WO2014090064A1 - 一种智能密码钥匙装置 - Google Patents

一种智能密码钥匙装置 Download PDF

Info

Publication number
WO2014090064A1
WO2014090064A1 PCT/CN2013/086948 CN2013086948W WO2014090064A1 WO 2014090064 A1 WO2014090064 A1 WO 2014090064A1 CN 2013086948 W CN2013086948 W CN 2013086948W WO 2014090064 A1 WO2014090064 A1 WO 2014090064A1
Authority
WO
WIPO (PCT)
Prior art keywords
interface unit
unit
data information
signed
wireless
Prior art date
Application number
PCT/CN2013/086948
Other languages
English (en)
French (fr)
Inventor
林锋
Original Assignee
国民技术股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 国民技术股份有限公司 filed Critical 国民技术股份有限公司
Publication of WO2014090064A1 publication Critical patent/WO2014090064A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Definitions

  • the invention belongs to the technical field of data communication and information security, and in particular relates to a smart key device.
  • the traditional smart cipher key is a security device widely used in PCs. It is connected to the PC through the USB interface, and the application software is used to store the user key and digital certificate.
  • the built-in cryptographic algorithm is used to authenticate and sign the user identity. Verification, while at the same time implementing a dynamic password mechanism.
  • the embodiment of the invention provides a smart cipher key device to solve the problem that the existing smart cipher key cannot be used for the mobile terminal, thereby failing to ensure the security of the data transaction of the mobile terminal user.
  • the embodiment of the present invention is implemented as a smart cryptographic key device, the device includes a wired interface unit and a wireless interface unit, and the device is connected to an external device by using the wired interface unit and/or the wireless interface unit, The device also includes a security unit;
  • the wired interface unit and/or the wireless interface unit are configured to receive the to-be-signed data information sent by the external device, and send the received data to be signed to the security unit;
  • the security unit is configured to sign the to-be-signed data information, and send the signed data information to the wired interface unit and/or the wireless interface unit, so that the wired interface unit and/or the wireless interface unit Returning the signed data information to the external device to implement secure authentication of the digital signature of the external device.
  • the beneficial effects of the embodiment of the present invention compared with the prior art are: By adding the functions of the wired interface unit and the wireless interface unit to the traditional smart cryptographic key, the wired interface and/or the wireless interface unit are connected to the external device, so that the same smart cryptographic key can be used on the mobile terminal device. It can be used on a computer to ensure the security of user data transactions, meet the security payment authentication requirements of different devices, and enhance the compatibility of smart password keys.
  • FIG. 1 is a structural diagram of a smart cipher key device according to a first embodiment of the present invention
  • FIG. 2 is a schematic diagram of a scenario of an application of a smart cipher key device according to a first embodiment of the present invention
  • FIG. 3 is a schematic diagram of another scenario of the application of the smart key device according to the first embodiment of the present invention.
  • FIG. 4 is another schematic diagram of a scenario of an application of a smart cipher key device according to a first embodiment of the present invention
  • FIG. 5 is a flowchart of an implementation of a method for implementing a smart cipher key device according to a second embodiment of the present invention.
  • association relationship describing an association object, indicating that there may be three relationships, for example, A and/or B, which may indicate that A exists separately, and A and B exist simultaneously. There are three cases of B alone.
  • character "/" in the embodiment of the present invention generally indicates that the context related object is an "or" relationship.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • FIG. 1 shows the structure of a smart cipher key device according to an embodiment of the present invention. For the convenience of description, only parts related to the embodiment of the present invention are shown.
  • the smart key device 1 includes a wired interface unit 11, a wireless interface unit 12, and a security unit 13, which is connected to an external device through the wired interface unit 11 and/or the wireless interface unit 12.
  • the wired interface unit 11 and/or the wireless interface unit 12 is configured to receive data to be signed sent by the external device, and send the received data to be signed to the security unit 13;
  • the security unit 13 is configured to sign the to-be-signed data information, and send the signed data information to the wired interface unit 11 and/or the wireless interface unit 12, so that the wired interface unit 11 and/ Or the wireless interface unit 12 returns the signed data information to the external device to implement secure authentication of the digital signature of the external device.
  • the wired interface unit 11 includes but is not limited to a USB interface
  • the wireless interface unit 12 includes but is not limited to short-range wireless communication (Near Field) Communication, NFC) interface unit and 2.4G interface unit.
  • the external device includes a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a desktop computer, and the like.
  • the security unit 13 specifically includes:
  • the processing control module 131 is configured to perform pre-processing on the to-be-signed data information, where the pre-processing includes, but is not limited to, filtering, de-noising, and converting into a predefined format.
  • the digital signature module 132 is configured to sign the data to be signed processed by the processing control module 131.
  • the device 1 further includes:
  • the display unit 14 is configured to display the to-be-signed data information and/or the signed data information, and the like;
