TWI669628B - Token device for conducting cryptography key backup or restoration operation - Google Patents

Token device for conducting cryptography key backup or restoration operation Download PDF

Info

Publication number
TWI669628B
TWI669628B TW107124687A TW107124687A TWI669628B TW I669628 B TWI669628 B TW I669628B TW 107124687 A TW107124687 A TW 107124687A TW 107124687 A TW107124687 A TW 107124687A TW I669628 B TWI669628 B TW I669628B
Authority
TW
Taiwan
Prior art keywords
card
user
security chip
key
control circuit
Prior art date
Application number
TW107124687A
Other languages
Chinese (zh)
Other versions
TW202006589A (en
Inventor
陳嘉宏
洪伯岳
Original Assignee
關楗股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 關楗股份有限公司 filed Critical 關楗股份有限公司
Priority to TW107124687A priority Critical patent/TWI669628B/en
Application granted granted Critical
Publication of TWI669628B publication Critical patent/TWI669628B/en
Publication of TW202006589A publication Critical patent/TW202006589A/en

Links

Abstract

本發明提出一種訊標裝置,包含:傳輸介面,可從外部裝置接收電力;生物特徵偵測電路,可偵測用戶觸壓動作及用戶的生物特徵;智慧卡存取電路,可偵測用戶放卡動作,並存取智慧卡上的卡端安全晶片;訊標端安全晶片;以及控制電路,設置成產生與生物特徵偵測電路的偵測結果相應的身分識別資料,以及分別傳送身分識別資料給訊標端安全晶片與卡端安全晶片進行身分驗證。倘若訊標端安全晶片與卡端安全晶片兩端的身分驗證皆成功,則控制電路會在訊標端安全晶片與卡端安全晶片之間進行相應的金鑰備份運作或金鑰還原運作。The invention provides a signal mark device, comprising: a transmission interface, which can receive power from an external device; a biometric detection circuit capable of detecting a user's touch action and a user's biological characteristics; and a smart card access circuit capable of detecting a user's release Card action, and accessing the card end security chip on the smart card; the message end security chip; and the control circuit configured to generate the identity identification data corresponding to the detection result of the biometric detection circuit, and separately transmit the identity identification data Perform identity verification on the target security chip and the card security chip. If the identity verification at both ends of the beacon security chip and the card security chip is successful, the control circuit performs a corresponding key backup operation or key restoration operation between the beacon security chip and the card security chip.

Description

用於進行金鑰備份或還原操作的訊標裝置Signal device for performing key backup or restore operations

本發明涉及金鑰備份及還原操作,尤指一種用於進行金鑰備份或還原操作的訊標裝置。The present invention relates to a key backup and restore operation, and more particularly to a beacon device for performing a key backup or restore operation.

隨著各種資訊應用科技的發展,簽章金鑰或加密金鑰等各種金鑰(cryptography key)的使用越來越普及,連帶地對這些金鑰進行備份的需求也隨之大增。With the development of various information application technologies, the use of various cryptography keys such as signature keys or encryption keys has become more and more popular, and the demand for backing up these keys has increased.

例如,在物聯網的相關系統中,經常利用各種金鑰機制來驗證裝置的身分真實性,或是對資料進行簽章加密,以確保資料在物聯網裝置彼此之間傳輸的過程中不會被竄改。物聯網系統中的相關金鑰一旦遺失,便得耗費許多時間在眾多相關裝置上重新佈署金鑰,否則便會導致整個物聯網系統出現資訊安全漏洞。For example, in the related systems of the Internet of Things, various key mechanisms are often used to verify the authenticity of the device, or to encrypt the data to ensure that the data will not be transmitted during the transmission of the IoT devices to each other. Tampering. Once the relevant key in the IoT system is lost, it will take a lot of time to redistribute the key on many related devices, otherwise it will lead to information security vulnerabilities in the entire IoT system.

又例如,在諸如比特幣(Bitcoin)、以太幣(Ether)、瑞波幣(Ripple)、萊特幣(Litecoin)等各類加密虛擬貨幣的應用中,加密虛擬貨幣可用金鑰形式儲存在用戶的私人儲存裝置中,讓用戶可以自行保存。然而,用戶自行保存的金鑰一旦遺失或損毀,將造成嚴重的經濟損失。For another example, in applications such as Bitcoin, Ether, Ripple, Litecoin, etc., the encrypted virtual currency can be stored in the user's private form in the form of a key. In the storage device, the user can save it by himself. However, if the key saved by the user is lost or destroyed, it will cause serious economic losses.

有鑑於此,如何使各種金鑰的備份或還原過程能夠更加簡便但又同時兼顧資料安全性,實為有待解決的技術問題。In view of this, how to make the backup or restore process of various keys easier and at the same time take into account data security is a technical problem to be solved.

本說明書提供一種用於一金鑰備份裝置中的訊標裝置的實施例,其包含:一傳輸介面,設置成可從一外部裝置接收該訊標裝置運作所需的電力;一生物特徵偵測電路,設置成偵測用戶觸壓動作,以及用戶的生物特徵;一智慧卡存取電路,設置成偵測用戶放卡動作,並可存取設置於一智慧卡上的一卡端安全晶片,其中,該卡端安全晶片內建有一卡端安全記憶體;一訊標端安全晶片,內建有一訊標端安全記憶體;以及一控制電路,耦接於該傳輸介面、該生物特徵偵測電路、該智慧卡存取電路、與該訊標端安全晶片,設置成產生與該生物特徵偵測電路的偵測結果相應的一或多個身分識別資料,傳送一第一身分識別資料給該訊標端安全晶片進行身分驗證,以及傳送一第二身分識別資料給該卡端安全晶片進行身分驗證;其中,倘若該訊標端安全晶片與該卡端安全晶片兩端的身分驗證皆成功,則該控制電路會在該訊標端安全晶片與該卡端安全晶片之間進行一相應的金鑰備份運作或金鑰還原運作。The present specification provides an embodiment of a beacon device for use in a key backup device, comprising: a transmission interface configured to receive power required for operation of the beacon device from an external device; a biometric detection The circuit is configured to detect a user touch action and a biometric feature of the user; a smart card access circuit is configured to detect a user card release action and access a card end security chip disposed on a smart card, The card end security chip has a card end security memory built therein; a message end security chip has a built-in security memory; and a control circuit coupled to the transmission interface, the biometric detection The circuit, the smart card access circuit, and the beacon security chip are configured to generate one or more identity identification data corresponding to the detection result of the biometric detection circuit, and transmit a first identity identification data to the The beacon security chip performs identity verification, and transmits a second identity identification data to the card security chip for identity verification; wherein, if the cell security chip and the card end Identity across the full wafer verification are successful, the control circuit may perform a backup operation of the corresponding key or key information to restore the operating standard between the wafer and the card side security side security wafer.

本說明書另提供一種用於一金鑰備份系統中的訊標裝置的實施例,其包含:一傳輸介面,設置成可與一主控端裝置進行資料通訊,並接收該主控端裝置傳來的一主控端認證資料;一智慧卡存取電路,設置成存取設置於一智慧卡上的一卡端安全晶片,其中,該卡端安全晶片內建有一卡端安全記憶體;一訊標端安全晶片,內建有一訊標端安全記憶體;以及一控制電路,耦接於該傳輸介面、該智慧卡存取電路、與該訊標端安全晶片,設置成產生包含該主控端認證資料的一或多個身分識別資料,傳送一第一身分識別資料給該訊標端安全晶片進行身分驗證,以及傳送一第二身分識別資料給該卡端安全晶片進行身分驗證;其中,倘若該訊標端安全晶片與該卡端安全晶片兩端的身分驗證皆成功,則該控制電路會依據該主控端裝置的指示,在該訊標端安全晶片與該卡端安全晶片之間進行一相應的金鑰備份運作或金鑰還原運作。The present specification further provides an embodiment of a beacon device used in a key backup system, comprising: a transmission interface configured to communicate with a host device and receive the host device a smart card access circuit configured to access a card end security chip disposed on a smart card, wherein the card end security chip has a card end security memory built therein; The target security chip has a built-in security memory; and a control circuit coupled to the transmission interface, the smart card access circuit, and the beacon security chip, configured to generate the host One or more identity identification data of the authentication data, transmitting a first identity identification data to the identity end security chip for identity verification, and transmitting a second identity identification data to the card security chip for identity verification; wherein, if The identity verification of both the beacon end security chip and the card end security chip is successful, and the control circuit according to the instruction of the main control device, the security chip at the beacon end and the Performing a backup operation of the corresponding key or key operation reducing end security between the wafer.

上述實施例的優點之一,是在進行金鑰備份運作或金鑰還原運作之前,訊標裝置與智慧卡兩端的安全晶片都會先進行用戶身分驗證,可阻止他人私自進行未獲授權的金鑰備份運作或金鑰還原運作。One of the advantages of the above embodiments is that the security device at both ends of the beacon device and the smart card performs user identity verification before the key backup operation or the key recovery operation, and prevents unauthorized unauthorized use of the key. Backup operation or key restore operation.

上述實施例的另一優點,是金鑰被儲存在安全晶片的安全記憶體中,所以能提高金鑰的儲存安全性,並有效降低駭客藉由入侵訊標裝置或智慧卡而竊取金鑰的可能性。Another advantage of the above embodiment is that the key is stored in the secure memory of the security chip, so the security of the key storage can be improved, and the hacker can effectively reduce the key by stealing the beacon device or the smart card. The possibility.

本發明的其他優點將搭配以下的說明和圖式進行更詳細的解說。Other advantages of the invention will be explained in more detail in conjunction with the following description and drawings.

以下將配合相關圖式來說明本發明的實施例。在圖式中,相同的標號表示相同或類似的元件或方法流程。Embodiments of the present invention will be described below in conjunction with the associated drawings. In the drawings, the same reference numerals indicate the same or similar elements or methods.

請參考圖1與圖2。圖1為本發明一實施例的金鑰備份裝置100簡化後的示意圖。圖2為金鑰備份裝置100簡化後的功能方塊圖。金鑰備份裝置100包含訊標裝置110與一或多個智慧卡120。金鑰備份裝置100用於讓用戶可以在訊標裝置110與智慧卡120之間進行金鑰的備份或還原動作。Please refer to Figure 1 and Figure 2. FIG. 1 is a simplified schematic diagram of a key backup device 100 according to an embodiment of the present invention. FIG. 2 is a simplified functional block diagram of the key backup device 100. The key backup device 100 includes a beacon device 110 and one or more smart cards 120. The key backup device 100 is configured to allow a user to perform a backup or restore operation of the key between the target device 110 and the smart card 120.

在說明書及申請專利範圍中所指稱的「金鑰(cryptography key)」一詞,包含基於各式密碼學演算法所產生的電子簽章金鑰、電子加密金鑰、以及各類加密虛擬貨幣(例如,比特幣、以太幣、瑞波幣、萊特幣等等)。The term "cryptography key" as used in the specification and patent application includes electronic signature keys, electronic encryption keys, and various types of encrypted virtual currency generated based on various cryptographic algorithms. For example, Bitcoin, Ethereum, Ripple, Litecoin, etc.).

在本實施例中,訊標裝置110包含殼體111、傳輸介面113、生物特徵偵測電路115、指示電路117、卡片插槽119、智慧卡存取電路211、安全晶片213、安全記憶體215、控制電路217、以及儲存電路219。安全記憶體215內建於安全晶片213中,且其存取權限由安全晶片213所控制。另一方面,智慧卡120則包含有安全晶片121以及安全記憶體223。安全記憶體223內建於安全晶片121中,且其存取權限由安全晶片121所控制。In this embodiment, the beacon device 110 includes a housing 111, a transmission interface 113, a biometric detection circuit 115, an indication circuit 117, a card slot 119, a smart card access circuit 211, a security chip 213, and a secure memory 215. And a control circuit 217 and a storage circuit 219. The secure memory 215 is built into the security chip 213 and its access rights are controlled by the security chip 213. On the other hand, the smart card 120 includes a security chip 121 and a secure memory 223. The secure memory 223 is built into the security chip 121 and its access rights are controlled by the security chip 121.

為方便說明起見,安全晶片213以下稱之為訊標端(on-token)安全晶片213,安全記憶體215以下稱之為訊標端安全記憶體215,安全晶片121以下稱之為卡端(on-card)安全晶片121,安全記憶體223以下稱之為卡端安全記憶體223。For convenience of description, the security chip 213 is hereinafter referred to as an on-token security chip 213, and the secure memory 215 is hereinafter referred to as a message-side secure memory 215, and the security chip 121 is hereinafter referred to as a card terminal. On-card security chip 121, secure memory 223 is hereinafter referred to as card-side secure memory 223.

在訊標裝置110中,可設置能夠從外部裝置接收訊標裝置110運作所需電力的一或多個傳輸介面113。前述的外部裝置可以用能供應電力給訊標裝置110使用的各式電腦、手機、行動電源、充電線等電子裝置來實現。此外,不同的傳輸介面113可用不同規格的連接端子來實現,以增加訊標裝置110可連接的外部裝置的類型數量。In the beacon device 110, one or more transmission interfaces 113 capable of receiving power required for operation of the beacon device 110 from an external device may be provided. The aforementioned external device can be realized by various electronic devices such as a computer, a mobile phone, a mobile power source, and a charging line that can supply power to the beacon device 110. In addition, different transmission interfaces 113 can be implemented with different types of connection terminals to increase the number of types of external devices to which the symbol device 110 can be connected.

例如,在圖1的實施例中,訊標裝置110包含兩個傳輸介面113,分別突出於殼體111的兩端,其中一個傳輸介面113可設計成符合某一種連接器規格(例如,USB Type-A規格)的形式,而另一個傳輸介面113則可設計成符合另一種連接器規格(例如,USB Type-C規格)的形式。當其中一個傳輸介面113插入合適外部裝置的相應供電連接埠時,訊標裝置110便可透過傳輸介面113自外部裝置接收內部元件運作所需的電力。For example, in the embodiment of FIG. 1, the beacon device 110 includes two transmission interfaces 113 respectively protruding from opposite ends of the housing 111. One of the transmission interfaces 113 can be designed to conform to a certain connector specification (for example, USB Type). The -A specification) is in the form of another transmission interface 113 that can be designed to conform to another connector specification (eg, USB Type-C specification). When one of the transmission interfaces 113 is inserted into a corresponding power supply port of a suitable external device, the beacon device 110 can receive the power required for the operation of the internal components from the external device through the transmission interface 113.

如此一來,訊標裝置110的殼體111內部便無需設置供電電池,因此能有效減少訊標裝置110的整體體積與重量。In this way, the power supply battery is not required inside the housing 111 of the signal device 110, so the overall volume and weight of the signal device 110 can be effectively reduced.

實作上,訊標裝置110的殼體111可設計成其他各種輕巧、易於攜帶、或易於手持的形狀,而不侷限於圖1實施例的態樣。例如,可將訊標裝置110設計成各種車用智慧鑰匙(smart key)或房屋用智慧鑰匙的型態。In practice, the housing 111 of the beacon device 110 can be designed in a variety of other lightweight, easy to carry, or easy to handle shapes, and is not limited to the embodiment of FIG. For example, the beacon device 110 can be designed into a variety of smart keys for a car or a smart key for a house.

生物特徵偵測電路115設置成可偵測用戶觸壓生物特徵偵測電路115的動作(以下稱之為用戶觸壓動作,user’s touch action)。另外,生物特徵偵測電路115還可於用戶觸壓時偵測用戶的生物特徵(physiological characteristics,或稱biometric characteristics),例如,用戶的指紋(fingerprint)、掌紋(palm print)等各種膚紋(skin texture)、靜脈血管分佈(vein)、或心電圖(electrocardiogram,ECG)等等。如圖1所示,生物特徵偵測電路115的感測區露出殼體111外。當用戶以身體的特定部位(例如,手指、腳趾、手肘、耳朵等)接觸生物特徵偵測電路115的感測區時,生物特徵偵測電路115便可對用戶的特定身體部位進行偵測,以取得用戶的生物特徵。The biometric detection circuit 115 is configured to detect an action of the user touching the biometric detection circuit 115 (hereinafter referred to as a user's touch action). In addition, the biometric detection circuit 115 can also detect the user's biometric characteristics, such as fingerprints and palm prints, when the user touches the pressure (for example, the user's fingerprint, palm print, etc.) Skin texture), vein distribution (vein), or electrocardiogram (ECG), etc. As shown in FIG. 1, the sensing region of the biometric detection circuit 115 is exposed outside the housing 111. When the user touches the sensing area of the biometric detecting circuit 115 with a specific part of the body (for example, a finger, a toe, an elbow, an ear, etc.), the biometric detecting circuit 115 can detect the specific body part of the user. To obtain the user's biometrics.

生物特徵偵測電路115可在每次被觸壓時,通知控制電路217發生一用戶觸壓動作。實作上,生物特徵偵測電路115可採用各種現有的機械、光學、磁學、或電學偵測機制,來偵測有無用戶觸壓動作發生,也可採用各種現有的生物特徵偵測機制來偵測用戶的生物特徵。The biometric detection circuit 115 can notify the control circuit 217 that a user touch action occurs each time it is touched. In practice, the biometric detection circuit 115 can adopt various existing mechanical, optical, magnetic, or electrical detection mechanisms to detect the presence or absence of a user's touch action, and can also adopt various existing biometric detection mechanisms. Detect the user's biometrics.

例如,生物特徵偵測電路115可在每次感測區被用戶的特定身體部位接觸時,通知控制電路217發生一次用戶觸壓動作。在用戶的特定身體部位脫離感測區之前,控制電路217可以不重複計算用戶觸壓動作的發生次數。For example, the biometric detection circuit 115 can notify the control circuit 217 that a user touch action occurs once each time the sensing area is contacted by a particular body part of the user. The control circuit 217 may not repeatedly calculate the number of occurrences of the user's touch action until the user's particular body part is out of the sensing area.

另外,生物特徵偵測電路115也可對每次被觸壓的持續時間設置適當的過濾條件,以降低將其他情況誤判為用戶觸壓動作的可能性。例如,生物特徵偵測電路115可設置成在每次被觸壓、且該次觸壓持續的時間超過一第一預定時間長度(例如,0.1秒、0.3秒、或是1秒等等)的情況下,才會通知控制電路217發生一次用戶觸壓動作。相反地,倘若生物特徵偵測電路115該次被觸壓的持續時間短於前述的第一預定時間長度,則生物特徵偵測電路115可忽略該次觸壓而不回報給控制電路217。In addition, the biometric detection circuit 115 can also set an appropriate filtering condition for each duration of the touch pressure to reduce the possibility of misjudging other situations as a user's touch action. For example, the biometric detection circuit 115 can be configured to be touched each time, and the time of the touch lasts for more than a first predetermined length of time (eg, 0.1 second, 0.3 second, or 1 second, etc.) In this case, the control circuit 217 is notified that a user touch action occurs. Conversely, if the duration of the biometric detection circuit 115 being touched is shorter than the first predetermined length of time, the biometric detection circuit 115 can ignore the touch and not report it to the control circuit 217.

指示電路117設置成產生用以表示訊標裝置110的相關運作進度的指示信息,或產生用以引導用戶更換(change)智慧卡的指示信息。指示電路117可用能產生光線、顯示文字、顯示圖像、顯示影像的各種視覺效果產生電路來實現,也可用能播放聲音、或語音的各種音訊播放裝置來實現,或者也可用同時整合產生視覺效果及音訊播放功能的各種合適電路來實現。The indicating circuit 117 is configured to generate indication information indicating the progress of the related operation of the beacon device 110, or generate indication information for guiding the user to change the smart card. The indicating circuit 117 can be realized by various visual effect generating circuits capable of generating light, displaying characters, displaying images, and displaying images, and can also be implemented by various audio playing devices capable of playing sounds or voices, or can be integrated to produce visual effects. And various suitable circuits for audio playback functions are implemented.

卡片插槽119設置於殼體111的一側,可供智慧卡120插入其中以使得智慧卡120上的卡端安全晶片121能夠與智慧卡存取電路211相接觸。The card slot 119 is disposed at one side of the housing 111 for the smart card 120 to be inserted therein to enable the card end security chip 121 on the smart card 120 to be in contact with the smart card access circuit 211.

智慧卡存取電路211設置成可偵測用戶將智慧卡120或其他卡片放到能被智慧卡存取電路211偵測到的位置的動作(以下稱之為用戶放卡動作,user’s card-placing action)。另外,智慧卡存取電路211還可在接觸到智慧卡120上的卡端安全晶片121時,與卡端安全晶片121進行指令或資料通訊。The smart card access circuit 211 is configured to detect an action of the user placing the smart card 120 or other card in a position detectable by the smart card access circuit 211 (hereinafter referred to as a user card-playing action, user's card-placing) Action). In addition, the smart card access circuit 211 can also perform command or data communication with the card end security chip 121 when contacting the card end security chip 121 on the smart card 120.

智慧卡存取電路211可在每次偵測到智慧卡120或其他卡片被放置在或移動到能被智慧卡存取電路211偵測到的位置時,通知控制電路217發生一用戶放卡動作。實作上,智慧卡存取電路211可採用各種現有的機械、光學、磁學、或電學偵測機制,來判斷有無用戶放卡動作發生。The smart card access circuit 211 can notify the control circuit 217 of a user card release action each time it detects that the smart card 120 or other card is placed or moved to a position detectable by the smart card access circuit 211. . In practice, the smart card access circuit 211 can employ various existing mechanical, optical, magnetic, or electrical detection mechanisms to determine whether a user has a card release action.

例如,在圖1的實施例中,智慧卡存取電路211可在每次偵測到用戶將智慧卡120或其他卡片插入卡片插槽119中時,通知控制電路217發生一次用戶放卡動作。在用戶將智慧卡120或其他卡片從卡片插槽119中拔出之前,控制電路217可以不重複計算用戶放卡動作的發生次數。For example, in the embodiment of FIG. 1, the smart card access circuit 211 can notify the control circuit 217 of a user card release action each time the user detects that the smart card 120 or other card is inserted into the card slot 119. Before the user pulls the smart card 120 or other card out of the card slot 119, the control circuit 217 may not repeatedly count the number of occurrences of the user's card release action.

又例如,在智慧卡存取電路211是透過無線感應方式與智慧卡進行通訊的某些實施例中,智慧卡存取電路211可在每次偵測到用戶將智慧卡120或其他卡片移動到靠近智慧卡存取電路211時,通知控制電路217發生一次用戶放卡動作。在用戶將智慧卡120或其他卡片移動到智慧卡存取電路211的感應範圍以外之前,控制電路217可以不重複計算用戶放卡動作的發生次數。For another example, in some embodiments in which the smart card access circuit 211 communicates with the smart card via wireless sensing, the smart card access circuit 211 can move the smart card 120 or other card to the user each time the user is detected. When the smart card access circuit 211 is approached, the notification control circuit 217 causes a user card release action. Before the user moves the smart card 120 or other card outside the sensing range of the smart card access circuit 211, the control circuit 217 may not repeatedly calculate the number of occurrences of the user's card-fetching action.

