TW201504964A - Secure mobile device shopping system and method - Google Patents

Secure mobile device shopping system and method Download PDF

Info

Publication number
TW201504964A
TW201504964A TW102126228A TW102126228A TW201504964A TW 201504964 A TW201504964 A TW 201504964A TW 102126228 A TW102126228 A TW 102126228A TW 102126228 A TW102126228 A TW 102126228A TW 201504964 A TW201504964 A TW 201504964A
Authority
TW
Taiwan
Prior art keywords
consumer
packet
message
csk
shopping
Prior art date
Application number
TW102126228A
Other languages
Chinese (zh)
Inventor
Yi-Li Huang
Fang-Yi Lv
Zheng-Zhong Zhu
Zhu-Xing Lin
zheng-ji Lin
Original Assignee
Yi-Li Huang
Fang-Yi Lv
Zheng-Zhong Zhu
Zhu-Xing Lin
zheng-ji Lin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yi-Li Huang, Fang-Yi Lv, Zheng-Zhong Zhu, Zhu-Xing Lin, zheng-ji Lin filed Critical Yi-Li Huang
Priority to TW102126228A priority Critical patent/TW201504964A/en
Publication of TW201504964A publication Critical patent/TW201504964A/en

Links

Abstract

The present invention provides a secure mobile device shopping system and a method providing a two-way authentication security mechanism that effectively integrates data connection core (DCC), Diffie-Hellman PKDS, RSA, and dynamic authentication code based upon different corresponding relationships between a consumer and a vendor and between a consumer and a bank. When a consumer performs a wireless shopping, relevant information about the personal consumption can be completely and fully secured and protected. Since credit card frauds can be effectively prevented to effectively enhance shopping security so that the secure mobile device shopping can be accomplished.

Description

安全的行動裝置購物系統及方法 Secure mobile device shopping system and method

本發明係屬一種線上購物的技術領域,尤指其技術上提供一種安全的行動裝置購物系統及方法,使得個人的消費相關資料可以得到安全保護,而盜刷問題可被有效防範,購物安全得以有效提升。 The invention belongs to the technical field of online shopping, in particular to technically providing a safe mobile device shopping system and method, so that personal consumption related materials can be safely protected, and the stolen brush problem can be effectively prevented, and shopping security can be ensured. Effectively improved.

在目前存在於線上購物系統的兩大系統,即,安全套接層(Secure Sockets Layer,SSL)與安全電子交易(Secure Electronic Transactions,SET),它們兩個皆有下列二項安全上缺點,(1)消費者無法確認電子商務網站是正派、穩當地經營,店家也無法知道消費者的真實身分,也無法防範盜刷的問題。(2)購物網站仍可取得消費者的信用卡資料,若保管不當,亦可能讓資料外洩而被盜刷。 In the two systems currently in the online shopping system, namely, Secure Sockets Layer (SSL) and Secure Electronic Transactions (SET), both of them have the following two security shortcomings (1) Consumers can't confirm that e-commerce websites are decent and stable, and store owners can't know the true identity of consumers, and they can't prevent the problem of stealing. (2) The credit card information of the consumer can still be obtained from the shopping website. If it is not properly stored, it may also be leaked and stolen.

除了前述缺點外,SSL與SET還有下列特性,(1)它們都是有線購物,便利性較差。(2)消費者透過廠商向銀行請款,潛藏風險較大。(3)以固定密碼進行身分認證,則使用越多次的網路購物,其安全性會越低。 In addition to the aforementioned shortcomings, SSL and SET have the following characteristics, (1) they are all wired shopping, and the convenience is poor. (2) Consumers are asking for loans from banks, and the risks are high. (3) If the identity is authenticated with a fixed password, the more Internet shopping is used, the lower the security will be.

其中最重要的是SSL與SET都是有線購物,便利性較差,而最方便的無線購物系統,在目前使用的無線通訊系統中,如3G,4G-LTE等,因無法提供足夠的安全機制來保護於無線傳輸中的敏感付款資料,使得無線購物系統遲至今日尚未普遍使用。 The most important of these is that SSL and SET are both wired shopping, and the convenience is poor. The most convenient wireless shopping system, in the current wireless communication systems, such as 3G, 4G-LTE, etc., cannot provide sufficient security mechanism. Protecting sensitive payment data in wireless transmissions has made wireless shopping systems less common today.

由於消費者的銀行付款資料是極其敏感而重要的,若是消費者的銀行付款資料因保護不足而被駭客破解,則駭客將可取代消費者進行購物消費;即,駭客購物而被破 密的消費者付款,這樣造成的消費糾紛將使整個無線購物系統崩解,尤其是無線購物的基本特性為無線通訊訊息封包,很容易被駭客竊取,駭客可以容易地蒐集消費者的購物通訊資料,進而分析、破密。 Since the consumer's bank payment information is extremely sensitive and important, if the consumer's bank payment data is cracked by the hacker because of insufficient protection, the hacker will be able to replace the consumer for shopping; that is, the hacker is broken by shopping. Close consumer payment, the resulting consumer dispute will make the entire wireless shopping system disintegrate, especially the basic feature of wireless shopping is wireless communication message packet, it is easy to be stolen by hackers, hackers can easily collect consumer shopping Communication materials, and then analysis and breaking.

在無線通訊的環境下,是無法防止駭客蒐集通訊封包資料,是而要使無線通訊系統安全度提高,無線通訊封包資料需受到足夠的安全保護,目前一般的加密保護措施是不夠的。在無線通訊環境下,要達到能充分保護無線通訊封包的安全,其根本的作法就是要做到“無線通訊資料蒐集、分析無效化”,只要無線通訊系統對於其無線通訊封包資料的加密保護機制能做到“無線通訊資料蒐集、分析無效化”,則駭客就是蒐集再多的資料,也將是徒勞無功的。然而,現行的無線通訊系統,如3G,4G-LTE等,其安全機制均無法達到前述要求,而本發明正是針對前述無線通訊的基本特性與其高安全度的需求所發展出來的無線購物系統。 In the environment of wireless communication, it is impossible to prevent hackers from collecting communication packet data. Therefore, to improve the security of the wireless communication system, the wireless communication packet data needs to be adequately protected. The current general encryption protection measures are not enough. In the wireless communication environment, in order to fully protect the security of wireless communication packets, the fundamental method is to do "wireless communication data collection, analysis invalidation", as long as the wireless communication system encrypts the protection mechanism of its wireless communication packets. Can do "wireless communication data collection, analysis invalidation", then the hacker is to collect more information, it will be futile. However, the current wireless communication systems, such as 3G, 4G-LTE, etc., cannot achieve the above requirements, and the present invention is a wireless shopping system developed for the basic characteristics of the aforementioned wireless communication and its high security requirements. .

本發明根據消費者與廠商、消費者與銀行間不同的相對應關係特性,提出了一套有效整合資料鏈結核心、Diffie-Hellman PKDS、RSA與動態認證碼之雙向認證安全機制。本發明主要之機制、功能分述如下: The invention proposes a two-way authentication security mechanism for effectively integrating the data link core, Diffie-Hellman PKDS, RSA and dynamic authentication code according to the different corresponding relationship characteristics between consumers and manufacturers, consumers and banks. The main mechanisms and functions of the present invention are as follows:

1.本發明之系統架構圖如第1圖所示,其中包含發卡銀行、廠商與行動裝置等三個單位,在系統架構圖中界定了各單位之間的交易功能。 1. The system architecture diagram of the present invention, as shown in FIG. 1, includes three units, such as a card issuing bank, a manufacturer, and a mobile device, and defines a transaction function between units in a system architecture diagram.

2.本發明之購物系統交易流程如第2圖所示,其中包含三個階段,第一階段:包含步驟1.1~1.4,為購物訂單確認階段;第二階段:包含步驟2.1~2.3,為無線購物付款申請/回覆與銀行付款訊息階段;第三階段:即步驟3.1,為傳送電子發票階段。 2. The shopping system transaction process of the present invention is as shown in Fig. 2, which includes three stages, the first stage: including steps 1.1 to 1.4, which is the shopping order confirmation stage; and the second stage: including steps 2.1 to 2.3, which is wireless Shopping Payment Request/Reply and Bank Payment Message Phase; Stage 3: Step 3.1, for the electronic invoice phase.

3.由於一個消費者將有許多個交易的廠商,而一個廠商亦有許多個消費者,故消費者與廠商之間是屬於開放式的關係,是而本發明以Diffie-Hellman PKDS建構消費者與交易廠商間 之安全機制。 3. Since a consumer will have many trading vendors, and one vendor has many consumers, the consumer and the manufacturer are open-ended, and the invention constructs the consumer with Diffie-Hellman PKDS. Between trading vendors Security mechanism.

4.為有效提升消費者之銀行付款資料的安全度,本發明建置一資料鏈結核心,其中包含了消費者的信用卡卡號,由此將消費者與發卡銀行連結,使得消費者與發卡銀行為一對一的關係,亦即,消費者與發卡銀行之間是屬於封閉式的關係,而本發明是以RSA建構消費者與發卡銀行間之安全機制。 4. In order to effectively improve the security of the bank payment data of the consumer, the present invention constructs a data link core, which includes the credit card number of the consumer, thereby connecting the consumer with the card issuing bank, so that the consumer and the issuing bank The one-to-one relationship, that is, the relationship between the consumer and the issuing bank is a closed relationship, and the present invention is to establish a security mechanism between the consumer and the issuing bank by using RSA.

5.資料鏈結核心在消費者端的結構內容為(UserID,e,d,N,PW,KPW,AK),而在銀行端的結構內容為(UserID,e,d,N,Card No,KPW,AK),透過此資料鏈結核心連結消費者與發卡銀行,使得消費者在無線購物申請付款過程的通訊封包受到完整而充份的安全保護。 5. The structure of the data link core on the consumer side is (UserID, e, d, N, PW, K PW , AK), while the structure content on the bank side is (UserID, e, d, N, Card No, K) PW , AK), through this data link core link consumers and card-issuing banks, so that consumers in the wireless shopping application payment process communication packets are fully and fully secure.

6.資料鏈結核心中之消費者密碼金鑰KPW是由消費者的密碼(PW)經由一定的演算法則產生的,消費者須經由特定的程序步驟,才可以更改密碼(PW),而消費者密碼金鑰KPW亦隨之更新,如此更新PW與KPW可有效加強系統安全度。 6. The consumer cryptographic key K PW in the core of the data link is generated by the consumer's password (PW) via a certain algorithm. The consumer must change the password (PW) through a specific program step. The password key K PW is also updated, so updating the PW and K PW can effectively enhance the system security.

7.開啟行動裝置上的購物APP時,會要求使用者輸入帳號與密碼(PW),系統程式會依既定的演算法計算產生密碼金鑰KPW,c,比對KPW,c與KPW(存於系統內部之消費者密碼金鑰)是否相等;若不相等,系統程式會要求使用者再次輸入帳號與密碼後,再比對KPW,c與KPW,若還是不相等,則系統會直接關閉購物APP,使用者需重新啟動購物APP方可再輸入帳號與密碼,如此可有效防禦猜密碼程式的攻擊,而提高系統安全度。 7. When opening the shopping app on the mobile device, the user will be required to enter the account number and password (PW). The system program will generate the cryptographic key K PW,c according to the established algorithm , and compare K PW, c and K PW. (The consumer password key stored in the system) is equal; if they are not equal, the system program will ask the user to enter the account and password again, and then compare K PW, c and K PW , if they are still not equal, then the system The shopping app will be closed directly, and the user needs to restart the shopping app before entering the account and password, which can effectively prevent the attack of the guessing password program and improve the system security.

