WO2015161689A1 - 一种基于协商密钥的数据处理方法 - Google Patents

一种基于协商密钥的数据处理方法 Download PDF

Info

Publication number
WO2015161689A1
WO2015161689A1 PCT/CN2015/070913 CN2015070913W WO2015161689A1 WO 2015161689 A1 WO2015161689 A1 WO 2015161689A1 CN 2015070913 W CN2015070913 W CN 2015070913W WO 2015161689 A1 WO2015161689 A1 WO 2015161689A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
mobile phone
security module
phone security
identification card
Prior art date
Application number
PCT/CN2015/070913
Other languages
English (en)
French (fr)
Inventor
李东声
Original Assignee
天地融科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 天地融科技股份有限公司 filed Critical 天地融科技股份有限公司
Publication of WO2015161689A1 publication Critical patent/WO2015161689A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Definitions

  • the present invention relates to the field of information security technologies, and in particular, to a data processing method based on a negotiation key.
  • the present invention aims to solve the problem that a mobile terminal cannot safely perform online banking and/or confidential information transmission.
  • the main object of the present invention is to provide a data processing method based on a negotiation key.
  • An aspect of the present invention provides a data processing method based on a negotiation key, comprising: acquiring, by a mobile phone security module, identification information of the user identification card; and acquiring, by the mobile phone security module, identification information of the user identification card
  • the public key of the user identification card is calculated according to the preset first public key calculation algorithm and the identification information of the user identification card; the mobile phone security module acquires a first random factor according to the first random factor Generating a negotiation key of the mobile phone security module end; after acquiring the first random factor, the mobile phone security module encrypts and calculates the first random factor according to the public key of the user identity identification card, and obtains the first a ciphertext information; after obtaining the first ciphertext information, the mobile phone security module signs the first ciphertext information according to the private key of the mobile phone security module to obtain the first signature information, and obtains the first signature information Transmitting the first signature information to the user identification card; the user identification card acquiring the identification information of the mobile phone security module; After
  • An aspect of the present invention further provides a data processing method based on a negotiation key, comprising: acquiring, by a user identity card, identification information of the mobile phone security module; and obtaining, by the user identity identification card, an identifier of the mobile phone security module After the information, the public key of the mobile phone security module is calculated according to the preset first public key calculation algorithm and the identification information of the mobile phone security module; the user identification card acquires a first random factor according to the first random factor Generating a negotiation key of the user identity card end; after acquiring the first random factor, the user identity identification card encrypts and calculates the first random factor according to the public key of the mobile phone security module, and obtains First ciphertext information; after obtaining the first ciphertext information, the user identity identification card signs the first ciphertext information according to the private key of the user identity identification card, and obtains the first signature information, And sending the first signature information to the mobile phone security module; the mobile phone security module acquiring the identification information of the user identity identification card; After obtaining
  • the step of performing secure transmission of information between the mobile phone security module and the user identity card by using a negotiation key of the mobile phone security module end and a negotiation key of the user identity identification card end includes: the mobile phone security The module obtains information to be transmitted; the mobile phone security module encrypts the to-be-transmitted information by using a negotiation key of the mobile phone security module to obtain third ciphertext information; and the mobile phone security module sends the first processing information to the The user identification card, wherein the first processing information at least includes: the third ciphertext information; after the user identification card receives the first processing information, the user identification card end negotiation The key decrypts the third ciphertext information to obtain information to be transmitted, and the user identity identification card signs the information to be transmitted to obtain second signature information.
  • the step of performing secure transmission of information between the mobile phone security module and the user identity card by using a negotiation key of the mobile phone security module end and a negotiation key of the user identity identification card end includes: the mobile phone security The module obtains information to be transmitted; the mobile phone security module performs verification calculation on the to-be-transmitted information by using a negotiation key of the mobile phone security module to obtain first verification information; and the mobile phone security module sends the first processing information.
  • the user identification card wherein the first processing information at least includes: the information to be transmitted and the first check After the user identification card receives the first processing information, verifying the first processing information by using a negotiation key of the user identity card end; if the user identity card is After the processing information is verified, the user identification card signs the information to be transmitted to obtain the second signature information.
  • the step of performing secure transmission of information between the mobile phone security module and the user identity card by using a negotiation key of the mobile phone security module end and a negotiation key of the user identity identification card end includes: the mobile phone security The module obtains information to be transmitted; the mobile phone security module encrypts the to-be-transmitted information by using a negotiation key of the mobile phone security module, obtains third ciphertext information, and performs verification calculation on the third ciphertext information.
  • the mobile phone security module sends the first processing information to the user identification card, where the first processing information includes at least: the third ciphertext information and the first Verifying the information; after receiving the first processing information, the user identification card verifies the first processing information by using a negotiation key of the user identification card end; if the user identification card is opposite After the first processing information is verified, the user identity card passes the negotiation key of the user identity card to the third secret. Decrypt the information, the information to be transmitted is obtained;
  • the user identification card signs the information to be transmitted to obtain second signature information.
  • the method further includes: the user identification card passes the negotiation key of the user identity identification card end Encrypting the second signature information to obtain fourth ciphertext information; the user identification card sending the second processing information to the mobile phone security module, where the second processing information includes at least: The fourth ciphertext information is obtained after the mobile phone security module receives the second processing information, and decrypts the fourth ciphertext information by using a negotiation key of the mobile phone security module end to obtain the second signature information; The mobile phone security module performs at least the second signature information to be sent out; or the user identification card performs a check calculation on the second signature information by using a negotiation key of the user identity card end to obtain a second check.
  • the user identification card sends the second processing information to the mobile phone security module, where the second processing information includes at least: And the second verification information is verified by the negotiation key of the mobile phone security module end; if the mobile phone security module receives the second processing information, if the After the mobile phone security module verifies the second processing information, the mobile phone security module sends out at least the second signature information; or the user identity identification card passes the negotiation key pair of the user identification card end.
  • the user identification card sends the second processing information to the location
  • the mobile phone security module wherein the second processing information includes at least: the fourth ciphertext information and the second verification information; after the mobile phone security module receives the second processing information, The second processing information is verified by the negotiation key of the mobile phone security module; if the mobile security module verifies the second processing information, the Mobile security key negotiation module to said fourth end of the ciphertext decrypting information, obtain the second signature Information; the mobile phone security module issues at least the second signature information.
  • the method further includes: the mobile phone security module Extracting key information in the information to be transmitted; the mobile phone security module controls the mobile phone display screen to display key information in the extracted information to be transmitted; the mobile phone security module receives a confirmation instruction outputted by the mobile phone keyboard; After receiving the confirmation command output by the mobile phone keyboard, the mobile phone security module performs the step of the mobile phone security module transmitting the first processing information to the user identification card.
  • the mobile phone security module is a module independent of the mobile phone CPU, or the mobile phone security module is disposed in a secure area in the mobile phone CPU.
  • the first public key calculation algorithm is the same as the second public key calculation algorithm.
  • the first error information is returned; if the second ciphertext information is decrypted, the second error information is returned.
  • An aspect of the present invention also provides a storage medium, the storage medium being configured to store an application, the application being configured to perform a negotiation key-based data processing method according to any of the embodiments of the present invention at runtime.
  • the data processing method based on the negotiation key of the present invention enables the mobile phone to securely perform online banking service and/or confidential information transmission.
  • FIG. 1 is a flowchart of a data processing method based on a negotiation key according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a data processing method based on a negotiation key according to Embodiment 2 of the present invention.
  • the terms “installation”, “connected”, and “connected” are to be understood broadly, and may be fixed or detachable, for example, unless otherwise explicitly defined and defined. Connected, or connected in one piece; Therefore, it may be a mechanical connection or an electrical connection; it may be directly connected, or may be indirectly connected through an intermediate medium, and may be internal communication between the two elements.
  • the specific meaning of the above terms in the present invention can be understood in a specific case by those skilled in the art.
  • the terms “first” and “second” are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or quantity or location.
  • the data processing method based on the negotiation key of the present invention is implemented based on a mobile phone, and the mobile phone includes at least one user identification card with a security function and a mobile phone security module.
  • the user identification card may be any of the following cards: a SIM (Subscriber Identity Module) card, a UIM (User Identity Module) card, a USIM card, a PIM card, etc., and the above cards are all in the existing functions.
  • SIM Subscriber Identity Module
  • UIM User Identity Module
  • USIM User Identity Module
  • PIM Personal Information Card
  • the mobile phone security module can be set as a separate module independent of the mobile phone CPU, or can be set as a secure area in the mobile phone CPU to ensure independent security functions that the mobile phone security module can implement, for example, the mobile phone security module can Independently perform secure identity authentication functions, as well as display security control to ensure the authenticity of the displayed content.
  • the third-party CA can issue a CA-certified certificate to the user ID card, and the third-party CA can also issue a CA-certified certificate to the mobile phone security module to ensure that both parties can verify the legality of the other party's identity and improve safety.
  • a data processing method based on a negotiation key according to Embodiment 1 of the present invention includes the following steps S101 to S111.