另外,智慧卡存取電路211也可對卡片每次停留在可被智慧卡存取電路211偵測到的位置(或範圍內)的持續時間設置適當的過濾條件,以降低將其他情況誤判為用戶放卡動作的可能性。In addition, the smart card access circuit 211 can also set appropriate filtering conditions for each time the card stays in the position (or range) that can be detected by the smart card access circuit 211, thereby reducing misjudgment to other situations. The possibility of the user placing the card.

例如,在圖1的實施例中,智慧卡存取電路211可在每次偵測到用戶將卡片插入卡片插槽119中、且卡片在可被偵測的位置持續停留超過一第二預定時間長度(例如,0.1秒、0.3秒、或是1秒等等)的情況下,才通知控制電路217發生一次用戶放卡動作。For example, in the embodiment of FIG. 1, the smart card access circuit 211 can each time the user inserts the card into the card slot 119 and the card stays in the detectable position for more than a second predetermined time. In the case of the length (for example, 0.1 second, 0.3 second, or 1 second, etc.), the control circuit 217 is notified that a user card release operation has occurred.

又例如,在智慧卡存取電路211是透過無線感應方式與智慧卡進行通訊的某些實施例中,智慧卡存取電路211可在每次偵測到用戶將智慧卡120或其他卡片靠近智慧卡存取電路211、且卡片在可被偵測的範圍內持續停留超過前述的第二預定時間長度的情況下,才通知控制電路217發生一次用戶放卡動作。For example, in some embodiments in which the smart card access circuit 211 communicates with the smart card through wireless sensing, the smart card access circuit 211 can close the smart card 120 or other cards to the smart each time the user is detected. The card access circuit 211 notifies the control circuit 217 of a user card release action only if the card continues to stay for more than the aforementioned second predetermined length of time within the detectable range.

相反地,倘若用戶該次提供的卡片停留在可被智慧卡存取電路211偵測的位置(或範圍內)的持續時間短於前述的第二預定時間長度,則智慧卡存取電路211可忽略該次放卡動作而不回報給控制電路217。On the contrary, if the card provided by the user stays at the position (or range) detectable by the smart card accessing circuit 211 for a duration shorter than the aforementioned second predetermined time length, the smart card accessing circuit 211 can The card release action is ignored and not reported to the control circuit 217.

訊標端安全晶片213內的訊標端安全記憶體215,預存有金鑰備份裝置100的適格(valid)用戶的身分識別資料(以下稱之為適格用戶身分識別資料)。另一方面,卡端安全晶片121內的卡端安全記憶體223也預存有適格用戶身分識別資料。The message-side secure memory 215 in the target-end security chip 213 prestores the identity identification data of the valid user of the key backup device 100 (hereinafter referred to as the eligible user identity identification data). On the other hand, the card-end secure memory 223 in the card-end security chip 121 also pre-stores the user identification data.

前述的適格用戶身分識別資料可以是依據適格用戶的獨特生物特徵所產生的識別資料,例如,用戶的指紋或靜脈血管分佈所對應的電位差紀錄、熱熵紀錄、灰階影像、多色階影像、彩色影像、或肉眼不可見的特殊光譜影像,或是前述資料經過各種已知的特徵演算法運算後所產生的數位資料。The foregoing suitable user identity identification data may be identification data generated according to the unique biometric characteristics of the eligible user, for example, a potential difference record corresponding to the user's fingerprint or venous blood vessel distribution, a thermal entropy record, a gray scale image, a multi-tone image, A color image, or a special spectral image that is invisible to the naked eye, or a digital data generated by the aforementioned data through various known feature algorithms.

實作上,訊標端安全記憶體215與卡端安全記憶體223兩者可儲存相同的適格用戶身分識別資料,也可以儲存同一適格用戶的不同身分識別資料。例如,在某些實施例中,訊標端安全記憶體215中所儲存的適格用戶身分識別資料,是對應於適格用戶的某個生理特徵(例如,右手食指指紋),而卡端安全記憶體223中所儲存的適格用戶身分識別資料,則是對應於適格用戶的另一個生物特徵(例如,左手食指指紋)。In practice, both the message-side secure memory 215 and the card-end secure memory 223 can store the same qualified user identity identification data, and can also store different identity identification data of the same eligible user. For example, in some embodiments, the qualified user identity identification data stored in the message-side secure memory 215 is a physiological characteristic corresponding to an eligible user (eg, a right-hand index finger fingerprint), and the card-end secure memory The appropriate user identity identification data stored in 223 is another biometric corresponding to the eligible user (eg, the left index finger fingerprint).

如圖2所示,控制電路217耦接於傳輸介面113、生物特徵偵測電路115、指示電路117、智慧卡存取電路211、與訊標端安全晶片213。控制電路217設置成控制前述元件的運作,並可依據生物特徵偵測電路115的通知,記錄用戶觸壓動作的發生時間及發生次數。另外,控制電路217還可依據智慧卡存取電路211的通知,記錄用戶放卡動作的發生時間及發生次數。As shown in FIG. 2, the control circuit 217 is coupled to the transmission interface 113, the biometric detection circuit 115, the indication circuit 117, the smart card access circuit 211, and the beacon end security chip 213. The control circuit 217 is arranged to control the operation of the aforementioned components, and can record the occurrence time and the number of occurrences of the user's touch action according to the notification of the biometric detection circuit 115. In addition, the control circuit 217 can also record the time when the user puts the card and the number of occurrences according to the notification of the smart card access circuit 211.

為了便利說明,前述用戶觸壓動作的發生次數,以下稱之為觸壓次數(touch count),而前述用戶放卡動作的發生次數,以下稱之為放卡次數(card-placing count)。For convenience of explanation, the number of occurrences of the user's touch operation is hereinafter referred to as a touch count, and the number of occurrences of the user's card release operation is hereinafter referred to as a card-placing count.

在運作時,控制電路217還可產生與生物特徵偵測電路115的偵測結果相應的一或多個身分識別資料,以及將相關的身分識別資料分別傳送給訊標端安全晶片213及卡端安全晶片121進行身分驗證。在本實施例中,只有在訊標端安全晶片213與卡端安全晶片121兩端的身分驗證皆成功的情況下,控制電路217才會按照用戶對於金鑰備份裝置100的操作行為判斷用戶下達的指示,並在訊標端安全晶片213與卡端安全晶片121之間進行相應的金鑰備份運作或金鑰還原運作。In operation, the control circuit 217 can also generate one or more identity identification data corresponding to the detection result of the biometric detection circuit 115, and transmit the relevant identity identification data to the beacon end security chip 213 and the card end respectively. The security chip 121 performs identity verification. In this embodiment, only when the identity verification of both the beacon end security chip 213 and the card end security chip 121 is successful, the control circuit 217 judges the user's release according to the user's operation behavior for the key backup device 100. Instructing, and performing a corresponding key backup operation or key restoration operation between the target end security chip 213 and the card end security chip 121.

儲存電路219耦接於控制電路217,且設置成儲存控制電路217運作所需的程式或資料。The storage circuit 219 is coupled to the control circuit 217 and is configured to store programs or data required for the operation of the control circuit 217.

實作上,控制電路217可用具有運算能力、指令解譯能力的各種可編程(programmable)處理器來實現。訊標端安全晶片213與卡端安全晶片121皆可用具備密碼演算法運算能力、金鑰產生及運算能力、電子簽章演算法運算能力、以及可儲存機密性資料的各種處理器或控制器來實現。例如,訊標端安全晶片213可用通過國際資料安全規範認證的各種安全微處理器(secure micro-controller)、安全晶片(secure chip)、硬體安全模組(hardware secure module,HSM)等等來實現,以確保儲存在訊標端安全記憶體215中的適格用戶身分識別資料及相關金鑰不會被輕易竄改。卡端安全晶片121則可用通過國際資料安全規範認證的各種智慧卡(smart card)晶片來實現,以確保儲存在卡端安全記憶體223中的適格用戶身分識別資料及相關金鑰不會被輕易竄改。In practice, the control circuit 217 can be implemented by various programmable processors having computing power and instruction interpretation capabilities. Both the message end security chip 213 and the card end security chip 121 can be implemented by various processors or controllers having cryptographic algorithm computing power, key generation and computing power, electronic signature algorithm computing capability, and confidentiality information. achieve. For example, the beacon security chip 213 can be implemented by various security micro-controllers, secure chips, hardware secure modules (HSMs), etc., which are certified by the International Data Security Specification. The implementation is to ensure that the appropriate user identity identification data and related keys stored in the secure memory 215 of the message end are not easily falsified. The card-end security chip 121 can be implemented by various smart card chips certified by the international data security specification to ensure that the appropriate user identity identification data and related keys stored in the card-side secure memory 223 are not easily Tampering.

以下將搭配圖3至圖5來說明金鑰備份裝置100的幾種應用態樣。圖3為金鑰備份裝置100的第一種應用態樣簡化後的示意圖。圖4為金鑰備份裝置100的第二種應用態樣簡化後的示意圖。圖5為金鑰備份裝置100的第三種應用態樣簡化後的示意圖。Several application aspects of the key backup apparatus 100 will be described below with reference to FIGS. 3 to 5. FIG. 3 is a simplified schematic diagram of the first application aspect of the key backup device 100. FIG. 4 is a simplified schematic diagram of a second application aspect of the key backup device 100. FIG. 5 is a simplified schematic diagram of a third application aspect of the key backup device 100.

在圖3所繪示的應用態樣中,用戶可按照操作行為表310所記載的方式對訊標裝置110下達金鑰備份指令,使得訊標裝置110以單純的一對一備份模式將儲存在訊標端安全記憶體215中的目標金鑰,複製到單一智慧卡120中的卡端安全記憶體223內進行保存。如此一來,原本只儲存在訊標裝置110中的目標金鑰,便能有一個備份版本被保存在智慧卡120中。In the application aspect illustrated in FIG. 3, the user can issue a key backup instruction to the beacon device 110 in the manner described in the operation behavior table 310, so that the beacon device 110 is stored in a simple one-to-one backup mode. The target key in the target security memory 215 is copied to the card-side secure memory 223 in the single smart card 120 for storage. In this way, only the target key stored in the target device 110 can be saved in the smart card 120.

例如,在一實施例中,用戶可按照操作行為態樣311的指示,先進行用戶觸壓動作一次,然後再進行用戶放卡動作一次,藉此對訊標裝置110下達金鑰備份指令。For example, in an embodiment, the user may first perform a user touch action once according to the instruction of the operation behavior mode 311, and then perform a user card release action once, thereby issuing a key backup instruction to the target device 110.

在另一實施例中,用戶可按照操作行為態樣312的指示,先進行用戶觸壓動作K次,然後再進行用戶放卡動作K次,藉此對訊標裝置110下達金鑰備份指令,其中,K為大於1的正整數。In another embodiment, the user may perform the user touch action K times according to the instruction of the operation behavior mode 312, and then perform the user card release action K times, thereby issuing a key backup instruction to the target device 110. Where K is a positive integer greater than one.

在另一實施例中,用戶可按照操作行為態樣313的指示,先進行用戶放卡動作一次,然後再進行用戶觸壓動作一次,藉此對訊標裝置110下達金鑰備份指令。In another embodiment, the user may perform the user card release action once according to the instruction of the operation behavior mode 313, and then perform the user touch action once, thereby issuing a key backup instruction to the target device 110.

在另一實施例中,用戶可按照操作行為態樣314的指示,先進行用戶放卡動作K次,然後再進行用戶觸壓動作K次,藉此對訊標裝置110下達金鑰備份指令。In another embodiment, the user may perform the user card release action K times according to the instruction of the operation behavior mode 314, and then perform the user touch action K times, thereby issuing a key backup instruction to the target device 110.

完成前述的金鑰備份運作之後,訊標裝置110中的目標金鑰將會一個備份版本被保存在單一智慧卡120中。After the aforementioned key backup operation is completed, the target key in the symbol device 110 will be saved in the single smart card 120 in a backup version.

之後,當用戶想要將智慧卡120中儲存的目標金鑰還原到某一訊標裝置110時,用戶可按照圖3中的操作行為表320所記載的方式對訊標裝置110進行操作,以對訊標裝置110下達金鑰還原指令,使得訊標裝置110以單純的一對一還原模式將儲存在單一智慧卡120中的目標金鑰,複製到單一訊標裝置110中的訊標端安全記憶體215內進行保存。如此一來,被保存在智慧卡120中的目標金鑰,便能被還原到訊標裝置110中。Thereafter, when the user wants to restore the target key stored in the smart card 120 to a certain symbol device 110, the user can operate the beacon device 110 in the manner described in the operation behavior table 320 in FIG. The key device 110 issues a key restore command, so that the target device 110 copies the target key stored in the single smart card 120 to the target end of the single target device 110 in a simple one-to-one restore mode. The memory 215 is stored inside. In this way, the target key stored in the smart card 120 can be restored to the beacon device 110.

例如,在一實施例中,用戶可按照操作行為態樣321的指示,先進行用戶放卡動作一次,然後再進行用戶觸壓動作一次,藉此對訊標裝置110下達金鑰還原指令。For example, in an embodiment, the user may perform the user card release action once according to the instruction of the operation behavior mode 321, and then perform the user touch action once, thereby issuing a key restoration instruction to the target device 110.

在另一實施例中,用戶可按照操作行為態樣322的指示,先進行用戶放卡動作K次,然後再進行用戶觸壓動作K次,藉此對訊標裝置110下達金鑰還原指令,其中,K為大於1的正整數。In another embodiment, the user may perform the user card release action K times according to the instruction of the operation behavior mode 322, and then perform the user touch action K times, thereby issuing a key restoration instruction to the target device 110. Where K is a positive integer greater than one.

在另一實施例中,用戶可按照操作行為態樣323的指示,先進行用戶觸壓動作一次,然後再進行用戶放卡動作一次,藉此對訊標裝置110下達金鑰還原指令。In another embodiment, the user may perform the user touch action once, and then perform the user card release action once, according to the instruction of the operation behavior mode 323, thereby issuing a key restoration instruction to the target device 110.

在另一實施例中,用戶可按照操作行為態樣324的指示,先進行用戶觸壓動作K次,然後再進行用戶放卡動作K次,藉此對訊標裝置110下達金鑰還原指令。In another embodiment, the user may perform the user touch action K times in accordance with the instruction of the operation behavior mode 324, and then perform the user card release action K times, thereby issuing a key restoration instruction to the target device 110.

完成前述的金鑰還原運作之後,儲存在單一智慧卡120中的目標金鑰便會被還原到單一訊標裝置110中。After the aforementioned key restoration operation is completed, the target key stored in the single smart card 120 is restored to the single symbol device 110.

在實際應用中,用以下達金鑰備份指令的用戶操作行為,與用以下達金鑰還原指令的用戶操作行為,兩者彼此之間不能完全相同(亦即,兩者之間要存在可區別性),以避免訊標裝置110解讀用戶指令時產生衝突。In practical applications, the user operation behavior of the following key backup instruction and the user operation behavior of the instruction restoration with the following key are not identical to each other (that is, there must be a distinction between the two (Sexuality) to avoid conflicts when the symbol device 110 interprets the user's instructions.

在圖3中,操作行為表310與320之間的虛線,便是代表用戶下達金鑰備份指令的操作行為,與下達金鑰還原指令的操作行為兩者之間的可行搭配方式。In FIG. 3, the dotted line between the operation behavior tables 310 and 320 is a feasible combination between the operation behavior of the user's release key instruction and the operation behavior of the release key instruction.

例如,用以下達金鑰備份指令的操作行為態樣311或312所描述的用戶操作行為,可以跟用以下達金鑰還原指令的操作行為態樣321或322所描述的用戶操作行為互相搭配使用。For example, the user operation behavior described by the operation behavior pattern 311 or 312 of the following key backup instruction may be used in conjunction with the user operation behavior described by the operation behavior pattern 321 or 322 of the following key restoration instruction. .

又例如,用以下達金鑰備份指令的操作行為態樣313或314所描述的用戶操作行為,則可以跟用以下達金鑰還原指令的操作行為態樣323或324所描述的用戶操作行為互相搭配使用。For another example, the user operation behavior described by the operation behavior pattern 313 or 314 of the following key backup instruction may be followed by the user operation behavior described by the operation behavior pattern 323 or 324 of the following key restoration instruction. For use with.

在圖4所繪示的應用態樣中,用戶可按照操作行為表410所記載的方式對訊標裝置110下達金鑰備份指令,使得訊標裝置110以單純的一對多備份模式將儲存在訊標端安全記憶體215中的目標金鑰,複製到多個智慧卡120中的卡端安全記憶體223內進行保存。如此一來,原本只儲存在訊標裝置110中的目標金鑰,便能有多個相同的備份版本被分別保存在多個不同的智慧卡120中。In the application aspect illustrated in FIG. 4, the user can issue a key backup instruction to the beacon device 110 in the manner described in the operation behavior table 410, so that the beacon device 110 is stored in a simple one-to-many backup mode. The target key in the target-side secure memory 215 is copied to the card-side secure memory 223 of the plurality of smart cards 120 for storage. In this way, the target key that is originally stored only in the beacon device 110 can have multiple identical backup versions stored in the plurality of different smart cards 120.

例如,在一實施例中,用戶可按照操作行為態樣411的指示,先進行用戶觸壓動作一次,然後再進行用戶放卡動作N次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,且代表要用來備份目標金鑰的智慧卡數量。例如,用戶可先進行用戶觸壓動作一次,然後再進行用戶放卡動作2次,以指示訊標裝置110將目標金鑰備份到兩張智慧卡120中。又例如,用戶可先進行用戶觸壓動作一次,然後再進行用戶放卡動作3次,以指示訊標裝置110將目標金鑰備份到三張智慧卡120中。For example, in an embodiment, the user may perform the user touch action once, and then perform the user card release action N times according to the instruction of the operation behavior mode 411, thereby issuing a key backup instruction to the target device 110. Where N is a positive integer greater than 1 and represents the number of smart cards to be used to back up the target key. For example, the user may perform the user touch action once, and then perform the user card release action twice to instruct the beacon device 110 to back up the target key into the two smart cards 120. For another example, the user may perform the user touch action once, and then perform the user card release action 3 times to instruct the beacon device 110 to back up the target key into the three smart cards 120.

在另一實施例中,用戶可按照操作行為態樣412的指示,先進行用戶觸壓動作N次,然後再進行用戶放卡動作一次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,且代表要用來備份目標金鑰的智慧卡數量。例如,用戶可先進行用戶觸壓動作2次,然後再進行用戶放卡動作一次,以指示訊標裝置110將目標金鑰備份到兩張智慧卡120中。又例如,用戶可先進行用戶觸壓動作3次,然後再進行用戶放卡動作一次,以指示訊標裝置110將目標金鑰備份到三張智慧卡120中。In another embodiment, the user may perform the user touch action N times according to the instruction of the operation behavior mode 412, and then perform the user card release action once, thereby issuing a key backup instruction to the target device 110, wherein , N is a positive integer greater than 1, and represents the number of smart cards to be used to back up the target key. For example, the user may perform the user touch action twice, and then perform the user release action once to instruct the beacon device 110 to back up the target key into the two smart cards 120. For another example, the user may perform the user touch action three times, and then perform the user card release action once to instruct the beacon device 110 to back up the target key into the three smart cards 120.

在另一實施例中,用戶可按照操作行為態樣413的指示,先進行用戶放卡動作一次,然後再進行用戶觸壓動作N次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,且代表要用來備份目標金鑰的智慧卡數量。In another embodiment, the user may perform the user card release action once according to the instruction of the operation behavior mode 413, and then perform the user touch action N times, thereby issuing a key backup instruction to the target device 110, wherein , N is a positive integer greater than 1, and represents the number of smart cards to be used to back up the target key.

在另一實施例中,用戶可按照操作行為態樣314的指示,先進行用戶放卡動作N次,然後再進行用戶觸壓動作一次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,且代表要用來備份目標金鑰的智慧卡數量。In another embodiment, the user may perform the user card release action N times according to the instruction of the operation behavior mode 314, and then perform the user touch action once, thereby issuing a key backup instruction to the target device 110, wherein , N is a positive integer greater than 1, and represents the number of smart cards to be used to back up the target key.

在進行金鑰備份的過程中,用戶可按照預定的時間間隔或是訊標裝置110的指示信息,陸續更換訊標裝置110所存取的智慧卡,以使訊標裝置110得以將目標金鑰陸續寫入多張智慧卡120中。During the key backup process, the user can replace the smart card accessed by the target device 110 according to the predetermined time interval or the indication information of the information device 110, so that the target device 110 can obtain the target key. Write multiple smart cards 120 one after another.

完成前述的金鑰備份運作之後,訊標裝置110中的目標金鑰便會有多個相同的備份版本被分別保存在多個不同的智慧卡120中,亦即,前述的多個智慧卡120中所儲存的目標金鑰都相同。After the foregoing key backup operation is completed, the target key in the target device 110 has a plurality of identical backup versions stored in the plurality of different smart cards 120, that is, the plurality of smart cards 120. The target keys stored in are the same.

之後,當用戶想要將智慧卡120中儲存的目標金鑰還原到某一訊標裝置110時,用戶可按照圖4中的操作行為表320所記載的方式對訊標裝置110進行操作,以對訊標裝置110下達金鑰還原指令,使得訊標裝置110以單純的一對一還原模式將儲存在單一智慧卡120中的目標金鑰,複製到單一訊標裝置110中的訊標端安全記憶體215內進行保存。如此一來,被保存在智慧卡120中的目標金鑰,便能被還原到訊標裝置110中。Thereafter, when the user wants to restore the target key stored in the smart card 120 to a certain symbol device 110, the user can operate the beacon device 110 in the manner described in the operation behavior table 320 in FIG. The key device 110 issues a key restore command, so that the target device 110 copies the target key stored in the single smart card 120 to the target end of the single target device 110 in a simple one-to-one restore mode. The memory 215 is stored inside. In this way, the target key stored in the smart card 120 can be restored to the beacon device 110.

圖4中的操作行為表320跟前述圖3中的操作行為表320相同,所以前述有關圖3中的操作行為表320的說明,亦適用於圖4的應用態樣中。為簡潔起見,在此不重複敘述相關的用戶操作方式。The operation behavior table 320 in FIG. 4 is the same as the operation behavior table 320 in FIG. 3 described above, so the foregoing description regarding the operation behavior table 320 in FIG. 3 also applies to the application aspect of FIG. For the sake of brevity, the related user operations are not repeated here.