8.為使消費者之付款資料能達到“無線通訊資料蒐集、分析無效化”,本發明透過消費者於交易過程中產生之隨機動態金鑰Xa2,Xa3與DCC內之消費者認證金鑰AK經由區塊加密機制,如DES,AES等,結合運算而產生“付款動態認證碼(En2(Xa2,Xa3 ♁ AK))”,此付款動態認證碼可用來取代使用信用卡時需要的持卡人簽名,如此,可使信用卡的使用更安全(不怕被盜刷)且更方便。 8. In order to enable the consumer's payment information to achieve "wireless communication data collection, analysis invalidation", the present invention generates a random dynamic key Xa2, Xa3 and a consumer authentication key AK in the DCC generated by the consumer in the transaction process. Through the block encryption mechanism, such as DES, AES, etc., combined with the operation to generate " payment dynamic authentication code ( En2 (Xa2, Xa3 ♁ AK))", this payment dynamic authentication code can be used to replace the cardholder signature required when using a credit card In this way, the use of the credit card can be made safer (not afraid of being stolen) and more convenient.

9.在本發明系統之實施例過程中,除步驟1外,其餘所有步驟的通訊訊息資料都被完整而安全地加密保護,而每一通訊封包中皆有HMAC()來保護此通訊訊息封包的完整性,並以通訊雙方產生之動態鏈結金鑰,如CSK,Xa1,Xa2,Xa3,Xb1等金鑰,運算而產生的動態金鑰Kd作為HMAC(Kd)之密鑰,如此透過通訊雙方產生之動態鏈結金鑰與HMAC(Kd)之連結,而達到通訊雙方的私密性、完整性、不可否認性及相互認證等功能。 9. In the embodiment of the system of the present invention, except for step 1, all the communication information of all steps are completely and securely encrypted, and each communication packet has HMAC() to protect the communication message packet. Integrity, and the dynamic link key generated by the communication parties, such as CSK, Xa1, Xa2, Xa3, Xb1 and other keys, the dynamic key Kd generated as the key of HMAC (Kd), so through the communication The dynamic link key generated by the two parties is linked with HMAC (Kd) to achieve the functions of privacy, integrity, non-repudiation and mutual authentication of the two parties.

10.本購物系統將OP_code與status搭配使用,可以提升通訊封包處理效能,並可以有效地防禦重送攻擊。 10. This shopping system uses OP_code with status to improve the performance of communication packets and effectively defend against resend attacks.

11.本系統的付款機制是由消費者傳送加密後的“付款動態認證碼(En2(Xa2,Xa3 ♁ AK))”給發卡銀行,再由發卡銀行經由解密取得“付款動態認證碼”,接著對取得的“付款動態認證碼”進行認證,而認證成功與否的關鍵在於消費者是否擁有正確的消費者RSA加/解密金鑰(e,d,N)、密碼金鑰(KPW)與認證金鑰AK,擁有這些金鑰才能正確地加/解密動態金鑰Xa1,Xa2,Xa3與付款動態認證碼(En2(Xa2,Xa3 ♁ AK)),當認證成功時發卡銀行才付款給廠商。如此機制下,廠商不用擔心有盜刷信用卡的問題,而消費者也不用擔心信用卡卡號資料外洩的問題,消費者與廠商的安全皆獲得提升。 11. The payment mechanism of the system is that the consumer transmits the encrypted “Decure Dynamic Authentication Code ( En2 (Xa2 ♁ AK))” to the issuing bank, and then the issuing bank obtains the “payment dynamic authentication code” via decryption, and then The obtained "payment dynamic authentication code" is authenticated, and the key to the success of the authentication is whether the consumer has the correct consumer RSA encryption/decryption key (e, d, N), password key (K PW ) and The authentication key AK has these keys to correctly add/decrypt the dynamic keys Xa1, Xa2, Xa3 and the payment dynamic authentication code ( En2 (Xa2, Xa3 ♁ AK)), and the card issuing bank pays the vendor when the authentication is successful. Under such a mechanism, manufacturers do not have to worry about the problem of stealing credit cards, and consumers do not have to worry about the leakage of credit card number data, and the safety of consumers and manufacturers has been improved.

12.本系統的參數定義如下:(1)UserID:使用者代號。(2)e,d,N:使用者個別之RSA加/解密金鑰。(3)Card No:信用卡卡號。(4)AK:消費者認證金鑰。(5)PW:密碼(Pass Word),KPW:密碼之金鑰(Key of password)。(6)資料鏈結核心:行動裝置端:(UserID,e,d,N,PW,KPW,AK);發卡銀行端:(UserID,e,d,N,Card No,KPW,AK)。(7)Xa,Xa1,Xa2,Xa3:消費者密鑰(private keys)。(8)PXa:消費者公鑰(Public key)。(9)Xb,Xb1:廠商密鑰(private keys)。(10)PXb:廠商公鑰(Public key)。(11)CSK:共同密鑰(Commom secret key)。(12)消費者訂單編號。(13)付款動態認證碼:En2(Xa2,Xa3 ♁ AK)。 12. The parameters of this system are defined as follows: (1) UserID: User code. (2) e, d, N: User's individual RSA encryption/decryption key. (3) Card No: Credit card number. (4) AK: Consumer authentication key. (5) PW: Password (Pass Word), K PW : Key of password. (6) Data link core: mobile device end: (UserID, e, d, N, PW, K PW , AK); issuing bank end: (UserID, e, d, N, Card No, K PW , AK) . (7) Xa, Xa1, Xa2, Xa3: private keys. (8) P Xa : Consumer Public Key (Public Key). (9) Xb, Xb1: vendor keys (private keys). (10) P Xb : The manufacturer's public key (Public key). (11) CSK: Common key (Commom secret key). (12) Consumer order number. (13) Payment dynamic authentication code: En2 (Xa2, Xa3 ♁ AK).

13.本系統包括下列的運算與函數: 13. The system includes the following operations and functions:

(1)二進制加法+2:『加密:c=p+2 K,p和K進行二進制加法,其中忽略了最高位元產生的進位』;『解密:,其中-2為二進制減法,為K的補數。』。 (1) Binary addition + 2 : "Encryption: c = p + 2 K , p and K for binary addition, which ignores the carry generated by the highest bit";"Decrypt: , where - 2 is a binary subtraction, The complement of K. 』.

(2)Ek(str)=k ♁ s1//k ♁ s2//k ♁ s3//…//k ♁ sn,其中str=s1//s2//s3//...//sn,//為串接符號。 (2) E k (str)=k ♁ s1//k ♁ s2//k ♁ s3//...//k ♁ sn, where str=s1//s2//s3//...//sn, // is a concatenated symbol.

(3)En1(a,b,c)=(a ♁ b)+2 c,其中a為欲被保護加密的參數金鑰,b與c為通訊雙方之鏈結金鑰。 (3) En1(a,b,c)=(a ♁ b)+ 2 c, where a is the parameter key to be protected and encrypted, and b and c are the link keys of the communication parties.

(4)En2(X,Y ♁ AK):X為一將被加密的明文資料,Y為一隨機參數,AK為消費者認證金鑰,每次加密前,Y會先和AK進行♁運算,產生一把臨時的動態金鑰KY,再用此動態金鑰為區塊加密機制如AES之Parent key,透過AES加密X而產生En2(X,YAK)。 (4) En2(X,Y ♁ AK): X is a plaintext data to be encrypted, Y is a random parameter, and AK is a consumer authentication key. Before each encryption, Y will perform a chirp operation with AK first. generating a temporary dynamic key K ♁ Y, then this dynamic key encryption such as AES is a block of Parent key, AES encryption through X produced En2 (X, Y ♁ AK) .

實例1:本系統的付款動態認證碼(En2(Xa2,Xa3AK)),是消費者於交易過程中產生之隨機動態金鑰Xa2,Xa3與DCC內之消費者認證金鑰AK經由區塊加密機制,如DES,AES等,結合運算而產生,其運作如第3圖所示。 Example 1: The payment dynamic authentication code ( En2 ( Xa2, Xa3AK )) of the system is a random dynamic key Xa2 generated by the consumer during the transaction process , and the consumer authentication key AK in Xa3 and DCC is via the block. Encryption mechanisms, such as DES, AES, etc., are combined with operations, as shown in Figure 3.

(5)OP_Code:本系統中每一個無線訊息皆有一個運作碼(operation code)來表明此訊息的功能為何,其可縮短訊息認證的時間,而OP-code其功能描述如表1所示。 (5) OP_Code: Each wireless message in the system has an operation code to indicate the function of the message, which can shorten the time of message authentication, and the function description of OP-code is shown in Table 1.

(6)status:本購物系統中每一個子系統,如消費者端、廠商端與銀行端等子系統皆會有其自己內部狀態參數(status),此狀態參數用來指出子系統下一次要執行的功能,其與OP_Code配合使用,可提升系統認證效能與有效抵禦重送攻擊,而status其功能描述如表1所示。 (6) status: Each subsystem in the shopping system, such as the consumer side, the manufacturer side and the bank side, has its own internal state parameter (status), which is used to indicate the next time the subsystem wants The executed function, which is used in conjunction with OP_Code, improves system authentication performance and effectively resists resend attacks, and its function description is shown in Table 1.

(7)HMAC(k):一個基於雜湊運算的信息認證碼,它是由一個雜湊函數作用於一個傳輸的信息與一把秘密金鑰K而產生的,用以確保這個信息的正確性、完整性與不可否認性。 (7) HMAC(k): A message authentication code based on hash operation, which is generated by a hash function acting on a transmitted message and a secret key K to ensure the correctness and completeness of this information. Sex and non-repudiation.

實例2:假若“OP-code|Tnonce |UserID|a1|a2|a3|a4| HMAC((b1 ♁ b2)+2b3)”是由使用者傳送給驗證者的信息封包,其中信息認證碼HMAC((b1 ♁ b2)+2b3)由一個雜湊函數作用於明文信息“OP-code|Tnonce|UserID|a1|a2|a3|a4|”與一把動態秘密金鑰(b1 ♁ b2)+2b3而產生的。 Example 2: If "OP-code|T nonce |UserID|a 1 |a 2 |a 3 |a 4 | HMAC((b1 ♁ b2)+ 2 b 3 )" is the information packet transmitted by the user to the verifier , wherein the information authentication code HMAC((b 1 ♁ b 2 )+ 2 b 3 ) is applied to the plaintext information by a hash function "OP-code|T nonce |UserID|a 1 |a 2 |a 3 |a 4 |" Produced with a dynamic secret key (b 1 ♁ b 2 ) + 2 b 3 .