  • Step S101 The mobile phone security module acquires identification information of the user identification card.
  • the identifier information of the user identity card is unique identifier information, including but not limited to: a user identity card serial number, a user number, a MAC address, and the like.
  • the identification information of the user identification card may be pre-stored by the mobile phone security module, or may be sent to the mobile phone security module for the user identification card.
  • the mobile phone security module obtains the identification information of the user identification card, and can use the unique identification information to generate a key.
  • Step S102 After obtaining the identification information of the user identification card, the mobile phone security module calculates the public key of the user identification card according to the preset first public key calculation algorithm and the identification information of the user identification card.
  • the mobile phone security module presets a first public key calculation algorithm, and can calculate a public key of the user identification card according to the identification information of the user identification card, and the public key of the user identification card can be used for subsequent identification with the user.
  • Card The information is encrypted and transmitted during the interaction so that the private key of the user identity card can decrypt the encrypted information.
  • Step S103 The mobile phone security module acquires a first random factor, and generates a negotiation key of the mobile phone security module end according to the first random factor.
  • the first random factor may be directly generated by the mobile phone security module, or the first random factor may be generated by the user identity card and sent to the mobile phone security module. Of course, it is safer to generate directly through the mobile phone security module; sending and transmitting to the mobile phone security module through the user identification card can reduce the processing of the mobile phone security module and improve processing efficiency.
  • the first random factor may be one or a string of random numbers, or may be one or a string of random characters, or any combination of a string of random numbers and random combinations.
  • the mobile phone security module may use the first random factor to generate a negotiation key.
  • the step of the mobile phone security module generating the negotiation key by using the first random factor is performed after the first random factor is acquired, and may be performed at the same time as any other step, as long as the negotiation security of the mobile security module end is finally generated.
  • the key can be.
  • Step S104 After obtaining the first random factor, the mobile phone security module performs encryption calculation on the first random factor according to the public key of the user identity identification card to obtain the first ciphertext information.
  • the mobile phone security module encrypts the first random factor according to the calculated public key of the user identity card, thereby ensuring the security of the first random factor transmission.
  • Step S105 After obtaining the first ciphertext information, the mobile phone security module signs the first ciphertext information according to the private key of the mobile phone security module, obtains the first signature information, and sends the first signature information to the user identity identification card.
  • Step S106 The user identity identification card acquires identification information of the mobile phone security module.
  • the identification information of the mobile phone security module is unique identification information, including but not limited to: a serial number of the mobile phone CPU, a MAC address of the mobile phone CPU, and the like.
  • the identification information of the mobile phone security module may be pre-stored by the user identification card, or may be sent to the user identification card by the mobile phone security module.
  • the user identification card obtains the identification information of the mobile phone security module, and can use the unique identification information to generate the public key of the mobile phone security module.
  • Step S107 After obtaining the identification information of the mobile phone security module, the user identity identification card calculates the public key of the mobile phone security module according to the preset second public key calculation algorithm and the identification information of the mobile phone security module.
  • the user identity card presets a second public key calculation algorithm, and the public key of the mobile phone security module can be calculated according to the identification information of the mobile phone security module, and the public key of the mobile phone security module can be used for subsequent interaction with the mobile phone security module. Encrypted transmission of information.
  • the second public key calculation algorithm may be the same as the first public key calculation algorithm, thereby simplifying the processing flow; the second public key calculation algorithm may also be different from the first public key calculation algorithm, thereby preventing brute force cracking and improving safety.
  • Step S108 after receiving the first signature information, the user identity identification card is based on the public key pair of the mobile phone security module. A signature information is verified.
  • the user identity card also uses the generated public key of the mobile phone security module to verify the first signature information, thereby ensuring the security of the information transmission and the legality of the information source.
  • Step S109 After verifying that the first signature information is passed, the user identity identification card decrypts the first ciphertext information according to the private key of the user identity identification card to obtain a first random factor.
  • the user identification card is preset with a private key of the user identification card, and the user identification card can decrypt the first ciphertext information sent by the mobile phone security module according to the private key of the user identification card, and obtain the first random factor. Thereby, the security of the first random factor transmission can be ensured, and the first random factor obtained in the user identification card is true.
  • step S101 is re-executed to reacquire the random factor.
  • the random factor may be the first random factor. It can also be another random factor different from the first random factor to improve security and prevent replay attacks.
  • Step S110 The user identity identification card generates a negotiation key of the user identity card end according to the first random factor.
  • the manner in which the user identity card generates the negotiation key should be the same as the method in which the mobile phone security module generates the negotiation key, so as to ensure that the information can be exchanged between the user identification card and the mobile phone security module through the negotiation key.
  • Step S111 The mobile security module and the user identification card perform secure transmission of information through the negotiation key of the mobile security module end and the negotiation key of the user identification card end.
  • the mobile phone security module and the user identification card pass the negotiation key of the two ends. Secure transmission of information.
  • the secure transmission of information can be realized by one of the following methods one to nine.
  • Step S112a The mobile phone security module acquires information to be transmitted.
  • the mobile phone security module obtains the information to be transmitted, and the information to be transmitted may be confidential information that needs to be transmitted securely, or may be transaction information to be traded in the online banking.
  • the information to be transmitted may be confidential information that the mobile phone needs to output, for example, confidential information obtained by the mobile phone from a secure storage area of the mobile phone.
  • the information to be transmitted may be transaction information of a transaction to be executed, for example, transaction information such as a transaction account number and a transaction amount obtained by the mobile phone through an online banking client.
  • Step S113a The mobile phone security module encrypts the transmission information by using the negotiation key of the mobile phone security module to obtain the third ciphertext information.
  • the mobile phone security module adds the information to be transmitted through the negotiation key of the mobile security module generated by the mobile phone security module. Density, so that the information to be transmitted is opaquely transmitted to ensure the security of the transmission.
  • the negotiation key includes at least one encryption key.
  • Step S114a The mobile phone security module sends the first processing information to the user identification card, where the first processing information includes at least: third ciphertext information.
  • Step S115a After receiving the first processing information, the user identity card decrypts the third ciphertext information by using the negotiation key of the user identity card to obtain the information to be transmitted.
  • the information to be transmitted is encrypted by using the negotiation key of the mobile phone security module.
  • the user identification card decrypts through the negotiation key in the user identification card, thereby obtaining Real information to be transmitted.
  • Step S116a The user identity identification card signs the transmission information to obtain the second signature information.
  • the user identity card signs the information to be transmitted to ensure the integrity and non-repudiation of the information to be transmitted.
  • Step S117a The user identity card encrypts the second signature information by using the negotiation key of the user identity card to obtain the fourth ciphertext information.
  • the user identity card further encrypts the second signature information by using a negotiation key of the user identity card end, thereby ensuring opaque transmission of the second signature information, thereby improving security.
  • Step S118a The user identification card sends the second processing information to the mobile phone security module, where the second processing information includes at least: fourth ciphertext information.
  • Step S119a After receiving the second processing information, the mobile phone security module decrypts the fourth ciphertext information through the negotiation key of the mobile phone security module to obtain the second signature information.
  • the mobile phone security module decrypts the fourth ciphertext information through the negotiation key of the mobile phone security module to obtain the real second signature information.
  • a secure information interaction is completed between the mobile phone security module and the user identification card.
  • step S120a the mobile phone security module issues at least the second signature information.
  • the mobile phone security module issues the second signature information that has been signed by the transmission information.
  • the present invention is applied to the secure transmission of confidential information
  • the signed confidential information is sent out to the device for extracting confidential information.
  • the signed transaction information is transmitted to an online banking server or the like.
  • Step S112b The mobile phone security module acquires information to be transmitted.
  • the mobile phone security module obtains the information to be transmitted, and the information to be transmitted may be confidential information that needs to be transmitted securely, or may be transaction information to be traded in the online banking.
  • the information to be transmitted may be confidential information that the mobile phone needs to output, for example, confidential information obtained by the mobile phone from a secure storage area of the mobile phone.
  • the information to be transmitted may be transaction information of a transaction to be executed, for example, transaction information such as a transaction account number and a transaction amount obtained by the mobile phone through an online banking client.
  • Step S113b The mobile phone security module performs check calculation on the transmission information by using the negotiation key of the mobile phone security module end, and obtains the first verification information.
  • the mobile phone security module performs check calculation on the transmission information through the negotiation key of the mobile phone security module generated by the mobile phone security module, thereby ensuring the integrity of the information to be transmitted.
  • the negotiation key includes at least one verification calculation key, and the verification calculation may be any verification manner such as calculating a MAC value.
  • Step S114b The mobile phone security module sends the first processing information to the user identification card, where the first processing information includes at least: information to be transmitted and first verification information.
  • Step S115b After receiving the first processing information, the user identity identification card verifies the first processing information by using the negotiation key of the user identity card end.
  • the information to be transmitted is verified by the negotiation key of the mobile phone security module.
  • the user identity card After receiving the information to be transmitted and the first verification information, the user identity card passes the negotiation key in the user identification card.