在完成前述的金鑰還原運作之後,儲存在單一智慧卡120中的目標金鑰便會被還原到單一訊標裝置110中。After the aforementioned key restoration operation is completed, the target key stored in the single smart card 120 is restored to the single symbol device 110.

在圖4中,操作行為表410與320之間的虛線,代表用戶下達金鑰備份指令的操作行為與下達金鑰還原指令的操作行為之間的可行搭配方式。In FIG. 4, the dashed line between the operational behavior tables 410 and 320 represents a possible match between the operational behavior of the user issuing the key backup instruction and the operational behavior of the release key instruction.

例如,用以下達金鑰備份指令的操作行為態樣411或412所描述的用戶操作行為,可以跟用以下達金鑰還原指令的操作行為態樣321或322所描述的用戶操作行為互相搭配。For example, the user operation behavior described by the operational behavior pattern 411 or 412 of the following key backup instruction may be matched with the user operation behavior described by the following operational behavior pattern 321 or 322 of the key restoration instruction.

又例如,用以下達金鑰備份指令的操作行為態樣413或414所描述的用戶操作行為,則可以跟用以下達金鑰還原指令的操作行為態樣323或324所描述的用戶操作行為互相搭配。For another example, the user operation behavior described by the operation behavior pattern 413 or 414 of the following key backup instruction may be followed by the user operation behavior described by the operation behavior pattern 323 or 324 of the following key restoration instruction. Match.

在圖5所繪示的應用態樣中,用戶可按照操作行為表510所記載的方式對訊標裝置110下達金鑰備份指令,使得訊標裝置110以分持型態的一對多備份模式將儲存在訊標端安全記憶體215中的目標金鑰,分散到多個智慧卡120中的卡端安全記憶體223內進行保存。如此一來,原本只儲存在訊標裝置110中的目標金鑰,便能以分持備份(M of N backup)方式分散到多個智慧卡120中進行儲存,且將來只要利用這其中一預定數量的智慧卡120上的資料便能夠還原出目標金鑰。In the application aspect illustrated in FIG. 5, the user can issue a key backup instruction to the beacon device 110 in the manner described in the operation behavior table 510, so that the beacon device 110 has a one-to-many backup mode in a split mode. The target key stored in the target-side secure memory 215 is distributed to the card-side secure memory 223 of the plurality of smart cards 120 for storage. In this way, the target key that is originally only stored in the target device 110 can be distributed to the plurality of smart cards 120 for storage in a M of N backup manner, and only one of the reservations can be utilized in the future. The amount of information on the smart card 120 can restore the target key.

例如,在一實施例中,用戶可按照操作行為態樣511的指示,先進行用戶觸壓動作一次,然後再進行用戶放卡動作N次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,且代表要用來備份目標金鑰的智慧卡數量。例如,用戶可先進行用戶觸壓動作一次,然後再進行用戶放卡動作3次,以指示訊標裝置110將目標金鑰備份到三張智慧卡120中。又例如,用戶可先進行用戶觸壓動作一次,然後再進行用戶放卡動作5次,以指示訊標裝置110將目標金鑰備份到五張智慧卡120中。For example, in an embodiment, the user may first perform a user touch action once according to the instruction of the operation behavior mode 511, and then perform a user card release action N times, thereby issuing a key backup instruction to the target device 110. Where N is a positive integer greater than 1 and represents the number of smart cards to be used to back up the target key. For example, the user may perform the user touch action once, and then perform the user card release action 3 times to instruct the beacon device 110 to back up the target key into the three smart cards 120. For another example, the user may perform the user touch action once, and then perform the user release action 5 times to instruct the beacon device 110 to back up the target key to the five smart cards 120.

在另一實施例中,用戶可按照操作行為態樣512的指示,先進行用戶觸壓動作N次,然後再進行用戶放卡動作一次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,且代表要用來備份目標金鑰的智慧卡數量。例如,用戶可先進行用戶觸壓動作3次,然後再進行用戶放卡動作一次,以指示訊標裝置110將目標金鑰備份到三張智慧卡120中。又例如,用戶可先進行用戶觸壓動作5次,然後再進行用戶放卡動作一次,以指示訊標裝置110將目標金鑰備份到五張智慧卡120中。In another embodiment, the user may perform the user touch action N times according to the instruction of the operation behavior mode 512, and then perform the user card release action once, thereby issuing a key backup instruction to the target device 110, wherein , N is a positive integer greater than 1, and represents the number of smart cards to be used to back up the target key. For example, the user may perform the user touch action 3 times before performing the user card release action once to instruct the beacon device 110 to back up the target key into the three smart cards 120. For another example, the user may perform the user touch action 5 times before performing the user card release action once to instruct the beacon device 110 to back up the target key into the five smart cards 120.

在另一實施例中,用戶可按照操作行為態樣513的指示,先進行用戶放卡動作一次,然後再進行用戶觸壓動作N次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,且代表要用來備份目標金鑰的智慧卡數量。In another embodiment, the user may perform the user card release action once according to the instruction of the operation behavior mode 513, and then perform the user touch action N times, thereby issuing a key backup instruction to the target device 110, wherein , N is a positive integer greater than 1, and represents the number of smart cards to be used to back up the target key.

在另一實施例中,用戶可按照操作行為態樣514的指示,先進行用戶放卡動作N次,然後再進行用戶觸壓動作一次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,且代表要用來備份目標金鑰的智慧卡數量。In another embodiment, the user may perform the user card release action N times according to the instruction of the operation behavior mode 514, and then perform the user touch action once, thereby issuing a key backup instruction to the target device 110, wherein , N is a positive integer greater than 1, and represents the number of smart cards to be used to back up the target key.

另外,在圖5所繪示的某些應用態樣中,用戶也可操控觸壓次數或放卡次數來自行設置將來要還原目標金鑰時所需的智慧卡數量。In addition, in some application modes illustrated in FIG. 5, the user can also control the number of touches or the number of times the card is released, and the number of smart cards required to restore the target key in the future.

例如,在一實施例中,用戶可按照操作行為態樣515的指示,先進行用戶觸壓動作N次,然後再進行用戶放卡動作M次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,代表要用來備份目標金鑰的智慧卡數量,而M為大於1且小於N的正整數,代表將來還原目標金鑰時所需要的智慧卡數量。例如,用戶可先進行用戶觸壓動作3次,然後再進行用戶放卡動作2次,以指示訊標裝置110將目標金鑰備份到三張智慧卡120中,且將來只需要這三張智慧卡120中的任意兩張智慧卡120上的資料便能夠還原出目標金鑰。又例如,用戶可先進行用戶觸壓動作5次,然後再進行用戶放卡動作3次,以指示訊標裝置110將目標金鑰備份到五張智慧卡120中,且將來只需要這五張智慧卡120中的任意三張智慧卡120上的資料便能夠還原出目標金鑰。For example, in an embodiment, the user may perform the user touch action N times according to the instruction of the operation behavior mode 515, and then perform the user card release action M times, thereby issuing a key backup instruction to the target device 110. Where N is a positive integer greater than 1, representing the number of smart cards to be used to back up the target key, and M is a positive integer greater than 1 and less than N, representing the number of smart cards required to restore the target key in the future. For example, the user may perform the user touch action 3 times and then perform the user card release action 2 times to instruct the beacon device 110 to back up the target key into the three smart cards 120, and only need the three smart cards 120 in the future. The data on any two of the smart cards 120 can restore the target key. For example, the user may perform the user touch action 5 times, and then perform the user card release action 3 times to instruct the beacon device 110 to back up the target key to the five smart cards 120, and only need these five smart cards in the future. The data on any of the three smart cards 120 in 120 can restore the target key.

在另一實施例中,用戶可按照操作行為態樣516的指示,先進行用戶觸壓動作M次,然後再進行用戶放卡動作N次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,代表要用來備份目標金鑰的智慧卡數量,而M為大於1小於N的正整數,代表將來還原目標金鑰時所需要的智慧卡數量。例如,用戶可先進行用戶觸壓動作2次,然後再進行用戶放卡動作3次,以指示訊標裝置110將目標金鑰備份到三張智慧卡120中,且將來只需要這三張智慧卡120中的任意兩張智慧卡120上的資料便能夠還原出目標金鑰。又例如,用戶可先進行用戶觸壓動作3次,然後再進行用戶放卡動作5次,以指示訊標裝置110將目標金鑰備份到五張智慧卡120中,且將來只需要這五張智慧卡120中的任意三張智慧卡120上的資料便能夠還原出目標金鑰。In another embodiment, the user may perform the user touch action M times and then perform the user card release operation N times according to the instruction of the operation behavior mode 516, thereby issuing a key backup instruction to the target device 110. Where N is a positive integer greater than 1, representing the number of smart cards to be used to back up the target key, and M is a positive integer greater than 1 and less than N, representing the number of smart cards required to restore the target key in the future. For example, the user may perform the user touch action twice, and then perform the user card release action 3 times to instruct the beacon device 110 to back up the target key into the three smart cards 120, and only need the three smart cards 120 in the future. The data on any two of the smart cards 120 can restore the target key. For example, the user may perform the user touch action 3 times and then perform the user card release action 5 times to instruct the beacon device 110 to back up the target key to the five smart cards 120, and only need these five smart cards in the future. The data on any of the three smart cards 120 in 120 can restore the target key.

在另一實施例中,用戶可按照操作行為態樣517的指示,先進行用戶放卡動作N次,然後再進行用戶觸壓動作M次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,代表要用來備份目標金鑰的智慧卡數量,而M為大於1且小於N的正整數,代表將來還原目標金鑰時所需要的智慧卡數量。In another embodiment, the user may perform the user card release action N times according to the instruction of the operation behavior mode 517, and then perform the user touch action M times, thereby issuing a key backup instruction to the target device 110. Where N is a positive integer greater than 1, representing the number of smart cards to be used to back up the target key, and M is a positive integer greater than 1 and less than N, representing the number of smart cards required to restore the target key in the future.

在另一實施例中,用戶可按照操作行為態樣518的指示,先進行用戶放卡動作M次,然後再進行用戶觸壓動作N次,藉此對訊標裝置110下達金鑰備份指令,其中,N為大於1的正整數,代表要用來備份目標金鑰的智慧卡數量,而M為大於1且小於N的正整數,代表將來還原目標金鑰時所需要的智慧卡數量。In another embodiment, the user may perform the user card release action M times according to the instruction of the operation behavior mode 518, and then perform the user touch action N times, thereby issuing a key backup instruction to the target device 110. Where N is a positive integer greater than 1, representing the number of smart cards to be used to back up the target key, and M is a positive integer greater than 1 and less than N, representing the number of smart cards required to restore the target key in the future.

在進行金鑰備份的過程中,用戶可按照預定的時間間隔或是訊標裝置110的指示信息,陸續更換訊標裝置110所存取的智慧卡,以使訊標裝置110得以將目標金鑰的分散備份資料寫入到多張智慧卡120中。During the key backup process, the user can replace the smart card accessed by the target device 110 according to the predetermined time interval or the indication information of the information device 110, so that the target device 110 can obtain the target key. The distributed backup data is written into the plurality of smart cards 120.

完成前述的金鑰備份運作之後,訊標裝置110中的目標金鑰便會被分散到多個智慧卡120中進行儲存,且將來需要這其中的兩張或兩張以上的智慧卡120中所儲存的資料一起搭配組合,才能還原出目標金鑰。After the foregoing key backup operation is completed, the target key in the target device 110 is distributed to the plurality of smart cards 120 for storage, and two or more of the smart cards 120 are needed in the future. The stored data can be combined and combined to restore the target key.

之後,當用戶想要將這多個智慧卡120中儲存的目標金鑰還原到某一訊標裝置110時,用戶可按照圖5中的操作行為表520所記載的方式對訊標裝置110進行操作,以對訊標裝置110下達金鑰還原指令,使得訊標裝置110以分持型態的多對一還原模式將儲存在預定數量的智慧卡120上的多個金鑰片段資料進行組合,以還原出目標金鑰並將目標金鑰複製到單一訊標裝置110中的訊標端安全記憶體215內進行保存。如此一來,被保存在置這些智慧卡120中的目標金鑰,便能被還原到訊標裝置110中。Thereafter, when the user wants to restore the target key stored in the plurality of smart cards 120 to a certain symbol device 110, the user can perform the beacon device 110 in the manner described in the operation behavior table 520 in FIG. The operation is performed to issue a key restore command to the target device 110, so that the beacon device 110 combines the plurality of key segment data stored on the predetermined number of smart cards 120 in a multi-to-one restore mode of the split mode. The target key is restored and the target key is copied to the message-side secure memory 215 in the single-symbol device 110 for storage. In this way, the target key stored in the smart card 120 can be restored to the beacon device 110.

例如,在一實施例中,用戶可按照操作行為態樣521的指示,先進行用戶放卡動作M次,然後再進行用戶觸壓動作一次,藉此對訊標裝置110下達金鑰還原指令,其中,M為大於1的正整數,且代表要還原出目標金鑰所需的智慧卡數量。例如,用戶可先進行用戶放卡動作2次,然後再進行用戶觸壓動作一次,以指示訊標裝置110將用戶陸續提供的兩張智慧卡120中的資料進行組合,以還原出目標金鑰。又例如,用戶可先進行用戶放卡動作3次,然後再進行用戶觸壓動作一次,以指示訊標裝置110將用戶陸續提供的三張智慧卡120中的資料進行組合,以還原出目標金鑰。For example, in an embodiment, the user may perform the user card release action M times according to the instruction of the operation behavior mode 521, and then perform the user touch action once, thereby issuing a key restoration instruction to the target device 110. Where M is a positive integer greater than 1 and represents the number of smart cards required to restore the target key. For example, the user may perform the user card release action twice, and then perform the user touch action once to instruct the beacon device 110 to combine the data in the two smart cards 120 provided by the user one after another to restore the target key. For example, the user may perform the user's card-playing action 3 times, and then perform the user's touch-pressing action once to instruct the beacon device 110 to combine the data in the three smart cards 120 provided by the user one after another to restore the target key. .

在另一實施例中,用戶可按照操作行為態樣522的指示,先進行用戶放卡動作一次,然後再進行用戶觸壓動作M次,藉此對訊標裝置110下達金鑰還原指令,其中,M為大於1的正整數,且代表要還原出目標金鑰所需的智慧卡數量。例如,用戶可先進行用戶放卡動作一次,然後再進行用戶觸壓動作2次,以指示訊標裝置110將用戶陸續提供的兩張智慧卡120中的資料進行組合,以還原出目標金鑰。又例如,用戶可先進行用戶放卡動作一次,然後再進行用戶觸壓動作3次,以指示訊標裝置110將用戶陸續提供的三張智慧卡120中的資料進行組合,以還原出目標金鑰。In another embodiment, the user may perform the user card release action once according to the indication of the operation behavior mode 522, and then perform the user touch action M times, thereby issuing a key restoration instruction to the target device 110, wherein , M is a positive integer greater than 1, and represents the number of smart cards required to restore the target key. For example, the user may perform the user card release action once, and then perform the user touch action twice to instruct the beacon device 110 to combine the data in the two smart cards 120 provided by the user one after another to restore the target key. For example, the user may perform the user card release action once, and then perform the user touch action three times to instruct the beacon device 110 to combine the data in the three smart cards 120 provided by the user one after another to restore the target key. .

在另一實施例中,用戶可按照操作行為態樣523的指示,先進行用戶觸壓動作M次,然後再進行用戶放卡動作一次,藉此對訊標裝置110下達金鑰還原指令,其中,M為大於1的正整數,且代表要還原出目標金鑰所需的智慧卡數量。In another embodiment, the user may perform the user touch action M times first according to the instruction of the operation behavior 523, and then perform the user card release action once, thereby issuing a key restoration instruction to the target device 110, wherein , M is a positive integer greater than 1, and represents the number of smart cards required to restore the target key.

在另一實施例中,用戶可按照操作行為態樣524的指示,先進行用戶觸壓動作一次,然後再進行用戶放卡動作M次,藉此對訊標裝置110下達金鑰還原指令,其中,M為大於1的正整數,且代表要還原出目標金鑰所需的智慧卡數量。In another embodiment, the user may perform the user touch action once, and then perform the user card release operation M times according to the indication of the operation behavior 524, thereby issuing a key restoration instruction to the target device 110, wherein , M is a positive integer greater than 1, and represents the number of smart cards required to restore the target key.

在進行金鑰還原的過程中,用戶可按照預定的時間間隔或是訊標裝置110的指示信息,陸續更換訊標裝置110所存取的智慧卡,以使訊標裝置110得以讀取多張智慧卡120中的分散備份資料以還原出目標金鑰。During the process of performing the key restoration, the user can replace the smart card accessed by the target device 110 according to the predetermined time interval or the indication information of the information device 110, so that the information device 110 can read multiple wisdoms. The backup data in the card 120 is distributed to restore the target key.

完成前述的金鑰還原運作之後,分散儲存在多張智慧卡120中的多個金鑰片段資料便會被重新還原成目標金鑰並儲存到單一訊標裝置110中。After the foregoing key restoration operation is completed, the plurality of key segment data stored in the plurality of smart cards 120 are restored to the target key and stored in the single symbol device 110.

在圖5中,操作行為表510與520之間的虛線,代表用戶下達金鑰備份指令的操作行為,與下達金鑰還原指令的操作行為兩者之間的可行搭配方式。In FIG. 5, the dotted line between the operational behavior tables 510 and 520 represents a feasible combination between the operational behavior of the user's release key instruction and the operational behavior of the release key instruction.

例如,用以下達金鑰備份指令的操作行為態樣511、512、515、或516所描述的用戶操作行為,可以跟用以下達金鑰還原指令的操作行為態樣521或522所描述的用戶操作行為互相搭配使用。For example, the user operation behavior described by the operational behavior pattern 511, 512, 515, or 516 of the following key backup instruction may be followed by the user described in the operational behavior aspect 521 or 522 of the key restoration instruction. Operational behaviors are used in conjunction with each other.

又例如,用以下達金鑰備份指令的操作行為態樣513、514、517、或518所描述的用戶操作行為,則可以跟用以下達金鑰還原指令的操作行為態樣523或524所描述的用戶操作行為互相搭配使用。For another example, the user operation behavior described by the following operational behavior pattern 513, 514, 517, or 518 of the key-up backup instruction may be described in the following operational behavior pattern 523 or 524 of the key-key restoration instruction. User action behaviors are used in conjunction with each other.

請注意,在前述圖3至圖5所繪示的應用態樣中,金鑰備份過程中所使用的訊標裝置110,跟金鑰還原過程中所使用的訊標裝置110,兩者可以是同一個訊標裝置,也可以是不同的訊標裝置。Please note that in the application manners shown in FIG. 3 to FIG. 5, the beacon device 110 used in the key backup process and the beacon device 110 used in the key restoration process may be The same beacon device can also be a different beacon device.

由前述說明可知,用戶可透過前述的操作行為可向訊標裝置110下達(issue)相關的操作指令,以指示訊標裝置110進行相應的金鑰備份運作或金鑰還原運作。It can be seen from the foregoing description that the user can issue the relevant operation instruction to the target device 110 through the foregoing operation behavior to instruct the target device 110 to perform the corresponding key backup operation or key restoration operation.

另一方面,訊標裝置110則可根據用戶對於訊標裝置110的操作行為來辨識用戶下達的操作指令。實作上,訊標裝置110可依據用戶觸壓動作與用戶放卡動作的發生順序,來判斷用戶指示的運作類型。On the other hand, the beacon device 110 can recognize the operation command issued by the user according to the user's operation behavior on the beacon device 110. In practice, the beacon device 110 can determine the type of operation indicated by the user according to the order in which the user touches the action and the user releases the card.

例如,在某些實施例中,訊標裝置110可將用戶觸壓動作發生在用戶放卡動作之前的用戶操作行為,解譯為用戶指示進行金鑰備份運作,並將用戶放卡動作發生在用戶觸壓動作之前的用戶操作行為,解譯為用戶指示訊標裝置110進行金鑰還原運作。For example, in some embodiments, the beacon device 110 may perform a user touch action before the user puts the card action, interpret the user as a key backup operation, and cause the user to perform the card release action. The user operation behavior before the user touches the action is interpreted as the user instructing the beacon device 110 to perform the key restoration operation.

或者,在某些實施例中,訊標裝置110可改將用戶放卡動作發生在用戶觸壓動作之前的用戶操作行為,解譯為用戶指示訊標裝置110進行金鑰備份運作,並改將用戶觸壓動作發生在用戶放卡動作之前的用戶操作行為,解譯為用戶指示訊標裝置110進行金鑰還原運作。Alternatively, in some embodiments, the beacon device 110 may change the user operation behavior before the user's touch action by the user's card release action, and interpret the user to instruct the beacon device 110 to perform the key backup operation, and The user touch action occurs in the user operation behavior before the user puts the card action, and is interpreted as the user instructing the beacon device 110 to perform the key restoration operation.

在某些實施例中,訊標裝置110還可依據觸壓次數(亦即,前述用戶觸壓動作的發生次數)、以及放卡次數(亦即,前述用戶放卡動作的發生次數),來判斷用戶設置的相關操作參數,例如,金鑰備份態樣、金鑰還原態樣,或是在金鑰備份或還原過程中所需使用的智慧卡總數等。In some embodiments, the beacon device 110 may further depend on the number of touches (ie, the number of occurrences of the user's touch action) and the number of times the card is released (ie, the number of occurrences of the user's card-playing action). Determine the relevant operating parameters set by the user, for example, the key backup mode, the key restoration mode, or the total number of smart cards required for the key backup or restore process.

以下將搭配圖6來進一步說明利用金鑰備份裝置100進行金鑰備份的運作方式。圖6為本發明一實施例的金鑰備份方法簡化後的流程圖。The operation of the key backup using the key backup device 100 will be further described below with reference to FIG. FIG. 6 is a simplified flowchart of a method for backing up a key according to an embodiment of the present invention.

在圖6的流程圖中,位於一特定裝置所屬區域中的流程,代表由特定裝置所進行的流程。例如,標記在「生物特徵偵測電路」區域中的部分,是由生物特徵偵測電路115所進行的流程;標記在「訊標端安全晶片」區域中的部分,是由訊標端安全晶片213所進行的流程;標記在「控制電路」區域中的部分,是由控制電路217所進行的流程;其餘依此類推。前述的邏輯也適用於後續的其他流程圖中。In the flow chart of Fig. 6, the flow located in the area to which a particular device belongs is representative of the flow performed by the particular device. For example, the portion marked in the "biometric detection circuit" region is the flow performed by the biometric detection circuit 115; the portion marked in the "signal end security chip" region is the beacon security chip. The flow performed by 213; the portion marked in the "control circuit" area is the flow performed by the control circuit 217; the rest is analogous. The foregoing logic also applies to subsequent flow charts.