  • the device 1 further includes:
  • the button unit 15 is configured to confirm the data to be signed and/or the data information after the signature displayed by the display unit 14 to determine whether it is necessary to continue to perform the subsequent steps.
  • the device 1 further includes:
  • the power control unit 16 is configured to obtain power from an external power source through the wireless interface unit, and supply power to the entire smart key device.
  • the power control unit 16 is further configured to obtain power from an internal power source.
  • the power control unit 16 is further configured to detect an intensity of the external wireless power source, and switch to the internal power supply when the strength of the external wireless power source is less than a preset value.
  • the device may acquire power by means of an internal power source (battery), or may be passive, that is, obtain power through an external power source (ie, draw power from an external power source) through the outside.
  • the way in which the power source obtains power includes wirelessly obtaining power from an external power source and wirelessly obtaining power from an external power source.
  • the wireless power is used to obtain power from an external power source, specifically by cutting the magnetic field and using magnetic induction to power the entire device.
  • the device in this embodiment can charge the internal power source through the wired interface unit and/or the wireless interface unit during communication with an external device.
  • the power control unit 16 obtains electrical energy from the external device through the NFC interface unit and/or the 2.4G interface unit, and detects the strength of the current magnetic field during the acquisition of the electrical energy. When the intensity is less than the preset value, switch to the internal power supply (ie battery) to supply power.
  • the internal power supply ie battery
  • the device in this embodiment can determine whether it is necessary to switch to battery power according to the strength of the magnetic field, thereby ensuring normal and stable operation of the device and prolonging the service life of the battery.
  • the smart key device 2 includes a USB interface 21, a 2.4G interface unit 22, an NFC interface unit 23, a security unit 24, a power control unit 25, a display unit 26, and a button unit 27.
  • the security unit 24 further includes a processing control module 241 and a digital signature module 242.
  • the mobile terminal device When a mobile terminal device having an NFC interface unit needs to perform data transaction, the mobile terminal device is connected to the NFC interface unit 23 of the smart cryptographic key device via the NFC interface unit, and the NFC interface unit 23 of the smart cryptographic key device receives And the mobile terminal device sends the to-be-signed data information to the security unit 24, and displays the to-be-signed data information through the display unit 26 by using the to-be-signed data information delivered by the NFC communication.
  • the button unit 27 preprocesses the data to be signed by the processing control module 241 in the security unit 24, and the digital signature module 242 in the security unit 24
  • the pre-processed data to be signed is digitally signed, and the signed data information is sent to the NFC interface unit 23, and the NFC interface unit 23 encodes the signed data information and returns the data information to the mobile terminal.
  • the device implements the secure authentication of the digital signature of the mobile terminal device.
  • the smart key device 3 includes a USB interface 31, a 2.4G interface unit 32, an NFC interface unit 33, a security unit 34, a power control unit 35, a display unit 36, and a button unit 37.
  • the security unit 34 further includes a processing control module 341 and a digital signature module 342.
  • the mobile terminal device When a mobile terminal device having a 2.4G interface unit needs to perform data transaction, the mobile terminal device is connected to the 2.4G interface unit 32 of the smart cipher key device through the 2.4G interface unit, and the 2.4G of the smart cipher key device
  • the interface unit 32 receives the to-be-signed data information that is sent by the mobile terminal device through the 2.4G communication, decodes the to-be-signed data information, and sends the data to the security unit 34, and displays the to-be-displayed by the display unit 36.
  • Signature data information after the button unit 37 receives the confirmation command, preprocesses the to-be-signed data information by the process control module 341 in the security unit 34, and passes the digital signature in the security unit 34.
  • the module 342 digitally signs the pre-processed data to be signed, and sends the signed data information to the 2.4G interface unit 32, where the 2.4G interface unit 32 encodes the signed data information. And returning to the mobile terminal device to implement secure authentication of the digital signature of the mobile terminal device.
  • the smart cipher key device 4 includes a USB interface 41, a 2.4G interface unit 42, an NFC interface unit 43, a security unit 44, a power control unit 45, a display unit 46, and a button unit 47.
  • the security unit 44 further includes a processing control module 441 and a digital signature module 442.
  • the computer When the computer having the USB interface needs to perform data transaction, the computer is connected to the USB interface 41 of the smart key device via the USB interface, and the USB interface 41 of the smart key device receives the computer and sends the data through the USB communication.
  • the data to be signed is decoded, and the data to be signed is decoded and sent to the security unit 44, and the data to be signed is displayed by the display unit 46, after the button unit 47 receives the confirmation command.
  • the data to be signed is pre-processed by the processing control module 441 in the security unit 44, and the pre-processed data to be signed is digitally digitized by the digital signature module 442 in the security unit 44.
  • the signature sends the signed data information to the USB interface 41.