  • the key is also subjected to check calculation for the transmitted information, and is compared with the first check information, and after the comparison is consistent, the verification is passed, thereby ensuring that the obtained information to be transmitted is not falsified.
  • Step S116b If the user identification card verifies the first processing information, the user identity card signs the transmission information to obtain the second signature information.
  • the user identity card signs the information to be transmitted to ensure the integrity and non-repudiation of the information to be transmitted.
  • step S117b the user identification card performs a check calculation on the second signature information by using the negotiation key of the user identity card, and obtains the second verification information.
  • the user identity card also performs verification calculation on the second signature information by using the negotiation key of the user identity card end, thereby ensuring the integrity of the second signature information.
  • Step S118b The user identification card sends the second processing information to the mobile phone security module, where the second processing information includes at least: second signature information and second verification information.
  • Step S119b After receiving the second processing information, the mobile phone security module verifies the second processing information by using the negotiation key of the mobile security module.
  • the mobile phone security module After receiving the second signature information and the second verification information, the mobile phone security module performs a check calculation on the second signature information by using a negotiation key of the mobile phone security module, and compares with the second verification information, and compares After the comparison is made, the verification is passed, thereby ensuring that the obtained second signature information has not been tampered with.
  • the mobile security module and user identity A secure information interaction was completed between the identification cards.
  • Step S120b If the mobile phone security module verifies the second processing information, the mobile phone security module issues at least the second signature information.
  • the mobile phone security module issues the second signature information that has been signed by the transmission information.
  • the present invention is applied to the secure transmission of confidential information
  • the signed confidential information is sent out to the device for extracting confidential information.
  • the signed transaction information is transmitted to an online banking server or the like.
  • Step S112c The mobile phone security module acquires information to be transmitted.
  • the mobile phone security module obtains the information to be transmitted, and the information to be transmitted may be confidential information that needs to be transmitted securely, or may be transaction information to be traded in the online banking.
  • the information to be transmitted may be confidential information that the mobile phone needs to output, for example, confidential information obtained by the mobile phone from a secure storage area of the mobile phone.
  • the information to be transmitted may be transaction information of a transaction to be executed, for example, transaction information such as a transaction account number and a transaction amount obtained by the mobile phone through an online banking client.
  • Step S113c The mobile phone security module encrypts the transmission information by using the negotiation key of the mobile phone security module, obtains the third ciphertext information, and performs a check calculation on the third ciphertext information to obtain the first verification information.
  • the mobile phone security module encrypts the transmission information through the negotiation key of the mobile phone security module generated by the mobile phone security module, so that the information to be transmitted is opaquely transmitted, and the security of the transmission is ensured.
  • the mobile phone security module performs verification calculation on the third ciphertext information through the negotiation key of the mobile phone security module end generated by the mobile phone security module, thereby ensuring the integrity of the third ciphertext information.
  • the check calculation can be any verification method such as calculating a MAC value.
  • the negotiation key includes at least one encryption key and one verification calculation key.
  • Step S114c The mobile phone security module sends the first processing information to the user identification card, where the first processing information includes at least: third ciphertext information and first verification information.
  • Step S115c After receiving the first processing information, the user identity identification card verifies the first processing information by using the negotiation key of the user identity card end.
  • the third ciphertext information is verified by the negotiation key of the mobile phone security module.
  • the user identity identification card passes the user identification card.
  • the negotiation key in the same manner performs the check calculation on the third ciphertext information, and compares it with the first check information, and after the comparison is consistent, the verification passes, thereby ensuring that the obtained third ciphertext information has not been tampered with.
  • Step S116c If the user identification card verifies the first processing information, the user identification card decrypts the third ciphertext information by using the negotiation key of the user identity card to obtain the information to be transmitted.
  • the information to be transmitted is encrypted by using the negotiation key of the mobile security module.
  • the user identification card decrypts through the negotiation key in the user identification card. Thereby obtaining the true information to be transmitted.
  • Step S117c The user identity identification card signs the transmission information to obtain the second signature information.
  • the user identity card signs the information to be transmitted to ensure the integrity and non-repudiation of the information to be transmitted.
  • Step S118c The user identity card encrypts the second signature information by using the negotiation key of the user identity card, obtains the fourth ciphertext information, and performs a check calculation on the fourth ciphertext information to obtain the second verification information.
  • the user identity card further encrypts the second signature information by using a negotiation key of the user identity card end, thereby ensuring opaque transmission of the second signature information, thereby improving security.
  • the user identification card also performs verification calculation on the fourth ciphertext information through the negotiation key of the user identification card end, thereby ensuring the integrity of the fourth ciphertext information.
  • Step S119c The user identification card sends the second processing information to the mobile phone security module, where the second processing information includes at least: fourth ciphertext information and second verification information.
  • Step S120c After receiving the second processing information, the mobile phone security module verifies the second processing information by using the negotiation key of the mobile security module.
  • the mobile phone security module after receiving the fourth ciphertext information and the second verification information, the mobile phone security module further performs verification calculation on the fourth ciphertext information through the negotiation key of the mobile phone security module, and compares with the second verification information. And after the consistency, the verification is passed, thus ensuring that the obtained fourth ciphertext information has not been tampered with.
  • Step S121c If the mobile phone security module verifies the second processing information, the fourth ciphertext information is decrypted by using the negotiation key of the mobile phone security module to obtain the second signature information.
  • the mobile phone security module decrypts the fourth ciphertext information through the negotiation key of the mobile phone security module to obtain the real second signature information.
  • Step S122c The mobile phone security module sends out at least the second signature information.
  • the mobile phone security module issues the second signature information that has been signed by the transmission information.
  • the present invention is applied to the secure transmission of confidential information
  • the signed confidential information is sent out to the device for extracting confidential information.
  • the signed transaction information is transmitted to an online banking server or the like.
  • Step S112d the mobile phone security module acquires information to be transmitted.
  • Step S113d the mobile phone security module encrypts the transmission information by using the negotiation key of the mobile security module end. Obtaining third ciphertext information, and performing a check calculation on the third ciphertext information to obtain first verification information.
  • Step S114d The mobile phone security module sends the first processing information to the user identification card, where the first processing information includes at least: third ciphertext information and first verification information.
  • Step S115d After receiving the first processing information, the user identity identification card verifies the first processing information by using the negotiation key of the user identity card end.
  • Step S116d If the user identification card verifies the first processing information, the user identification card decrypts the third ciphertext information by using the negotiation key of the user identity card to obtain the information to be transmitted.
  • Step S117d the user identification card signs the transmission information to obtain the second signature information.
  • Step S118d The user identity card encrypts the second signature information by using the negotiation key of the user identity card to obtain the fourth ciphertext information.
  • Step S119d The user identification card sends the second processing information to the mobile phone security module, where the second processing information includes at least: fourth ciphertext information.
  • step S120d the mobile phone security module decrypts the fourth ciphertext information through the negotiation key of the mobile phone security module to obtain the second signature information.
  • step S121d the mobile phone security module issues at least the second signature information.
  • Step S112e The mobile phone security module acquires information to be transmitted.
  • Step S113e The mobile phone security module encrypts the transmission information by using the negotiation key of the mobile phone security module, obtains the third ciphertext information, and performs a check calculation on the third ciphertext information to obtain the first verification information.
  • Step S114e The mobile phone security module sends the first processing information to the user identification card, where the first processing information includes at least: third ciphertext information and first verification information.
  • Step S115e After receiving the first processing information, the user identity identification card verifies the first processing information by using the negotiation key of the user identity card end.
  • Step S116e If the user identification card verifies the first processing information, the user identification card decrypts the third ciphertext information by using the negotiation key of the user identity card to obtain the information to be transmitted.
  • Step S117e the user identity identification card signs the transmission information to obtain the second signature information.
  • Step S118e The user identity identification card performs verification calculation on the second signature information by using the negotiation key of the user identity card end to obtain second verification information.
  • Step S119e The user identification card sends the second processing information to the mobile phone security module, where the second processing information includes at least: second signature information and second verification information.
  • Step S120e After receiving the second processing information, the mobile phone security module verifies the second processing information by using the negotiation key of the mobile security module.
  • Step S121e If the mobile phone security module verifies the second processing information, the mobile phone security module issues at least the second signature information.
  • Step S112f The mobile phone security module acquires information to be transmitted.
  • Step S113f The mobile phone security module encrypts the transmission information by using the negotiation key of the mobile phone security module to obtain the third ciphertext information.
  • Step S114f The mobile phone security module sends the first processing information to the user identification card, where the first processing information includes at least: third ciphertext information.
  • Step S115f After receiving the first processing information, the user identity card decrypts the third ciphertext information through the negotiation key of the user identity card to obtain the information to be transmitted.
  • Step S116f The user identity card signs the transmission information to obtain the second signature information.
  • Step S117f The user identity card encrypts the second signature information by using the negotiation key of the user identity card, obtains the fourth ciphertext information, and performs check calculation on the fourth ciphertext information to obtain the first verification information.
  • step S118 the user identification card sends the second processing information to the mobile phone security module, where the second processing information includes at least: fourth ciphertext information and first verification information.