在圖6的實施例中,訊標裝置110允許用戶透過前述的操作行為向訊標裝置110下達相關的金鑰備份指令,以指示訊標裝置110以相應的備份模式將儲存在訊標端安全記憶體215中的目標金鑰,備份到一或多個智慧卡120中進行保存。In the embodiment of FIG. 6, the beacon device 110 allows the user to issue an associated key backup command to the beacon device 110 through the foregoing operational behavior to indicate that the beacon device 110 is to be stored in the beacon terminal in a corresponding backup mode. The target key in the memory 215 is backed up to one or more smart cards 120 for storage.

在用戶對金鑰備份裝置100進行前述操作的過程中,訊標裝置110會進行流程602、604、606、和608,以辨識用戶對於金鑰備份裝置100的操作行為。In the process of the user performing the foregoing operations on the key backup device 100, the beacon device 110 performs processes 602, 604, 606, and 608 to recognize the user's operational behavior for the key backup device 100.

在流程602中,生物特徵偵測電路115會偵測用戶觸壓動作,並回報給控制電路217。In the process 602, the biometric detection circuit 115 detects the user's touch action and reports it to the control circuit 217.

在流程604中,控制電路217會依據生物特徵偵測電路115的通知,記錄每次用戶觸壓動作的發生時間,並計算觸壓次數。In the process 604, the control circuit 217 records the time of occurrence of each user's touch action according to the notification of the biometric detection circuit 115, and calculates the number of touches.

由於用戶可能會重複觸壓生物特徵偵測電路115達兩次或兩次以上,所以生物特徵偵測電路115跟控制電路217可以重複進行流程602與604。Since the user may repeatedly touch the biometric detection circuit 115 twice or more, the biometric detection circuit 115 and the control circuit 217 may repeat the processes 602 and 604.

在一實施例中,控制電路217可直接將生物特徵偵測電路115通知發生用戶觸壓動作的次數,記錄為觸壓次數。例如,倘若生物特徵偵測電路115向控制電路217陸續報告了2次用戶觸壓動作,則控制電路217可將觸壓次數記錄為兩次。In an embodiment, the control circuit 217 can directly notify the biometric detection circuit 115 of the number of times the user touches the action, and records the number of touches. For example, if the biometric detection circuit 115 reports the user touch action twice to the control circuit 217, the control circuit 217 can record the number of touches twice.

在某些實施例中,控制電路217可以只將合理時段內所發生的用戶觸壓動作納入觸壓次數的計算中,以降低誤判觸壓次數的可能性。例如,控制電路217可以只把首次用戶觸壓動作,以及在首次用戶觸壓動作發生後的第一預定時段(例如,3秒、5秒、10秒、或是30秒等等)內所偵測到的後續用戶觸壓動作,納入觸壓次數的計算中,但不將在第一預定時段之後所偵測到的用戶觸壓動作納入觸壓次數的計算中。In some embodiments, the control circuit 217 can only incorporate user touch actions occurring within a reasonable period of time into the calculation of the number of touches to reduce the likelihood of misjudging the number of touches. For example, the control circuit 217 can only detect the first user touch action and the first predetermined time period (eg, 3 seconds, 5 seconds, 10 seconds, or 30 seconds, etc.) after the first user touch action occurs. The detected subsequent user touch action is included in the calculation of the number of touches, but the user touch action detected after the first predetermined time period is not included in the calculation of the number of touches.

舉例而言,假設前述的第一預定時段是10秒。倘若生物特徵偵測電路115在通知控制電路217發生首次用戶觸壓動作後的10秒內,又陸續報告了2次用戶觸壓動作,並且在發生首次用戶觸壓動作的10秒之後,又報告了一次用戶觸壓動作,則控制電路217可以只把首次用戶觸壓動作以及在首次用戶觸壓動作發生後的10秒內所偵測到的2次用戶觸壓動作納入觸壓次數的計算中,並將在發生首次用戶觸壓動作的10秒之後所偵測到的那一次用戶觸壓動作忽略不計。在此情況下,本例中的控制電路217可將觸壓次數記錄為三次,而非四次。For example, assume that the aforementioned first predetermined time period is 10 seconds. If the biometric detection circuit 115 reports the user's touch action twice within 10 seconds after the notification control circuit 217 has caused the first user touch action, and reports again after 10 seconds of the first user touch action. When the user touches the action, the control circuit 217 can only include the first user touch action and the two user touch actions detected within 10 seconds after the first user touch action occurs in the calculation of the number of touches. And the user's touch action detected after 10 seconds of the first user's touch action is ignored. In this case, the control circuit 217 in this example can record the number of touches as three times instead of four times.

在流程606中,智慧卡存取電路211會偵測用戶放卡動作,並回報給控制電路217。In the process 606, the smart card access circuit 211 detects the user's card release action and reports it to the control circuit 217.

在流程608中,控制電路217會依據智慧卡存取電路211的通知,記錄每次用戶放卡動作的發生時間,並計算放卡次數。In the process 608, the control circuit 217 records the time of occurrence of the user's card release action according to the notification of the smart card access circuit 211, and calculates the number of times the card is released.

由於用戶可能會重複將智慧卡120或其他卡片放到能被智慧卡存取電路211偵測到的位置(或範圍)達兩次或兩次以上,所以智慧卡存取電路211跟控制電路217可以重複進行流程606與608。Since the user may repeatedly put the smart card 120 or other card into the position (or range) that can be detected by the smart card access circuit 211 twice or more, the smart card access circuit 211 and the control circuit 217 Flows 606 and 608 can be repeated.

在一實施例中,控制電路217可直接將智慧卡存取電路211通知發生用戶放卡動作的次數,記錄為放卡次數。例如,倘若智慧卡存取電路211向控制電路217陸續報告了2次用戶放卡動作,則控制電路217可將放卡次數記錄為兩次。In an embodiment, the control circuit 217 can directly notify the smart card access circuit 211 of the number of times the user releases the card, and records the number of times the card is played. For example, if the smart card access circuit 211 reports the user card release action twice to the control circuit 217, the control circuit 217 can record the number of times the card is released twice.

在某些實施例中,控制電路217可以只將合理時段內所發生的用戶放卡動作納入放卡次數的計算中,以降低誤判放卡次數的可能性。例如,控制電路217可以只把首次用戶放卡動作,以及在首次用戶放卡動作發生後的第二預定時段(例如,3秒、5秒、10秒、或是30秒等等)內所偵測到的後續用戶放卡動作,納入放卡次數的計算中,但不將在第二預定時段之後所偵測到的用戶放卡動作納入放卡次數的計算中。In some embodiments, the control circuit 217 can only include the user card release action occurring within a reasonable period of time into the calculation of the number of card release times, so as to reduce the possibility of erroneously determining the number of times the card is played. For example, the control circuit 217 may only detect the first user's card release action and the second predetermined time period (eg, 3 seconds, 5 seconds, 10 seconds, or 30 seconds, etc.) after the first user card release action occurs. The measured subsequent user card release action is included in the calculation of the number of card release times, but the user card release action detected after the second predetermined time period is not included in the calculation of the number of card release times.

舉例而言,假設前述的第二預定時段是20秒。倘若智慧卡存取電路211在通知控制電路217發生首次用戶放卡動作後的20秒內,又陸續報告了3次用戶放卡動作,並且在發生首次用戶放卡動作的20秒之後,又報告了一次用戶放卡動作,則控制電路217可以只把首次用戶放卡動作以及在首次用戶放卡動作發生後的20秒內所偵測到的3次用戶放卡動作納入放卡次數的計算中,並將在發生首次用戶放卡動作的20秒之後所偵測到的那一次用戶放卡動作忽略不計。在此情況下,本例中的控制電路217可將放卡次數記錄為四次,而非五次。For example, assume that the aforementioned second predetermined time period is 20 seconds. If the smart card access circuit 211 reports the user's card release action 3 times within 20 seconds after the notification control circuit 217 causes the first user to release the card, and reports again after 20 seconds of the first user card release action, When the user puts the card release action, the control circuit 217 can only include the first user card release action and the three user card release actions detected within 20 seconds after the first user card release action occurs in the calculation of the number of card release times. And the user's card-playing action detected after 20 seconds of the first user's card-playing action is ignored. In this case, the control circuit 217 in this example can record the number of times of card release as four times instead of five times.

在實際應用中,用戶有可能先進行用戶觸壓動作再進行用戶放卡動作,也有可能先進行用戶放卡動作再進行用戶觸壓動作,所以流程606與608有可能發生在流程602與604之後,也有可能發生在流程602與604之前。In the actual application, the user may perform the user touch action before performing the user card release action, or may perform the user card release action and then perform the user touch action, so the processes 606 and 608 may occur after the processes 602 and 604. It is also possible to occur before processes 602 and 604.

另一方面,訊標裝置110還會搭配智慧卡120進行流程610至620,以進行用戶身分認證程序,藉此判別用戶身分的真實性與正確性。On the other hand, the beacon device 110 also performs the processes 610 to 620 with the smart card 120 to perform a user identity authentication process, thereby discriminating the authenticity and correctness of the user identity.

在流程610中,生物特徵偵測電路115會偵測用戶的生物特徵,並將偵測結果傳送給控制電路217。實作上,生物特徵偵測電路115也可以在進行前述流程602的過程中一併進行流程610。In the process 610, the biometric detection circuit 115 detects the biometric characteristics of the user and transmits the detection result to the control circuit 217. In practice, the biometric detection circuit 115 can also perform the process 610 in the process of performing the foregoing process 602.

或者,控制電路217也可以在特定的時間控制指示電路117發出相關指示信息,以提示用戶按壓生物特徵偵測電路115的感測區讓生物特徵偵測電路115進行指紋掃描。Alternatively, the control circuit 217 may also issue relevant indication information at a specific time control indicating circuit 117 to prompt the user to press the sensing area of the biometric detecting circuit 115 for the biometric detecting circuit 115 to perform fingerprint scanning.

在流程612中,控制電路217會依據生物特徵偵測電路115的偵測結果產生相應的身分識別資料,並將產生的身分識別資料分別傳送至訊標端安全晶片213與卡端安全晶片121進行驗證。In the process 612, the control circuit 217 generates the corresponding identity identification data according to the detection result of the biometric detection circuit 115, and transmits the generated identity identification data to the beacon end security chip 213 and the card end security chip 121, respectively. verification.

在訊標端安全記憶體215與卡端安全記憶體223兩者所預存的適格用戶身分識別資料相同的實施例中,控制電路217可以將相同的身分識別資料傳送給訊標端安全晶片213與卡端安全晶片121進行驗證。In the embodiment in which the qualified user identity identification data pre-stored by both the message-side secure memory 215 and the card-end secure memory 223 is the same, the control circuit 217 can transmit the same identity identification data to the target-end security chip 213 and The card end security chip 121 performs verification.

在訊標端安全記憶體215與卡端安全記憶體223兩者所儲存的適格用戶身分識別資料不相同的實施例中,控制電路217傳送給訊標端安全晶片213進行驗證的身分識別資料,可以跟傳送給卡端安全晶片121進行驗證的身分識別資料互不相同。In the embodiment in which the qualified user identity identification data stored by the target end secure memory 215 and the card end secure memory 223 are different, the control circuit 217 transmits the identity identification data to the target end security chip 213 for verification. The identity identification data that can be verified by the card security chip 121 can be different from each other.

例如,用戶可以按照事先約定的順序、或依照指示電路117的指示信息,將不同的指紋(例如,右手食指指紋與左手食指指紋)依序提供給生物特徵偵測電路115進行掃描。在此情況下,控制電路217可依序產生兩個相異的身分識別資料。控制電路217可將其中一個身分識別資料傳送給訊標端安全晶片213進行驗證,並將另一個身分識別資料傳送給卡端安全晶片121進行驗證。For example, the user may sequentially provide different fingerprints (eg, a right-hand index finger and a left-hand index finger fingerprint) to the biometric detection circuit 115 for scanning according to a predetermined order or according to the indication information of the indication circuit 117. In this case, the control circuit 217 can sequentially generate two distinct identity identification data. The control circuit 217 can transmit one of the identity identification data to the target end security chip 213 for verification, and transmit another identity identification data to the card end security chip 121 for verification.

在流程614中,訊標端安全晶片213會驗證控制電路217傳來的身分識別資料,以進行訊標端的用戶身分驗證程序。訊標端安全晶片213可採用各種既有的驗證方式,將控制電路217傳來的身分識別資料與訊標端安全記憶體215內預存的適格用戶身分識別資料進行比對。In the process 614, the beacon security chip 213 verifies the identity identification data sent by the control circuit 217 to perform the user identity verification process at the cell end. The target end security chip 213 can use various existing verification methods to compare the identity identification data transmitted from the control circuit 217 with the pre-stored user identification data pre-stored in the message security memory 215.

控制電路217傳來的身分識別資料必須與訊標端安全記憶體215內預存的適格用戶身分識別資料相符,才能通過訊標端安全晶片213的身分認證程序。The identity identification data sent by the control circuit 217 must match the qualified user identity identification data pre-stored in the message-side secure memory 215 to pass the identity authentication procedure of the message-side security chip 213.

倘若訊標端安全晶片213判定控制電路217傳來的身分識別資料與訊標端安全記憶體215內預存的適格用戶身分識別資料相符,則訊標端安全晶片213會進行流程616;反之,則訊標端安全晶片213會傳送身分認證失敗通知給控制電路217。If the identity end security chip 213 determines that the identity identification data sent by the control circuit 217 matches the pre-stored user identity identification data pre-stored in the message-side secure memory 215, the cell-side security chip 213 performs the process 616; otherwise, The beacon security chip 213 transmits an identity authentication failure notification to the control circuit 217.

在流程616中,訊標端安全晶片213會傳送身分認證成功通知給控制電路217,並同意接受控制電路217對於訊標端安全記憶體215的存取請求。In the process 616, the beacon security chip 213 transmits the identity authentication success notification to the control circuit 217 and agrees to accept the access request from the control circuit 217 to the beacon security memory 215.

在流程618中,卡端安全晶片121會驗證控制電路217傳來的身分識別資料,以進行智慧卡端的用戶身分驗證程序。卡端安全晶片121可採用各種既有的驗證方式,將控制電路217傳來的身分識別資料與卡端安全記憶體223內預存的適格用戶身分識別資料進行比對。In the process 618, the card-end security chip 121 verifies the identity identification data transmitted from the control circuit 217 for the user identity verification process of the smart card end. The card-end security chip 121 can use various existing verification methods to compare the identity identification data transmitted from the control circuit 217 with the pre-stored user identity identification data pre-stored in the card-side secure memory 223.

控制電路217傳來的身分識別資料必須與卡端安全記憶體223內預存的適格用戶身分識別資料相符,才能通過卡端安全晶片121的身分認證程序。The identity identification data transmitted from the control circuit 217 must match the qualified user identity identification data pre-stored in the card-side secure memory 223 to pass the identity authentication procedure of the card-end security chip 121.

倘若卡端安全晶片121判定控制電路217傳來的身分識別資料與卡端安全記憶體223內預存的適格用戶身分識別資料相符,則卡端安全晶片121會進行流程620;反之,則卡端安全晶片121會傳送身分認證失敗通知給控制電路217。If the card-end security chip 121 determines that the identity identification data sent by the control circuit 217 matches the qualified user identity identification data pre-stored in the card-end secure memory 223, the card-end security chip 121 performs the process 620; otherwise, the card-side security The wafer 121 transmits an identity authentication failure notification to the control circuit 217.

在流程620中,卡端安全晶片121會傳送身分認證成功通知給控制電路217,並同意接受控制電路217對於卡端安全記憶體223的存取請求。In the process 620, the card-end security chip 121 transmits the identity authentication success notification to the control circuit 217 and agrees to accept the control circuit 217's access request to the card-side secure memory 223.

在流程622中,控制電路217會接收訊標端安全晶片213和/或卡端安全晶片121傳來的身分認證失敗通知。在本實施例中,只要控制電路217接收到訊標端安全晶片213和卡端安全晶片121的其中之一傳來的身分認證失敗通知,控制電路217便會判定當前的用戶無法通過金鑰備份裝置100的用戶身分認證程序,並拒絕進行後續的金鑰備份運作。In the process 622, the control circuit 217 receives the identity authentication failure notification from the beacon security chip 213 and/or the card security chip 121. In this embodiment, as long as the control circuit 217 receives the identity authentication failure notification sent by one of the beacon security chip 213 and the card security chip 121, the control circuit 217 determines that the current user cannot be backed up by the key. The user identity authentication program of the device 100 refuses to perform subsequent key backup operations.

在流程624中,控制電路217會接收訊標端安全晶片213和/或卡端安全晶片121傳來的身分認證成功通知。In the process 624, the control circuit 217 receives the identity authentication success notification from the beacon security chip 213 and/or the card security chip 121.

只有在訊標端安全晶片213與卡端安全晶片121兩端的身分驗證皆成功的情況下,控制電路217才會判定當前的用戶通過金鑰備份裝置100的用戶身分認證程序,並進行流程626。Only when the identity verification at both ends of the beacon security chip 213 and the card security chip 121 is successful, the control circuit 217 determines that the current user passes the user identity authentication procedure of the key backup device 100, and proceeds to flow 626.

在流程626中,控制電路217可依據用戶對於訊標裝置110的操作行為解譯出用戶下達的操作指令與相關操作參數,並在訊標端安全晶片213與卡端安全晶片121之間進行相應的金鑰備份運作。In the process 626, the control circuit 217 can interpret the operation command and related operation parameters issued by the user according to the operation behavior of the user of the information device 110, and perform corresponding correspondence between the message end security chip 213 and the card end security chip 121. The key backup operation works.

如前所述,控制電路217可依據用戶觸壓動作與用戶放卡動作的發生順序,來判斷用戶所指示的運作類型是金鑰備份運作還是金鑰還原運作。另外,訊標裝置110還可依據觸壓次數以及放卡次數,來判斷用戶設置的相關操作參數,例如,金鑰備份態樣、金鑰還原態樣,或是在金鑰備份或還原過程中所需使用的智慧卡總數等。As described above, the control circuit 217 can determine whether the type of operation indicated by the user is a key backup operation or a key restoration operation according to the order in which the user touches the action and the user releases the card. In addition, the beacon device 110 can also determine the relevant operational parameters set by the user according to the number of touches and the number of times the card is released, for example, a key backup mode, a key restoration state, or during a key backup or restoration process. The total number of smart cards required, etc.

實作上,控制電路217可比較首次用戶觸壓動作的發生時間與首次用戶放卡動作的發生時間,來判斷用戶觸壓動作與用戶放卡動作的發生順序。或者,控制電路217可比較最後一次用戶觸壓動作的發生時間,與最後一次用戶放卡動作的發生時間,來判斷用戶觸壓動作與用戶放卡動作的發生順序。In practice, the control circuit 217 can compare the occurrence time of the first user's touch action with the time of the first user's card release action to determine the order in which the user touches the action and the user releases the card. Alternatively, the control circuit 217 can compare the occurrence time of the last user touch action and the occurrence time of the last user card release action to determine the order in which the user touch action and the user release action occur.

在圖6的實施例中,倘若控制電路217判斷出用戶觸壓動作與用戶放卡動作的發生順序、觸壓次數、以及放卡次數,與前述圖3至圖5中的操作行為表310、410、或510所描述的其中一種特定操作行為態樣相符,則控制電路217便會進行與該特定操作行為態樣相應的金鑰備份運作。In the embodiment of FIG. 6, if the control circuit 217 determines the sequence of occurrence of the user's touch action and the user's card release action, the number of touches, and the number of times the card is placed, the operation behavior table 310 in the foregoing FIGS. 3 to 5, When one of the specific operational behaviors described in 410, or 510 is consistent, the control circuit 217 performs a key backup operation corresponding to the particular operational behavior.

例如,倘若控制電路217判定用戶對於訊標裝置110的操作行為與圖3的操作行為表310中的操作行為態樣311或312相符,則控制電路217便會以單純的一對一備份模式將訊標端安全記憶體215中的目標金鑰,複製到單一智慧卡120中的卡端安全記憶體223內進行保存。在本例中,控制電路217可要求訊標端安全晶片213提供訊標端安全記憶體215中所儲存的目標金鑰,並將訊標端安全晶片213所提供的目標金鑰傳送給智慧卡120中的卡端安全晶片121,並指示卡端安全晶片121將目標金鑰寫入卡端安全記憶體223中進行保存。For example, if the control circuit 217 determines that the user's operational behavior for the beacon device 110 matches the operational behavior pattern 311 or 312 in the operational behavior table 310 of FIG. 3, the control circuit 217 will be in a simple one-to-one backup mode. The target key in the target security memory 215 is copied to the card-side secure memory 223 in the single smart card 120 for storage. In this example, the control circuit 217 can request the target end security chip 213 to provide the target key stored in the target security memory 215, and transmit the target key provided by the beacon security chip 213 to the smart card. The card-end security chip 121 in 120, and instructs the card-end security chip 121 to write the target key into the card-side secure memory 223 for storage.

如此一來,便可完成將訊標裝置110中的目標金鑰備份到單一智慧卡120中的動作。之後,控制電路217可控制指示電路117產生相關進度指示信息,以通知用戶金鑰備份運作已完成。In this way, the action of backing up the target key in the beacon device 110 into the single smart card 120 can be completed. Thereafter, the control circuit 217 can control the indication circuit 117 to generate relevant progress indication information to notify the user that the key backup operation has been completed.

又例如,倘若控制電路217判定用戶對於訊標裝置110的操作行為與圖4的操作行為表410中的操作行為態樣413或414相符,則控制電路217便會以單純的一對多備份模式將訊標端安全記憶體215中的目標金鑰,複製到多個智慧卡120中的卡端安全記憶體223內進行保存。在本例中,控制電路217可將訊標端安全晶片213所提供的目標金鑰傳送給智慧卡120中的卡端安全晶片121,並指示卡端安全晶片121將目標金鑰寫入卡端安全記憶體223中進行保存。For another example, if the control circuit 217 determines that the user's operating behavior for the beacon device 110 matches the operational behavior pattern 413 or 414 in the operational behavior table 410 of FIG. 4, the control circuit 217 will be in a one-to-many backup mode. The target key in the target-side secure memory 215 is copied to the card-side secure memory 223 of the plurality of smart cards 120 for storage. In this example, the control circuit 217 can transmit the target key provided by the beacon security chip 213 to the card security chip 121 in the smart card 120, and instruct the card security chip 121 to write the target key to the card end. The security memory 223 is saved.