第1圖係本發明之系統架構圖。 Figure 1 is a system architecture diagram of the present invention.

第2圖係本發明之購物系統交易流程圖。 Figure 2 is a flow chart of the shopping system transaction of the present invention.

第3圖係本發明之付款動態認證碼En2(Xa2,Xa3 ♁ AK)運作示意圖。 Figure 3 is a schematic diagram of the operation of the payment dynamic authentication code En2 (Xa2, Xa3 ♁ AK) of the present invention.

為充分瞭解本發明之目的、特徵及功效,茲藉由 下述具體之實施例,並配合所附之圖式,對本發明做一詳細說明,說明如後: In order to fully understand the purpose, features and effects of the present invention, The following specific embodiments, together with the accompanying drawings, illustrate the present invention in detail, as illustrated below:

第1圖為本發明具體實施例之系統架構圖,其中包含發卡銀行、廠商與行動裝置等三個單位,各單位之間的交易功能如下:(1)消費者(行動裝置)與廠商間之交易功能為“購物訂單確認與傳送電子發票”。(2)銀行與消費者(行動裝置)間之交易功能為“無線購物付款申請/回覆”。(3)銀行與廠商間之交易功能為“銀行付款訊息”。 1 is a system architecture diagram of a specific embodiment of the present invention, which includes three units, such as a card issuing bank, a manufacturer, and a mobile device. The transaction functions between the units are as follows: (1) between the consumer (mobile device) and the manufacturer. The trading function is "Shopping Order Confirmation and Delivery of Electronic Invoice". (2) The transaction function between the bank and the consumer (mobile device) is “Wireless Shopping Payment Request/Reply”. (3) The transaction function between the bank and the manufacturer is “bank payment message”.

為使本發明系統更具有實際建置的彈性,本系統的發卡銀行可由聯合發卡中心,如VISA、Master Card等,取代;又,為增加安全度與實用性,發卡銀行可與通訊公司,如中華電信、台灣大哥大、遠傳電信等合作,將消費者的資料鏈結核心寫入消費者手機或平板電腦的SIM卡中。 In order to make the system of the present invention more flexible in actual construction, the issuing bank of the system can be replaced by a joint issuing card center, such as VISA, Master Card, etc.; in order to increase the security and practicability, the issuing bank can cooperate with the communication company, such as Chunghwa Telecom, Taiwan's Big Brother, and FarEasTone Telecom cooperated to write the consumer's data link core into the SIM card of the consumer's mobile phone or tablet.

本發明提供一種安全的行動裝置購物系統,係包含:一資料鏈結核心,其係建置於消費者與發卡銀行間;一消費者密碼金鑰,其由消費者的密碼經由演算法則產生;一付款動態認證碼,其可取代使用信用卡時所需的持卡人簽名,可使信用卡的使用更安全更方便;一行動裝置購物APP,其係建置於消費者、發卡銀行與廠商間;及一無線訊息運作碼(OP-code)及狀態參數(status)對照表(如表1所示)。 The invention provides a secure mobile device shopping system, which comprises: a data link core, which is built between a consumer and a card issuing bank; and a consumer cryptographic key, which is generated by a consumer's password via an algorithm; A payment dynamic authentication code, which can replace the cardholder signature required when using a credit card, can make the use of the credit card safer and more convenient; a mobile device shopping app is built between the consumer, the issuing bank and the manufacturer; And a wireless message operation code (OP-code) and status parameter (status) comparison table (as shown in Table 1).

第2圖為本發明具體實施例之購物系統交易流程圖,其中包含三個階段,第一階段:包含步驟1.1~1.4,為購物訂單確認階段,其中,1.1為行動裝置購物要求、1.2為行動裝置購物回覆、1.3為購物訂單、1.4為行動裝置購物訂單訊息確認;第二階段:包含步驟2.1~2.3,為無線購物付款申請/回覆與銀行付款訊息階段,其中,2.1為無線購物付款申請、2.2為無線購物付款申請回覆、2.3為無線購物付款訊息;第三階段:即步驟3.1,為傳送電子發票階段。 2 is a flow chart of a shopping system transaction according to a specific embodiment of the present invention, which includes three stages. The first stage includes steps 1.1 to 1.4 for the shopping order confirmation phase, wherein 1.1 is a mobile device shopping request, and 1.2 is an action. Device shopping reply, 1.3 is the shopping order, 1.4 is the mobile device shopping order message confirmation; the second stage includes steps 2.1~2.3, for the wireless shopping payment application/reply and bank payment message phase, wherein 2.1 is the wireless shopping payment application, 2.2 for wireless shopping payment application reply, 2.3 for wireless shopping payment message; the third stage: step 3.1, for the transmission of electronic invoice phase.

本發明具體實施例之行動裝置無線購物過程詳述如下: The wireless shopping process of the mobile device of the specific embodiment of the present invention is as follows:

第一階段:(購物訂單確認階段) Phase 1: (Purchase Order Confirmation Phase)

步驟1.1: Step 1.1:

(1)消費者登入廠商網頁後,便可觀看廠商所販賣的商品資料,當將所有選購中意的商品放入購物車後,可藉由網頁互動開啟行動裝置上的購物APP。開啟行動裝置上的購物APP時,會要求使用者輸入帳號與密碼(PW),系統程式會依既定的演算法計算產生密碼金鑰KPW,c,並比對KPW,c與KPW(存於系統內部之消費者密碼金鑰)是否相等;若不相等,系統程式會要求使用者再次輸入帳號與密碼,再比對KPW,c與KPW,若還是不相等,則系統會直接關閉購物APP,使用者需重新啟動購物APP方可再輸入帳號與密碼。 (1) After the consumer logs in to the manufacturer's webpage, he can view the merchandise information sold by the manufacturer. When all the favorite merchandise products are put into the shopping cart, the shopping app on the mobile device can be opened by webpage interaction. When the shopping app on the mobile device is turned on, the user is required to input an account number and password (PW), and the system program calculates the generated key K PW,c according to the established algorithm, and compares K PW,c and K PW ( Whether the consumer password key stored in the system is equal; if they are not equal, the system program will ask the user to enter the account and password again, and then compare K PW, c and K PW . If they are still not equal, the system will directly Close the shopping app, the user needs to restart the shopping app to enter the account and password.

(2)將購買要求訊息傳給廠商,裡面包含的資料有:消費者稱謂、公鑰PXa、購買清單。消費者透過購物APP程式傳送message 1給廠商,其內容如下:Message 1:消費者→廠商(行動裝置購物要求)OP-code|消費者稱謂| PXa |購買清單此時,OP-code=1。 (2) The purchase request message is transmitted to the manufacturer, and the information contained therein includes: the consumer title, the public key P Xa , and the purchase list. The consumer sends the message 1 to the manufacturer through the shopping APP program, and its contents are as follows: Message 1: Consumer → Vendor (Mobile Device Shopping Request) OP-code|Consumer Title | P Xa | Purchase List At this time, OP-code=1 .

(3)設定消費者之status=2。 (3) Set the consumer's status=2.

步驟1.2: Step 1.2:

(1)廠商收到消費者的購物要求後(OP-code=1),便可以將自己的私鑰Xb與消費者傳的公鑰PXa計算出共同密鑰CSK,i.e.,(1) After receiving the consumer's shopping request (OP-code=1), the manufacturer can calculate the common key CSK, ie, the private key Xb and the public key P Xa transmitted by the consumer. .

(2)廠商傳送message 2給消費者,其內容如下:Message 2:廠商→消費者(行動裝置購物回覆)OP-code|消費者訂單編號|日期| PXb | ECSK(Xb1)| (預購物品之相關資料)| HMAC(CSK)此時,OP-code=2。 (2) The manufacturer transmits message 2 to the consumer, and its contents are as follows: Message 2: Vendor → Consumer (Mobile Device Shopping Reply) OP-code|Consumer Order Number|Date | P Xb | E CSK (Xb1)| (Related items of pre-sales) | HMAC (CSK) At this time, OP-code=2.

(3)廠商設定消費者訂單編號之status=3。 (3) The manufacturer sets the status of the consumer order number to =3.

步驟1.3: Step 1.3:

(1)消費者收到封包,檢驗OP-code status,若不相等,則 丟棄此封包。繼續等待正確封包,若相等,則得知此封包為行動裝置購物回覆。接著,計算產生CSK,i.e.,(1) The consumer receives the packet and checks the OP-code Status, if not equal, discard this packet. Continue to wait for the correct packet, if equal, then know that the packet is a mobile device shopping reply. Next, the calculation produces CSK, ie, .

(2)認証封包,i.e.,檢驗HMAC(CSK)c HMAC(CSK)r,其中下標c代表HMAC(CSK)是由消費者內部參數計算所得,而下標r代表消費者收到承載在message 2中的訊息認證碼HMAC(CSK)。若兩者不相等,則表示傳送來封包不合法,消費者丟棄此封包,繼續等待正確封包到達。若兩者相等則表示傳送來的封包是合法的。 (2) Authentication packet, ie, check HMAC (CSK) c HMAC(CSK) r , where the subscript c represents HMAC (CSK) is calculated by the internal parameters of the consumer, and the subscript r represents the message authentication code HMAC (CSK) received by the consumer in the message 2. If the two are not equal, it means that the packet is invalid, and the consumer discards the packet and continues to wait for the correct packet to arrive. If the two are equal, it means that the transmitted packet is legal.

(3)消費者以CSK解密ECSK(Xb1)得金鑰Xb1,再以CSK+2 Xb1解密(預購物品之相關資料)取得預購物品之相關資料。 (3) The consumer decrypts E CSK (Xb1) with CSK to obtain key Xb1, and then decrypts with CSK+ 2 Xb1 (Related materials for pre-sales) Get relevant information about pre-sales.

(4)消費者看完回傳商品資料並確認資訊正確的話,便可以正式向廠商下訂單,此時,消費者傳送Message 3給廠商:Message 3:消費者→廠商(購物訂單)OP-code|消費者訂單編號| En1(Xa1,CSK,Xb1)| (消費者姓名//送貨地址//訂購物品資料//消費者連絡電話號碼)| HMAC(Xa1+2CSK)此時,OP-code=3。 (4) After reading the returned product information and confirming that the information is correct, the consumer can formally place an order with the manufacturer. At this time, the consumer transmits Message 3 to the manufacturer: Message 3: Consumer → Vendor (shopping order) OP-code |Consumer Order Number | En1(Xa1,CSK,Xb1)| (Consumer Name//Delivery Address//Order Item Information//Consumer Contact Phone Number)| HMAC (Xa1+ 2 CSK) At this time, OP-code=3.

(5)設定消費者之status=4。 (5) Set the consumer's status=4.

步驟1.4: Step 1.4:

(1)當廠商接到消費者傳來的封包時,由消費者訂單編號取出存在廠商的該消費者之status,檢驗OP-code status,若不相等,則丟棄此封包,繼續等待正確封包;若相等,則表示此封包為購物訂單封包。 (1) When the manufacturer receives the packet from the consumer, the manufacturer's status is taken out by the consumer order number, and the OP-code is checked. Status, if not equal, discard the packet and continue to wait for the correct packet; if equal, it indicates that the packet is a shopping order packet.