  • the USB interface 41 encodes the signed data information and returns it to the computer to implement secure authentication of the computer digital signature.
  • the smart cipher key device applied to the mobile terminal device needs to communicate with the mobile terminal device using a new interface, and with the NFC technology and the 2.4G wireless communication technology.
  • the mobile device devices will likely support NFC and 2.4G interfaces. Therefore, by adding NFC interface and 2.4G wireless interface to the smart cipher key device, the above requirements can be well met, and it is safe and convenient to have NFC function or 2.4.
  • the mobile terminal device of the G wireless communication function provides digital signature security authentication.
  • the mobile terminal device and the computer provide a multi-interface smart cipher key device, so that the The intelligent password key device can communicate with the computer through the USB interface to realize the digital signature security authentication, and can also communicate with the mobile terminal device with the NFC interface through the NFC interface unit to realize digital signature security authentication, and can also pass 2.4G wireless communication.
  • the interface unit communicates with the mobile terminal device with the 2.4G wireless interface to implement digital signature security authentication to meet the security payment authentication requirements of different devices.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • FIG. 5 is a flowchart showing an implementation of a method for implementing a smart cipher key device according to Embodiment 2 of the present invention. The process is detailed as follows:
  • step S501 the external device is connected through a wired interface unit and/or a wireless interface unit.
  • the smart key device includes a wired interface unit and a wireless interface unit.
  • the wired interface unit includes, but is not limited to, a USB interface, including but not limited to a short-range wireless communication NFC interface unit and a 2.4G interface unit.
  • the external device includes a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a desktop computer, and the like.
  • step S502 the data to be signed sent by the external device through the wired interface and/or the wireless interface unit is received.
  • step S503 the to-be-signed data information is signed, and the signed data information is returned to the external device.
  • the data to be signed is preprocessed, the preprocessed data to be signed is signed, and the signed data information is returned to the computer and/or the mobile terminal device.
  • the pre-processing includes, but is not limited to, filtering, de-noising, and converting into a predefined format of the data to be signed.
  • the embodiment may further provide a user with a human-computer interaction interface synchronized with the digital signature process, and display digital signature information (including data to be signed and/or signed data) through the interaction interface.
  • digital signature information including data to be signed and/or signed data
  • Information, etc. for the user to select and confirm, after receiving the confirmation instruction sent by the user, signing the to-be-signed data information or transmitting the signed data information to the computer and/or the mobile terminal device.
  • this embodiment further includes:
  • Power is taken from the internal power source and/or power is taken from the external power source through the wireless interface unit (ie, power is obtained), and power is supplied to the entire smart key device.
  • the power is taken from the external power source through the NFC interface unit and/or the 2.4G interface unit, it is also required to detect the strength of the current magnetic field, and when the strength of the magnetic field is less than a preset value, switch to the internal power supply. .
  • the power taking mode may be active, that is, the power is obtained by the internal power source (battery); or may be passive, that is, the power is obtained by the external power source (ie, the power is taken from the external power source), and the power is obtained by the external power source.
  • the method includes wirelessly obtaining power from an external power source and wirelessly obtaining power from an external power source.
  • the wireless power is used to obtain power from an external power source, specifically by cutting the magnetic field and using magnetic induction to power the entire device.
  • the device in this embodiment can charge the internal power source through the wired interface unit and/or the wireless interface unit during communication with an external device.
  • the method for implementing the smart cipher key device provided in this embodiment can be applied to the above-mentioned smart cipher key device.
  • For the specific implementation process refer to the related description of the first embodiment of the smart cipher key device, and details are not described herein again.
  • the embodiment of the present invention On the basis of the traditional smart cipher key, a multi-interface smart cipher key is provided, and the multi-interface is connected with the external device, so that the same smart cipher key can be used on the mobile terminal device and can be used on the computer to meet different users.
  • the authentication requirements of the paid platform and the security of user data transactions are strong, easy to use and practical.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the modules or units is only a logical function division.
  • there may be another division manner for example, multiple units or components may be used. Combinations can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the embodiments of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the medium includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the methods described in various embodiments of the embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read only memory (ROM, Read-Only) Memory, random access memory (RAM), disk or optical disk, and other media that can store program code.