接著,用戶可按照預定的時間間隔或是指示電路117產生的相關引導信息,陸續更換訊標裝置110所存取的智慧卡,以使控制電路217得以透過智慧卡存取電路211將目標金鑰陸續寫入其他智慧卡120的卡端安全記憶體223中。Then, the user can replace the smart card accessed by the target device 110 according to the predetermined time interval or the relevant guiding information generated by the indicating circuit 117, so that the control circuit 217 can use the smart card accessing circuit 211 to target the key. The card-side secure memory 223 of the other smart card 120 is successively written.

在用戶按照指示陸續更換多張智慧卡120之後,訊標裝置110中的目標金鑰便會有多個相同的備份版本被分別保存在多個不同的智慧卡120中。之後,控制電路217可控制指示電路117產生相關進度指示信息,以通知用戶金鑰備份運作已完成。After the user successively replaces the plurality of smart cards 120 according to the instructions, the target keys in the beacon device 110 have a plurality of identical backup versions stored in the plurality of different smart cards 120, respectively. Thereafter, the control circuit 217 can control the indication circuit 117 to generate relevant progress indication information to notify the user that the key backup operation has been completed.

又例如,倘若控制電路217判定用戶對於訊標裝置110的操作行為與圖5的操作行為表510中的操作行為態樣515或516相符,則控制電路217便會以分持型態的一對多備份模式將訊標端安全記憶體215中的目標金鑰,分散到多個智慧卡120中的卡端安全記憶體223內進行保存。在本例中,控制電路217可將訊標端安全晶片213所提供的目標金鑰分拆成複數個金鑰片段資料,或是由訊標端安全晶片213將目標金鑰分拆成複數個金鑰片段資料再傳送給控制電路217。控制電路217會將其中一個金鑰片段資料傳送給智慧卡120中的卡端安全晶片121,並指示卡端安全晶片121將該片段資料寫入卡端安全記憶體223中進行保存。For another example, if the control circuit 217 determines that the user's operational behavior for the beacon device 110 matches the operational behavior pattern 515 or 516 in the operational behavior table 510 of FIG. 5, the control circuit 217 will be in a pair of split configurations. The multi-backup mode distributes the target key in the target-side secure memory 215 to the card-side secure memory 223 of the plurality of smart cards 120 for storage. In this example, the control circuit 217 can split the target key provided by the beacon security chip 213 into a plurality of key segment data, or split the target key into a plurality of target security chips 213. The key fragment data is then transmitted to the control circuit 217. The control circuit 217 transmits one of the key segment data to the card-end security chip 121 in the smart card 120, and instructs the card-end security chip 121 to write the segment data into the card-side secure memory 223 for storage.

接著,用戶可按照預定的時間間隔或是指示電路117產生的相關引導信息,陸續更換訊標裝置110所存取的智慧卡,以使控制電路217得以透過智慧卡存取電路211將其他金鑰片段資料陸續寫入其他智慧卡120的卡端安全記憶體223中。Then, the user can replace the smart card accessed by the target device 110 according to the predetermined time interval or the relevant guiding information generated by the indicating circuit 117, so that the control circuit 217 can use the smart card accessing circuit 211 to access other keys. The clip data is successively written into the card-side secure memory 223 of the other smart card 120.

在用戶按照指示陸續更換多張智慧卡120之後,訊標裝置110中的目標金鑰便會以分持備份形態被分散到多個智慧卡120中進行儲存。之後,控制電路217可控制指示電路117產生相關進度指示信息,以通知用戶金鑰備份運作已完成。After the user successively replaces the plurality of smart cards 120 according to the instructions, the target keys in the target device 110 are distributed to the plurality of smart cards 120 for storage in the backup backup mode. Thereafter, the control circuit 217 can control the indication circuit 117 to generate relevant progress indication information to notify the user that the key backup operation has been completed.

請注意,前述各實施例中的訊標端安全晶片213可先利用與卡端安全晶片121預先約定好的各種加密機制對目標金鑰(或相關的金鑰片段資料)進行加密,再將加密後的目標金鑰(或相關的金鑰片段資料)透過控制電路217傳送給卡端安全晶片121進行解密。Please note that the target end security chip 213 in the foregoing embodiments may first encrypt the target key (or related key segment data) by using various encryption mechanisms pre-agreed with the card end security chip 121, and then encrypt the target key (or related key segment data). The subsequent target key (or associated key segment data) is transmitted to the card end security chip 121 via the control circuit 217 for decryption.

藉此可避免控制電路217在金鑰備份過程中得知目標金鑰的真實內容,因此能夠有效降低目標金鑰內容外洩的可能性。Thereby, the control circuit 217 can be prevented from knowing the real content of the target key during the key backup process, thereby effectively reducing the possibility of leakage of the target key content.

之後,用戶可能會因為原有的訊標裝置110故障或遺失,而需要將已備份在一或多張智慧卡120中的目標金鑰還原到另一個訊標裝置110中以供後續使用。或者,原有的訊標裝置110中的目標金鑰也可能因為各種原因被刪除,而使得用戶需要將已備份在一或多張智慧卡120中的目標金鑰還原到原先的訊標裝置110中。Thereafter, the user may need to restore the target key that has been backed up in one or more smart cards 120 to another beacon device 110 for subsequent use because the original beacon device 110 is faulty or missing. Alternatively, the target key in the original beacon device 110 may also be deleted for various reasons, so that the user needs to restore the target key that has been backed up in one or more smart cards 120 to the original beacon device 110. .

換言之,用戶之後在進行金鑰還原過程中所使用的訊標裝置110,有可能是另一個訊標裝置,也有可能是原先的訊標裝置。In other words, the beacon device 110 used by the user in the process of performing the key restoration may be another beacon device or may be the original beacon device.

以下將搭配圖7來進一步說明利用金鑰備份裝置100進行金鑰還原的運作方式。圖7本發明一實施例的金鑰還原方法簡化後的流程圖。The operation of the key restoration using the key backup apparatus 100 will be further described below with reference to FIG. FIG. 7 is a simplified flowchart of a key reduction method according to an embodiment of the present invention.

在圖7的實施例中,訊標裝置110允許用戶透過前述的操作行為向訊標裝置110下達相關的金鑰還原指令,以指示訊標裝置110以相應的還原模式將儲存在一或多張智慧卡120中的目標金鑰,還原到單一訊標裝置110的訊標端安全記憶體215中進行保存。In the embodiment of FIG. 7, the beacon device 110 allows the user to issue a relevant key restoration command to the beacon device 110 through the aforementioned operational behavior to instruct the beacon device 110 to store one or more pieces of wisdom in a corresponding restore mode. The target key in the card 120 is restored to the target end secure memory 215 of the single symbol device 110 for storage.

同樣地,在用戶對金鑰備份裝置100進行操作的過程中,訊標裝置110會進行圖7中的流程602、604、606、和608,以辨識用戶對於金鑰備份裝置100的操作行為。另外,訊標裝置110還會搭配智慧卡120進行流程610至620,以進行用戶身分認證程序,藉此判別用戶身分的真實性與正確性。Similarly, in the process of the user operating the key backup device 100, the beacon device 110 performs the processes 602, 604, 606, and 608 in FIG. 7 to recognize the user's operational behavior for the key backup device 100. In addition, the beacon device 110 also performs the processes 610 to 620 with the smart card 120 to perform a user identity authentication process, thereby judging the authenticity and correctness of the user identity.

前述有關圖6中的流程602~620的實作方式及相關變化的描述,也適用於圖7的實施例中。因此,為簡潔起見,在此不重複敘述流程602~620的相關細節。The foregoing description of the implementation of the flows 602-620 in FIG. 6 and related variations also applies to the embodiment of FIG. Therefore, for the sake of brevity, the relevant details of the flow 602-620 will not be repeated here.

如圖7所示,控制電路217在流程722中會接收訊標端安全晶片213和/或卡端安全晶片121傳來的身分認證失敗通知。在本實施例中,只要控制電路217接收到訊標端安全晶片213和卡端安全晶片121的其中之一傳來的身分認證失敗通知,控制電路217便會判定當前的用戶無法通過金鑰備份裝置100的用戶身分認證程序,並拒絕進行後續的金鑰還原運作。As shown in FIG. 7, the control circuit 217 receives the identity authentication failure notification from the beacon security chip 213 and/or the card security chip 121 in flow 722. In this embodiment, as long as the control circuit 217 receives the identity authentication failure notification sent by one of the beacon security chip 213 and the card security chip 121, the control circuit 217 determines that the current user cannot be backed up by the key. The user identity authentication program of device 100 refuses to perform subsequent key restoration operations.

在流程624中,控制電路217會接收訊標端安全晶片213和/或卡端安全晶片121傳來的身分認證成功通知。In the process 624, the control circuit 217 receives the identity authentication success notification from the beacon security chip 213 and/or the card security chip 121.

只有在訊標端安全晶片213與卡端安全晶片121兩端的身分驗證皆成功的情況下,控制電路217才會判定當前的用戶通過金鑰備份裝置100的用戶身分認證程序,並進行流程726。Only when the identity verification of both the beacon end security chip 213 and the card end security chip 121 is successful, the control circuit 217 determines that the current user passes the user identity authentication procedure of the key backup device 100, and proceeds to flow 726.

在流程726中,控制電路217可依據用戶對於訊標裝置110的操作行為解譯出用戶下達的操作指令與相關操作參數,並在訊標端安全晶片213與卡端安全晶片121之間進行相應的金鑰還原運作。In the process 726, the control circuit 217 can interpret the operation command and related operation parameters issued by the user according to the operation behavior of the user of the information device 110, and perform corresponding correspondence between the message end security chip 213 and the card end security chip 121. The key restore operation works.

如前所述,控制電路217可依據用戶觸壓動作與用戶放卡動作的發生順序,來判斷用戶所指示的運作類型是金鑰備份運作還是金鑰還原運作。另外,訊標裝置110還可依據觸壓次數以及放卡次數,來判斷用戶設置的相關操作參數,例如,金鑰備份態樣、金鑰還原態樣,或是在金鑰備份或還原過程中所需使用的智慧卡總數等。As described above, the control circuit 217 can determine whether the type of operation indicated by the user is a key backup operation or a key restoration operation according to the order in which the user touches the action and the user releases the card. In addition, the beacon device 110 can also determine the relevant operational parameters set by the user according to the number of touches and the number of times the card is released, for example, a key backup mode, a key restoration state, or during a key backup or restoration process. The total number of smart cards required, etc.

在圖7的實施例中,倘若控制電路217判斷出用戶觸壓動作與用戶放卡動作的發生順序、觸壓次數、以及放卡次數,與前述圖3至圖5中的操作行為表320或520所描述的其中一種特定操作行為態樣相符,則控制電路217便會進行與該特定操作行為態樣相應的金鑰還原運作。In the embodiment of FIG. 7, if the control circuit 217 determines the sequence of occurrence of the user's touch action and the user's card release action, the number of touches, and the number of times of card release, the operation behavior table 320 in the foregoing FIGS. 3 to 5 or When one of the specific operational behaviors described in 520 is consistent, the control circuit 217 performs a key restoration operation corresponding to the particular operational behavior.

例如,倘若控制電路217判定用戶對於訊標裝置110的操作行為與圖3的操作行為表320中的操作行為態樣321或322相符,則控制電路217便會以單純的一對一還原模式將單一智慧卡120中的目標金鑰,複製到單一訊標裝置110中的訊標端安全記憶體215內進行保存。在本例中,控制電路217可要求卡端安全晶片121提供卡端安全記憶體223中所儲存的目標金鑰,並將卡端安全晶片121所提供的目標金鑰傳送給訊標端安全晶片213,以及指示訊標端安全晶片213將目標金鑰寫入訊標端安全記憶體215中進行保存。For example, if the control circuit 217 determines that the user's operational behavior for the beacon device 110 matches the operational behavior pattern 321 or 322 in the operational behavior table 320 of FIG. 3, the control circuit 217 will be in a simple one-to-one restore mode. The target key in the single smart card 120 is copied to the target end secure memory 215 in the single symbol device 110 for storage. In this example, the control circuit 217 can request the card-end security chip 121 to provide the target key stored in the card-side secure memory 223, and transmit the target key provided by the card-end security chip 121 to the target-end security chip. 213, and the instruction target end security chip 213 writes the target key into the target end secure memory 215 for storage.

如此一來,便可完成將單一智慧卡120中的目標金鑰還原到單一訊標裝置110中的動作。之後,控制電路217可控制指示電路117產生相關進度指示信息,以通知用戶金鑰還原運作已完成。In this way, the action of restoring the target key in the single smart card 120 to the single symbol device 110 can be completed. Thereafter, the control circuit 217 can control the indication circuit 117 to generate relevant progress indication information to notify the user that the key restoration operation has been completed.

又例如,倘若控制電路217判定用戶對於訊標裝置110的操作行為與圖4的操作行為表320中的操作行為態樣323或324相符,則控制電路217同樣會以單純的一對一還原模式將單一智慧卡120中的目標金鑰,複製到單一訊標裝置110中的訊標端安全記憶體215內進行保存。在本例中,控制電路217可要求卡端安全晶片121提供卡端安全記憶體223中所儲存的目標金鑰,並將卡端安全晶片121所提供的目標金鑰傳送給訊標端安全晶片213,並指示訊標端安全晶片213將目標金鑰寫入訊標端安全記憶體215中進行保存。For another example, if the control circuit 217 determines that the user's operating behavior for the beacon device 110 matches the operational behavior pattern 323 or 324 in the operational behavior table 320 of FIG. 4, the control circuit 217 also has a simple one-to-one restoration mode. The target key in the single smart card 120 is copied to the target end secure memory 215 in the single symbol device 110 for storage. In this example, the control circuit 217 can request the card-end security chip 121 to provide the target key stored in the card-side secure memory 223, and transmit the target key provided by the card-end security chip 121 to the target-end security chip. 213, and instructing the target end security chip 213 to write the target key into the target end secure memory 215 for saving.

如此一來,便可完成將單一智慧卡120中的目標金鑰還原到單一訊標裝置110中的動作。之後,控制電路217可控制指示電路117產生相關進度指示信息,以通知用戶金鑰還原運作已完成。In this way, the action of restoring the target key in the single smart card 120 to the single symbol device 110 can be completed. Thereafter, the control circuit 217 can control the indication circuit 117 to generate relevant progress indication information to notify the user that the key restoration operation has been completed.

又例如,倘若控制電路217判定用戶對於訊標裝置110的操作行為與圖5的操作行為表520中的操作行為態樣521或522相符,則控制電路217便會以分持型態的多對一還原模式將分散在預定數量的智慧卡120中的多個金鑰片段資料進行組合,以還原出目標金鑰並將目標金鑰複製到單一訊標裝置110中的訊標端安全記憶體215內進行保存。在本例中,控制電路217可要求首張智慧卡120上的卡端安全晶片121提供卡端安全記憶體223中所儲存的金鑰片段資料。For another example, if the control circuit 217 determines that the user's operating behavior for the beacon device 110 matches the operational behavior pattern 521 or 522 in the operational behavior table 520 of FIG. 5, the control circuit 217 will be in pairs of different types. A restore mode combines a plurality of key fragment data dispersed in a predetermined number of smart cards 120 to restore the target key and copy the target key to the target end secure memory 215 in the single symbol device 110. Save it inside. In this example, the control circuit 217 can request the card-end security chip 121 on the first smart card 120 to provide the key piece data stored in the card-side secure memory 223.

接著,用戶可按照預定的時間間隔或是指示電路117產生的相關引導信息,陸續更換訊標裝置110所存取的智慧卡,以使控制電路217得以透過智慧卡存取電路211讀取其他智慧卡120的卡端安全記憶體223中所儲存的金鑰片段資料。Then, the user can replace the smart card accessed by the target device 110 according to the predetermined time interval or the relevant guiding information generated by the indicating circuit 117, so that the control circuit 217 can read other wisdom through the smart card accessing circuit 211. The card-side secure memory 223 of the card 120 is stored in the key piece data.

在某些實施例中,控制電路217可從所獲得的金鑰片段資料中還原出目標金鑰,並指示訊標端安全晶片213將目標金鑰寫入訊標端安全記憶體215中進行保存。In some embodiments, the control circuit 217 can restore the target key from the obtained key fragment data and instruct the target end security chip 213 to write the target key into the target end secure memory 215 for saving. .

在另外一些實施例中,控制電路217可將所獲得的金鑰片段資料都傳送給訊標端安全晶片213,並指示訊標端安全晶片213從所這些金鑰片段資料中還原出目標金鑰,以及將目標金鑰寫入訊標端安全記憶體215中進行保存。In some other embodiments, the control circuit 217 can transmit the obtained key segment data to the beacon security chip 213, and instruct the beacon security chip 213 to restore the target key from the key segment data. And writing the target key to the message-side secure memory 215 for saving.

如此一來,分散儲存在多張智慧卡120中的多個金鑰片段資料便會被重新還原成目標金鑰並儲存到單一訊標裝置110中。之後,控制電路217可控制指示電路117產生相關進度指示信息,以通知用戶金鑰還原運作已完成。In this way, the plurality of key segment data stored in the plurality of smart cards 120 are re-restored into the target key and stored in the single symbol device 110. Thereafter, the control circuit 217 can control the indication circuit 117 to generate relevant progress indication information to notify the user that the key restoration operation has been completed.

請注意,前述各實施例中的卡端安全晶片121可先利用與訊標端安全晶片213預先約定好的各種加密機制對目標金鑰(或相關的金鑰片段資料)進行加密,再將加密後的目標金鑰(或相關的金鑰片段資料)透過控制電路217傳送給訊標端安全晶片213進行解密。Please note that the card-end security chip 121 in the foregoing embodiments may first encrypt the target key (or related key segment data) by using various encryption mechanisms pre-agreed with the target-end security chip 213, and then encrypt the target key (or related key segment data). The subsequent target key (or associated key segment data) is transmitted to the target end security chip 213 via the control circuit 217 for decryption.

藉此可避免控制電路217在金鑰還原過程中得知目標金鑰的真實內容,因此能夠有效降低目標金鑰內容外洩的可能性。Thereby, the control circuit 217 can be prevented from knowing the real content of the target key during the key restoration process, thereby effectively reducing the possibility of leakage of the target key content.

由前述說明可知,在訊標裝置110進行金鑰備份運作或金鑰還原運作之前,訊標裝置110與智慧卡120兩端的安全晶片都會進行用戶身分驗證程序。只要訊標裝置110與智慧卡120其中之一的身分驗證程序失敗,用戶就無法通過身分認證程序,因此能有效阻止他人私自進行未獲授權的金鑰備份運作或金鑰還原運作。It can be seen from the foregoing description that the beacon device 110 and the security chip at both ends of the smart card 120 perform the user identity verification procedure before the target device 110 performs the key backup operation or the key restoration operation. As long as the identity verification program of one of the symbol device 110 and the smart card 120 fails, the user cannot pass the identity authentication program, thereby effectively preventing others from performing an unauthorized key backup operation or key restoration operation.

前述的目標金鑰與適格用戶身分識別資料都是儲存在安全晶片的安全記憶體中,所以能提高目標金鑰與適格用戶身分識別資料的儲存安全性,也能降低駭客藉由入侵訊標裝置110或智慧卡120而竊取目標金鑰與適格用戶身分識別資料的可能性。The foregoing target key and the qualified user identity identification data are stored in the secure memory of the security chip, so the storage security of the target key and the qualified user identity identification data can be improved, and the hacker can also reduce the hacker by invading the beacon. The device 110 or the smart card 120 steals the possibility of the target key and the appropriate user identity identification data.

前述的訊標裝置110允許用戶利用操控用戶觸壓動作與用戶放卡動作兩者的發生順序,來下達相關的操作指令以控制訊標裝置110要進行的運作模式。另外,訊標裝置110還允許用戶可利用操控觸壓次數和放卡次數的方式,來設置訊標裝置110的相關操作參數。The aforementioned beacon device 110 allows the user to use the sequence of occurrences of both the user's touch action and the user's card release action to issue relevant operational commands to control the mode of operation to be performed by the beacon device 110. In addition, the beacon device 110 also allows the user to set the relevant operating parameters of the beacon device 110 by controlling the number of touches and the number of times the card is played.

前述訊標裝置110的用戶操控方式不僅簡單、直觀,而且無需為訊標裝置110設置指令按鍵、鍵盤、或觸控面板等傳統的指令輸入裝置,故可有效減少訊標裝置110的電路複雜度與重量。The user control mode of the above-mentioned beacon device 110 is not only simple and intuitive, but also does not need to set a conventional command input device such as a command button, a keyboard, or a touch panel for the beacon device 110, so that the circuit complexity of the beacon device 110 can be effectively reduced. With weight.

再者,在訊標裝置110進行金鑰備份或金鑰還原運作的過程中,訊標裝置110完全是獨立運作,而無需用戶利用其他電腦、手機、或行動裝置等額外設備來操控訊標裝置110的運作。因此,訊標裝置110的控制電路217在前述的金鑰備份或金鑰還原運作的過程中,並不會受控於其他設備。如此一來,駭客或其他惡意人士在前述的金鑰備份或金鑰還原運作的過程中,就沒有機會藉由入侵控制電路217的方式來竊取目標金鑰的內容。Moreover, in the process of the key device 110 performing the key backup or key restoration operation, the beacon device 110 operates completely independently without the user using other devices such as a computer, a mobile phone, or a mobile device to manipulate the beacon device. The operation of 110. Therefore, the control circuit 217 of the beacon device 110 is not controlled by other devices during the aforementioned key backup or key restoration operation. In this way, the hacker or other malicious person does not have the opportunity to steal the content of the target key by means of the intrusion control circuit 217 during the aforementioned key backup or key restoration operation.

請參考圖8,其所繪示為本發明一實施例的金鑰備份系統800簡化後的功能方塊圖。如圖8所示,金鑰備份系統800包含前述的訊標裝置110、一或多個智慧卡120、以及一主控端裝置830。金鑰備份系統800用於讓用戶可以透過主控端裝置830來指示訊標裝置110進行與一或多張智慧卡120之間的金鑰備份運作或金鑰還原動作。Please refer to FIG. 8 , which is a simplified functional block diagram of a key backup system 800 according to an embodiment of the invention. As shown in FIG. 8, the key backup system 800 includes the aforementioned symbol device 110, one or more smart cards 120, and a host device 830. The key backup system 800 is configured to enable the user to instruct the target device 110 to perform a key backup operation or a key restoration operation with the one or more smart cards 120 through the host device 830.