(2)由消費者訂單編號取得消費者相關參數,CSK和Xb1對En1(Xa1,CSK,Xb1)進行解密,取得Xa1。接著,進行認證,即檢驗,HMAC(Xa1+2CSK)c HMAC(Xa1+2CSK)r,其中下標c代表該HMAC(Xa1+2CSK)是由廠商內部參數計算所得,而下標r代表廠商收到承載在message 3中的訊息認證碼HMAC(Xa1+2CSK),若兩者不相等,則表示傳送來封包不合 法,廠商便丟棄此封包,繼續等待正確封包到達;若兩者相等則表示傳送來的封包合法,則廠商用CSK+2Xb1依序解密取得消費者的消費者姓名,送貨地址,訂購物品資料,及消費者連絡電話號碼等。 (2) The consumer-related parameters are obtained from the consumer order number, and CSK and Xb1 decrypt En1 (Xa1, CSK, Xb1) to obtain Xa1. Next, perform authentication, ie, check, HMAC (Xa1+ 2 CSK) c HMAC(Xa1+2CSK) r , where the subscript c represents the HMAC (Xa1+ 2 CSK) is calculated by the internal parameters of the vendor, and the subscript r represents the message authentication code HMAC (Xa1+ 2 CSK) received by the vendor in the message 3. If the two are not equal, it means that the packet is invalid. The manufacturer discards the packet and continues to wait for the correct packet to arrive. If the two are equal, the packet is legal. The manufacturer decrypts the CSK+ 2 Xb1 sequentially. Consumer's consumer name, shipping address, ordering item information, and consumer contact phone number.

(3)廠商回傳購物訂單確認訊息(message 4)給消費者,其內容如下:Message 4:廠商→消費者(行動裝置購物訂單確認訊息)OP-code|消費者訂單編號|廠商營利事業登記資料|EXa1 ♁ Xb1(各項消費明細與金額//總金額//廠商收款帳號)|HMAC(Xa1+2Xb1)此時,OP-code=4。 (3) The manufacturer returns the shopping order confirmation message (message 4) to the consumer, and its contents are as follows: Message 4: Vendor→Consumer (Mobile Device Purchase Order Confirmation Message) OP-code|Consumer Order Number|Manufacturer Profit Registration Information|E Xa1 ♁ Xb1 (various consumption details and amount / / total amount / / manufacturer collection account number) | HMAC (Xa1 + 2 Xb1) At this time, OP-code = 4.

(4)廠商設定消費者訂單編號之status=7。 (4) The manufacturer sets the status of the consumer order number = 7.

第二階段:(無線購物付款申請/回覆與銀行付款訊息階段) Phase 2: (Wireless Shopping Payment Request/Reply and Bank Payment Message Phase)

步驟2.1: Step 2.1:

(1)消費者在收到廠商傳來的封包,檢驗OP-code status,若不相等,則丟棄此封包,繼續等待正確封包到達。若相等,則得知此封包為購物訂單確認訊息。 (1) The consumer receives the packet from the manufacturer and checks the OP-code. Status, if not equal, discard this packet and continue waiting for the correct packet to arrive. If they are equal, the packet is known to be a shopping order confirmation message.

(2)進行認證,即,檢驗HMAC(Xa1+2Xb1)c HMAC(Xa1+2 Xb1)r,其中下標c代表HMAC(Xa1+2Xb1)是由消費者內部參數計算所得,而下標r代表消費者收到承載在message 4中的訊息認證碼HMAC(Xa1+2Xb1),若兩者不相等,則表示傳送來封包不合法,則丟棄此封包,繼續等待正確封包;若兩者相等,則表示傳送來的封包合法,則消費者讀取廠商營利事業登記資料並用Xa1 ♁ Xb1解密取得各項消費明細與金額、總金額,及廠商收款帳號。 (2) Perform authentication, that is, check HMAC (Xa1+ 2 Xb1) c HMAC(Xa1+ 2 Xb1) r , where the subscript c represents HMAC (Xa1+ 2 Xb1) is calculated by the internal parameters of the consumer, and the subscript r represents the message authentication code HMAC (Xa1+ 2) received by the consumer in the message 4. Xb1), if the two are not equal, it means that the packet is invalid if it is transmitted, then the packet is discarded and continues to wait for the correct packet; if the two are equal, it means that the transmitted packet is legal, and the consumer reads the manufacturer's profit business registration data. And use Xa1 ♁ Xb1 decryption to obtain various consumption details and amount, total amount, and manufacturer's collection account.

(3)消費者向發卡銀行提出使用無線購物付款申請,消費者傳送message 5給發卡銀行,其內容如下:Message 5:消費者→發卡銀行(無線購物付款申請)OP-code |UserID| RSA_En(Xa2,e)|En1(Xa3,Xa2,Xa2 ♁ K PW )| (CSK//Xa1//消費者訂單編號//廠商營利事業登記資料 //總金額//廠商收款帳號//廠商的聯絡電話)| EXa1(En2(Xa2,Xa3 ♁ AK))|HMAC((CSK ♁ Xa2)+2Xa3)此時,OP-code=5。 (3) The consumer submits a wireless shopping payment application to the issuing bank, and the consumer transmits the message 5 to the issuing bank, the contents of which are as follows: Message 5: Consumer → Issuer Bank (Wireless Shopping Payment Request) OP-code | UserID| RSA_En ( Xa2,e)| En1 (Xa3,Xa2,Xa2 ♁ K PW )| (CSK//Xa1//Consumer order number//Company profit business registration information//Total amount//Manufacturer collection account//Manufacturer's contact number)| E Xa1 ( En2 (Xa2, Xa3 ♁ AK))|HMAC ((CSK ♁ Xa2) + 2 Xa3) At this time, OP-code=5.

(4)設定消費者之status=6 (4) Set the consumer's status=6

步驟2.2: Step 2.2:

(1)銀行收到消費者傳來的封包,依據UserID取出存在銀行內部該消費者之status(銀行內該UserID的status,目前為初值為5),檢驗OP-code status,若不相等,則丟棄此封包,繼續等待正確封包到達。若相等,則得知此封包為使用無線購物付款申請。 (1) The bank receives the packet from the consumer, and according to the UserID, the status of the consumer inside the bank is taken out (the status of the UserID in the bank is currently 5), and the OP-code is checked. Status, if not equal, discard this packet and continue waiting for the correct packet to arrive. If they are equal, they know that the packet is a wireless shopping payment request.

(2)銀行接著由UserID的DCC取得消費者的RSA加/解密金鑰(e,d,N),進而解密RSA_En(Xa2,e)取得Xa2,用Xa2與K PW 解密En1(Xa3,Xa2,Xa2 ♁ K PW )取得Xa3,再用Xa3 ♁ K PW 解密(CSK//Xa1//消費者訂單編號//廠商營利事業登記資料//總金額//廠商收款帳號//廠商的聯絡電話)取得CSK,Xa1,消費者訂單編號,廠商營利事業登記資料,總金額,廠商收款帳號與廠商的聯絡電話,接著進行第二次認證,即檢驗,HMAC((CSK ♁ Xa2)+2Xa3)c HMAC((CSK ♁ Xa2)+2Xa3)r,其中下標c代表HMAC((CSK ♁ Xa2)+2Xa3)是由銀行經由前面手續取得的CSK,Xa2與Xa3計算所得,而下標r代表銀行收到承載在message 5中的訊息認證碼HMAC((CSK ♁ Xa2)+2Xa3),若兩者不相等,則表示傳送來的封包是不合法的,則丟棄此封包。若兩者相等,則表示傳送來的封包是合法的。 (2) The bank then obtains the RSA encryption/decryption key (e, d, N) of the consumer by the DCC of UserID, and then decrypts RSA_En (Xa2, e) to obtain Xa2, and decrypts En1 (Xa3, Xa2, with Xa2 and K PW , Xa2 ♁ K PW ) Get Xa3, then decrypt it with Xa3 ♁ K PW (CSK//Xa1//consumer order number / / manufacturer profit business registration information / / total amount / / manufacturer collection account / / manufacturer's contact phone) to obtain CSK, Xa1, consumer order number, manufacturer profit business registration information , the total amount, the contact number of the manufacturer's collection account and the manufacturer, followed by the second certification, that is, inspection, HMAC ((CSK ♁ Xa2) + 2 Xa3) c HMAC((CSK ♁ Xa2)+ 2 Xa3) r , where the subscript c stands for HMAC ((CSK ♁ Xa2) + 2 Xa3) is calculated by the bank through the previous procedures CSK, Xa2 and Xa3, and the subscript r represents The bank receives the message authentication code HMAC ((CSK ♁ Xa2) + 2 Xa3) carried in message 5. If the two are not equal, it indicates that the transmitted packet is illegal, and the packet is discarded. If the two are equal, it means that the transmitted packet is legal.

(3)發卡銀行用Xa1解密E Xa1 (En2(Xa2,Xa3 ♁ AK))取出付款動態認證碼En2(Xa2,Xa3 ♁ AK),接著進行第三次認證,即檢驗,En2(Xa2,Xa3 ♁ AK)c En2(Xa2,Xa3 ♁ AK)r,其中下標c代表En2(Xa2,Xa3 ♁ AK)是由銀行經由前面手續取得的Xa2,Xa3與存於銀行內之消費者認證金鑰AK計算所得,而下標r代表銀行收到承載在message 5中的付款動態認證碼En2(Xa2,Xa3 ♁ AK),若兩者不相等,則表示傳送來的封包是不合法的,則 丟棄此封包。若兩者相等,則表示傳送來的是合法的消費者無線購物付款申請。 (3) The issuing bank decrypts the payment dynamic authentication code En2 (Xa2, Xa3 ♁ AK) with Xa1 decryption E Xa1 ( En2 (Xa2, Xa3 ♁ AK)), and then performs the third authentication, that is, the check, En2 (Xa2, Xa3 ♁ AK) c En2 (Xa2, Xa3 ♁ AK) r , where the subscript c represents En2 (Xa2, Xa3 ♁ AK) is calculated by the bank through the previous procedures Xa2, Xa3 and the consumer authentication key AK stored in the bank, and The subscript r indicates that the bank receives the payment dynamic authentication code En2 (Xa2, Xa3 ♁ AK) carried in the message 5. If the two are not equal, it indicates that the transmitted packet is illegal, and the packet is discarded. If the two are equal, it means that the legitimate consumer wireless shopping payment request is transmitted.

(4)發卡銀行由UserID取出消費者在DCC內之信用卡卡號,檢查消費者之信用狀況,決定是否撥款後,若交易成功(撥款),則發卡銀行將總金額匯入廠商收款帳號,若交易失敗,則發卡銀行將交易失敗原因訊息寫入交易結果訊息中。 (4) The issuing bank will take out the credit card number of the consumer in the DCC by UserID, check the credit status of the consumer, and decide whether or not to allocate funds. If the transaction is successful (grant), the issuing bank will transfer the total amount to the manufacturer's receiving account. If the transaction fails, the issuing bank will write the transaction failure reason message into the transaction result message.