  • Step S119f After receiving the second processing information, the mobile phone security module verifies the second processing information by using the negotiation key of the mobile security module.
  • Step S120f If the mobile phone security module verifies the second processing information, the fourth ciphertext information is decrypted by using the negotiation key of the mobile phone security module to obtain the second signature information.
  • Step S121f The mobile phone security module sends out at least the second signature information.
  • Step S112g The mobile phone security module acquires information to be transmitted.
  • Step S113g The mobile phone security module performs a check calculation on the transmission information by using the negotiation key of the mobile phone security module, and obtains the first verification information.
  • Step S114g The mobile phone security module sends the first processing information to the user identification card, where the first processing information includes at least: information to be transmitted and first verification information.
  • Step S115g After receiving the first processing information, the user identity identification card verifies the first processing information by using the negotiation key of the user identity card end.
  • Step S116g If the user identification card verifies the first processing information, the user identity card signs the transmission information to obtain the second signature information.
  • Step S117g The user identification card encrypts the second signature information by using the negotiation key of the user identity card, obtains the fourth ciphertext information, and performs a check calculation on the fourth ciphertext information to obtain the second verification information.
  • Step S118g The user identification card sends the second processing information to the mobile phone security module, where the second processing information includes at least: fourth ciphertext information and second verification information.
  • Step S119g After receiving the second processing information, the mobile phone security module verifies the second processing information by using the negotiation key of the mobile security module.
  • Step S120g If the mobile phone security module verifies the second processing information, the fourth ciphertext information is decrypted by using the negotiation key of the mobile phone security module to obtain the second signature information.
  • Step S121g The mobile phone security module issues at least the second signature information.
  • step S112h the mobile phone security module acquires information to be transmitted.
  • step S113h the mobile phone security module encrypts the transmission information by using the negotiation key of the mobile phone security module to obtain the third ciphertext information.
  • Step S114h The mobile phone security module sends the first processing information to the user identification card, where the first processing information includes at least: third ciphertext information.
  • Step S115h After receiving the first processing information, the user identity card decrypts the third ciphertext information through the negotiation key of the user identity card to obtain the information to be transmitted.
  • step S116h the user identity identification card signs the transmission information to obtain the second signature information.
  • step S117h the user identification card performs verification calculation on the second signature information by using the negotiation key of the user identification card, and obtains the first verification information.
  • step S118h the user identification card sends the second processing information to the mobile phone security module, where the second processing information includes at least: second signature information and first verification information.
  • Step S119h After receiving the second processing information, the mobile phone security module verifies the second processing information by using the negotiation key of the mobile security module.
  • Step S120h If the mobile phone security module verifies the second processing information, the mobile phone security module issues at least the second signature information.
  • Step S112i The mobile phone security module acquires information to be transmitted.
  • Step S113i The mobile phone security module encrypts the transmission information by using the negotiation key of the mobile phone security module, obtains the third ciphertext information, and performs a check calculation on the third ciphertext information to obtain the first verification information.
  • Step S114i The mobile phone security module sends the first processing information to the user identification card, where the first processing information includes at least: third ciphertext information and first verification information.
  • Step S115i After receiving the first processing information, the user identity identification card verifies the first processing information by using the negotiation key of the user identity card end.
  • step S116i if the user identification card verifies the first processing information, the user identification card decrypts the third ciphertext information through the negotiation key of the user identification card, and obtains the information to be transmitted.
  • step S117i the user identification card signs the transmission information to obtain the second signature information.
  • Step S118i The user identification card encrypts the second signature information by using a negotiation key of the user identity card end to obtain fourth ciphertext information.
  • step S119i the user identification card sends the second processing information to the mobile phone security module, where the second processing information includes at least: fourth ciphertext information.
  • step S120i the mobile phone security module decrypts the fourth ciphertext information through the negotiation key of the mobile phone security module to obtain the second signature information.
  • step S121i the mobile phone security module issues at least the second signature information.
  • the step of performing verification calculation on each ciphertext information may be replaced by performing verification calculation on the original text of the ciphertext information, and after obtaining the verification information and the ciphertext information, , the first decryption to obtain the original text of the ciphertext information, and then verify the verification information.
  • the original text of ciphertext information or ciphertext information cannot be tampered with.
  • the data processing method based on the negotiation key of the present invention enables the mobile phone to securely perform online banking service and/or confidential information transmission.
  • the data processing method based on the negotiation key further includes The following steps S1121 - step S1124.
  • Step S1121 The mobile phone security module extracts key information in the information to be transmitted.
  • the mobile phone security module will extract key information in the information to be transmitted to display to the user to confirm whether it is the information.
  • the mobile phone security module will extract key information in the information to be transmitted to display to the user to confirm whether it is the information.
  • the mobile phone security module can extract key information such as the file name in the confidential information, so that the user can confirm whether the confidential file needs to be extracted for secure output.
  • the mobile security module can extract key information in the transaction information, such as transaction account number and transaction amount, so that the user can confirm whether the transaction is a real transaction.
  • Step S1122 The mobile phone security module controls the mobile phone display screen to display the key information in the extracted information to be transmitted.
  • the mobile phone security module controls the display screen of the mobile phone to display the extracted key information, so that the user can confirm the authenticity of the key information, thereby ensuring the authenticity of the information to be transmitted.
  • the mobile phone security module controls the display screen of the mobile phone to display the extracted key information, and also prevents the problem that the key information may be tampered with by the mobile phone CPU controlling the mobile phone display screen, and ensures that the displayed content is controlled by the mobile phone security module as real content. To improve safety.
  • Step S1123 The mobile phone security module receives an acknowledgement command outputted by the mobile phone keyboard.
  • the confirmation button on the mobile phone can be a hardware button set on the mobile phone, or a virtual button of the touch screen mobile phone, in the mobile phone security module. After receiving the confirmation command of the mobile phone keyboard output, confirm the authenticity of the information to be transmitted, and prepare for subsequent secure transmission.
  • Step S1124 After the mobile phone security module receives the confirmation command outputted by the mobile phone keyboard, the mobile security module sends the first processing information to the user identification card.
  • the information to be transmitted confirmed by the user's button is considered to be the real information to be transmitted, which ensures the authenticity of the information to be transmitted, thereby improving the authenticity of the confidential information output and the security of the transaction information output.
  • the mobile phone security module and the user identity identification card are included in the mobile phone according to the embodiment 1 of the present invention.
  • the mobile phone security module and the user identification card can be divided into any module and/or any combination of the transceiver unit, the encryption and decryption unit, the calculation unit, the generation unit, the signature unit and the like to complete the corresponding functions, and no longer A narrative.
  • the difference between the embodiment 2 and the embodiment 1 is that the authentication process and the key generation process between the mobile phone security module and the user identity card are reversed, and are not further described herein.
  • the data processing method of the negotiation key is briefly described.
  • FIG. 2 is a flowchart of a data processing method based on a negotiation key according to Embodiment 2 of the present invention.
  • a data processing method based on a negotiation key according to Embodiment 2 of the present invention includes the following steps S201 to S211.
  • Step S201 The user identity identification card acquires identification information of the mobile phone security module.
  • Step S202 After obtaining the identification information of the mobile phone security module, the user identity identification card calculates the public key of the mobile phone security module according to the preset first public key calculation algorithm and the identification information of the mobile phone security module.
  • Step S203 The user identity card acquires a first random factor, and generates a negotiation key of the user identity card end according to the first random factor.
  • Step S204 After obtaining the first random factor, the user identity identification card performs encryption calculation on the first random factor according to the public key of the mobile phone security module to obtain the first ciphertext information.
  • Step S205 After obtaining the first ciphertext information, the user identity identification card signs the first ciphertext information according to the private key of the user identity identification card, obtains the first signature information, and sends the first signature information to the mobile phone security module. .
  • Step S206 the mobile phone security module acquires the identification information of the user identification card.
  • Step S207 after the mobile phone security module obtains the identification information of the user identification card, according to the preset second public
  • the key calculation algorithm and the identification information of the user identification card calculate the public key of the user identification card.
  • Step S208 After receiving the first signature information, the mobile phone security module verifies the first signature information according to the public key of the user identity identification card.
  • Step S209 After verifying that the first signature information is passed, the mobile phone security module decrypts the first ciphertext information according to the private key of the mobile phone security module to obtain a first random factor.
  • Step S210 The mobile phone security module generates a negotiation key of the mobile phone security module end according to the first random factor.
  • Step S211 The mobile security module and the user identification card perform secure transmission of information through the negotiation key of the mobile security module end and the negotiation key of the user identification card end.
  • the data processing method based on the negotiation key of the present invention enables the mobile phone to securely perform online banking service and/or confidential information transmission.
  • the process of securely transmitting information between the mobile phone security module and the user identity card through the negotiation key of the mobile phone security module and the negotiation key of the user identity card is the same as that of the first embodiment. Let me repeat.
  • the second embodiment of the present invention can also provide a mobile phone, which uses the data processing method based on the negotiation key provided by the second embodiment.