前述圖1與圖2中的訊標裝置110中的其他元件的連接關係與實施方式,都適用於圖8的實施例,但圖8實施例中的訊標裝置110的運作方式,與前述圖1與圖2中的訊標裝置110有部分不同之處。The connection relationship and the implementation manners of the other components in the above-mentioned FIG. 1 and FIG. 2 are applicable to the embodiment of FIG. 8. However, the operation mode of the beacon device 110 in the embodiment of FIG. 1 is partially different from the beacon device 110 of FIG.

例如,在圖8的實施例中,訊標裝置110的傳輸介面113設置成可從主控端裝置830接收訊標裝置110運作所需電力,並可與主控端裝置830進行資料通訊,以接收主控端裝置830傳來的一主控端認證資料。For example, in the embodiment of FIG. 8, the transmission interface 113 of the beacon device 110 is configured to receive power required for operation of the beacon device 110 from the host device 830, and can perform data communication with the host device 830. Receiving a master authentication data transmitted from the host device 830.

實作上,主控端裝置830可用能與訊標裝置110進行資料與指令通訊的各式桌上型電腦、筆記型電腦、平板電腦、手機等運算裝置來實現。In practice, the host device 830 can be implemented by various desktop devices such as a desktop computer, a notebook computer, a tablet computer, and a mobile phone that can communicate with the information device 110.

另外,圖8中的控制電路217設置成產生包含主控端認證資料的相關身分識別資料,並將產生的身分識別資料分別傳送給訊標端安全晶片213與智慧卡120上的卡端安全晶片121進行身分驗證。In addition, the control circuit 217 in FIG. 8 is configured to generate related identity identification data including the master authentication data, and transmit the generated identity identification data to the target security chip 213 and the card security chip on the smart card 120, respectively. 121 for identity verification.

在金鑰備份系統800中,倘若訊標端安全晶片213與卡端安全晶片121兩端的身分驗證皆成功,則訊標裝置110的控制電路217會依據主控端裝置830的指示,在訊標端安全晶片213與卡端安全晶片121之間進行相應的金鑰備份運作或金鑰還原運作。In the key backup system 800, if the identity verification at both ends of the target security chip 213 and the card security chip 121 is successful, the control circuit 217 of the beacon device 110 will be in the cell according to the indication of the host device 830. The corresponding security key or the key restoration operation is performed between the end security chip 213 and the card end security chip 121.

以下將搭配圖9來進一步說明利用金鑰備份系統800進行金鑰備份的運作方式。圖9為本發明另一實施例的金鑰備份方法簡化後的流程圖。The operation of the key backup using the key backup system 800 will be further described below with reference to FIG. FIG. 9 is a simplified flowchart of a method for backing up a key according to another embodiment of the present invention.

在圖9的實施例中,用戶可透過主控端裝置830向訊標裝置110下達相關的金鑰備份指令與備份參數,以指示訊標裝置110以相應的備份模式將儲存在訊標端安全記憶體215中的目標金鑰,備份到一或多個智慧卡120中進行保存。In the embodiment of FIG. 9, the user can send the relevant key backup command and backup parameters to the target device 110 through the host device 830 to indicate that the target device 110 is to be stored in the target end in the corresponding backup mode. The target key in the memory 215 is backed up to one or more smart cards 120 for storage.

實作上,主控端裝置830可提供相關的用戶操作介面供用戶下達前述的金鑰備份指令,並設置相關的備份參數。In practice, the host device 830 can provide an associated user operation interface for the user to issue the aforementioned key backup command and set related backup parameters.

在進行金鑰備份運作之前,金鑰備份系統800會進行流程902至914,以進行用戶身分認證程序,藉此判別用戶身分的真實性與正確性。Before performing the key backup operation, the key backup system 800 performs processes 902 to 914 to perform a user identity authentication process, thereby discriminating the authenticity and correctness of the user identity.

在流程902中,主控端裝置830會傳送一份主控端認證資料給訊標裝置110。In the process 902, the master device 830 transmits a master authentication material to the target device 110.

在一實施例中,主控端裝置830可利用各種現有機制,主動產生可供核對主控端裝置830身分真實性的識別資料來做為主控端認證資料,並在流程902中傳送給訊標裝置110。例如,主控端裝置830可利用自己的私鑰對特定的資料進行電子簽章,以產生相應的簽章值做為主控端認證資料。又例如,主控端裝置830可利用合適的演算法產生與當前的時間點相對應的密碼或辨識碼做為主控端認證資料。In an embodiment, the master device 830 can use various existing mechanisms to actively generate identification data for verifying the authenticity of the host device 830 as the master authentication data, and transmit the message in the process 902. Target device 110. For example, the master device 830 can use its own private key to electronically sign a specific data to generate a corresponding signature value as the master authentication data. For another example, the master device 830 can generate a password or an identification code corresponding to the current time point as a master authentication data by using a suitable algorithm.

在另一實施例中,主控端裝置830可以是在收到訊標裝置110或智慧卡120的請求後,才被動產生可供核對主控端裝置830身分真實性的識別資料來做為主控端認證資料,並在流程902中傳送給訊標裝置110。例如,主控端裝置830可利用各種合適的挑戰回應演算法,來產生與訊標裝置110或智慧卡120的請求相應的回應值做為主控端認證資料。又例如,主控端裝置830可在收到訊標裝置110或智慧卡120的請求後,才利用合適的演算法產生與當前的時間點相對應的密碼或辨識碼做為主控端認證資料。In another embodiment, the master device 830 may passively generate identification data for verifying the authenticity of the identity of the master device 830 after receiving the request from the message device 110 or the smart card 120. The terminal authenticates the data and transmits it to the beacon device 110 in flow 902. For example, the master device 830 can utilize various suitable challenge response algorithms to generate a response value corresponding to the request of the beacon device 110 or the smart card 120 as the master authentication data. For another example, the master device 830 can use the appropriate algorithm to generate a password or an identification code corresponding to the current time point as the master authentication data after receiving the request from the target device 110 or the smart card 120. .

在流程904中,訊標裝置110的控制電路217會透過傳輸介面113接收主控端裝置830傳來的主控端認證資料。In the process 904, the control circuit 217 of the beacon device 110 receives the host authentication data transmitted from the host device 830 through the transmission interface 113.

在流程906中,控制電路217會產生包含主控端認證資料在內的身分識別資料。In flow 906, control circuitry 217 generates identity identification data including the master authentication material.

實作上,主控端裝置830可要求用戶提供可識別用戶身分的資料,以供控制電路217據以進行前述的流程906。In practice, the master device 830 can require the user to provide information identifying the user's identity for the control circuit 217 to perform the foregoing process 906.

例如,在一實施例中,主控端裝置830可要求用戶透過主控端裝置830的輸入介面輸入一組密碼,並將用戶輸入的密碼傳送給控制電路217。在本例中,控制電路217可將主控端認證資料及用戶輸入的密碼以各種方式進行組合或編碼以產生一身分識別資料,使得該身分識別資料包含主控端認證資料以及用戶輸入的密碼。For example, in an embodiment, the master device 830 may require the user to input a set of passwords through the input interface of the master device 830 and transmit the password entered by the user to the control circuit 217. In this example, the control circuit 217 can combine or encode the master authentication data and the password input by the user in various manners to generate an identity identification data, such that the identity identification data includes the authentication information of the host and the password input by the user. .

又例如,在另一實施例中,主控端裝置830可要求用戶按壓訊標裝置110的生物特徵偵測電路115。此時,生物特徵偵測電路115會掃描用戶指紋,並將偵測結果傳送給控制電路217,而控制電路217則會產生與生物特徵偵測電路115的偵測結果相應的指紋資料。在本例中,控制電路217可將主控端認證資料及前述的指紋資料以各種方式進行組合或編碼以產生一身分識別資料,使得該身分識別資料包含主控端認證資料以及用戶的指紋資料。For another example, in another embodiment, the master device 830 can require the user to press the biometric detection circuit 115 of the beacon device 110. At this time, the biometric detection circuit 115 scans the user fingerprint and transmits the detection result to the control circuit 217, and the control circuit 217 generates the fingerprint data corresponding to the detection result of the biometric detection circuit 115. In this example, the control circuit 217 can combine or encode the master authentication data and the fingerprint data in various manners to generate an identity identification data, so that the identity identification data includes the host authentication data and the user's fingerprint data. .

又例如,在另一實施例中,主控端裝置830可利用其他的生物特徵擷取電路(例如,虹膜掃描器、掌紋掃描器、臉型掃描器等等)來取得用戶的生物特徵資料,並將取得的生物特徵資料傳送給控制電路217。在本例中,控制電路217可將主控端認證資料及前述的生物特徵資料以各種方式進行組合以產生一身分識別資料,使得該身分識別資料包含主控端認證資料以及與用戶相應的生物特徵資料。For another example, in another embodiment, the host device 830 can utilize other biometric capture circuits (eg, an iris scanner, a palm print scanner, a face scanner, etc.) to obtain biometric data of the user, and The acquired biometric data is transmitted to the control circuit 217. In this example, the control circuit 217 can combine the master authentication data and the foregoing biometric data in various manners to generate an identity identification data, so that the identity identification data includes the host authentication data and the biometric corresponding to the user. Characteristic data.

另外,控制電路217還會將產生的身分識別資料分別傳送至訊標端安全晶片213與卡端安全晶片121進行驗證。In addition, the control circuit 217 also transmits the generated identity identification data to the beacon end security chip 213 and the card end security chip 121 for verification.

在金鑰備份系統800中,訊標端安全記憶體215與卡端安全記憶體223都會預存有可驗證前述身分識別資料正確性的適格用戶身分識別資料。在某些實施例中,訊標端安全記憶體215與卡端安全記憶體223還會預存有主控端裝置830的公鑰。In the key backup system 800, the message-side secure memory 215 and the card-side secure memory 223 are pre-stored with appropriate user identity identification data that can verify the correctness of the identity identification data. In some embodiments, the message-side secure memory 215 and the card-side secure memory 223 also pre-store the public key of the master device 830.

實作上,訊標端安全記憶體215與卡端安全記憶體223兩者可儲存相同的適格用戶身分識別資料,也可以儲存同一適格用戶的不同身分識別資料。In practice, both the message-side secure memory 215 and the card-end secure memory 223 can store the same qualified user identity identification data, and can also store different identity identification data of the same eligible user.

例如,在某些實施例中,訊標端安全記憶體215中所儲存的適格用戶身分識別資料,是對應於主控端認證資料以及用戶輸入的第一組密碼的組合,而卡端安全記憶體223中所儲存的適格用戶身分識別資料,則是對應於主控端認證資料以及用戶輸入的第二組密碼的組合。For example, in some embodiments, the qualified user identity identification data stored in the message-side secure memory 215 is a combination of the first-party password corresponding to the authentication data of the host and the user, and the card-side security memory. The qualified user identity identification data stored in the body 223 is a combination corresponding to the master authentication material and the second group password input by the user.

又例如,在某些實施例中,訊標端安全記憶體215中所儲存的適格用戶身分識別資料,是對應於主控端認證資料以及適格用戶的某個生物特徵(例如,右手食指指紋)的組合,而卡端安全記憶體223中所儲存的適格用戶身分識別資料,則是對應於主控端認證資料以及適格用戶的另一個生物特徵(例如,左手食指指紋)的組合。For another example, in some embodiments, the qualified user identity identification data stored in the target security storage device 215 is corresponding to the authentication information of the host and a certain biometric feature of the eligible user (eg, the right index finger fingerprint). The combination of the user identity identification data stored in the card-end secure memory 223 is a combination of another biometric feature (eg, a left-hand index finger fingerprint) corresponding to the host authentication material and the eligible user.

在訊標端安全記憶體215與卡端安全記憶體223兩者所預存的適格用戶身分識別資料相同的實施例中,控制電路217可以將相同的身分識別資料傳送給訊標端安全晶片213與卡端安全晶片121進行驗證。In the embodiment in which the qualified user identity identification data pre-stored by both the message-side secure memory 215 and the card-end secure memory 223 is the same, the control circuit 217 can transmit the same identity identification data to the target-end security chip 213 and The card end security chip 121 performs verification.

在訊標端安全記憶體215與卡端安全記憶體223兩者所儲存的適格用戶身分識別資料不相同的實施例中,控制電路217傳送給訊標端安全晶片213進行驗證的身分識別資料,可以跟傳送給卡端安全晶片121進行驗證的身分識別資料互不相同。In the embodiment in which the qualified user identity identification data stored by the target end secure memory 215 and the card end secure memory 223 are different, the control circuit 217 transmits the identity identification data to the target end security chip 213 for verification. The identity identification data that can be verified by the card security chip 121 can be different from each other.

例如,用戶可以按照主控端裝置830指示的順序,將不同的指紋(例如,右手食指指紋與左手食指指紋)依序提供給生物特徵偵測電路115進行掃描。在此情況下,控制電路217可依序產生兩個相異的身分識別資料。控制電路217可將其中一個身分識別資料傳送給訊標端安全晶片213進行驗證,並將另一個身分識別資料傳送給卡端安全晶片121進行驗證。For example, the user may sequentially provide different fingerprints (eg, right-hand index finger and left-hand index finger fingerprint) to the biometric detection circuit 115 for scanning in the order indicated by the host device 830. In this case, the control circuit 217 can sequentially generate two distinct identity identification data. The control circuit 217 can transmit one of the identity identification data to the target end security chip 213 for verification, and transmit another identity identification data to the card end security chip 121 for verification.

在流程908中,訊標端安全晶片213會驗證控制電路217傳來的身分識別資料,以進行訊標端的用戶身分驗證程序。訊標端安全晶片213可採用各種既有的驗證方式,將控制電路217傳來的身分識別資料與訊標端安全記憶體215內預存的適格用戶身分識別資料進行比對。In the process 908, the beacon security chip 213 verifies the identity identification data sent by the control circuit 217 to perform the user identity verification process at the cell end. The target end security chip 213 can use various existing verification methods to compare the identity identification data transmitted from the control circuit 217 with the pre-stored user identification data pre-stored in the message security memory 215.

控制電路217傳來的身分識別資料必須與訊標端安全記憶體215內預存的適格用戶身分識別資料相符,才能通過訊標端安全晶片213的身分認證程序。The identity identification data sent by the control circuit 217 must match the qualified user identity identification data pre-stored in the message-side secure memory 215 to pass the identity authentication procedure of the message-side security chip 213.

倘若訊標端安全晶片213判定控制電路217傳來的身分識別資料與訊標端安全記憶體215內預存的適格用戶身分識別資料相符,則訊標端安全晶片213會進行流程910;反之,則訊標端安全晶片213會傳送身分認證失敗通知給控制電路217。If the identity end security chip 213 determines that the identity identification data sent by the control circuit 217 matches the pre-stored user identity identification data pre-stored in the target security memory 215, the beacon security chip 213 performs the process 910; otherwise, The beacon security chip 213 transmits an identity authentication failure notification to the control circuit 217.

在流程910中,訊標端安全晶片213會傳送身分認證成功通知給控制電路217,並同意接受控制電路217對於訊標端安全記憶體215的存取請求。In the process 910, the beacon security chip 213 transmits the identity authentication success notification to the control circuit 217, and agrees to accept the access request from the control circuit 217 to the beacon security memory 215.

在流程912中,卡端安全晶片121會驗證控制電路217傳來的身分識別資料,以進行智慧卡端的用戶身分驗證程序。卡端安全晶片121可採用各種既有的驗證方式,將控制電路217傳來的身分識別資料與卡端安全記憶體223內預存的適格用戶身分識別資料進行比對。In the process 912, the card end security chip 121 verifies the identity identification data transmitted from the control circuit 217 to perform the user identity verification procedure of the smart card end. The card-end security chip 121 can use various existing verification methods to compare the identity identification data transmitted from the control circuit 217 with the pre-stored user identity identification data pre-stored in the card-side secure memory 223.

控制電路217傳來的身分識別資料必須與卡端安全記憶體223內預存的適格用戶身分識別資料相符,才能通過卡端安全晶片121的身分認證程序。The identity identification data transmitted from the control circuit 217 must match the qualified user identity identification data pre-stored in the card-side secure memory 223 to pass the identity authentication procedure of the card-end security chip 121.

倘若卡端安全晶片121判定控制電路217傳來的身分識別資料與卡端安全記憶體223內預存的適格用戶身分識別資料相符,則卡端安全晶片121會進行流程914;反之,則卡端安全晶片121會傳送身分認證失敗通知給控制電路217。If the card-end security chip 121 determines that the identity identification data sent from the control circuit 217 matches the qualified user identity identification data pre-stored in the card-end secure memory 223, the card-end security chip 121 performs the process 914; otherwise, the card-side security The wafer 121 transmits an identity authentication failure notification to the control circuit 217.

在流程914中,卡端安全晶片121會傳送身分認證成功通知給控制電路217,並同意接受控制電路217對於卡端安全記憶體223的存取請求。In the process 914, the card-end security chip 121 transmits an identity authentication success notification to the control circuit 217 and agrees to accept the control circuit 217's access request to the card-side secure memory 223.

在流程916中,控制電路217會接收訊標端安全晶片213和/或卡端安全晶片121傳來的身分認證失敗通知。在本實施例中,只要控制電路217接收到訊標端安全晶片213和卡端安全晶片121的其中之一傳來的身分認證失敗通知,控制電路217便會拒絕進行後續的金鑰備份運作,並將此結果回報給主控端裝置830。In the process 916, the control circuit 217 receives the identity authentication failure notification from the beacon security chip 213 and/or the card security chip 121. In this embodiment, as long as the control circuit 217 receives the identity authentication failure notification sent by one of the beacon security chip 213 and the card security chip 121, the control circuit 217 rejects the subsequent key backup operation. This result is reported to the master device 830.

在流程918中,控制電路217會接收訊標端安全晶片213和/或卡端安全晶片121傳來的身分認證成功通知。In the process 918, the control circuit 217 receives the identity authentication success notification from the beacon security chip 213 and/or the card security chip 121.

只有在訊標端安全晶片213與卡端安全晶片121兩端的身分驗證皆成功的情況下,控制電路217才會判定當前的用戶通過金鑰備份系統800的用戶身分認證程序,並進行流程920。Only if the identity verification at both ends of the beacon security chip 213 and the card security chip 121 is successful, the control circuit 217 determines that the current user passes the user identity authentication procedure of the key backup system 800, and proceeds to process 920.

在流程920中,控制電路217會將用戶通過訊標裝置110及智慧卡120兩端的用戶身分認證程序的結果,回報給主控端裝置830。In the process 920, the control circuit 217 reports the result of the user identity authentication procedure by the user through the beacon device 110 and the smart card 120 to the master device 830.

在流程922中,主控端裝置830可將用戶設置的金鑰備份指令與相關的備份參數,傳送給訊標裝置110。In the process 922, the master device 830 can transmit the key backup command set by the user and the related backup parameters to the target device 110.

在流程924中,訊標裝置110的控制電路217會接收主控端裝置830傳來的金鑰備份指令與相關的備份參數。In the process 924, the control circuit 217 of the beacon device 110 receives the key backup command and associated backup parameters from the host device 830.

在流程926中,控制電路217可依據主控端裝置830傳來的金鑰備份指令與相關的備份參數,在訊標端安全晶片213與卡端安全晶片121之間進行相應的金鑰備份運作。In the process 926, the control circuit 217 can perform a corresponding key backup operation between the target security chip 213 and the card security chip 121 according to the key backup command and the related backup parameters transmitted from the host device 830. .

例如,在主控端裝置830指示訊標裝置110進行單純的一對一備份運作的情況下,控制電路217可要求訊標端安全晶片213提供訊標端安全記憶體215中所儲存的目標金鑰,並將訊標端安全晶片213所提供的目標金鑰傳送給智慧卡120中的卡端安全晶片121,以及指示卡端安全晶片121將目標金鑰寫入卡端安全記憶體223中進行保存。For example, in the case that the master device 830 instructs the beacon device 110 to perform a simple one-to-one backup operation, the control circuit 217 can request the beacon security chip 213 to provide the target gold stored in the target security memory 215. Key, and the target key provided by the beacon security chip 213 is transmitted to the card security chip 121 in the smart card 120, and the card security chip 121 is instructed to write the target key into the card security memory 223. save.

如此一來,便可完成將單一訊標裝置110中的目標金鑰備份到單一智慧卡120中的動作。In this way, the action of backing up the target key in the single symbol device 110 into the single smart card 120 can be completed.

又例如,在主控端裝置830指示訊標裝置110進行單純的一對多備份運作的情況下,控制電路217可將訊標端安全晶片213所提供的目標金鑰傳送給智慧卡120中的卡端安全晶片121,並指示卡端安全晶片121將目標金鑰寫入卡端安全記憶體223中進行保存。For another example, in a case where the master device 830 instructs the beacon device 110 to perform a simple one-to-many backup operation, the control circuit 217 can transmit the target key provided by the beacon security chip 213 to the smart card 120. The card-end security chip 121 instructs the card-end security chip 121 to write the target key into the card-side secure memory 223 for storage.

接著,用戶可按照主控端裝置830的指示、或是指示電路117產生的相關引導信息,陸續更換訊標裝置110所存取的智慧卡,以使控制電路217得以透過智慧卡存取電路211將目標金鑰陸續寫入其他智慧卡120的卡端安全記憶體223中。Then, the user can replace the smart card accessed by the target device 110 according to the instruction of the host device 830 or the related guidance information generated by the indication circuit 117, so that the control circuit 217 can pass the smart card access circuit 211. The target key is successively written into the card-side secure memory 223 of the other smart card 120.

在用戶按照指示陸續更換多張智慧卡120之後,訊標裝置110中的目標金鑰便會有多個相同的備份版本被分別保存在多個不同的智慧卡120中。After the user successively replaces the plurality of smart cards 120 according to the instructions, the target keys in the beacon device 110 have a plurality of identical backup versions stored in the plurality of different smart cards 120, respectively.

又例如,在主控端裝置830指示訊標裝置110進行分持型態的一對多備份運作的情況下,控制電路217可將訊標端安全晶片213所提供的目標金鑰分拆成複數個金鑰片段資料,或是由訊標端安全晶片213將目標金鑰分拆成複數個金鑰片段資料再傳送給控制電路217。控制電路217會將其中一個金鑰片段資料傳送給智慧卡120中的卡端安全晶片121,並指示卡端安全晶片121將該片段資料寫入卡端安全記憶體223中進行保存。For example, in a case where the master device 830 instructs the beacon device 110 to perform a one-to-many backup operation of the split type, the control circuit 217 can split the target key provided by the beacon security chip 213 into plural numbers. The key segment data is separated from the target key by the target end security chip 213 into a plurality of key segment data and then transmitted to the control circuit 217. The control circuit 217 transmits one of the key segment data to the card-end security chip 121 in the smart card 120, and instructs the card-end security chip 121 to write the segment data into the card-side secure memory 223 for storage.