(5)發卡銀行傳送無線購物付款申請回覆訊息(massage6)給消費者:Message 6:發卡銀行→消費者(無線購物付款申請回覆)OP-code| E CSK ♁ Xa1 (消費者訂單編號//交易結果訊息)| HMAC(Xa1+2CSK)此時,OP-code=6。 (5) The issuing bank sends a wireless shopping payment application reply message (massage6) to the consumer: Message 6: issuing bank → consumer (wireless shopping payment application reply) OP-code| E CSK ♁ Xa1 (consumer order number // transaction Result message)| HMAC (Xa1+ 2 CSK) At this time, OP-code=6.

(6)消費者在收到發卡銀行傳來的封包,檢驗OP-code status,若不相等,則丟棄此封包,繼續等待正確封包到達。若相等,則代表此封包為無線購物付款申請回覆訊息。 (6) The consumer receives the packet from the issuing bank and checks the OP-code. Status, if not equal, discard this packet and continue waiting for the correct packet to arrive. If they are equal, it means that the packet is a wireless shopping payment request reply message.

(7)消費者進行認證,即檢驗,HMAC(Xa1+2CSK)c HMAC(Xa1+2CSK)r,其中下標c代表HMAC(Xa1+2CSK)是由消費者內部參數計算所得,而下標r代表消費者收到承載在message 6中的訊息認證碼HMAC(Xa1+2CSK),若兩者不相等,則表示傳送來封包不合法,而丟棄此封包。若兩者相等則表示傳送來的封包是合法的。 (7) Consumers perform authentication, ie inspection, HMAC (Xa1+ 2 CSK) c HMAC(Xa1+ 2 CSK) r , where the subscript c represents HMAC (Xa1+ 2 CSK) is calculated by the internal parameters of the consumer, and the subscript r represents the message authentication code HMAC (Xa1+ 2) received by the consumer in the message 6. CSK), if the two are not equal, it means that the packet is invalid and the packet is discarded. If the two are equal, it means that the transmitted packet is legal.

(8)消費者用CSK ♁ Xa1解密依序取得此次購物之消費者訂單編號與交易結果訊息,若交易結果訊息為“交易失敗”,則讀取交易失敗之原因訊息並終止此次交易,若交易結果訊息為“交易成功”,則設定消費者之status=8,等待廠商傳來電子發票。 (8) The consumer uses CSK ♁ Xa1 decryption to sequentially obtain the consumer order number and transaction result message of the purchase. If the transaction result message is “transaction failed”, the reason information of the transaction failure is read and the transaction is terminated. If the transaction result message is "transaction successful", set the consumer's status=8 and wait for the manufacturer to send an electronic invoice.

步驟2.3: Step 2.3:

(1)發卡銀行傳送無線購物付款訊息(massage7)給廠商:Message 7:發卡銀行→廠商(無線購物付款訊息)OP-code|消費者訂單編號| (付款訊息)| HMAC(Xa1 ♁ CSK)此時,OP-code=7。 (1) The issuing bank sends the wireless shopping payment message (massage7) to the manufacturer: Message 7: issuing bank → manufacturer (wireless shopping payment message) OP-code|consumer order number| (payment message) | HMAC (Xa1 ♁ CSK) At this time, OP-code=7.

(2)銀行設定消費者之Status=9。 (2) The bank sets the consumer's Status=9.

(3)當廠商接到發卡銀行傳來的封包時,由消費者訂單編號取出其status,檢驗OP-code status,若不相等,則丟棄此封包,繼續等待正確封包到達,若相等,則得知此封包為銀行付款訊息封包。 (3) When the manufacturer receives the packet from the issuing bank, the status is taken out by the consumer order number, and the OP-code is checked. Status, if not equal, discard the packet and continue to wait for the correct packet to arrive. If they are equal, the packet is known to be a bank payment message packet.

(4)廠商由消費者訂單編號取得消費者相關參數,接著,進行認證,即檢驗,HMAC(Xa1 ♁ CSK)c HMAC(Xa1 ♁ CSK)r,其中下標c代表HMAC(Xa1 ♁ CSK)是由廠商內部參數計算所得,而下標r代表廠商收到承載在message7中的訊息認證碼HMAC(Xa1 ♁ CSK),若兩者不相等,則表示傳送來封包不合法,而丟棄此封包。若兩者相等,則表示傳送來的封包是合法的。 (4) The manufacturer obtains consumer-related parameters from the consumer order number, and then performs authentication, ie, inspection, HMAC (Xa1 ♁ CSK) c HMAC(Xa1 ♁ CSK) r , where the subscript c represents HMAC (Xa1 ♁ CSK) is calculated by the internal parameters of the vendor, and the subscript r represents the message authentication code HMAC (Xa1 ♁ CSK) received by the vendor in the message7. If the two are not equal, it means that the packet is invalid and the packet is discarded. If the two are equal, it means that the transmitted packet is legal.

(5)廠商用Xa1+2CSK解密(付款訊息)取得付款訊息資料,若交易成功(銀行付款)則進行出貨與傳送電子發票給消費者,即,執行步驟3.1,若交易失敗,則終止此次交易。 (5) The vendor decrypts with Xa1+ 2 CSK (Payment message) Obtain payment information. If the transaction is successful (bank payment), ship and send the electronic invoice to the consumer, ie, proceed to step 3.1. If the transaction fails, terminate the transaction.

第三階段:(廠商傳送電子發票階段) The third stage: (the manufacturer transmits the electronic invoice stage)

步驟3.1: Step 3.1:

(1)廠商傳送電子發票訊息(message 8)給消費者,其內容如下:Message 8:廠商→消費者(電子發票訊息)OP-code|消費者訂單編號|電子發票|HMAC((CSK+2Xa1)♁ Xb1)此時,OP-code=8。 (1) The manufacturer transmits the electronic invoice message (message 8) to the consumer, and its contents are as follows: Message 8: Vendor→Consumer (electronic invoice message) OP-code|Consumer order number|Electronic invoice|HMAC((CSK+ 2 Xa1) ) ♁ Xb1) At this time, OP-code=8.

(2)廠商設定消費者訂單編號之status=9。 (2) The manufacturer sets the status of the consumer order number to ==9.

(3)消費者收到訊息後,檢驗OP-code status,若不相等,則丟棄此封包,繼續等待正確封包到達。若相等,則代表此封包為廠商傳來之電子發票訊息,接著進行認證,即,檢驗HMAC((CSK+2Xa1)♁ Xb1)c HMAC((CSK+2Xa1)♁ Xb1)r,若不相等,則拋棄此訊息,若相等,消費者則可取出電子發票後 結束此次交易。 (3) After the consumer receives the message, check the OP-code Status, if not equal, discard this packet and continue waiting for the correct packet to arrive. If they are equal, it means that the packet is an electronic invoice message from the manufacturer, and then the authentication is performed, that is, the HMAC is checked ((CSK+ 2 Xa1)♁ Xb1) c HMAC((CSK+ 2 Xa1)♁ Xb1) r , if not equal, discard this message. If they are equal, the consumer can take out the electronic invoice and end the transaction.

Claims (9)