  • the mobile phone of the second embodiment of the present invention includes at least: a mobile phone security module and a user identification card;
  • the mobile phone security module and the user identification card can be divided into any module and/or any combination of the transceiver unit, the encryption and decryption unit, the calculation unit, the generation unit, the signature unit and the like to complete the corresponding functions, and no longer A narrative.
  • portions of the invention may be implemented in hardware, software, firmware or a combination thereof.
  • multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
  • a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
  • each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
  • the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种基于协商密钥的数据处理方法,包括:手机安全模块获取用户身份识别卡的标识信息计算得到用户身份识别卡的公钥,获取第一随机因子,根据第一随机因子生成手机安全模块端的协商密钥,对第一随机因子进行加密计算、签名后发送至用户身份识别卡;用户身份识别卡获取手机安全模块的标识信息计算得到手机安全模块的公钥,对第一签名信息进行验证,对第一密文信息进行解密,获得第一随机因子,根据第一随机因子生成用户身份识别卡端的协商密钥;手机安全模块与用户身份识别卡之间通过手机安全模块端的协商密钥以及用户身份识别卡端的协商密钥进行信息的安全传输。通过本发明可以使手机能够安全执行网上银行业务和/或机密信息传输。

Description

一种基于协商密钥的数据处理方法 技术领域
本发明涉及信息安全技术领域,尤其涉及一种基于协商密钥的数据处理方法。
背景技术
网络的迅速发展给人们带来的极大便利,人们越来越依赖于网络进行各种活动,例如网络文件的传输、网上银行交易均已逐渐成为人们生活、工作中不可缺少的一部分。由于网络毕竟是一个虚拟的环境,存在着太多不安全的因素,而在网络环境中必然会进行数据交互的网络活动,尤其是像网上银行业务和机密信息的传输这样的网络活动,对网络的安全提出了很高的要求,因此需要发展网络信息安全技术。
随着现今手机技术的飞速发展,手机终端越来越多的被用来替代计算机使用,但现今并没有一种使手机终端能够安全执行网上银行业务和/或机密信息传输的解决方案。
发明内容
本发明旨在解决手机终端无法安全执行网上银行业务和/或机密信息传输的问题。
本发明的主要目的在于提供一种基于协商密钥的数据处理方法。
为达到上述目的,本发明的技术方案具体是这样实现的:
本发明一方面提供了一种基于协商密钥的数据处理方法,包括:手机安全模块获取所述用户身份识别卡的标识信息;所述手机安全模块在获取到所述用户身份识别卡的标识信息后,根据预设的第一公钥计算算法以及所述用户身份识别卡的标识信息计算得到用户身份识别卡的公钥;所述手机安全模块获取第一随机因子,根据所述第一随机因子生成所述手机安全模块端的协商密钥;所述手机安全模块在获取到所述第一随机因子后,根据所述用户身份识别卡的公钥对所述第一随机因子进行加密计算,获得第一密文信息;所述手机安全模块在获得所述第一密文信息后,根据所述手机安全模块的私钥对所述第一密文信息进行签名,获得第一签名信息,并将所述第一签名信息发送至用户身份识别卡;所述用户身份识别卡获取所述手机安全模块的标识信息;所述用户身份识别卡在获取到所述手机安全模块的标识信息后,根据预设的第二公钥计算算法以及所述手机安全模块的标识信息计算得到手机安全模块的公钥;所述用户身份识别卡在接收到所述第一签名信息后,根据所述手机安全模块的公钥对所述第一签名信息进行验证;所述用户身份识别卡在验证所述第一签名信息通过后,根据所述用户身份识别卡的私钥对所述第一密文信息进行解密,获得 所述第一随机因子;所述用户身份识别卡根据所述第一随机因子生成所述用户身份识别卡端的协商密钥;所述手机安全模块与所述用户身份识别卡之间通过所述手机安全模块端的协商密钥以及所述用户身份识别卡端的协商密钥进行信息的安全传输。
本发明一方面还提供了一种基于协商密钥的数据处理方法,包括:用户身份识别卡获取所述手机安全模块的标识信息;所述用户身份识别卡在获取到所述手机安全模块的标识信息后,根据预设的第一公钥计算算法以及所述手机安全模块的标识信息计算得到手机安全模块的公钥;所述用户身份识别卡获取第一随机因子,根据所述第一随机因子生成所述用户身份识别卡端的协商密钥;所述用户身份识别卡在获取到所述第一随机因子后,根据所述手机安全模块的公钥对所述第一随机因子进行加密计算,获得第一密文信息;所述用户身份识别卡在获得所述第一密文信息后,根据所述用户身份识别卡的私钥对所述第一密文信息进行签名,获得第一签名信息,并将所述第一签名信息发送至手机安全模块;所述手机安全模块获取所述用户身份识别卡的标识信息;所述手机安全模块在获取到所述用户身份识别卡的标识信息后,根据预设的第二公钥计算算法以及所述用户身份识别卡的标识信息计算得到用户身份识别卡的公钥;所述手机安全模块在接收到所述第一签名信息后,根据所述用户身份识别卡的公钥对所述第一签名信息进行验证;所述手机安全模块在验证所述第一签名信息通过后,根据手机安全模块的私钥对所述第一密文信息进行解密,获得所述第一随机因子;所述手机安全模块根据所述第一随机因子生成所述手机安全模块端的协商密钥;所述手机安全模块与所述用户身份识别卡之间通过所述手机安全模块端的协商密钥以及所述用户身份识别卡端的协商密钥进行信息的安全传输。
此外,所述手机安全模块与所述用户身份识别卡之间通过所述手机安全模块端的协商密钥以及所述用户身份识别卡端的协商密钥进行信息的安全传输的步骤包括:所述手机安全模块获取待传输信息;所述手机安全模块通过所述手机安全模块端的协商密钥对所述待传输信息进行加密,获得第三密文信息;所述手机安全模块将第一处理信息发送至所述用户身份识别卡,其中,所述第一处理信息至少包括:所述第三密文信息;所述用户身份识别卡接收到所述第一处理信息后,通过所述用户身份识别卡端的协商密钥对所述第三密文信息进行解密,获得待传输信息;所述用户身份识别卡对所述待传输信息进行签名,获得第二签名信息。
此外,所述手机安全模块与所述用户身份识别卡之间通过所述手机安全模块端的协商密钥以及所述用户身份识别卡端的协商密钥进行信息的安全传输的步骤包括:所述手机安全模块获取待传输信息;所述手机安全模块通过所述手机安全模块端的协商密钥对所述待传输信息进行校验计算,获得第一校验信息;所述手机安全模块将第一处理信息发送至所述用户身份识别卡,其中,所述第一处理信息至少包括:所述待传输信息和所述第一校验 信息;所述用户身份识别卡接收到所述第一处理信息后,通过所述用户身份识别卡端的协商密钥对所述第一处理信息进行验证;如果所述用户身份识别卡对所述第一处理信息验证通过,则所述用户身份识别卡对所述待传输信息进行签名,获得第二签名信息。
此外,所述手机安全模块与所述用户身份识别卡之间通过所述手机安全模块端的协商密钥以及所述用户身份识别卡端的协商密钥进行信息的安全传输的步骤包括:所述手机安全模块获取待传输信息;所述手机安全模块通过所述手机安全模块端的协商密钥对所述待传输信息进行加密,获得第三密文信息,以及对所述第三密文信息进行校验计算,获得第一校验信息;所述手机安全模块将第一处理信息发送至所述用户身份识别卡,其中,所述第一处理信息至少包括:所述第三密文信息和所述第一校验信息;所述用户身份识别卡接收到所述第一处理信息后,通过所述用户身份识别卡端的协商密钥对所述第一处理信息进行验证;如果所述用户身份识别卡对所述第一处理信息验证通过,则所述用户身份识别卡通过所述用户身份识别卡端的协商密钥对所述第三密文信息进行解密,获得所述待传输信息;
所述用户身份识别卡对所述待传输信息进行签名,获得第二签名信息。