接著,用戶可按照主控端裝置830的指示、或是指示電路117產生的相關引導信息,陸續更換訊標裝置110所存取的智慧卡,以使控制電路217得以透過智慧卡存取電路211將其他金鑰片段資料陸續寫入其他智慧卡120的卡端安全記憶體223中。Then, the user can replace the smart card accessed by the target device 110 according to the instruction of the host device 830 or the related guidance information generated by the indication circuit 117, so that the control circuit 217 can pass the smart card access circuit 211. The other key segment data is successively written into the card-side secure memory 223 of the other smart card 120.

在用戶按照指示陸續更換多張智慧卡120之後,訊標裝置110中的目標金鑰便會以分持備份形態被分散到多個智慧卡120中進行儲存。After the user successively replaces the plurality of smart cards 120 according to the instructions, the target keys in the target device 110 are distributed to the plurality of smart cards 120 for storage in the backup backup mode.

請注意,前述各實施例中的訊標端安全晶片213可先利用與卡端安全晶片121預先約定好的各種加密機制對目標金鑰(或相關的金鑰片段資料)進行加密,再將加密後的目標金鑰(或相關的金鑰片段資料)透過控制電路217傳送給卡端安全晶片121進行解密。Please note that the target end security chip 213 in the foregoing embodiments may first encrypt the target key (or related key segment data) by using various encryption mechanisms pre-agreed with the card end security chip 121, and then encrypt the target key (or related key segment data). The subsequent target key (or associated key segment data) is transmitted to the card end security chip 121 via the control circuit 217 for decryption.

藉此可避免控制電路217在金鑰備份過程中得知目標金鑰的真實內容,因此能夠有效降低惡意人士藉由入侵主控端裝置830或控制電路217而竊取目標金鑰的可能性。Thereby, the control circuit 217 can be prevented from knowing the real content of the target key during the key backup process, thereby effectively reducing the possibility of the malicious person stealing the target key by invading the master device 830 or the control circuit 217.

之後,用戶可能會因為原有的訊標裝置110故障或遺失,而需要將已備份在一或多張智慧卡120中的目標金鑰還原到另一個訊標裝置110中以供後續使用。或者,原有的訊標裝置110中的目標金鑰也可能因為各種原因被刪除,而使得用戶需要將已備份在一或多張智慧卡120中的目標金鑰還原到原先的訊標裝置110中。Thereafter, the user may need to restore the target key that has been backed up in one or more smart cards 120 to another beacon device 110 for subsequent use because the original beacon device 110 is faulty or missing. Alternatively, the target key in the original beacon device 110 may also be deleted for various reasons, so that the user needs to restore the target key that has been backed up in one or more smart cards 120 to the original beacon device 110. .

換言之,用戶之後在進行金鑰還原過程中所使用的訊標裝置110,有可能是另一個訊標裝置,也有可能是原先的訊標裝置。In other words, the beacon device 110 used by the user in the process of performing the key restoration may be another beacon device or may be the original beacon device.

以下將搭配圖10來進一步說明利用金鑰備份系統800進行金鑰還原的運作方式。圖10為本發明另一實施例的金鑰還原方法簡化後的流程圖。The operation of the key restoration using the key backup system 800 will be further described below with reference to FIG. FIG. 10 is a simplified flowchart of a method for reducing a key according to another embodiment of the present invention.

在圖10的實施例中,用戶可透過主控端裝置830向訊標裝置110下達相關的金鑰還原指令與還原參數,以指示訊標裝置110以相應的還原模式將儲存在一或多張智慧卡120中的目標金鑰,還原到單一訊標裝置110的訊標端安全記憶體215中進行保存。In the embodiment of FIG. 10, the user can issue the relevant key restoration command and the restoration parameter to the target device 110 through the host device 830 to instruct the target device 110 to store one or more wisdoms in the corresponding restoration mode. The target key in the card 120 is restored to the target end secure memory 215 of the single symbol device 110 for storage.

同樣地,主控端裝置830可提供相關的用戶操作介面供用戶下達前述的金鑰還原指令,並設置相關的還原參數。Similarly, the host device 830 can provide an associated user operation interface for the user to release the aforementioned key restoration command and set the relevant restore parameters.

在進行金鑰還原運作之前,金鑰備份系統800同樣要進行圖10中的流程902至914,以進行用戶身分認證程序,藉此判別用戶身分的真實性與正確性。Before performing the key restoration operation, the key backup system 800 also performs the processes 902 to 914 in FIG. 10 to perform the user identity authentication process, thereby discriminating the authenticity and correctness of the user identity.

前述有關圖9中的流程902至914的實作方式及相關變化的描述,也適用於圖10的實施例中。因此,為簡潔起見,在此不重複敘述流程902至914的相關細節。The foregoing description of the implementations and related variations of flows 902 through 914 in FIG. 9 also applies to the embodiment of FIG. Therefore, for the sake of brevity, the relevant details of the flow 902 to 914 will not be repeated here.

如圖10所示,控制電路217在流程1016中會接收訊標端安全晶片213和/或卡端安全晶片121傳來的身分認證失敗通知。在本實施例中,只要控制電路217接收到訊標端安全晶片213和卡端安全晶片121的其中之一傳來的身分認證失敗通知,控制電路217便會拒絕進行後續的金鑰還原運作,並將此結果回報給主控端裝置830。As shown in FIG. 10, the control circuit 217 receives the identity authentication failure notification from the beacon security chip 213 and/or the card security chip 121 in the process 1016. In this embodiment, as long as the control circuit 217 receives the identity authentication failure notification sent by one of the beacon security chip 213 and the card security chip 121, the control circuit 217 rejects the subsequent key restoration operation. This result is reported to the master device 830.

在流程918中,控制電路217會接收訊標端安全晶片213和/或卡端安全晶片121傳來的身分認證成功通知。In the process 918, the control circuit 217 receives the identity authentication success notification from the beacon security chip 213 and/or the card security chip 121.

只有在訊標端安全晶片213與卡端安全晶片121兩端的身分驗證皆成功的情況下,控制電路217才會判定當前的用戶通過金鑰備份系統800的用戶身分認證程序,並進行流程920。Only if the identity verification at both ends of the beacon security chip 213 and the card security chip 121 is successful, the control circuit 217 determines that the current user passes the user identity authentication procedure of the key backup system 800, and proceeds to process 920.

在流程920中,控制電路217會將用戶通過訊標裝置110及智慧卡120兩端的用戶身分認證程序的結果,回報給主控端裝置830。In the process 920, the control circuit 217 reports the result of the user identity authentication procedure by the user through the beacon device 110 and the smart card 120 to the master device 830.

在流程1022中,主控端裝置830可將用戶設置的金鑰還原指令與相關的還原參數,傳送給訊標裝置110。In the process 1022, the master device 830 can transmit the key reset command set by the user and the associated restore parameter to the target device 110.

在流程1024中,訊標裝置110的控制電路217會接收主控端裝置830傳來的金鑰還原指令與相關的還原參數。In the process 1024, the control circuit 217 of the beacon device 110 receives the key restoration command and the associated restoration parameters transmitted from the host device 830.

在流程1026中,控制電路217可依據主控端裝置830傳來的金鑰還原指令與相關的還原參數,在訊標端安全晶片213與卡端安全晶片121之間進行相應的金鑰還原運作。In the process 1026, the control circuit 217 can perform the corresponding key restoration operation between the target security chip 213 and the card security chip 121 according to the key restoration command and the related restoration parameter transmitted from the host device 830. .

例如,在主控端裝置830指示訊標裝置110進行單純的一對一還原運作的情況下,控制電路217可要求卡端安全晶片121提供卡端安全記憶體223中所儲存的目標金鑰,並將卡端安全晶片121所提供的目標金鑰傳送給訊標端安全晶片213,以及指示訊標端安全晶片213將目標金鑰寫入訊標端安全記憶體215中進行保存。For example, in the case that the master device 830 instructs the beacon device 110 to perform a simple one-to-one reduction operation, the control circuit 217 may request the card-end security chip 121 to provide the target key stored in the card-end secure memory 223. The target key provided by the card-end security chip 121 is transmitted to the target-end security chip 213, and the target-side security chip 213 is instructed to write the target key into the target-side secure memory 215 for storage.

如此一來,便可完成將單一智慧卡120中的目標金鑰還原到單一訊標裝置110中的動作。In this way, the action of restoring the target key in the single smart card 120 to the single symbol device 110 can be completed.

又例如,在主控端裝置830指示訊標裝置110進行分持型態的多對一還原運作的情況下,控制電路217可要求首張智慧卡120上的卡端安全晶片121提供卡端安全記憶體223中所儲存的金鑰片段資料。For another example, in a case where the master device 830 instructs the beacon device 110 to perform a multi-to-one restoration operation of the split type, the control circuit 217 may request the card end security chip 121 on the first smart card 120 to provide card end security. The key fragment data stored in the memory 223.

接著,用戶可按照主控端裝置830的指示、或是指示電路117產生的相關引導信息,陸續更換訊標裝置110所存取的智慧卡,以使控制電路217得以透過智慧卡存取電路211讀取其他智慧卡120的卡端安全記憶體223中所儲存的金鑰片段資料。Then, the user can replace the smart card accessed by the target device 110 according to the instruction of the host device 830 or the related guidance information generated by the indication circuit 117, so that the control circuit 217 can pass the smart card access circuit 211. The key piece data stored in the card-side secure memory 223 of the other smart card 120 is read.

在某些實施例中,控制電路217可從所獲得的金鑰片段資料中還原出目標金鑰,並指示訊標端安全晶片213將目標金鑰寫入訊標端安全記憶體215中進行保存。In some embodiments, the control circuit 217 can restore the target key from the obtained key fragment data and instruct the target end security chip 213 to write the target key into the target end secure memory 215 for saving. .

在另外一些實施例中,控制電路217可將所獲得的金鑰片段資料都傳送給訊標端安全晶片213,並指示訊標端安全晶片213從所這些金鑰片段資料中還原出目標金鑰,以及將目標金鑰寫入訊標端安全記憶體215中進行保存。In some other embodiments, the control circuit 217 can transmit the obtained key segment data to the beacon security chip 213, and instruct the beacon security chip 213 to restore the target key from the key segment data. And writing the target key to the message-side secure memory 215 for saving.

如此一來,分散儲存在多張智慧卡120中的多個金鑰片段資料便會被重新還原成目標金鑰並儲存到單一訊標裝置110中。In this way, the plurality of key segment data stored in the plurality of smart cards 120 are re-restored into the target key and stored in the single symbol device 110.

請注意,前述各實施例中的卡端安全晶片121可先利用與訊標端安全晶片213預先約定好的各種加密機制對目標金鑰(或相關的金鑰片段資料)進行加密,再將加密後的目標金鑰(或相關的金鑰片段資料)透過控制電路217傳送給訊標端安全晶片213進行解密。Please note that the card-end security chip 121 in the foregoing embodiments may first encrypt the target key (or related key segment data) by using various encryption mechanisms pre-agreed with the target-end security chip 213, and then encrypt the target key (or related key segment data). The subsequent target key (or associated key segment data) is transmitted to the target end security chip 213 via the control circuit 217 for decryption.

藉此可避免控制電路217在金鑰還原過程中得知目標金鑰的真實內容,因此能夠有效降低惡意人士藉由入侵主控端裝置830或控制電路217而竊取目標金鑰的可能性。Thereby, the control circuit 217 can be prevented from knowing the real content of the target key during the key restoration process, thereby effectively reducing the possibility of the malicious person stealing the target key by invading the master device 830 or the control circuit 217.

由前述說明可知,圖8實施例中的生物特徵偵測電路115也無需偵測前述的用戶觸壓動作,智慧卡存取電路211也無需偵測前述的用戶放卡動作。另外,圖8中的控制電路217無需記錄前述用戶觸壓動作的發生時間與發生次數,也無需記錄前述用戶放卡動作的發生時間與發生次數。It can be seen from the foregoing description that the biometric detection circuit 115 in the embodiment of FIG. 8 does not need to detect the user touch action, and the smart card access circuit 211 does not need to detect the aforementioned user card release action. In addition, the control circuit 217 in FIG. 8 does not need to record the occurrence time and the number of occurrences of the user's touch operation, and it is not necessary to record the occurrence time and the number of occurrences of the user's card-playing operation.

由前述說明可知,在訊標裝置110進行金鑰備份運作或金鑰還原運作之前,訊標裝置110與智慧卡120兩端的安全晶片都會進行用戶身分驗證程序。只要訊標裝置110與智慧卡120其中之一的身分驗證程序失敗,用戶就無法通過身分認證程序,因此能有效阻止他人私自進行未獲授權的金鑰備份運作或金鑰還原運作。It can be seen from the foregoing description that the beacon device 110 and the security chip at both ends of the smart card 120 perform the user identity verification procedure before the target device 110 performs the key backup operation or the key restoration operation. As long as the identity verification program of one of the symbol device 110 and the smart card 120 fails, the user cannot pass the identity authentication program, thereby effectively preventing others from performing an unauthorized key backup operation or key restoration operation.

前述的目標金鑰與適格用戶身分識別資料都是儲存在安全晶片的安全記憶體中,所以能提高目標金鑰與適格用戶身分識別資料的儲存安全性,也能降低駭客藉由入侵主控端裝置830、訊標裝置110、或智慧卡120而竊取目標金鑰與適格用戶身分識別資料的可能性。The aforementioned target key and the appropriate user identity identification data are stored in the secure memory of the security chip, so the storage security of the target key and the appropriate user identity identification data can be improved, and the hacker can also reduce the security of the hacker. The end device 830, the beacon device 110, or the smart card 120 steals the possibility of the target key and the qualified user identity identification data.

另外,在金鑰備份系統800中,訊標裝置110的控制電路217所產生的身分識別資料必須包含有主控端裝置830提供的主控端認證資料,才有機會通過訊標裝置110與智慧卡120兩端的用戶身分驗證程序。換言之,在缺乏主控端認證資料的情況下,用戶不可能通過訊標裝置110與智慧卡120兩端的用戶身分驗證程序。In addition, in the key backup system 800, the identity identification data generated by the control circuit 217 of the beacon device 110 must include the host authentication information provided by the host device 830, and the opportunity is passed through the beacon device 110 and the wisdom. User identity verification procedures at both ends of the card 120. In other words, in the absence of the master authentication material, the user cannot verify the program through the user identity authentication device 110 and the smart card 120.

從另一角度而言,金鑰備份系統800採用的前述身分驗證程序,相當於是對目標金鑰的備份或還原動作設下了額外的限制,亦即,目標金鑰的備份或還原動作被限定成只能在主控端裝置830所在的地點進行,而且必須是對主控端裝置830擁有存取權限的人員才能夠進行。From another point of view, the foregoing identity verification program used by the key backup system 800 is equivalent to setting an additional limit on the backup or restore operation of the target key, that is, the backup or restore action of the target key is limited. The process can only be performed at the location where the master device 830 is located, and must be performed by a person having access to the master device 830.

如此一來,主控端裝置830所屬的機構或企業,只要加強控管主控端裝置830的存取權限,便能有效降低該機構或企業所擁有的各種金鑰被非法複製或竊取的風險。In this way, the institution or enterprise to which the master device 830 belongs can effectively reduce the risk of illegally copying or stealing various keys owned by the institution or enterprise as long as the access authority of the control host device 830 is strengthened. .

請注意,前述圖9和圖10中的流程執行順序只是一示範性的實施例,並非侷限本發明的實際實施方式。例如,圖9中的流程922可以跟流程902同時進行,或者也可以將流程922和924調整到流程902之前進行。It should be noted that the foregoing flow execution sequence in FIGS. 9 and 10 is merely an exemplary embodiment and is not intended to limit the actual implementation of the present invention. For example, flow 922 in FIG. 9 can be performed concurrently with process 902, or flow 922 and 924 can be adjusted prior to process 902.

又例如,圖10中的流程1022可以跟流程902同時進行,或者也可以將流程1022和1024調整到流程902之前進行。For another example, the process 1022 in FIG. 10 can be performed concurrently with the process 902, or the processes 1022 and 1024 can be adjusted prior to the process 902.

另外,前述各實施例中的訊標裝置110的電路架構只是示範性的實施例,並非侷限本發明的實際實施方式。In addition, the circuit architecture of the beacon device 110 in the foregoing embodiments is merely an exemplary embodiment, and is not intended to limit the actual implementation of the present invention.

例如,前述訊標裝置110中的傳輸介面113的位置、規格、和/或數量,都可依實際應用的需要而調整。For example, the location, size, and/or number of the transmission interface 113 in the aforementioned beacon device 110 can be adjusted according to the needs of the actual application.

前述訊標裝置110中的生物特徵偵測電路115的位置、數量、和/或偵測機制,也都可依實際應用的需要而調整。例如,在生物特徵偵測電路115是用來偵測用戶心電圖的實施例中,訊標裝置110中至少要設置兩個生物特徵偵測電路115。當用戶以心臟兩側之身體部位分別碰觸​​這兩個生物特徵偵測電路​115​時,​便可利用​這兩個生物特徵偵測電路​115​​量測出用戶的心電信號。The position, number, and/or detection mechanism of the biometric detection circuit 115 in the aforementioned beacon device 110 can also be adjusted according to the needs of the actual application. For example, in the embodiment where the biometric detection circuit 115 is used to detect the user's electrocardiogram, at least two biometric detection circuits 115 are disposed in the beacon device 110. When the user touches the two biometric detection circuits 115 with the body parts on both sides of the heart, the two biometric detection circuits 115 can be used to measure the user's heart. electric signal.

實作上,也可以將前述訊標裝置110中的指示電路117省略,此時用戶可按照訊標裝置110的操作手冊或其他指引文件所指示的方式,自行估測前述訊標裝置110的相關運作進度。In practice, the indication circuit 117 in the signal device 110 may be omitted. At this time, the user may estimate the correlation of the target device 110 according to the operation manual of the information device 110 or other guidance documents. Operational progress.

另外,訊標裝置110中的卡片插槽119的位置可依實際電路設計的需要而調整。在智慧卡存取電路211用感應式、或非接觸式的電路架構實現的某些實施例中,甚至可以將卡片插槽119省略。In addition, the position of the card slot 119 in the beacon device 110 can be adjusted according to the needs of the actual circuit design. In some embodiments in which the smart card access circuit 211 is implemented in an inductive or non-contact circuit architecture, the card slot 119 may even be omitted.

在前述圖6與圖7的實施例中,也可以將訊標裝置110中的控制電路217改設置成單純依據用戶觸壓動作與用戶放卡動作的發生順序,來識別用戶指示的運作類型,而省略記錄觸壓次數和放卡次數的流程,以簡化控制電路217的判斷複雜度和所需的運算量。In the foregoing embodiments of FIG. 6 and FIG. 7 , the control circuit 217 in the beacon device 110 may be modified to recognize the operation type indicated by the user according to the order of occurrence of the user's touch action and the user's card release action. The flow of recording the number of touches and the number of times of card release is omitted to simplify the judgment complexity of the control circuit 217 and the amount of calculation required.

在某些實施例中,訊標裝置110亦可將傳輸介面113省略,而改用內建的微型電池來提供訊標裝置110內部元件運作所需的電力。In some embodiments, the beacon device 110 can also omit the transmission interface 113 and use a built-in miniature battery to provide the power required to operate the internal components of the beacon device 110.

另外,在某些實施例中,也可將前述圖8中的生物特徵偵測電路115省略。In addition, in some embodiments, the biometric detection circuit 115 in FIG. 8 described above may also be omitted.

在說明書及申請專利範圍中使用了某些詞彙來指稱特定的元件,而本領域內的技術人員可能會用不同的名詞來稱呼同樣的元件。本說明書及申請專利範圍並不以名稱的差異來作爲區分元件的方式,而是以元件在功能上的差異來作爲區分的基準。在說明書及申請專利範圍中所提及的「包含」爲開放式的用語,應解釋成「包含但不限定於」。另外,「耦接」一詞在此包含任何直接及間接的連接手段。因此,若文中描述第一元件耦接於第二元件,則代表第一元件可通過電性連接或無線傳輸、光學傳輸等信號連接方式而直接地連接於第二元件,或通過其它元件或連接手段間接地電性或信號連接至第二元件。Certain terms are used throughout the description and claims to refer to particular elements, and those skilled in the art may refer to the same elements. This specification and the scope of the patent application do not use the difference in the name as the means for distinguishing the elements, but the difference in function of the elements as the basis for the distinction. The term "including" as used in the specification and the scope of the patent application is an open term and should be interpreted as "including but not limited to". In addition, the term "coupled" is used herein to include any direct and indirect means of attachment. Therefore, if the first element is described as being coupled to the second element, the first element may be directly connected to the second element by electrical connection or by wireless transmission, optical transmission, or the like, or by other elements or connections. The means is indirectly electrically or signally connected to the second component.

在說明書中所使用的「和/或」的描述方式,包含所列舉的其中一個項目或多個項目的任意組合。另外,除非說明書中特別指明,否則任何單數格的用語都同時包含複數格的含義。The description of "and/or" used in the specification includes any one of the listed items or any combination of items. In addition, the terms of any singular are intended to include the meaning of the plural, unless otherwise specified in the specification.

以上僅為本發明的較佳實施例,凡依本發明請求項所做的等效變化與修改,皆應屬本發明的涵蓋範圍。The above are only the preferred embodiments of the present invention, and equivalent changes and modifications made to the claims of the present invention are intended to be within the scope of the present invention.