Abstract

本发明适用于数据通讯和信息安全领域,提供了一种智能密码钥匙装置,所述装置包括有线接口单元、无线接口单元,通过有线接口和/或无线接口单元与外部设备连接,所述有线接口单元和/或无线接口单元,用于接收所述外部设备发送的待签名数据信息,并将接收到的所述待签名数据信息发送至安全单元;所述安全单元,用于对所述待签名数据信息进行签名,将签名后的数据信息发送至所述有线接口单元和/或无线接口单元,以使得所述有线接口单元和/或无线接口单元将所述签名后的数据信息返回给所述外部设备。通过本发明使得同一智能密码钥匙能够在多个不同的设备上使用,满足不同设备安全支付认证需求。

Description

一种智能密码钥匙装置 技术领域
本发明属于数据通讯和信息安全技术领域,尤其涉及一种智能密码钥匙装置。
背景技术
传统的智能密码钥匙是一种广泛应用于PC的安全设备,通过USB接口与PC相接,配合应用软件实现用户密钥和数字证书的存储,利用内置密码算法实现对用户身份的认证、签名和验证,同时又可实现动态密码机制。
随着移动终端设备如手机、平台电脑等迅速的发展,数字签名和动态密码等安全操作的应用在移动终端中也得到了快速发展,移动终端上对一种可进行加密、认证等安全操作的智能密码钥匙需求急切。
然而,现有移动终端出于便捷性要求的考虑,大多数没有提供标准的USB接口,导致现有智能密码钥匙无法用于移动终端,从而无法保证移动终端用户数据交易的安全。
技术问题
本发明实施例提供一种智能密码钥匙装置,以解决现有智能密码钥匙无法用于移动终端,从而无法保证移动终端用户数据交易安全性的问题。
技术解决方案
本发明实施例是这样实现的,一种智能密码钥匙装置,所述装置包括有线接口单元、无线接口单元,所述装置通过所述有线接口单元和/或无线接口单元与外部设备连接,所述装置还包括安全单元;
  所述有线接口单元和/或无线接口单元,用于接收所述外部设备发送的待签名数据信息,并将接收到的所述待签名数据信息发送至所述安全单元;
  所述安全单元,用于对所述待签名数据信息进行签名,将签名后的数据信息发送至所述有线接口单元和/或无线接口单元,以使得所述有线接口单元和/或无线接口单元将所述签名后的数据信息返回给所述外部设备,实现所述外部设备数字签名的安全认证。
有益效果
本发明实施例与现有技术相比存在的有益效果是: 通过在传统智能密码钥匙的基础上增加有线接口单元和无线接口单元的功能,通过所述有线接口和/或无线接口单元与外部设备连接,使得同一智能密码钥匙即能够在移动终端设备上使用又能在计算机上使用,在保证用户数据交易安全性的同时,满足不同设备的安全支付认证需求,增强智能密码钥匙的兼容性。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
  图1是本发明第一实施例提供的智能密码钥匙装置的组成结构图;
  图2是本发明第一实施例提供的智能密码钥匙装置应用的场景示意图;
  图3是本发明第一实施例提供的智能密码钥匙装置应用的另一场景示意图;
  图4是本发明第一实施例提供的智能密码钥匙装置应用的另一场景示意图;
  图5是本发明第二实施例提供的智能密码钥匙装置实现方法的实现流程图。  
本发明的实施方式
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、接口、技术之类的具体细节,以便透切理解本发明实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本发明。在其它情况中,省略对众所周知的装置、电路以及方法的详细说明,以免不必要的细节妨碍本发明的描述。
  本发明实施例中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本发明实施例中字符“/”,一般表示前后关联对象是一种“或”的关系。
  实施例一:
  图1示出了本发明一实施例提供的智能密码钥匙装置的组成结构,为了便于说明,仅示出了与本发明实施例相关的部分。
  如图1所示,该智能密码钥匙装置1包括有线接口单元11、无线接口单元12以及安全单元13,所述装置通过所述有线接口单元11和/或无线接口单元12与外部设备连接。
  所述有线接口单元11和/或无线接口单元12,用于接收外部设备发送的待签名数据信息,并将接收到的所述待签名数据信息发送至所述安全单元13;
  所述安全单元13,用于对所述待签名数据信息进行签名,将签名后的数据信息发送至所述有线接口单元11和/或无线接口单元12,以使得所述有线接口单元11和/或无线接口单元12将所述签名后的数据信息返回给所述外部设备,实现所述外部设备数字签名的安全认证。
  在本实施例中,所述有线接口单元11包括但不限于USB接口,所述无线接口单元12包括但不限于近距离无线通讯(Near Field Communication,NFC)接口单元和2.4G接口单元。所述外部设备包括手机、平板电脑、笔记本电脑、掌上电脑、台式电脑等。
  进一步的,所述安全单元13具体包括:
  处理控制模块131,用于对所述待签名数据信息进行预处理,所述预处理包括但不限于对待签名数据信息的过滤、去噪以及转换成预定义格式等。