此外,在所述用户身份识别卡对所述待传输信息进行签名,获得第二签名信息的步骤之后,所述方法还包括:所述用户身份识别卡通过所述用户身份识别卡端的协商密钥对所述第二签名信息进行加密,获得第四密文信息;所述用户身份识别卡将第二处理信息发送至所述手机安全模块,其中,所述第二处理信息至少包括:所述第四密文信息;所述手机安全模块接收到所述第二处理信息后,通过所述手机安全模块端的协商密钥对所述第四密文信息进行解密,获得所述第二签名信息;所述手机安全模块至少将所述第二签名信息外发;或者所述用户身份识别卡通过所述用户身份识别卡端的协商密钥对所述第二签名信息进行校验计算,获得第二校验信息;所述用户身份识别卡将第二处理信息发送至所述手机安全模块,其中,所述第二处理信息至少包括:所述第二签名信息和所述第二校验信息;所述手机安全模块接收到所述第二处理信息后,通过所述手机安全模块端的协商密钥对所述第二处理信息进行验证;如果所述手机安全模块对所述第二处理信息验证通过,则所述手机安全模块至少将所述第二签名信息外发;或者所述用户身份识别卡通过所述用户身份识别卡端的协商密钥对所述第二签名信息进行加密,获得第四密文信息,以及对所述第四密文信息进行校验计算,获得第二校验信息;所述用户身份识别卡将第二处理信息发送至所述手机安全模块,其中,所述第二处理信息至少包括:所述第四密文信息和所述第二校验信息;所述手机安全模块接收到所述第二处理信息后,通过所述手机安全模块端的协商密钥对所述第二处理信息进行验证;如果所述手机安全模块对所述第二处理信息验证通过,则通过所述手机安全模块端的协商密钥对所述第四密文信息进行解密,获得所述第二签名 信息;所述手机安全模块至少将所述第二签名信息外发。
此外,在所述手机安全模块获取待传输信息的步骤之后,在所述手机安全模块将第一处理信息发送至所述用户身份识别卡的步骤之前,所述方法还包括:所述手机安全模块提取所述待传输信息中的关键信息;所述手机安全模块控制手机显示屏显示所述提取出的待传输信息中的关键信息;所述手机安全模块接收手机键盘输出的确认指令;在所述手机安全模块接收到所述手机键盘输出的确认指令后,执行所述手机安全模块将第一处理信息发送至所述用户身份识别卡的步骤。
此外,所述手机安全模块为独立于手机CPU之外的模块,或者所述手机安全模块设置在所述手机CPU中的安全区域。
此外,所述第一公钥计算算法与第二公钥计算算法相同。
此外,如果解密所述第一密文信息错误,则返回第一错误信息;如果解密所述第二密文信息错误,则返回第二错误信息。
本发明一方面还提供了一种存储介质,所述存储介质设置为存储应用程序,所述应用程序设置为在运行时执行本发明任一实施例所述的基于协商密钥的数据处理方法。
由上述本发明提供的技术方案可以看出,通过本发明的基于协商密钥的数据处理方法,可以使手机能够安全执行网上银行业务和/或机密信息传输。
附图说明
为了更清楚地说明本发明实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他附图。
图1为本发明实施例1提供的基于协商密钥的数据处理方法的流程图;以及
图2为本发明实施例2提供的基于协商密钥的数据处理方法的流程图。
具体实施方式
下面结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明的保护范围。
在本发明的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可 以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,可以是两个元件内部的连通。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本发明中的具体含义。此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或数量或位置。
下面将结合附图对本发明实施例作进一步地详细描述。
本发明的基于协商密钥的数据处理方法是基于手机实现的,该手机至少包括一个具备安全功能的用户身份识别卡,以及一个手机安全模块。
其中,用户身份识别卡可以为如下任一种卡片:SIM(Subscriber Identity Module,客户识别模块)卡、UIM(User Identity Module)卡、USIM卡、PIM卡等,以上的卡片均在现有的功能的基础上,拓展了安全功能,以配合本发明的手机安全模块实现本发明的功能。
该手机安全模块可以设置为独立于手机CPU之外的单独的模块,也可以设置为在手机CPU中的安全区域,以保证该手机安全模块可以实现的独立的安全功能,例如:手机安全模块可以独立进行安全的身份认证功能,以及进行显示的安全控制,保证显示内容的真实性等。
此外,第三方CA可以对用户身份识别卡颁发了经过CA认证的证书,同时第三方CA还可以对手机安全模块也颁发了经过CA认证的证书,以保证双方可以验证对方身份的合法性,提高安全性。
实施例1
图1出示了本发明实施例1提供的基于协商密钥的数据处理方法的流程图,参见图1,本发明的基于协商密钥的数据处理方法,包括以下步骤S101-步骤S111。
步骤S101,手机安全模块获取用户身份识别卡的标识信息。
具体的,用户身份识别卡的标识信息为唯一的标识信息,包括但不限于:用户身份识别卡序列号、用户号码、MAC地址等。该用户身份识别卡的标识信息可以为手机安全模块预先存储的,也可以为用户身份识别卡发送给手机安全模块的。
手机安全模块获取到用户身份识别卡的标识信息,可以利用该唯一标识信息进行密钥的生成。
步骤S102,手机安全模块在获取到用户身份识别卡的标识信息后,根据预设的第一公钥计算算法以及用户身份识别卡的标识信息计算得到用户身份识别卡的公钥。
具体的,手机安全模块预设第一公钥计算算法,可以根据用户身份识别卡的标识信息计算出用户身份识别卡的公钥,该用户身份识别卡的公钥可以用于后续与用户身份识别卡 进行交互时加密传输信息,以便用户身份识别卡的私钥可以对加密信息进行解密。
步骤S103,手机安全模块获取第一随机因子,根据第一随机因子生成手机安全模块端的协商密钥。
具体的,该第一随机因子可以为该手机安全模块直接生成的,或者该第一随机因子可以为用户身份识别卡生成,并发送给手机安全模块而获得的。当然,通过手机安全模块直接生成更加安全;通过用户身份识别卡生成发送至手机安全模块可以减少手机安全模块的处理,提高处理效率。该第一随机因子可以为一个或一串随机数,或者可以为一个或一串随机字符,或者一串随机数和随机组合的任意组合。
获取该第一随机因子后,手机安全模块可以使用该第一随机因子生成协商密钥。当然,手机安全模块使用该第一随机因子生成协商密钥的步骤,除了在获取第一随机因子之后执行,还可以在后续其他任一步骤的同时执行,只要最终生成了手机安全模块端的协商密钥即可。
步骤S104,手机安全模块在获取到第一随机因子后,根据用户身份识别卡的公钥对第一随机因子进行加密计算,获得第一密文信息。
具体的,手机安全模块根据计算出的用户身份识别卡的公钥对第一随机因子进行加密,从而保证第一随机因子传输的安全性。
步骤S105,手机安全模块在获得第一密文信息后,根据手机安全模块的私钥对第一密文信息进行签名,获得第一签名信息,并将第一签名信息发送至用户身份识别卡。
步骤S106,用户身份识别卡获取手机安全模块的标识信息。
具体的,手机安全模块的标识信息为唯一的标识信息,包括但不限于:手机CPU的序列号、手机CPU的MAC地址等。该手机安全模块的标识信息可以为用户身份识别卡预先存储的,也可以为手机安全模块发送给用户身份识别卡的。
用户身份识别卡获取到手机安全模块的标识信息,可以利用该唯一标识信息进行手机安全模块的公钥的生成。
步骤S107,用户身份识别卡在获取到手机安全模块的标识信息后,根据预设的第二公钥计算算法以及手机安全模块的标识信息计算得到手机安全模块的公钥。
具体的,用户身份识别卡预设第二公钥计算算法,可以根据手机安全模块的标识信息计算出手机安全模块的公钥,该手机安全模块的公钥可以用于后续与手机安全模块进行交互时加密传输信息。
当然,该第二公钥计算算法可以与第一公钥计算算法相同,由此简化处理流程;该第二公钥计算算法也可以与第一公钥计算算法不同,由此防止暴力破解,提高安全性。
步骤S108,用户身份识别卡在接收到第一签名信息后,根据手机安全模块的公钥对第 一签名信息进行验证。
具体的,用户身份识别卡还使用生成的手机安全模块的公钥对第一签名信息进行验证,保证信息传输的安全性和信息来源的合法性。
步骤S109,用户身份识别卡在验证第一签名信息通过后,根据用户身份识别卡的私钥对第一密文信息进行解密,获得第一随机因子。
具体的,用户身份识别卡中预设了用户身份识别卡的私钥,用户身份识别卡可以根据用户身份识别卡的私钥解密手机安全模块发送的第一密文信息,获得第一随机因子,由此可以保证第一随机因子传输的安全性,在用户身份识别卡中获取到的为真实的第一随机因子。
此外,如果此时解密第一密文信息错误,则返回第一错误信息,并且重新执行步骤S101,以便重新获取随机因子,当然,重新执行步骤S101后,该随机因子可以为第一随机因子,也可以为另一个不同于第一随机因子的随机因子,以提高安全性,防止重放攻击。