一種安全的行動裝置購物系統,係包含:一資料鏈結核心,其係建置於消費者與發卡銀行間;一消費者密碼金鑰,其由消費者的密碼經由演算法則產生;一付款動態認證碼,其可取代使用信用卡時所需的持卡人簽名,可使信用卡的使用更安全且方便;一行動裝置購物APP,其係建置於消費者、發卡銀行與廠商間;及一無線訊息運作碼(OP-code)及狀態參數(status)對照表。 A secure mobile device shopping system includes: a data link core, which is built between the consumer and the issuing bank; a consumer cryptographic key, which is generated by the consumer's password via an algorithm; The authentication code, which can replace the cardholder's signature required to use the credit card, makes the use of the credit card safer and more convenient; a mobile device shopping app is built between the consumer, the issuing bank and the manufacturer; and a wireless Message operation code (OP-code) and status parameter (status) comparison table. 如申請專利範圍第1項所述之安全的行動裝置購物系統,其中該無線訊息運作碼(OP-code)及狀態參數(status)對照表如下: 購物過程中透過OP_code與status搭配使用,可以提升通訊封包處理效能,並可以有效地防禦重送攻擊。 For example, in the secure mobile device shopping system described in claim 1, wherein the wireless message operating code (OP-code) and the status parameter (status) are as follows: Through the use of OP_code and status in the shopping process, the communication packet processing performance can be improved, and the resend attack can be effectively prevented. 如申請專利範圍第1項所述之安全的行動裝置購物系統,其中資料鏈結核心在消費者端的結構內容為(UserID,e,d,N,PW,KPW,AK),而在銀行端的結構內容為(UserID,e,d,N,Card No,KPW,AK),透過該資料鏈結核心連結消費者與發卡銀行,使得消費者在無線購物申請付款過程的通訊封包受到完整而充份的安全保護;其中,UserID代表使用者代號;e,d,N代表使用者個別之RSA加/解密金鑰;Card No代表信用卡卡號;PW代表密碼(Pass Word);AK代表消費者認證金鑰;KPW代表密碼之金鑰(Key of password)。 For example, in the secure mobile device shopping system described in claim 1, wherein the structure of the data link core on the consumer side is (UserID, e, d, N, PW, K PW , AK), and at the bank end The structure content is (UserID, e, d, N, Card No, K PW , AK), through which the core of the data link connects the consumer and the issuing bank, so that the communication package of the consumer in the wireless shopping application payment process is fully charged. Security protection; where UserID represents the user code; e, d, N represents the user's individual RSA encryption/decryption key; Card No represents the credit card number; PW represents the password (Pass Word); AK represents the consumer certification Key; K PW stands for Key of password. 如申請專利範圍第1項所述之安全的行動裝置購物系統,其中開啟行動裝置上的購物APP時,會要求使用者輸入帳號與密碼(PW),系統程式會依演算法則計算產生密碼金鑰(KPW,c),再比對KPW,c與KPW(存於系統內部之消費者密碼金鑰)是否相等,若不相等則系統會要求消費者再重新輸入帳號與密碼後,進行比對KPW,c與KPW是否相等,若還是不相等,則系統會直接關閉購物APP,使用者需重新啟動購物APP方可再輸入帳號與密碼。 For example, in the secure mobile device shopping system described in claim 1, in which the shopping application on the mobile device is opened, the user is required to input an account number and password (PW), and the system program calculates the generated password key according to the algorithm. (K PW,c ), and then compare K PW, c and K PW (the consumer cryptographic key stored in the system) are equal. If they are not equal, the system will ask the consumer to re-enter the account and password. Compare K PW, c and K PW are equal, if they are still not equal, the system will directly close the shopping app, the user needs to restart the shopping app before entering the account and password. 如申請專利範圍第1項所述之安全的行動裝置購物系統,其中付款動態認證碼的建置與使用包含:(1)付款動態認證碼En2(Xa2,Xa3 ♁ AK),是消費者於交易過程中產生之隨機動態金鑰Xa2,Xa3與DCC內之消費者認證金鑰AK經由區塊密碼加密機制,如DES,AES,結合運算而產生,此付款動態認證碼可用來取代消費者使用信用卡時所需的持卡人簽名,如此,可使信用卡的使用更安全(不怕被盜刷)而方便。(2)本系統的付款機制是由消費者傳送加密後的“付款動態認證碼En2(Xa2,Xa3 ♁ AK)”給發卡銀行,再由發卡銀行經由解密計算取得付款動態認證碼,接著對接收信息取得的付款動態認證碼進行認證,而認證成功與否的關鍵在於消費者是否擁有正確的消費者RSA加/解密金鑰(e,d,N),密碼金鑰(KPW)與認證金鑰AK,擁有這些金鑰才能正確地加/解密動態金鑰Xa1,Xa2,Xa3與付款動態認證碼(En2(Xa2,Xa3 ♁ AK)),當認證成功時發卡銀行才付款給廠商,如此機制下,廠商不必擔心有盜刷信用卡的問題,而消費者也不用擔心信用卡卡號資料外洩的問題,消費者與廠商的安全皆獲得提升。 For example, the secure mobile device shopping system described in claim 1 wherein the payment dynamic authentication code is constructed and used includes: (1) payment dynamic authentication code En2 (Xa2, Xa3 ♁ AK), which is a consumer transaction. The random dynamic key Xa2, Xa3 generated in the process and the consumer authentication key AK in the DCC are generated by a block cipher encryption mechanism such as DES, AES, and the payment dynamic authentication code can be used to replace the consumer using the credit card. The cardholder's signature required at this time makes it easier to use the credit card safely (not afraid of being stolen). (2) The payment mechanism of the system is that the consumer sends the encrypted "payment dynamic authentication code En2 (Xa2, Xa3 ♁ AK)" to the issuing bank, and then the card issuing bank obtains the payment dynamic authentication code through decryption calculation, and then receives the payment. The payment dynamic authentication code obtained by the information is authenticated, and the key to the success of the authentication is whether the consumer has the correct consumer RSA encryption/decryption key (e, d, N), password key (K PW ) and the authentication money. Key AK, which has these keys to correctly add/decrypt dynamic keys Xa1, Xa2, Xa3 and payment dynamic authentication code ( En2 (Xa2, Xa3 ♁ AK)). When the authentication is successful, the issuing bank will pay the vendor. Under the circumstance, manufacturers do not have to worry about the problem of stolen credit card, and consumers do not have to worry about the leakage of credit card number data, and the safety of consumers and manufacturers has been improved. 如申請專利範圍第1項所述之安全的行動裝置購物系統,其中發卡銀行可由聯合發卡中心取代,如此可使系統更具有彈性;又,為增加安全度與實用性,發卡銀行可與通訊公司合作,將消費者的資料鏈結核心寫入消費者手機或平板電腦的SIM卡中。 For example, the secure mobile device shopping system described in claim 1 of the patent scope, wherein the issuing bank can be replaced by a joint issuing card center, so that the system can be more flexible; and, in order to increase security and practicability, the issuing bank can communicate with the communication company. Cooperation, the consumer's data link core is written into the SIM card of the consumer's mobile phone or tablet. 如申請專利範圍第2項所述之購物系統的實施方法,係包含三個階段,其中第一階段:包含步驟1.1~1.4,為購物訂單確認階段;第二階段:包含步驟2.1~2.3,為無線購物付款申請/回覆與銀行付款訊息階段;第三階段:即步驟3.1,為傳送電子發票階段,行動裝置購物APP具體實施例之購物過程詳述如下:第一階段:(購物訂單確認階段)步驟1.1:(1)消費者登入廠商網頁後,便可觀看廠商所販賣的商品資料,當將所有選購的商品放入購物車後,可藉由網頁互動開啟行動裝置上的購物APP,開啟行動裝置上的購物APP時,會要求使用者輸入帳號與密碼(PW),系統程式會依既定的演算法計算產生密碼金鑰KPW,c,並比對KPW,c與KPW(存於系統內部之消費者密碼金鑰)是否相等;若不相等,系統程式會要求使用者再次輸入帳號與密碼後,再比對KPW,c與KPW,若還是不相等,則系統會直接關閉購物APP,使用者需重新啟動購物APP方可再輸入帳號與密碼;(2)將購買要求訊息傳給廠商,裡面包含的資料有:消費者稱謂、公鑰PXa、購買清單。消費者透過購物APP程式傳送message 1給廠商,其內容如下:Message 1:消費者→廠商(行動裝置購物要求)OP-code|消費者稱謂| PXa |購買清單此時,OP-code=1;(3)設定消費者之status=2;步驟1.2:(1)廠商收到消費者的購物要求後(OP-code=1),便可以將自己的私鑰Xb與消費者傳的公鑰PXa計算出共同密鑰CSK,i.e.,; (2)廠商傳送message 2給消費者,其內容如下:Message 2:廠商→消費者(行動裝置購物回覆)OP-code|消費者訂單編號|日期| PXb | ECSK(Xb1)| (預購物品之相關資料)| HMAC(CSK)此時,OP-code=2;(3)廠商設定消費者訂單編號之status=3;步驟1.3:(1)消費者收到封包,檢驗OP-code status,若不相等,則丟棄此封包。繼續等待正確封包,若相等,則得知此封包為行動裝置購物回覆。接著,計算產生CSK,i.e.,;(2)認証封包,i.e.,檢驗HMAC(CSK)c HMAC(CSK)r,其中下標c代表HMAC(CSK)是由消費者內部參數計算所得,而下標r代表消費者收到承載在message 2中的訊息認證碼HMAC(CSK)。若兩者不相等,則表示傳送來封包不合法,消費者丟棄此封包,繼續等待正確封包到達。若兩者相等則表示傳送來的封包是合法的;(3)消費者以CSK解密E CSK (Xb1)得金鑰Xb1,再以CSK+2 Xb1解密(預購物品之相關資料)取得預購物品之相關資料;(4)消費者看完回傳商品資料並確認資訊正確的話,便可以正式向廠商下訂單,此時,消費者傳送Message 3給廠商:Message 3:消費者→廠商(購物訂單)OP-code|消費者訂單編號| En1(Xa1,CSK,Xb1)| (消費者姓名//送貨地址//訂購物品資料//消費者連絡電話號碼)|HMAC(Xa1+2CSK);此時,OP-code=3;(5)設定消費者之status=4;步驟1.4:(1)當廠商接到消費者傳來的封包時,由消費者訂單編號取出存在廠商的該消費者之status,檢驗OP-code status,若不 相等,則丟棄此封包,繼續等待正確封包;若相等,則表示此封包為購物訂單封包;(2)由消費者訂單編號取得消費者相關參數,CSK,Xb1對En1(Xa1,CSK,Xb1)進行解密,取得Xa1。接著,進行認證,即檢驗,HMAC(Xa1+2CSK)c HMAC(Xa1+2CSK)r,其中下標c代表該HMAC(Xa1+2CSK)是由廠商內部參數計算所得,而下標r代表廠商收到承載在message 3中的訊息認證碼HMAC(Xa1+2CSK),若兩者不相等,則表示傳送來封包不合法,廠商便丟棄此封包,繼續等待正確封包到達;若兩者相等則表示傳送來的封包合法,則廠商用CSK+2Xb1依序解密取得消費者的消費者姓名,送貨地址,訂購物品資料,及消費者連絡電話號碼等;(3)廠商回傳購物訂單確認訊息(message 4)給消費者,其內容如下:Message 4:廠商→消費者(行動裝置購物訂單確認訊息)OP-code|消費者訂單編號|廠商營利事業登記資料|EXa1 ♁ Xb1(各項消費明細與金額//總金額//廠商收款帳號)|HMAC(Xa1+2Xb1)此時,OP-code=4;(4)廠商設定消費者訂單編號之status=7;第二階段:(無線購物付款申請/回覆與銀行付款訊息階段)步驟2.1:(1)消費者在收到廠商傳來的封包,檢驗OP-code status,若不相等,則丟棄此封包,繼續等待正確封包到達。若相等,則得知此封包為購物訂單確認訊息;(2)進行認證,即,檢驗HMAC(Xa1+2Xb1)c HMAC(Xa1+2 Xb1)r,其中下標c代表HMAC(Xa1+2Xb1)是由消費者內部參數計算所得,而下標r代表消費者收到承載在message 4中的訊息認證碼HMAC(Xa1+2Xb1),若兩者不相等,則表示傳送來封包不合法,則丟棄此封包,繼續等待正確封包;若兩者相 等,則表示傳送來的封包合法,則消費者讀取廠商營利事業登記資料並用Xa1 ♁ Xb1解密取得各項消費明細與金額、總金額,及廠商收款帳號;(3)消費者向發卡銀行提出使用無線購物付款申請,消費者傳送message 5給發卡銀行,其內容如下:Message 5:消費者→發卡銀行(無線購物付款申請)OP-code |UserID| RSA_En(Xa2,e)|En1(Xa3,Xa2,Xa2 ♁ K PW )| (CSK//Xa1//消費者訂單編號//廠商營利事業登記資料//總金額//廠商收款帳號//廠商的聯絡電話)| E Xa1 (En2(Xa2,Xa3 ♁ AK))|HMAC((CSK ♁ Xa2)+2Xa3)此時,OP-code=5;(4)設定消費者之status=6;步驟2.2:(1)銀行收到消費者傳來的封包,依據UserID取出存在銀行內部該消費者之status(銀行內該UserID的status,目前為初值為5),檢驗OP-code status,若不相等,則丟棄此封包,繼續等待正確封包到達。若相等,則得知此封包為使用無線購物付款申請;(2)銀行接著由UserID的DCC取得消費者的RSA加/解密金鑰(e,d,N),進而解密RSA_En(Xa2,e)取得Xa2,用Xa2與K PW 解密En1(Xa3,Xa2,Xa2 ♁ K PW )取得Xa3,再用Xa3 ♁ K PW 解密 (CSK//Xa1//消費者訂單編號//廠商營利事業登記資料//總金額//廠商收款帳號//廠商的聯絡電話)取得CSK,Xa1,消費者訂單編號,廠商營利事業登記資料,總金額,廠商收款帳號與廠商的聯絡電話,接著進行第二次認證,即檢驗,HMAC((CSK ♁ Xa2)+2Xa3)c HMAC((CSK ♁ Xa2)+2Xa3)r,其中下標c代表HMAC((CSK ♁ Xa2)+2Xa3)是由銀行經由前面手續取得的CSK,Xa2與Xa3再計算所得,而下標r代表銀行收到承載在message 5中的訊息認證碼HMAC((CSK ♁ Xa2)+2Xa3),若兩者不相等,則表示傳送來的封包是不合法的,則丟棄此封包; 若兩者相等,則表示傳送來的封包是合法的;(3)發卡銀行用Xa1解密E Xa1 (En2(Xa2,Xa3 ♁ AK))取出付款動態認證碼(En2(Xa2,Xa3 ♁ AK)),接著進行第三次認證,即檢驗,En2(Xa2,Xa3 ♁ AK)c En2(Xa2,Xa3 ♁ AK)r,其中下標c代表En2(Xa2,Xa3 ♁ AK)是由銀行經由前面手續取得的Xa2,Xa3與存於銀行內之消費者認證金鑰AK計算所得,而下標r代表銀行收到承載在message 5中的付款動態認證碼En2(Xa2,Xa3 ♁ AK),若兩者不相等,則表示傳送來的封包是不合法的,則丟棄此封包;若兩者相等,則表示傳送來的是合法的消費者無線購物付款申請;(4)發卡銀行由UserID取出消費者在DCC內之信用卡卡號,檢查消費者之信用狀況,決定是否撥款後,若交易成功(撥款),則發卡銀行將總金額匯入廠商收款帳號,若交易失敗,則發卡銀行將交易失敗原因訊息寫入交易結果訊息中;(5)發卡銀行傳送無線購物付款申請回覆訊息(massage6)給消費者:Message 6:發卡銀行→消費者(無線購物付款申請回覆)OP-code| E CSK ♁ Xa1 (消費者訂單編號//交易結果訊息)| HMAC(Xa1+2CSK)此時,OP-code=6;(6)消費者在收到發卡銀行傳來的封包,檢驗OP-code status,若不相等,則丟棄此封包,繼續等待正確封包到達;若相等,則代表此封包為無線購物付款申請回覆訊息;(7)消費者進行認證,即檢驗,HMAC(Xa1+2CSK)c HMAC(Xa1+2CSK)r,其中下標c代表HMAC(Xa1+2CSK)是由消費者內部參數計算所得,而下標r代表消費者收到承載在message 6中的訊息認證碼HMAC(Xa1+2CSK),若兩者不相等,則表示傳送來封包不合法,而丟棄此封包;若兩者相等則表示傳送來的封包是合法的;(8)消費者用CSK ♁ Xa1解密依序取得此次購物之消費者訂單 編號與交易結果訊息,若交易結果訊息為“交易失敗”,則讀取交易失敗之原因訊息並終止此次交易,若交易結果訊息為“交易成功”,則設定消費者之status=8,等待廠商傳來電子發票;步驟2.3:(1)發卡銀行傳送無線購物付款訊息(massage7)給廠商:Message 7:發卡銀行→廠商(無線購物付款訊息)OP-code|消費者訂單編號| (付款訊息)| HMAC(Xa1 ♁ CSK)此時,OP-code=7;(2)銀行設定消費者之Status=9;(3)當廠商接到發卡銀行傳來的封包時,由消費者訂單編號取出其status,檢驗OP-code status,若不相等,則丟棄此封包,繼續等待正確封包到達,若相等,則得知此封包為銀行付款訊息封包;(4)廠商由消費者訂單編號取得消費者相關參數,接著,進行認證,即檢驗,HMAC(Xa1 ♁ CSK)c HMAC(Xa1 ♁ CSK)r,其中下標c代表HMAC(Xa1 ♁ CSK)是由廠商內部參數計算所得,而下標r代表廠商收到承載在message7中的訊息認證碼HMAC(Xa1 ♁ CSK),若兩者不相等,則表示傳送來封包不合法,而丟棄此封包;若兩者相等,則表示傳送來的封包是合法的;(5)廠商用Xa1+2CSK解密(付款訊息)取得付款訊息資料,若交易成功(銀行付款)則進行出貨與傳送電子發票給消費者,即,執行步驟3.1,若交易失敗,則終止此次交易;第三階段:(廠商傳送電子發票階段)步驟3.1:(1)廠商傳送電子發票訊息(message 8)給消費者,其內容如下:Message 8:廠商→消費者(電子發票訊息) OP-code|消費者訂單編號|電子發票|HMAC((CSK+2Xa1)♁ Xb1)此時,OP-code=8;(2)廠商設定消費者訂單編號之status=9;(3)消費者收到訊息後,檢驗OP-codestatus,若不相等,則丟棄此封包,繼續等待正確封包到達;若相等,則代表此封包為廠商傳來之電子發票訊息,接著進行認證,即,檢驗HMAC((CSK+2Xa1)♁ Xb1)c HMAC((CSK+2Xa1)♁ Xb1)r,若不相等,則拋棄此訊息,若相等,消費者則可取出電子發票後結束此次交易。 For example, the implementation method of the shopping system described in claim 2 includes three stages, wherein the first stage includes steps 1.1 to 1.4, which is a shopping order confirmation stage; and the second stage includes steps 2.1 to 2.3, Wireless shopping payment application / reply and bank payment message phase; the third stage: step 3.1, in order to transmit the electronic invoice stage, the mobile device shopping APP specific embodiment of the shopping process is detailed as follows: the first stage: (shopping order confirmation stage) Step 1.1: (1) After the consumer logs in to the manufacturer's webpage, he can view the merchandise information sold by the manufacturer. After all the purchased merchandise is put into the shopping cart, the shopping app on the mobile device can be opened by webpage interaction. When the shopping app on the mobile device is requested, the user is required to input the account number and password (PW), and the system program calculates the generated password key K PW,c according to the established algorithm, and compares K PW,c and K PW (stored ) is equal to the internal system of consumer cryptographic key; after equal if not, the system program asks the user to enter account number and password, and then comparing K PW, c and K PW, or if not equal, the Department of Directly shut down the shopping APP, users need to restart shopping APP before and then enter the account number and password; (2) the purchase request message passed to the manufacturer, which contains information include: consumer titles, public key P Xa, shopping list. The consumer sends the message 1 to the manufacturer through the shopping APP program, and its contents are as follows: Message 1: Consumer → Vendor (Mobile Device Shopping Request) OP-code|Consumer Title | P Xa | Purchase List At this time, OP-code=1 (3) Set the consumer's status=2; Step 1.2: (1) After the manufacturer receives the consumer's shopping request (OP-code=1), it can transfer its private key Xb to the public key of the consumer. P Xa calculates the common key CSK, ie, (2) The manufacturer transmits message 2 to the consumer, the content of which is as follows: Message 2: Vendor → Consumer (Mobile Device Shopping Reply) OP-code|Consumer Order Number|Date | P Xb | E CSK (Xb1)| (Related items of pre-sales) | HMAC (CSK) At this time, OP-code=2; (3) The manufacturer sets the status of the consumer order number=3; Step 1.3: (1) The consumer receives the packet and checks the OP- Code Status, if not equal, discard this packet. Continue to