  数字签名模块132,用于对所述处理控制模块131处理后的待签名数据信息进行签名。
  所述装置1还包括:
  显示单元14,用于显示所述待签名数据信息和/或签名后的数据信息等;
  进一步的,所述装置1还包括:
  按键单元15,用于对所述显示单元14显示的所述待签名数据信息和/或签名后的数据信息进行确认,以决定是否需要继续执行后续步骤。
  进一步的,所述装置1还包括:
  电源控制单元16,用于通过所述无线接口单元从外部电源获取电能,以及向整个所述智能密码钥匙装置供电。
  进一步的,所述电源控制单元16,还用于从内部电源获取电能。
  更进一步的,所述电源控制单元16,还用于检测外部无线电源的强度,在所述外部无线电源的强度小于预设值时,切换到内部电源供电。
  在本实施例中,所述装置获取电能方式可为有源,即通过内部电源(电池)获取电能;也可以为无源,即通过外部电源获取电能(即从外部电源取电),通过外部电源获取电能的方式包括通过无线的方式从外部电源获取电能以及通过有线的方式从外部电源获取电能。通过无线的方式从外部电源获取电能具体是通过切割磁场,利用磁感应为整个装置供电。本实施例所述装置可以在与外部设备通讯的过程中,通过所述有线接口单元和/或无线接口单元为所述内部电源充电。
  优选的是,所述电源控制单元16具体通过所述NFC接口单元和/或2.4G接口单元从所述外部设备获取电能,并在获取电能过程中,检测当前磁场的强度,在所述磁场的强度小于预设值时,切换到内部电源(即电池)供电。
  本实施例所述装置可根据磁场的强度,决定是否需要切换到电池供电,从而确保设备的正常稳定工作,同时延长电池的使用寿命。
  下面给出采用上述智能密码钥匙装置的应用场景。
  场景一:如图2所示,所述智能密码钥匙装置2包括USB接口21、2.4G接口单元22、NFC接口单元23、安全单元24、电源控制单元25、显示单元26以及按键单元27。其中所述安全单元24还包括处理控制模块241以及数字签名模块242。
  当具有NFC接口单元的移动终端设备需要进行数据交易时,移动终端设备通过所述NFC接口单元与所述智能密码钥匙装置的NFC接口单元23连接,所述智能密码钥匙装置的NFC接口单元23接收所述移动终端设备通过NFC通讯下发的待签名数据信息,对所述待签名数据信息进行解码后发送至所述安全单元24,并通过所述显示单元26显示所述待签名数据信息,在所述按键单元27接收到确认指令后,通过所述安全单元24中的处理控制模块241对所述待签名数据信息进行预处理,并通过所述安全单元24中的数字签名模块242对所述预处理后的待签名数据信息进行数字签名,将签名后的数据信息发送至所述NFC接口单元23,所述NFC接口单元23对所述签名后的数据信息进行编码后返还给所述移动终端设备,实现移动终端设备数字签名的安全认证。
  场景二:如图3所示,所述智能密码钥匙装置3包括USB接口31、2.4G接口单元32、NFC接口单元33、安全单元34、电源控制单元35、显示单元36以及按键单元37。其中所述安全单元34还包括处理控制模块341以及数字签名模块342。
  当具有2.4G接口单元的移动终端设备需要进行数据交易时,移动终端设备通过所述2.4G接口单元与所述智能密码钥匙装置的2.4G接口单元32连接,所述智能密码钥匙装置的2.4G接口单元32接收所述移动终端设备通过2.4G通讯下发的待签名数据信息,对所述待签名数据信息进行解码后发送至所述安全单元34,并通过所述显示单元36显示所述待签名数据信息,在所述按键单元37接收到确认指令后,通过所述安全单元34中的处理控制模块341对所述待签名数据信息进行预处理,并通过所述安全单元34中的数字签名模块342对所述预处理后的待签名数据信息进行数字签名,将签名后的数据信息发送至所述2.4G接口单元32,所述2.4G接口单元32对所述签名后的数据信息进行编码后返还给所述移动终端设备,实现移动终端设备数字签名的安全认证。
  场景三:如图4所示,所述智能密码钥匙装置4包括USB接口41、2.4G接口单元42、NFC接口单元43、安全单元44、电源控制单元45、显示单元46以及按键单元47。其中所述安全单元44还包括处理控制模块441以及数字签名模块442。
  当具有USB接口的计算机需要进行数据交易时,计算机通过所述USB接口与所述智能密码钥匙装置的USB接口41连接,所述智能密码钥匙装置的USB接口41接收所述计算机通过USB通讯下发的待签名数据信息,对所述待签名数据信息进行解码后发送至所述安全单元44,并通过所述显示单元46显示所述待签名数据信息,在所述按键单元47接收到确认指令后,通过所述安全单元44中的处理控制模块441对所述待签名数据信息进行预处理,并通过所述安全单元44中的数字签名模块442对所述预处理后的待签名数据信息进行数字签名,将签名后的数据信息发送至所述USB接口41,所述USB接口41对所述签名后的数据信息进行编码后返还给所述计算机,实现计算机数字签名的安全认证。
