations;
    The power interface of the encrypted card is connected with the power interface of the SIM card neck of the mobile terminal, for passing through The power interface for stating the SIM card neck of mobile terminal provides electric energy for the encrypted card.
  2. 2. the encrypted card according to claim 1 for inserting in mobile terminal, it is characterised in that the safety chip is also For:The user profile operational order from the mobile terminal is received from the wireless communication module, generates random target Confirmation signal, and compare user's confirmation signal that the sensor detects to obtain and the goal verification signal generated whether one Cause, if comparing, to obtain user's confirmation signal consistent with the goal verification signal, user profile is encrypted operation Or decryption oprerations.
  3. 3. the encrypted card according to claim 1 for inserting in mobile terminal, it is characterised in that when the encrypted card When structure is ferrule structure, the appearance and size of the encrypted card and the appearance and size phase of the SIM card neck of the mobile terminal Match somebody with somebody, the groove of the encrypted card is embedded in SIM card of the geomery less than or equal to the geomery of the groove;Add when described When the structure of close card is membrane structure, the encrypted card is attached to SIM card and is provided with the surface of hard contact.
  4. 4. the encrypted card according to claim 1 for inserting in mobile terminal, it is characterised in that the sensor is also used In:Detect the user control signal of user;
    The safety chip is additionally operable to:The user control signal for detecting to obtain according to the sensor, start or close the nothing The communication function of line communication module.
  5. 5. the encrypted card according to claim 2 for inserting in mobile terminal, it is characterised in that the user profile behaviour Instructing includes personal recognition code;
    The safety chip is additionally operable to:According to the personal recognition code that prestores, the individual in the user profile operational order is verified The legitimacy of recognition code.
  6. 6. the encrypted card according to claim 2 for inserting in mobile terminal, it is characterised in that the goal verification letter Number include target gesture behavior signal, user's confirmation signal includes user gesture behavior signal;And/or the target is true Recognizing signal includes targeted voice signal, and user's confirmation signal includes user voice signal.
  7. 7. the encrypted card according to claim 6 for inserting in mobile terminal, it is characterised in that the safety chip is also For:When the goal verification signal includes target gesture behavior signal, user's confirmation signal includes user gesture behavior During signal, judge that the user gesture behavior signal that the sensor detects to obtain is consistent with the target gesture behavior signal Time whether exceed prefixed time interval, if judging, obtaining the user gesture behavior signal and the target gesture behavior believes Number time being consistent exceedes prefixed time interval, then operation or decryption oprerations user profile are encrypted.
  8. 8. according to claim any one of 1-7 for the encrypted card that inserts in mobile terminal, it is characterised in that the peace Full chip is additionally operable to:Pass through established communication port respectively to detect the goal verification signal generated and the sensor To user's confirmation signal send to the mobile terminal.
  9. 9. according to claim any one of 1-7 for the encrypted card that inserts in mobile terminal, it is characterised in that the biography Sensor includes:Acceleration transducer, geomagnetic sensor, gyro sensor and/or sonic sensor.
  10. 10. according to claim any one of 1-7 for the encrypted card that inserts in mobile terminal, it is characterised in that it is described Wireless communication module includes:Bluetooth communication and/or WIFI communication modules.
CN201720398370.4U 2017-04-14 2017-04-14 For inserting the encrypted card in mobile terminal Expired - Fee Related CN206863807U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201720398370.4U CN206863807U (en) 2017-04-14 2017-04-14 For inserting the encrypted card in mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201720398370.4U CN206863807U (en) 2017-04-14 2017-04-14 For inserting the encrypted card in mobile terminal

Publications (1)

Publication Number Publication Date
CN206863807U true CN206863807U (en) 2018-01-09

Family

ID=60816790

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201720398370.4U Expired - Fee Related CN206863807U (en) 2017-04-14 2017-04-14 For inserting the encrypted card in mobile terminal

Country Status (1)

Country Link
CN (1) CN206863807U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110312236A (en) * 2019-07-02 2019-10-08 桂林微网互联信息技术有限公司 A kind of communication channel construction method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110312236A (en) * 2019-07-02 2019-10-08 桂林微网互联信息技术有限公司 A kind of communication channel construction method

Similar Documents

Publication Publication Date Title
CN110555706B (en) Face payment security method and platform based on security unit and trusted execution environment
CN105321240B (en) The control method and device and Intelligent door control system of intelligent door lock
CN107038571A (en) For inserting the encrypted card in mobile terminal
CN109816832A (en) A kind of method for unlocking and device
CN105978907A (en) Decrypting method, device and system
CN107395610A (en) One kind communication authentication method, first terminal and second terminal
CN107016541B (en) Encrypted card
JPH11252069A (en) Mutual authentication device between information devices
US11074489B1 (en) Dual communication channel smart card
US9294921B2 (en) Device for mobile communication
CN206863807U (en) For inserting the encrypted card in mobile terminal
CN107026735A (en) Method and managed devices that a kind of password is automatically entered
US11449860B2 (en) Specialized keypad for pre-staging complex transactions
CN206788918U (en) Encrypted card
CN112633864A (en) Payment system and method based on TEE and Bluetooth type digital currency hardware wallet
CN107038572B (en) Encrypted card and its working method
CN101980309A (en) Near field communication (NFC) mobile terminal and NFC safety payment realizing method
CN103606081A (en) Transaction protection method, transaction accepting device and transaction submitting device
CN105471580B (en) Signature rechecking method and device
KR100720316B1 (en) wireless telecommunication device with output control function
CN107026817B (en) System for automatically inputting password
CN104794430B (en) A kind of method and system of fingerprint decryption
CN206863808U (en) Encrypted card
WO2001044899A1 (en) Cryptographic token and security system
US11164169B2 (en) Card pre-staging automated teller machine (“ATM”) technology

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180109

Termination date: 20210414