wait for the correct packet, if equal, then know that the packet is a mobile device shopping reply. Next, the calculation produces CSK, ie, ; (2) authentication packet, ie, check HMAC (CSK) c HMAC(CSK) r , where the subscript c represents HMAC (CSK) is calculated by the internal parameters of the consumer, and the subscript r represents the message authentication code HMAC (CSK) received by the consumer in the message 2. If the two are not equal, it means that the packet is invalid, and the consumer discards the packet and continues to wait for the correct packet to arrive. If the two are equal, it means that the transmitted packet is legal; (3) the consumer decrypts the E CSK (Xb1) key Xb1 by CSK, and then decrypts with CSK+ 2 Xb1 (Related materials related to pre-sales) Obtain relevant information on pre-sales; (4) After reading the returned product information and confirming that the information is correct, the consumer can formally place an order with the manufacturer. At this time, the consumer transmits Message 3 to the manufacturer: Message 3: Consumer → Vendor (Purchase Order) OP-code|Consumer Order Number | En1(Xa1,CSK,Xb1)| (consumer name / / shipping address / / order item information / / consumer contact phone number) | HMAC (Xa1 + 2 CSK); at this time, OP-code = 3; (5) set the consumer's status = 4; Step 1.4: (1) When the manufacturer receives the packet from the consumer, the manufacturer's status is taken out by the consumer order number, and the OP-code is checked. Status, if not equal, discard the packet and continue to wait for the correct packet; if it is equal, it means that the packet is a shopping order packet; (2) obtain the consumer related parameter from the consumer order number, CSK, Xb1 to En1 (Xa1, CSK, Xb1) decrypts and acquires Xa1. Next, perform authentication, ie, check, HMAC (Xa1+ 2 CSK) c HMAC(Xa1+2CSK) r , where the subscript c represents the HMAC (Xa1+ 2 CSK) is calculated by the internal parameters of the vendor, and the subscript r represents the message authentication code HMAC (Xa1+ 2 CSK) received by the vendor in the message 3. If the two are not equal, it means that the packet is invalid. The manufacturer discards the packet and continues to wait for the correct packet to arrive. If the two are equal, the packet is legal. The manufacturer decrypts the CSK+ 2 Xb1 sequentially. Consumer's consumer name, shipping address, ordering item information, and consumer contact phone number; (3) The manufacturer returns a shopping order confirmation message (message 4) to the consumer, the content of which is as follows: Message 4: Vendor → Consumer (Mobile Device Purchase Order Confirmation Message) OP-code|Consumer Order Number|Manufacturer Business Registration Information|E Xa1 ♁ Xb1 (various consumption details and amount//total amount//vendor collection account number)|HMAC( Xa1+ 2 Xb1) At this time, OP-code=4; (4) Vendor sets the consumer order number status=7; Phase 2: (Wireless shopping payment request/reply and bank payment message stage) Step 2.1: (1) The consumer receives the packet from the manufacturer, OP-code inspection Status, if not equal, discard this packet and continue waiting for the correct packet to arrive. If they are equal, they know that the packet is a shopping order confirmation message; (2) perform authentication, that is, check HMAC (Xa1+ 2 Xb1) c HMAC(Xa1+ 2 Xb1) r , where the subscript c represents HMAC (Xa1+ 2 Xb1) is calculated by the internal parameters of the consumer, and the subscript r represents the message authentication code HMAC (Xa1+ 2) received by the consumer in the message 4. Xb1), if the two are not equal, it means that the packet is invalid if it is transmitted, then the packet is discarded and continues to wait for the correct packet; if the two are equal, it means that the transmitted packet is legal, and the consumer reads the manufacturer's profit business registration data. And use Xa1 ♁ Xb1 decryption to obtain various consumption details and amount, total amount, and the manufacturer's collection account; (3) the consumer submits a wireless shopping payment application to the issuing bank, and the consumer transmits the message 5 to the issuing bank, the contents of which are as follows: Message 5: Consumer → Issuer Bank (Wireless Shopping Payment Request) OP-code | UserID| RSA_En (Xa2,e)| En1 (Xa3, Xa2, Xa2 ♁ K PW )| (CSK//Xa1//Consumer order number//Company profit business registration information//Total amount//Manufacturer collection account//Manufacturer's contact number)| E Xa1 ( En2 (Xa2, Xa3 ♁ AK))|HMAC ((CSK ♁ Xa2) + 2 Xa3) At this time, OP-code=5; (4) Set the consumer's status=6; Step 2.2: (1) The bank receives the packet from the consumer and retrieves the existence according to the UserID. The status of the consumer inside the bank (the status of the UserID in the bank, currently the initial value is 5), check the OP-code Status, if not equal, discard this packet and continue waiting for the correct packet to arrive. If they are equal, they know that the packet is a wireless shopping payment application; (2) the bank then obtains the consumer's RSA encryption/decryption key (e, d, N) by the UserID's DCC, and then decrypts the RSA_En (Xa2, e) Get Xa2, use Xa2 and K PW to decrypt En1 (Xa3, Xa2, Xa2 ♁ K PW ) to get Xa3, then decrypt it with Xa3 ♁ K PW (CSK//Xa1//consumer order number / / manufacturer profit business registration information / / total amount / / manufacturer collection account / / manufacturer's contact phone) to obtain CSK, Xa1, consumer order number, manufacturer profit business registration information , the total amount, the contact number of the manufacturer's collection account and the manufacturer, followed by the second certification, that is, inspection, HMAC ((CSK ♁ Xa2) + 2 Xa3) c HMAC((CSK ♁ Xa2)+ 2 Xa3) r , where the subscript c stands for HMAC ((CSK ♁ Xa2) + 2 Xa3) is calculated by the bank through the previous procedures CSK, Xa2 and Xa3, and the subscript r On behalf of the bank, the message authentication code HMAC ((CSK ♁ Xa2) + 2 Xa3) carried in message 5 is received. If the two are not equal, it indicates that the transmitted packet is illegal, and the packet is discarded; If they are equal, it means that the transmitted packet is legal; (3) The issuing bank decrypts E Xa1 ( En2 (Xa2, Xa3 ♁ AK)) with Xa1 to retrieve the payment dynamic authentication code ( En2 (Xa2, Xa3 ♁ AK)), and then proceeds The third certification, ie inspection, En2 (Xa2, Xa3 ♁ AK) c En2 (Xa2, Xa3 ♁ AK) r , where the subscript c represents En2 (Xa2, Xa3 ♁ AK) is calculated by the bank through the previous procedures Xa2, Xa3 and the consumer authentication key AK stored in the bank, and The subscript r indicates that the bank receives the payment dynamic authentication code En2 (Xa2, Xa3 ♁ AK) carried in the message 5. If the two are not equal, it indicates that the transmitted packet is illegal, and the packet is discarded; If they are equal, it means that the legitimate consumer wireless shopping payment application is sent; (4) The issuing bank picks up the credit card number of the consumer in the DCC by UserID, checks the credit status of the consumer, and decides whether the payment is successful if the transaction is successful. (Appropriation), the issuing bank will transfer the total amount to the manufacturer's receiving account. If the transaction fails, the issuing bank will write the transaction failure reason message into the transaction result message; (5) The issuing bank will send the wireless shopping payment application reply message (massage6) ) To the consumer: Message 6: Issuer Bank → Consumer (Wireless Shopping Payment Request Reply) OP-code| E CSK ♁ Xa1 (Consumer Order Number // Transaction Result Message) | HMAC (Xa1+ 2 CSK) At this time, OP -code=6;(6)Consumption After receiving the packet from the issuing bank, check the OP-code Status, if not equal, discard the packet and continue to wait for the correct packet to arrive; if equal, it means that the packet is a wireless shopping payment request reply message; (7) the consumer performs authentication, that is, check, HMAC (Xa1 + 2 CSK) c HMAC(Xa1+ 2 CSK) r , where the subscript c represents HMAC (Xa1+ 2 CSK) is calculated by the internal parameters of the consumer, and the subscript r represents the message authentication code HMAC (Xa1+ 2) received by the consumer in the message 6. CSK), if the two are not equal, it means that the packet is invalid and the packet is discarded; if the two are equal, it means that the transmitted packet is legal; (8) the consumer obtains this by CSK ♁ Xa1 decryption. The consumer order number and the transaction result message of the second purchase, if the transaction result message is “transaction failed”, the reason information of the transaction failure is read and the transaction is terminated, and if the transaction result message is “transaction successful”, the consumer is set. Status=8, waiting for the manufacturer to send the electronic invoice; Step 2.3: (1) The issuing bank sends the wireless shopping payment message (massage7) to the manufacturer: Message 7: issuing bank → manufacturer (wireless shopping payment message) OP-code|consumer Order number| (payment message) | HMAC (Xa1 ♁ CSK) at this time, OP-code = 7; (2) Bank set consumer's Status = 9; (3) when the manufacturer receives the packet from the issuing bank, by the consumer Order number to take out its status, check OP-code Status, if not equal, discard the packet and continue to wait for the correct packet to arrive. If it is equal, it knows that the packet is a bank payment message packet; (4) the manufacturer obtains the consumer-related parameters from the consumer order number, and then authenticates , ie test, HMAC (Xa1 ♁ CSK) c HMAC(Xa1 ♁ CSK) r , where the subscript c represents HMAC (Xa1 ♁ CSK) is calculated by the internal parameters of the vendor, and the subscript r represents the message authentication code HMAC (Xa1 ♁ CSK) received by the vendor in the message7. If the two are not equal, it means that the transmitted packet is invalid, and the packet is discarded; if the two are equal, it means that the transmitted packet is legal; (5) the manufacturer decrypts with Xa1+ 2 CSK (Payment message) Obtain payment information. If the transaction is successful (bank payment), ship and send the electronic invoice to the consumer, ie, execute step 3.1. If the transaction fails, terminate the transaction; Stage 3: (vendor) Transfer electronic invoice stage) Step 3.1: (1) The manufacturer sends the electronic invoice message (message 8) to the consumer, the content of which is as follows: Message 8: Vendor → Consumer (electronic invoice message) OP-code|Consumer order number|Electronics Invoice|HMAC((CSK+ 2 Xa1)♁ Xb1) At this time, OP-code=8; (2) The manufacturer sets the status of the consumer order number=9; (3) After the consumer receives the message, check the OP-code Status, if not equal, discard the packet and continue to wait for the correct packet to arrive; if equal, it represents the electronic invoice message sent by the manufacturer, and then authenticate, ie, check HMAC ((CSK+ 2 Xa1)♁ Xb1) c HMAC((CSK+ 2 Xa1)♁ Xb1) r , if not equal, discard this message. If they are equal, the consumer can take out the electronic invoice and end the transaction. 如申請專利範圍第7項所述之購物系統的實施方法,其中除步驟1.1外,其餘所有步驟的通訊信息資料都被完整而安全地加密保護,而每一通訊封包中皆有HMAC()來保護此通訊信息封包的完整性,並以通訊雙方產生之動態鏈結金鑰,如CSK,Xa1,Xa2,Xa3,Xb1金鑰,運算而產生的動態金鑰Kd作為HMAC(Kd)之密鑰,如此透過通訊雙方產生之動態鏈結金鑰與HMAC(Kd)之連結,而達到通訊雙方的私密性、完整性、不可否認性及相互認證功能。 For example, in the implementation method of the shopping system described in claim 7, wherein the communication information of all the steps except the step 1.1 is completely and securely encrypted, and each communication packet has HMAC(). The integrity of the communication information packet is protected, and the dynamic key Kd generated by the dynamic link key generated by the communication parties, such as CSK, Xa1, Xa2, Xa3, and Xb1 keys, is used as the key of HMAC (Kd). In this way, through the connection between the dynamic link key generated by the two parties and HMAC (Kd), the privacy, integrity, non-repudiation and mutual authentication functions of the two parties are achieved. 一種安全的行動裝置購物系統,包含發卡銀行、廠商與行動裝置三個單位,各單位之間的交易功能包含:(1)消費者(行動裝置)與廠商間之交易功能為“購物訂單確認與傳送電子發票”;(2)銀行與消費者(行動裝置)間之交易功能為“無線購物付款申請/回覆”;(3)銀行與廠商間之交易功能為“銀行付款訊息”。 A secure mobile device shopping system, comprising three banks: issuing bank, manufacturer and mobile device. The transaction function between each unit includes: (1) the transaction function between the consumer (mobile device) and the manufacturer is "customer order confirmation and (2) The transaction function between the bank and the consumer (mobile device) is "wireless shopping payment application/reply"; (3) the transaction function between the bank and the manufacturer is "bank payment message".
TW102126228A 2013-07-23 2013-07-23 Secure mobile device shopping system and method TW201504964A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW102126228A TW201504964A (en) 2013-07-23 2013-07-23 Secure mobile device shopping system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW102126228A TW201504964A (en) 2013-07-23 2013-07-23 Secure mobile device shopping system and method