  需要说明的是,由于移动终端设备一般不具备USB接口,因此应用于移动终端设备的智能密码钥匙装置需要使用新的接口与所述移动终端设备通讯,而随着NFC技术和2.4G无线通讯技术的快速发展,移动设备设备将可能支持NFC和2.4G接口,因此通过在智能密码钥匙装置中增加NFC接口和2.4G无线接口能够很好的满足以上需求,安全且方便的为具有NFC功能或2.4G无线通讯功能的移动终端设备提供数字签名的安全认证。
  本实施例通过在智能密码钥匙装置中增加NFC接口单元、2.4G接口单元等无线接口功能及USB接口等有线接口,为移动终端设备和计算机提供一种多接口的智能密码钥匙装置,使得所述智能密码钥匙装置既可以通过USB接口与计算机通讯,实现数字签名的安全认证,也可通过NFC接口单元与具备NFC接口的移动终端设备进行通讯,实现数字签名安全认证,也可通过2.4G无线通讯接口单元与具备2.4G无线接口的移动终端设备进行通讯,实现数字签名安全认证,满足不同设备的安全支付认证需求。
  所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将装置的内部结构划分成不同的功能单元和模块,以完成以上描述的全部或者部分功能;另外,各功能单元、模块的具体名称也只是为了便于相互区分,并不用于限制本发明实施例的保护范围。
  实施例二:
  图5示出了本发明实施例二提供的智能密码钥匙装置实现方法的实现流程,该方法过程详述如下:
  在步骤S501中,通过有线接口单元和/或无线接口单元与外部设备连接。
  在本实施例中,所述智能密码钥匙装置包括有线接口单元、无线接口单元。所述有线接口单元包括但不限于USB接口,所述无线接口单元包括但不限于近距离无线通讯NFC接口单元和2.4G接口单元。所述外部设备包括手机、平板电脑、笔记本电脑、掌上电脑、台式电脑等。
  在步骤S502中,接收所述外部设备通过所述有线接口和/或无线接口单元发送的待签名数据信息。
  在步骤S503中,对所述待签名数据信息进行签名,并将签名后的数据信息返回给所述外部设备。
  具体的是,对所述待签名数据信息进行预处理,对所述预处理后的待签名数据信息进行签名,并将签名后的数据信息返回给所述计算机和/或移动终端设备。其中,所述预处理包括但不限于对待签名数据信息的过滤、去噪以及转换成预定义格式等。
  优选的是,在具体实现时,本实施例还可以为用户提供与数字签名过程同步的人机交互界面,通过所述交互界面显示数字签名信息(包括待签名数据信息和/或签名后的数据信息等),以供用户选择确认,当接收到用户发送的确认指令后,则对所述待签名数据信息进行签名或者将所述签名后的数据信息发送给计算机和/或移动终端设备。
  进一步的,本实施例还包括:
  从内部电源处取电和/或通过所述无线接口单元从外部电源取电(即获取电能),以及向整个所述智能密码钥匙装置供电。优选的是,在通过所述NFC接口单元和/或2.4G接口单元从外部电源取电时,还需要检测当前磁场的强度,在所述磁场的强度小于预设值时,切换到内部电源供电。
  在本实施例中,取电方式可为有源,即通过内部电源(电池)获取电能;也可以为无源,即通过外部电源获取电能(即从外部电源取电),通过外部电源获取电能的方式包括通过无线的方式从外部电源获取电能以及通过有线的方式从外部电源获取电能。通过无线的方式从外部电源获取电能具体是通过切割磁场,利用磁感应为整个装置供电。本实施例所述装置可以在与外部设备通讯的过程中,通过所述有线接口单元和/或无线接口单元为所述内部电源充电。
  而且可以根据磁场的强度,决定是否需要切换到电池供电,从而确保设备的正常稳定工作,同时延长电池的使用寿命。
  本实施例提供的智能密码钥匙装置实现方法可应用于上述智能密码钥匙装置,其具体实施过程可参见上述智能密码钥匙装置实施例一的相关描述,在此不再赘述。
  综上所述,本发明实施例 在传统智能密码钥匙的基础上,提供多接口的智能密码钥匙,通过所述多接口与外部设备连接,使得同一智能密码钥匙即能够在移动终端设备上使用又能在计算机上使用,满足用户不同付费平台的认证需求,并保证用户数据交易的安全,具有较强的易用性和实用性。
  在本发明实施例所提供的实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通讯连接可以是通过一些接口,装置或单元的间接耦合或通讯连接,可以是电性,机械或其它的形式。
  所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
  另外,在本发明实施例各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
  所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本发明实施例各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
  以上所述实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明实施例各实施例技术方案的精神和范围。