步骤S110,用户身份识别卡根据第一随机因子生成用户身份识别卡端的协商密钥。
具体的,用户身份识别卡生成协商密钥的方式应与手机安全模块生成协商密钥的方式相同,以保证用户身份识别卡与手机安全模块之间可以通过该协商密钥进行信息交互。
步骤S111,手机安全模块与用户身份识别卡之间通过手机安全模块端的协商密钥以及用户身份识别卡端的协商密钥进行信息的安全传输。
具体的,在手机安全模块生成了手机安全模块端的协商密钥,以及用户身份识别卡生成了用户身份识别卡端的协商密钥后,手机安全模块与用户身份识别卡之间通过两端的协商密钥进行信息的安全传输。
此时,可以通过如下方式一至方式九中之一实现信息的安全传输。
方式一
步骤S112a,手机安全模块获取待传输信息。
具体的,手机安全模块获取待传输信息,该待传输信息可以为需要安全传输的机密信息,也可以为网银中待交易的交易信息。
如果本发明应用于机密信息安全传输中,则待传输信息可以为手机需要输出的机密信息,例如:手机从手机的安全存储区域内获取的机密信息等。
如果本发明应用于网上银行业务中,则待传输信息可以为待执行交易的交易信息,例如:手机通过网上银行客户端获取到的交易账号、交易金额等交易信息。
步骤S113a,手机安全模块通过手机安全模块端的协商密钥对待传输信息进行加密,获得第三密文信息。
具体的,手机安全模块通过其生成的手机安全模块端的协商密钥对待传输信息进行加 密,从而使得待传输信息进行不透明传输,保证传输的安全性。此时,协商密钥至少包括一个加密密钥。
步骤S114a,手机安全模块将第一处理信息发送至用户身份识别卡,其中,第一处理信息至少包括:第三密文信息。
步骤S115a,用户身份识别卡接收到第一处理信息后,通过用户身份识别卡端的协商密钥对第三密文信息进行解密,获得待传输信息。
具体的,由于待传输信息通过手机安全模块端的协商密钥进行了加密,此时,用户身份识别卡接收到第三密文信息后,通过用户身份识别卡中的协商密钥进行解密,从而获得真实的待传输信息。
步骤S116a,用户身份识别卡对待传输信息进行签名,获得第二签名信息。
具体的,用户身份识别卡在获得了真实的待传输信息后,对该待传输信息进行签名,以保证待传输信息的完整性和不可抵赖性。
步骤S117a,用户身份识别卡通过用户身份识别卡端的协商密钥对第二签名信息进行加密,获得第四密文信息。
具体的,用户身份识别卡还通过用户身份识别卡端的协商密钥对第二签名信息进行加密,从而保证第二签名信息的不透明传输,提高安全性。
步骤S118a,用户身份识别卡将第二处理信息发送至手机安全模块,其中,第二处理信息至少包括:第四密文信息。
步骤S119a,手机安全模块接收到第二处理信息后,通过手机安全模块端的协商密钥对第四密文信息进行解密,获得第二签名信息。
具体的,手机安全模块接收到第四密文信息后,还通过手机安全模块端的协商密钥对第四密文信息进行解密,获得真实的第二签名信息。由此,手机安全模块与用户身份识别卡之间完成了一次安全的信息交互。
步骤S120a,手机安全模块至少将第二签名信息外发。
具体的,手机安全模块将对待传输信息进行了签名后的第二签名信息外发。
如果本发明应用于机密信息安全传输中,则将签名后的机密信息外发至机密信息提取的装置中等。
如果本发明应用于网上银行业务中,则将签名后的交易信息发送至网上银行服务器等。
方式二
步骤S112b,手机安全模块获取待传输信息。
具体的,手机安全模块获取待传输信息,该待传输信息可以为需要安全传输的机密信息,也可以为网银中待交易的交易信息。
如果本发明应用于机密信息安全传输中,则待传输信息可以为手机需要输出的机密信息,例如:手机从手机的安全存储区域内获取的机密信息等。
如果本发明应用于网上银行业务中,则待传输信息可以为待执行交易的交易信息,例如:手机通过网上银行客户端获取到的交易账号、交易金额等交易信息。
步骤S113b,手机安全模块通过手机安全模块端的协商密钥对待传输信息进行校验计算,获得第一校验信息。
具体的,手机安全模块通过其生成的手机安全模块端的协商密钥对待传输信息进行校验计算,从而保证待传输信息的完整性。此时,协商密钥至少包括一个校验计算密钥,该校验计算可以为计算MAC值等任一校验方式。
步骤S114b,手机安全模块将第一处理信息发送至用户身份识别卡,其中,第一处理信息至少包括:待传输信息和第一校验信息。
步骤S115b,用户身份识别卡接收到第一处理信息后,通过用户身份识别卡端的协商密钥对第一处理信息进行验证。
具体的,由于待传输信息通过手机安全模块端的协商密钥进行了校验计算,此时,用户身份识别卡接收到待传输信息和第一校验信息后,通过用户身份识别卡中的协商密钥对待传输信息同样进行校验计算,并与第一校验信息进行比较,并在比较一致后,验证通过,从而确保获得的待传输信息未经篡改。
步骤S116b,如果用户身份识别卡对第一处理信息验证通过,则用户身份识别卡对待传输信息进行签名,获得第二签名信息。
具体的,用户身份识别卡在获得了真实的待传输信息后,对该待传输信息进行签名,以保证待传输信息的完整性和不可抵赖性。
步骤S117b,用户身份识别卡通过用户身份识别卡端的协商密钥对第二签名信息进行校验计算,获得第二校验信息。
具体的,用户身份识别卡还通过用户身份识别卡端的协商密钥对第二签名信息进行校验计算,从而保证第二签名信息的完整性。
步骤S118b,用户身份识别卡将第二处理信息发送至手机安全模块,其中,第二处理信息至少包括:第二签名信息和第二校验信息。
步骤S119b,手机安全模块接收到第二处理信息后,通过手机安全模块端的协商密钥对第二处理信息进行验证。
具体的,手机安全模块接收到第二签名信息和第二校验信息后,还通过手机安全模块端的协商密钥对第二签名信息进行校验计算,并与第二校验信息进行比较,并在比较一致后,验证通过,从而确保获得的第二签名信息未经篡改。由此,手机安全模块与用户身份 识别卡之间完成了一次安全的信息交互。
步骤S120b,如果手机安全模块对第二处理信息验证通过,则手机安全模块至少将第二签名信息外发。
具体的,手机安全模块将对待传输信息进行了签名后的第二签名信息外发。
如果本发明应用于机密信息安全传输中,则将签名后的机密信息外发至机密信息提取的装置中等。
如果本发明应用于网上银行业务中,则将签名后的交易信息发送至网上银行服务器等。
方式三
步骤S112c,手机安全模块获取待传输信息。
具体的,手机安全模块获取待传输信息,该待传输信息可以为需要安全传输的机密信息,也可以为网银中待交易的交易信息。
如果本发明应用于机密信息安全传输中,则待传输信息可以为手机需要输出的机密信息,例如:手机从手机的安全存储区域内获取的机密信息等。
如果本发明应用于网上银行业务中,则待传输信息可以为待执行交易的交易信息,例如:手机通过网上银行客户端获取到的交易账号、交易金额等交易信息。
步骤S113c,手机安全模块通过手机安全模块端的协商密钥对待传输信息进行加密,获得第三密文信息,以及对第三密文信息进行校验计算,获得第一校验信息。
具体的,手机安全模块通过其生成的手机安全模块端的协商密钥对待传输信息进行加密,从而使得待传输信息进行不透明传输,保证传输的安全性。
手机安全模块通过其生成的手机安全模块端的协商密钥对第三密文信息进行校验计算,从而保证第三密文信息的完整性。该校验计算可以为计算MAC值等任一校验方式。
此时,协商密钥至少包括一个加密密钥一个校验计算密钥。
步骤S114c,手机安全模块将第一处理信息发送至用户身份识别卡,其中,第一处理信息至少包括:第三密文信息和第一校验信息。
步骤S115c,用户身份识别卡接收到第一处理信息后,通过用户身份识别卡端的协商密钥对第一处理信息进行验证。
具体的,由于第三密文信息通过手机安全模块端的协商密钥进行了校验计算,此时,用户身份识别卡接收到第三密文信息和第一校验信息后,通过用户身份识别卡中的协商密钥对第三密文信息同样进行校验计算,并与第一校验信息进行比较,并在比较一致后,验证通过,从而确保获得的第三密文信息未经篡改。
步骤S116c,如果用户身份识别卡对第一处理信息验证通过,则用户身份识别卡通过用户身份识别卡端的协商密钥对第三密文信息进行解密,获得待传输信息。
具体的,由于待传输信息通过手机安全模块端的协商密钥进行了加密,此时,用户身份识别卡接收到真实的第三密文信息后,通过用户身份识别卡中的协商密钥进行解密,从而获得真实的待传输信息。
步骤S117c,用户身份识别卡对待传输信息进行签名,获得第二签名信息。
具体的,用户身份识别卡在获得了真实的待传输信息后,对该待传输信息进行签名,以保证待传输信息的完整性和不可抵赖性。
步骤S118c,用户身份识别卡通过用户身份识别卡端的协商密钥对第二签名信息进行加密,获得第四密文信息,以及对第四密文信息进行校验计算,获得第二校验信息。
具体的,用户身份识别卡还通过用户身份识别卡端的协商密钥对第二签名信息进行加密,从而保证第二签名信息的不透明传输,提高安全性。
用户身份识别卡还通过用户身份识别卡端的协商密钥对第四密文信息进行校验计算,从而保证第四密文信息的完整性。