100‧‧‧金鑰備份裝置(cryptography key backup device)100‧‧‧key backup device (cryptography key backup device)

110‧‧‧訊標裝置(token device)110‧‧‧token device

111‧‧‧殼體(housing)111‧‧‧Housing

113‧‧‧傳輸介面(transmission interface)113‧‧‧Transmission interface

115‧‧‧生物特徵偵測電路(physiological characteristic detecting circuit)115‧‧‧physical characteristic detecting circuit

117‧‧‧指示電路(indication circuit)117‧‧‧indication circuit

119‧‧‧卡片插槽(card slot)119‧‧‧card slot

120‧‧‧智慧卡(smart card)120‧‧‧Smart card

121‧‧‧卡端安全晶片(on-card secure chip)121‧‧‧on-card secure chip

211‧‧‧智慧卡存取電路(smart card accessing circuit)211‧‧‧ smart card accessing circuit

213‧‧‧訊標端安全晶片(on-token secure chip)213‧‧‧on-token secure chip

215‧‧‧訊標端安全記憶體(on-token secure memory)215‧‧‧on-token secure memory

217‧‧‧控制電路(control circuit)217‧‧‧control circuit

219‧‧‧儲存電路(storage circuit)219‧‧‧storage circuit

223‧‧‧卡端安全記憶體(on-card secure memory)223‧‧‧on-card secure memory

310、320、410、510、520‧‧‧操作行為表(user behavior table)310, 320, 410, 510, 520‧‧‧ user behavior table

311~314、321~324、411~414、511~518、521~524‧‧‧操作行為態樣(user behavior pattern)311~314, 321~324, 411~414, 511~518, 521~524‧‧‧user behavior pattern

602~626、 722、726、902~926、1016、1022~1026‧‧‧運作流程(operation)602-626, 722, 726, 902-926, 1016, 1022~1026‧‧‧ operation process

800‧‧‧金鑰備份系統(cryptography key backup system)800‧‧‧key backup system (cryptography key backup system)

830‧‧‧主控端裝置(host device)830‧‧‧Host device (host device)

圖1為本發明一實施例的金鑰備份裝置簡化後的示意圖。FIG. 1 is a simplified schematic diagram of a key backup device according to an embodiment of the present invention.

圖2為圖1中的金鑰備份裝置簡化後的功能方塊圖。FIG. 2 is a simplified functional block diagram of the key backup device of FIG. 1. FIG.

圖3為圖1中的金鑰備份裝置的第一種應用態樣簡化後的示意圖。FIG. 3 is a simplified schematic diagram of a first application aspect of the key backup device of FIG. 1. FIG.

圖4為圖1中的金鑰備份裝置的第二種應用態樣簡化後的示意圖。4 is a simplified schematic diagram of a second application aspect of the key backup device of FIG. 1.

圖5為圖1中的金鑰備份裝置的第三種應用態樣簡化後的示意圖。FIG. 5 is a simplified schematic diagram of a third application aspect of the key backup device of FIG. 1. FIG.

圖6為本發明一實施例的金鑰備份方法簡化後的流程圖。FIG. 6 is a simplified flowchart of a method for backing up a key according to an embodiment of the present invention.

圖7為本發明一實施例的金鑰還原方法簡化後的流程圖。FIG. 7 is a simplified flowchart of a method for reducing a key according to an embodiment of the present invention.

圖8為本發明一實施例的金鑰備份系統簡化後的功能方塊圖。FIG. 8 is a simplified functional block diagram of a key backup system according to an embodiment of the present invention.

圖9為本發明另一實施例的金鑰備份方法簡化後的流程圖。FIG. 9 is a simplified flowchart of a method for backing up a key according to another embodiment of the present invention.

圖10為本發明另一實施例的金鑰還原方法簡化後的流程圖。FIG. 10 is a simplified flowchart of a method for reducing a key according to another embodiment of the present invention.

Claims (26)

一種用於一金鑰備份裝置(100)中的訊標裝置(110),包含: 一傳輸介面(113),設置成可從一外部裝置接收該訊標裝置(110)運作所需的電力; 一生物特徵偵測電路(115),設置成偵測用戶觸壓動作,以及用戶的生物特徵; 一智慧卡存取電路(211),設置成偵測用戶放卡動作,並可存取設置於一智慧卡(120)上的一卡端安全晶片(121),其中,該卡端安全晶片(121)內建有一卡端安全記憶體(223); 一訊標端安全晶片(213),內建有一訊標端安全記憶體(215);以及 一控制電路(217),耦接於該傳輸介面(113)、該生物特徵偵測電路(115)、該智慧卡存取電路(211)、與該訊標端安全晶片(213),設置成產生與該生物特徵偵測電路(115)的偵測結果相應的一或多個身分識別資料,傳送一第一身分識別資料給該訊標端安全晶片(213)進行身分驗證,以及傳送一第二身分識別資料給該卡端安全晶片(121)進行身分驗證; 其中,倘若該訊標端安全晶片(213)與該卡端安全晶片(121)兩端的身分驗證皆成功,則該控制電路(217)會在該訊標端安全晶片(213)與該卡端安全晶片(121)之間進行一相應的金鑰備份運作或金鑰還原運作。A beacon device (110) for use in a key backup device (100), comprising: a transmission interface (113) configured to receive power required for operation of the beacon device (110) from an external device; a biometric detection circuit (115) configured to detect a user's touch action and a biometric feature of the user; a smart card access circuit (211) configured to detect a user's card release action and to access the set a card-side security chip (121) on a smart card (120), wherein the card-end security chip (121) has a card-side security memory (223) built therein; a message-end security chip (213), a signal security memory (215) is provided; and a control circuit (217) is coupled to the transmission interface (113), the biometric detection circuit (115), the smart card access circuit (211), And the identifier end security chip (213) is configured to generate one or more identity identification data corresponding to the detection result of the biometric detection circuit (115), and transmit a first identity identification data to the identifier end The security chip (213) performs identity verification and transmits a second identity identification material to the card end security chip (121) The identity verification is performed; wherein if the identity verification of both the beacon security chip (213) and the card security chip (121) is successful, the control circuit (217) will be at the beacon security chip (213). A corresponding key backup operation or key restoration operation is performed between the card end security chip (121). 如請求項1所述的訊標裝置(110),其中,倘若該訊標端安全晶片(213)與該卡端安全晶片(121)兩端的身分驗證皆成功,則該控制電路(217)會依據該用戶觸壓動作與該用戶放卡動作的發生順序,在該訊標端安全晶片(213)與該卡端安全晶片(121)之間進行相應的金鑰備份運作或金鑰還原運作。The beacon device (110) of claim 1, wherein if the identity verification of both the beacon end security chip (213) and the card end security chip (121) is successful, the control circuit (217) According to the user's touch action and the order of the user's card release action, a corresponding key backup operation or key restoration operation is performed between the target end security chip (213) and the card end security chip (121). 如請求項2所述的訊標裝置(110),其中,該訊標端安全記憶體(215)中預存有一目標金鑰,倘若該訊標端安全晶片(213)與該卡端安全晶片(121)兩端的身分驗證皆成功,且該用戶觸壓動作發生在該用戶放卡動作之前,則該訊標端安全晶片(213)會將該目標金鑰傳送給該控制電路(217),而該控制電路(217)會將該目標金鑰傳送給該卡端安全晶片(121),使該卡端安全晶片(121)將該目標金鑰儲存於該卡端安全記憶體(223)中,以進行一金鑰備份運作。The beacon device (110) of claim 2, wherein the target end secure memory (215) is pre-stored with a target key, if the beacon security chip (213) and the card end security chip ( 121) the identity verification of both ends is successful, and the user touch action occurs before the user puts the card action, then the target end security chip (213) transmits the target key to the control circuit (217), and The control circuit (217) transmits the target key to the card-side security chip (121), so that the card-end security chip (121) stores the target key in the card-side secure memory (223). To perform a key backup operation. 如請求項3所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料相同。The symbol device (110) of claim 3, wherein the first identity identification material is the same as the second identity identification material. 如請求項3所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料不同。The symbol device (110) of claim 3, wherein the first identity identification material is different from the second identity identification material. 如請求項2所述的訊標裝置(110),其中,該卡端安全記憶體(223)中預存有一目標金鑰,倘若該訊標端安全晶片(213)與該卡端安全晶片(121)兩端的身分驗證皆成功,且該用戶放卡動作發生在該用戶觸壓動作之前,則該卡端安全晶片(121)會將該目標金鑰傳送給該控制電路(217),而該控制電路(217)會將該目標金鑰傳送給該訊標端安全晶片(213),使該訊標端安全晶片(213)將該目標金鑰儲存於該訊標端安全記憶體(215)中,以進行一金鑰還原運作。The symbol device (110) of claim 2, wherein the card-side secure memory (223) is pre-stored with a target key, if the target-end security chip (213) and the card-end security chip (121) The identity verification at both ends is successful, and the user's card release action occurs before the user touches the action, then the card-side security chip (121) transmits the target key to the control circuit (217), and the control The circuit (217) transmits the target key to the beacon security chip (213), so that the beacon security chip (213) stores the target key in the beacon security memory (215). To perform a key restore operation. 如請求項6所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料相同。The symbol device (110) of claim 6, wherein the first identity identification material is the same as the second identity identification material. 如請求項6所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料不同。The symbol device (110) of claim 6, wherein the first identity identification material is different from the second identity identification material. 如請求項2所述的訊標裝置(110),其中,該訊標端安全記憶體(215)中預存有一目標金鑰,倘若該訊標端安全晶片(213)與該卡端安全晶片(121)兩端的身分驗證皆成功,且該用戶放卡動作發生在該用戶觸壓動作之前,則該訊標端安全晶片(213)會將該目標金鑰傳送給該控制電路(217),而該控制電路(217)會將該目標金鑰傳送給該卡端安全晶片(121),使該卡端安全晶片(121)將該目標金鑰儲存於該卡端安全記憶體(223)中,以進行一金鑰備份運作。The beacon device (110) of claim 2, wherein the target end secure memory (215) is pre-stored with a target key, if the beacon security chip (213) and the card end security chip ( 121) If the identity verification of both ends is successful, and the user release action occurs before the user touches the action, the target security chip (213) transmits the target key to the control circuit (217), and The control circuit (217) transmits the target key to the card-side security chip (121), so that the card-end security chip (121) stores the target key in the card-side secure memory (223). To perform a key backup operation. 如請求項9所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料相同。The symbol device (110) of claim 9, wherein the first identity identification material is the same as the second identity identification material. 如請求項9所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料不同。The symbol device (110) of claim 9, wherein the first identity identification material is different from the second identity identification material. 如請求項2所述的訊標裝置(110),其中,該卡端安全記憶體(223)中預存有一目標金鑰,倘若該訊標端安全晶片(213)與該卡端安全晶片(121)兩端的身分驗證皆成功,且該用戶觸壓動作發生在該用戶放卡動作之前,則該卡端安全晶片(121)會將該目標金鑰傳送給該控制電路(217),而該控制電路(217)會將該目標金鑰傳送給該訊標端安全晶片(213),使該訊標端安全晶片(213)將該目標金鑰儲存於該訊標端安全記憶體(215)中,以進行一金鑰還原運作。The symbol device (110) of claim 2, wherein the card-side secure memory (223) is pre-stored with a target key, if the target-end security chip (213) and the card-end security chip (121) The identity verification of both ends is successful, and the user touch action occurs before the user puts the card action, then the card end security chip (121) transmits the target key to the control circuit (217), and the control The circuit (217) transmits the target key to the beacon security chip (213), so that the beacon security chip (213) stores the target key in the beacon security memory (215). To perform a key restore operation. 如請求項12所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料相同。The symbol device (110) of claim 12, wherein the first identity identification material is the same as the second identity identification material. 如請求項12所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料不同。The symbol device (110) of claim 12, wherein the first identity identification material is different from the second identity identification material. 如請求項1所述的訊標裝置(110),其中,該生物特徵偵測電路(115)設置成在每次被觸壓時,通知該控制電路(217)發生一用戶觸壓動作,而該智慧卡存取電路(211)設置成在每次偵測到該智慧卡(120)或其他卡片被放置在或移動到能被該智慧卡存取電路(211)偵測到的位置時,通知該控制電路(217)發生一用戶放卡動作。The device (110) of claim 1, wherein the biometric detection circuit (115) is configured to notify the control circuit (217) that a user touch action occurs each time it is touched. The smart card access circuit (211) is configured to be each time the smart card (120) or other card is detected to be placed or moved to a position detectable by the smart card access circuit (211). The control circuit (217) is notified that a user card release action has occurred. 如請求項1所述的訊標裝置(110),其中,該控制電路(217)還設置成依據該用戶觸壓動作的一發生次數或該用戶放卡動作的一發生次數,判斷在該金鑰備份運作或該金鑰還原運作中所需使用的一智慧卡數量。The symbol device (110) of claim 1, wherein the control circuit (217) is further configured to determine the gold in accordance with an occurrence of the user's touch action or an occurrence of the user's card release action. The number of smart cards required for key backup operations or for the key restore operation. 如請求項1至16中任一項所述的訊標裝置(110),其另包含有: 一指示電路(117),耦接於該控制電路(217),設置成依據該控制電路(217)的控制,產生用以代表相關運作進度的指示信息,或產生用以引導用戶更換(change)該智慧卡存取電路(211)所存取的智慧卡的指示信息。The beacon device (110) according to any one of claims 1 to 16, further comprising: an indicating circuit (117) coupled to the control circuit (217), configured to be in accordance with the control circuit (217) The control generates an indication message for representing the progress of the related operation, or generates indication information for guiding the user to change the smart card accessed by the smart card access circuit (211). 一種用於一金鑰備份系統(800)中的訊標裝置(110),包含: 一傳輸介面(113),設置成可與該金鑰備份系統(800)中的一主控端裝置(830)進行資料通訊,並接收該主控端裝置(830)傳來的一主控端認證資料; 一智慧卡存取電路(211),設置成存取設置於一智慧卡(120)上的一卡端安全晶片(121),其中,該卡端安全晶片(121)內建有一卡端安全記憶體(223); 一訊標端安全晶片(213),內建有一訊標端安全記憶體(215);以及 一控制電路(217),耦接於該傳輸介面(113)、該智慧卡存取電路(211)、與該訊標端安全晶片(213),設置成產生包含該主控端認證資料的一或多個身分識別資料,傳送一第一身分識別資料給該訊標端安全晶片(213)進行身分驗證,以及傳送一第二身分識別資料給該卡端安全晶片(121)進行身分驗證; 其中,倘若該訊標端安全晶片(213)與該卡端安全晶片(121)兩端的身分驗證皆成功,則該控制電路(217)會依據該主控端裝置(830)的指示,在該訊標端安全晶片(213)與該卡端安全晶片(121)之間進行一相應的金鑰備份運作或金鑰還原運作。A beacon device (110) for use in a key backup system (800), comprising: a transmission interface (113) configured to be associated with a host device (830) in the key backup system (800) Carrying out data communication and receiving a master authentication data transmitted from the host device (830); a smart card access circuit (211) configured to access a set on a smart card (120) The card end security chip (121), wherein the card end security chip (121) has a card end security memory (223) built therein; a message end security chip (213) has a built-in tag end security memory ( 215); and a control circuit (217) coupled to the transmission interface (113), the smart card access circuit (211), and the beacon security chip (213), configured to generate the host One or more identity identification data of the authentication data, transmitting a first identity identification data to the identity end security chip (213) for identity verification, and transmitting a second identity identification data to the card security chip (121) Identity verification; wherein, if the identity end security chip (213) and the card end security chip (121) are verified at both ends If successful, the control circuit (217) performs a corresponding key backup between the target security chip (213) and the card security chip (121) according to the indication of the host device (830). Operation or key restoration operation. 如請求項18所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料相同。The beacon device (110) of claim 18, wherein the first identity identification material is the same as the second identity identification material. 如請求項19所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料皆包含該主控端認證資料以及用戶所輸入的一組密碼。The symbol device (110) of claim 19, wherein the first identity identification data and the second identity identification material both include the master authentication material and a set of passwords input by the user. 如請求項19所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料皆包含該主控端認證資料以及與用戶相應的一生物特徵資料。The beacon device (110) of claim 19, wherein the first identity identification data and the second identity identification material both include the master authentication material and a biometric data corresponding to the user. 如請求項19所述的訊標裝置(110),其另包含: 一生物特徵偵測電路(115),耦接於該控制電路(217),設置成偵測用戶的生物特徵; 其中,該控制電路(217)還設置成產生與該生物特徵偵測電路(115)的偵測結果相應的一生物特徵資料,且該第一身分識別資料與該第二身分識別資料皆包含該主控端認證資料與該生物特徵資料。The beacon device (110) of claim 19, further comprising: a biometric detection circuit (115) coupled to the control circuit (217), configured to detect a biometric feature of the user; wherein The control circuit (217) is further configured to generate a biometric data corresponding to the detection result of the biometric detection circuit (115), and the first identity identification data and the second identity identification data both comprise the main control end Certification data and the biometric data. 如請求項18所述的訊標裝置(110),其中,該第一身分識別資料與該第二身分識別資料不同。The symbol device (110) of claim 18, wherein the first identity identification material is different from the second identity identification material. 如請求項23所述的訊標裝置(110),其中,該第一身分識別資料包含該主控端認證資料以及用戶所輸入的一第一組密碼,而該第二身分識別資料包含該主控端認證資料以及用戶所輸入的一第二組密碼。The symbol device (110) of claim 23, wherein the first identity identification material includes the master authentication material and a first group of passwords input by the user, and the second identity identification material includes the master The terminal authentication data and a second group of passwords entered by the user. 如請求項23所述的訊標裝置(110),其中,該第一身分識別資料包含該主控端認證資料以及與用戶相應的一第一生物特徵資料,而該第二身分識別資料包含該主控端認證資料以及與用戶相應的一第二生物特徵資料。The symbol device (110) of claim 23, wherein the first identity identification data includes the master authentication material and a first biometric data corresponding to the user, and the second identity identification material includes the The master authentication data and a second biometric data corresponding to the user. 如請求項23所述的訊標裝置(110),其另包含: 一生物特徵偵測電路(115),耦接於該控制電路(217),設置成偵測用戶的生物特徵; 其中,該控制電路(217)還設置成產生與該生物特徵偵測電路(115)的偵測結果相應的一第一生物特徵資料以及異於該第一生物特徵資料的一第二生物特徵資料,該第一身分識別資料包含該主控端認證資料與該第一生物特徵資料,而該第二身分識別資料則包含該主控端認證資料與該第二生物特徵資料。The beacon device (110) of claim 23, further comprising: a biometric detection circuit (115) coupled to the control circuit (217), configured to detect a biometric feature of the user; wherein The control circuit (217) is further configured to generate a first biometric data corresponding to the detection result of the biometric detection circuit (115) and a second biometric data different from the first biometric data, the first The identity identification data includes the master authentication data and the first biometric data, and the second identity identification data includes the master authentication data and the second biometric data.
TW107124687A 2018-07-17 2018-07-17 Token device for conducting cryptography key backup or restoration operation TWI669628B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW107124687A TWI669628B (en) 2018-07-17 2018-07-17 Token device for conducting cryptography key backup or restoration operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW107124687A TWI669628B (en) 2018-07-17 2018-07-17 Token device for conducting cryptography key backup or restoration operation

Publications (2)

Publication Number Publication Date
TWI669628B true TWI669628B (en) 2019-08-21
TW202006589A TW202006589A (en) 2020-02-01

Family

ID=68316328

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107124687A TWI669628B (en) 2018-07-17 2018-07-17 Token device for conducting cryptography key backup or restoration operation

Country Status (1)

Country Link
TW (1) TWI669628B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI742670B (en) * 2020-05-19 2021-10-11 中華電信股份有限公司 Terminal device, server and method for private key protection and transaction supervision in blockchains

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1894923A (en) * 2003-10-08 2007-01-10 史蒂芬·J·英格博格 Method and system for establishing a communication using privacy enhancing techniques
US20070288247A1 (en) * 2006-06-11 2007-12-13 Michael Mackay Digital life server
CN101958795A (en) * 2009-07-15 2011-01-26 索尼公司 Cipher key storage device and management method and biometric authentication device, system and method
CN103595730A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Ciphertext cloud storage method and system
TWI430643B (en) * 2010-10-06 2014-03-11 Chunghwa Telecom Co Ltd Secure key recovery system and method
TW201506663A (en) * 2013-05-08 2015-02-16 Vorwerk Co Interholding Method for copy-protected storage of information on a data carrier
TWI610244B (en) * 2014-09-19 2018-01-01 唐明中 Smart card holder, mobile device system with smart card holder, and smart card access system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1894923A (en) * 2003-10-08 2007-01-10 史蒂芬·J·英格博格 Method and system for establishing a communication using privacy enhancing techniques
US20070288247A1 (en) * 2006-06-11 2007-12-13 Michael Mackay Digital life server
CN101958795A (en) * 2009-07-15 2011-01-26 索尼公司 Cipher key storage device and management method and biometric authentication device, system and method
TWI430643B (en) * 2010-10-06 2014-03-11 Chunghwa Telecom Co Ltd Secure key recovery system and method
TW201506663A (en) * 2013-05-08 2015-02-16 Vorwerk Co Interholding Method for copy-protected storage of information on a data carrier
CN103595730A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Ciphertext cloud storage method and system
TWI610244B (en) * 2014-09-19 2018-01-01 唐明中 Smart card holder, mobile device system with smart card holder, and smart card access system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI742670B (en) * 2020-05-19 2021-10-11 中華電信股份有限公司 Terminal device, server and method for private key protection and transaction supervision in blockchains

Also Published As

Publication number Publication date
TW202006589A (en) 2020-02-01

Similar Documents

Publication Publication Date Title
US11086978B2 (en) Transaction authentication by a token, contingent on personal presence
CN101436247B (en) Biological personal identification method and system based on UEFI
US6741729B2 (en) Fingerprint recognition system
US11516212B2 (en) Multi-functional authentication apparatus and operating method for the same
CN104969180B (en) With from host Central Processing Unit (CPU) and operating system interference and control be isolated user authorization and exist detection
CN110175573B (en) Face and iris coding and verification method, system and computer storage medium
CN110998574B (en) Authentication terminal, authentication device, and authentication method and system using the same
US11196557B2 (en) Token device for conducting cryptography key backup or restoration operation
US11450092B2 (en) Forged-physiological-characteristic filtering device of identity authentication system
JP2007241371A (en) Authentication system
TWI669628B (en) Token device for conducting cryptography key backup or restoration operation
CA3196583A1 (en) Secure verification of medical status using a contactless card
BR102020015872A2 (en) SYSTEM AND METHOD FOR USER AUTHENTICATION AND / OR AUTHORIZATION
CN1971471A (en) Realizing method of fingerprint notebook PC
BR102019009097A2 (en) system for user authentication and / or authorization, method of authentication and / or user authorization, and computer program product
TWI646474B (en) Forged-physiological-characteristic filtering device of identity authentication system
CN114238909A (en) Virtual asset storage method and device and virtual asset query method and device
US20200327216A1 (en) Portable authentication apparatus and self-enrollment method for enrolling authentication data in the apparatus
KR20070109488A (en) The mouse of finger drive ring with nand flash memory
JP2012048728A (en) Token-based transaction authentication under condition of presence of individual
TW502223B (en) Identifying system and method
TW517205B (en) Finger print recognition keyboard and recognition method therefor
Furnell Biometric Technology and User Identity
TW202324971A (en) Encrypted side-band communications
JP2005346489A (en) Biological information registration method, biological information registration device, authentication medium, program, and recording medium