Claims (10)

  1. 一种智能密码钥匙装置,其特征在于,所述装置包括有线接口单元、无线接口单元,所述装置通过所述有线接口单元和/或无线接口单元与外部设备连接,所述装置还包括安全单元;
      所述有线接口单元和/或无线接口单元,用于接收所述外部设备发送的待签名数据信息,并将接收到的所述待签名数据信息发送至所述安全单元;
      所述安全单元,用于对所述待签名数据信息进行签名,将签名后的数据信息发送至所述有线接口单元和/或无线接口单元,以使得所述有线接口单元和/或无线接口单元将所述签名后的数据信息返回给所述外部设备,实现所述外部设备数字签名的安全认证。
  2.   如权利要求1所述的装置,其特征在于,所述安全单元具体包括:
      处理控制模块,用于对所述待签名数据信息进行预处理;
      数字签名模块,用于对所述预处理后的待签名数据信息进行签名。
  3.   如权利要求1所述的装置,其特征在于,所述装置还包括:
      显示单元,用于显示所述待签名数据信息和/或签名后的数据信息。
  4.   如权利要求3所述的装置,其特征在于,所述装置还包括:
      按键单元,用于对显示的所述待签名数据信息和/或签名后的数据信息进行确认。
  5.   如权利要求1所述的装置,其特征在于,所述装置还包括:
      电源控制单元,用于通过所述无线接口单元从外部电源获取电能,以及向整个所述智能密码钥匙装置供电。  
  6. 如权利要求5所述的装置,其特征在于,所述电源控制单元,还用于从内部电源获取电能。
  7.   如权利要求6所述的装置,其特征在于,所述电源控制单元,还用于检测外部无线电源的强度,在所述外部无线电源的强度小于预设值时,切换到内部电源供电。
  8.   如权利要求1所述的装置,其特征在于,所述有线接口单元为USB接口。
  9.   如权利要求1至8任一项所述的装置,其特征在于,所述无线接口单元为近距离无线通讯NFC接口单元和2.4G接口单元。
  10.   如权利要求9所述的装置,其特征在于,所述电源控制单元,具体用于通过所述NFC接口单元和/或2.4G接口单元从外部电源获取电能,并在获取电能过程中,检测当前磁场的强度,在所述磁场的强度小于预设值时,切换到内部电源供电。
PCT/CN2013/086948 2012-12-12 2013-11-12 一种智能密码钥匙装置 WO2014090064A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210534960.7A CN103873242A (zh) 2012-12-12 2012-12-12 一种智能密码钥匙装置
CN201210534960.7 2012-12-12

Publications (1)

Publication Number Publication Date
WO2014090064A1 true WO2014090064A1 (zh) 2014-06-19

Family

ID=50911392

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/086948 WO2014090064A1 (zh) 2012-12-12 2013-11-12 一种智能密码钥匙装置

Country Status (2)

Country Link
CN (1) CN103873242A (zh)
WO (1) WO2014090064A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104363338A (zh) * 2014-11-05 2015-02-18 成都缤果科技有限公司 一种基于nfc技术的支付手机
CN112019351A (zh) * 2020-09-03 2020-12-01 杭州天宽科技有限公司 基于SDKey的移动终端信息交互方法