Publications (1)

Publication Number Publication Date
TW201504964A true TW201504964A (en) 2015-02-01

Family

ID=53018948

Family Applications (1)

Application Number Title Priority Date Filing Date
TW102126228A TW201504964A (en) 2013-07-23 2013-07-23 Secure mobile device shopping system and method

Country Status (1)

Country Link
TW (1) TW201504964A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI651675B (en) * 2016-12-09 2019-02-21 財團法人工業技術研究院 Ticket management method and server
TWI787536B (en) * 2018-07-26 2022-12-21 美商標準認知公司 Systems and methods to check-in shoppers in a cashier-less store
US11538186B2 (en) 2017-08-07 2022-12-27 Standard Cognition, Corp. Systems and methods to check-in shoppers in a cashier-less store
US11810317B2 (en) 2017-08-07 2023-11-07 Standard Cognition, Corp. Systems and methods to check-in shoppers in a cashier-less store

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI651675B (en) * 2016-12-09 2019-02-21 財團法人工業技術研究院 Ticket management method and server
US11538186B2 (en) 2017-08-07 2022-12-27 Standard Cognition, Corp. Systems and methods to check-in shoppers in a cashier-less store
US11810317B2 (en) 2017-08-07 2023-11-07 Standard Cognition, Corp. Systems and methods to check-in shoppers in a cashier-less store
TWI787536B (en) * 2018-07-26 2022-12-21 美商標準認知公司 Systems and methods to check-in shoppers in a cashier-less store

Similar Documents

Publication Publication Date Title
CN105745678B (en) Secure remote payment transaction processing including consumer authentication
US8601268B2 (en) Methods for securing transactions by applying crytographic methods to assure mutual identity
US10135614B2 (en) Integrated contactless MPOS implementation
CN105556553B (en) Secure remote payment transaction processing
KR102222230B1 (en) Secure remote payment transaction processing using a secure element
CA2937850C (en) Verification of portable consumer devices
US20210167962A1 (en) System And Method For Generating Trust Tokens
US20170124535A1 (en) Systems and methods for securing cryptocurrency purchases
JP2018522353A (en) Authentication system and method for server-based payment
US20090222383A1 (en) Secure Financial Reader Architecture
US20150317625A1 (en) Verification of portable consumer devices
EP2098985A2 (en) Secure financial reader architecture
JP6498192B2 (en) How to secure the online transaction verification step
JP6743276B2 (en) System and method for end-to-end key management
US8620824B2 (en) Pin protection for portable payment devices
KR20160132105A (en) Method and system for generating an advanced storage key in a mobile device without secure elements
TWI591553B (en) Systems and methods for mobile devices to trade financial documents
US11756029B2 (en) Secured end-to-end communication for remote payment verification
US20110022837A1 (en) Method and Apparatus For Performing Secure Transactions Via An Insecure Computing and Communications Medium
TW201504964A (en) Secure mobile device shopping system and method
TW201619880A (en) Network authentication method using card device
PT2306668T (en) System and method for secure on-line transactions
US20210377039A1 (en) Checkout with mac
Plateaux et al. An e-payment architecture ensuring a high level of privacy protection
US20240144232A1 (en) Systems and methods for terminal device attestation for contactless payments