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204731813U (zh) * 2014-09-22 2015-10-28 天地融科技股份有限公司 卡套
CN108833112A (zh) * 2018-06-04 2018-11-16 北京艾丕科技有限责任公司 一种激活手机盾的方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504731A (zh) * 2009-03-20 2009-08-12 龙冬阳 基于nfc的移动识别系统
CN102469453A (zh) * 2010-11-12 2012-05-23 国民技术股份有限公司 一种安全认证方法及系统
CN102546545A (zh) * 2010-12-21 2012-07-04 喜海龙 保障用户重要的网络数据传输安全的装置和方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807995A (zh) * 2010-01-18 2010-08-18 北京天地融科技有限公司 支持无线通讯的电子签名工具及与终端通信的处理方法
CN102315936A (zh) * 2010-07-08 2012-01-11 晨星软件研发(深圳)有限公司 认证处理装置及其相关移动装置
CN201830273U (zh) * 2010-11-04 2011-05-11 北京握奇数据系统有限公司 身份认证设备
CN202309735U (zh) * 2011-11-11 2012-07-04 国民技术股份有限公司 一种智能密钥

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504731A (zh) * 2009-03-20 2009-08-12 龙冬阳 基于nfc的移动识别系统
CN102469453A (zh) * 2010-11-12 2012-05-23 国民技术股份有限公司 一种安全认证方法及系统
CN102546545A (zh) * 2010-12-21 2012-07-04 喜海龙 保障用户重要的网络数据传输安全的装置和方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104363338A (zh) * 2014-11-05 2015-02-18 成都缤果科技有限公司 一种基于nfc技术的支付手机
CN112019351A (zh) * 2020-09-03 2020-12-01 杭州天宽科技有限公司 基于SDKey的移动终端信息交互方法
CN112019351B (zh) * 2020-09-03 2023-05-16 杭州天宽科技有限公司 基于SDKey的移动终端信息交互方法

Also Published As

Publication number Publication date
CN103873242A (zh) 2014-06-18

Similar Documents

Publication Publication Date Title
WO2014082387A1 (zh) 基于nfc的指纹认证系统及指纹认证方法
EP3243153B1 (en) Operating system dongle
US7136904B2 (en) Wireless cable replacement for computer peripherals using a master adapter
WO2014040439A1 (zh) 一种无线网络系统及便携式电子设备
WO2014010928A1 (ko) 지문 인식을 이용한 휴대용 저장 장치 및 그 제어 방법
WO2014090064A1 (zh) 一种智能密码钥匙装置
WO2013100413A1 (ko) 이어폰 잭을 이용한 스마트폰 신용카드 결제 시스템 및 그 방법
WO2011124049A1 (zh) Usbkey装置及利用usb接口实现智能卡通信的方法
TW200952468A (en) Camera modules and the authentication systems
CN110378097A (zh) 保障传感器数据安全
WO2016085062A1 (ko) 엔에프씨 인증카드를 이용한 인증방법
WO2017105072A1 (ko) 생체 정보 기반 인증 장치 그리고 이의 동작 방법
WO2017020468A1 (zh) 应用于复合型智能卡设备的数据交互方法和装置
WO2014086112A1 (zh) 基于指纹认证的图片管理系统及图片管理方法
WO2015105289A1 (ko) 인터넷 환경에서의 사용자 보안 인증 시스템 및 그 방법
WO2015003518A1 (zh) 一种智能电源及利用该智能电源实现移动支付的方法
CN204069000U (zh) 移动加密认证装置
CN105631298A (zh) 一种加解密装置及方法
WO2020060114A1 (ko) 신분 정보를 제공하는 장치 및 그 시스템
KR20140017035A (ko) 오디오 보안 저장 시스템과 이를 이용한 인증서 관리 방법
WO2016200107A1 (ko) 사용자 단말을 이용한 사용자 부인방지 대금결제 시스템 및 그 방법
WO2016095403A1 (zh) 一种具有支付功能的穿戴设备及其实现支付功能的方法
WO2018216991A1 (ko) 다중 사용자의 인증요소를 조합하여 보안키를 생성하는 보안인증방법
CN202563514U (zh) 具有多媒体认证加密保护功能的移动电子设备
WO2021235838A1 (ko) 블록체인을 이용하는 전자 장치 및 동작 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13862610

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/10/2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13862610

Country of ref document: EP

Kind code of ref document: A1