步骤S119c,用户身份识别卡将第二处理信息发送至手机安全模块,其中,第二处理信息至少包括:第四密文信息和第二校验信息。
步骤S120c,手机安全模块接收到第二处理信息后,通过手机安全模块端的协商密钥对第二处理信息进行验证。
具体的,手机安全模块接收到第四密文信息和第二校验信息后,还通过手机安全模块端的协商密钥对第四密文信息进行校验计算,并与第二校验信息进行比较,并在比较一致后,验证通过,从而确保获得的第四密文信息未经篡改。
步骤S121c,如果手机安全模块对第二处理信息验证通过,则通过手机安全模块端的协商密钥对第四密文信息进行解密,获得第二签名信息。
具体的,手机安全模块在获得了真实的第四密文信息后,还通过手机安全模块端的协商密钥对第四密文信息进行解密,获得真实的第二签名信息。
由此,手机安全模块与用户身份识别卡之间完成了一次安全的信息交互。
步骤S122c,手机安全模块至少将第二签名信息外发。
具体的,手机安全模块将对待传输信息进行了签名后的第二签名信息外发。
如果本发明应用于机密信息安全传输中,则将签名后的机密信息外发至机密信息提取的装置中等。
如果本发明应用于网上银行业务中,则将签名后的交易信息发送至网上银行服务器等。
方式四
步骤S112d,手机安全模块获取待传输信息。
步骤S113d,手机安全模块通过手机安全模块端的协商密钥对待传输信息进行加密, 获得第三密文信息,以及对第三密文信息进行校验计算,获得第一校验信息。
步骤S114d,手机安全模块将第一处理信息发送至用户身份识别卡,其中,第一处理信息至少包括:第三密文信息和第一校验信息。
步骤S115d,用户身份识别卡接收到第一处理信息后,通过用户身份识别卡端的协商密钥对第一处理信息进行验证。
步骤S116d,如果用户身份识别卡对第一处理信息验证通过,则用户身份识别卡通过用户身份识别卡端的协商密钥对第三密文信息进行解密,获得待传输信息。
步骤S117d,用户身份识别卡对待传输信息进行签名,获得第二签名信息。
步骤S118d,用户身份识别卡通过用户身份识别卡端的协商密钥对第二签名信息进行加密,获得第四密文信息。
步骤S119d,用户身份识别卡将第二处理信息发送至手机安全模块,其中,第二处理信息至少包括:第四密文信息。
步骤S120d,手机安全模块通过手机安全模块端的协商密钥对第四密文信息进行解密,获得第二签名信息。
步骤S121d,手机安全模块至少将第二签名信息外发。
方式五
步骤S112e,手机安全模块获取待传输信息。
步骤S113e,手机安全模块通过手机安全模块端的协商密钥对待传输信息进行加密,获得第三密文信息,以及对第三密文信息进行校验计算,获得第一校验信息。
步骤S114e,手机安全模块将第一处理信息发送至用户身份识别卡,其中,第一处理信息至少包括:第三密文信息和第一校验信息。
步骤S115e,用户身份识别卡接收到第一处理信息后,通过用户身份识别卡端的协商密钥对第一处理信息进行验证。
步骤S116e,如果用户身份识别卡对第一处理信息验证通过,则用户身份识别卡通过用户身份识别卡端的协商密钥对第三密文信息进行解密,获得待传输信息。
步骤S117e,用户身份识别卡对待传输信息进行签名,获得第二签名信息。
步骤S118e,用户身份识别卡通过用户身份识别卡端的协商密钥对第二签名信息进行校验计算,获得第二校验信息。
步骤S119e,用户身份识别卡将第二处理信息发送至手机安全模块,其中,第二处理信息至少包括:第二签名信息和第二校验信息。
步骤S120e,手机安全模块接收到第二处理信息后,通过手机安全模块端的协商密钥对第二处理信息进行验证。
步骤S121e,如果手机安全模块对第二处理信息验证通过,则手机安全模块至少将第二签名信息外发。
方式六
步骤S112f,手机安全模块获取待传输信息。
步骤S113f,手机安全模块通过手机安全模块端的协商密钥对待传输信息进行加密,获得第三密文信息。
步骤S114f,手机安全模块将第一处理信息发送至用户身份识别卡,其中,第一处理信息至少包括:第三密文信息。
步骤S115f,用户身份识别卡接收到第一处理信息后,通过用户身份识别卡端的协商密钥对第三密文信息进行解密,获得待传输信息。
步骤S116f,用户身份识别卡对待传输信息进行签名,获得第二签名信息。
步骤S117f,用户身份识别卡通过用户身份识别卡端的协商密钥对第二签名信息进行加密,获得第四密文信息,以及对第四密文信息进行校验计算,获得第一校验信息。
步骤S118f,用户身份识别卡将第二处理信息发送至手机安全模块,其中,第二处理信息至少包括:第四密文信息和第一校验信息。
步骤S119f,手机安全模块接收到第二处理信息后,通过手机安全模块端的协商密钥对第二处理信息进行验证。
步骤S120f,如果手机安全模块对第二处理信息验证通过,则通过手机安全模块端的协商密钥对第四密文信息进行解密,获得第二签名信息。
步骤S121f,手机安全模块至少将第二签名信息外发。
方式七
步骤S112g,手机安全模块获取待传输信息。
步骤S113g,手机安全模块通过手机安全模块端的协商密钥对待传输信息进行校验计算,获得第一校验信息。
步骤S114g,手机安全模块将第一处理信息发送至用户身份识别卡,其中,第一处理信息至少包括:待传输信息和第一校验信息。
步骤S115g,用户身份识别卡接收到第一处理信息后,通过用户身份识别卡端的协商密钥对第一处理信息进行验证。
步骤S116g,如果用户身份识别卡对第一处理信息验证通过,则用户身份识别卡对待传输信息进行签名,获得第二签名信息。
步骤S117g,用户身份识别卡通过用户身份识别卡端的协商密钥对第二签名信息进行加密,获得第四密文信息,以及对第四密文信息进行校验计算,获得第二校验信息。
步骤S118g,用户身份识别卡将第二处理信息发送至手机安全模块,其中,第二处理信息至少包括:第四密文信息和第二校验信息。
步骤S119g,手机安全模块接收到第二处理信息后,通过手机安全模块端的协商密钥对第二处理信息进行验证。
步骤S120g,如果手机安全模块对第二处理信息验证通过,则通过手机安全模块端的协商密钥对第四密文信息进行解密,获得第二签名信息。
步骤S121g,手机安全模块至少将第二签名信息外发。
方式八
步骤S112h,手机安全模块获取待传输信息。
步骤S113h,手机安全模块通过手机安全模块端的协商密钥对待传输信息进行加密,获得第三密文信息。
步骤S114h,手机安全模块将第一处理信息发送至用户身份识别卡,其中,第一处理信息至少包括:第三密文信息。
步骤S115h,用户身份识别卡接收到第一处理信息后,通过用户身份识别卡端的协商密钥对第三密文信息进行解密,获得待传输信息。
步骤S116h,用户身份识别卡对待传输信息进行签名,获得第二签名信息。
步骤S117h,用户身份识别卡通过用户身份识别卡端的协商密钥对第二签名信息进行校验计算,获得第一校验信息。
步骤S118h,用户身份识别卡将第二处理信息发送至手机安全模块,其中,第二处理信息至少包括:第二签名信息和第一校验信息。
步骤S119h,手机安全模块接收到第二处理信息后,通过手机安全模块端的协商密钥对第二处理信息进行验证。
步骤S120h,如果手机安全模块对第二处理信息验证通过,则手机安全模块至少将第二签名信息外发。
方式九
步骤S112i,手机安全模块获取待传输信息。
步骤S113i,手机安全模块通过手机安全模块端的协商密钥对待传输信息进行加密,获得第三密文信息,以及对第三密文信息进行校验计算,获得第一校验信息。
步骤S114i,手机安全模块将第一处理信息发送至用户身份识别卡,其中,第一处理信息至少包括:第三密文信息和第一校验信息。
步骤S115i,用户身份识别卡接收到第一处理信息后,通过用户身份识别卡端的协商密钥对第一处理信息进行验证。
步骤S116i,如果用户身份识别卡对第一处理信息验证通过,则用户身份识别卡通过用户身份识别卡端的协商密钥对第三密文信息进行解密,获得待传输信息。
步骤S117i,用户身份识别卡对待传输信息进行签名,获得第二签名信息。
步骤S118i,用户身份识别卡通过用户身份识别卡端的协商密钥对第二签名信息进行加密,获得第四密文信息。
步骤S119i,用户身份识别卡将第二处理信息发送至手机安全模块,其中,第二处理信息至少包括:第四密文信息。
步骤S120i,手机安全模块通过手机安全模块端的协商密钥对第四密文信息进行解密,获得第二签名信息。
步骤S121i,手机安全模块至少将第二签名信息外发。
当然,以上方式一至方式九中,对于对每个对密文信息进行校验计算的步骤,均可以采用对密文信息的原文进行校验计算来替代,在获得校验信息和密文信息后,均先行解密获得密文信息的原文,再进行校验信息的验证。只要可以保证密文信息或者密文信息的原文无法被篡改即可。
由此可见,通过本发明的基于协商密钥的数据处理方法,可以使得手机能够安全执行网上银行业务和/或机密信息传输。
另外,在上述任一方式中,在手机安全模块获取待传输信息的步骤之后,在手机安全模块将第一处理信息发送至用户身份识别卡的步骤之前,基于协商密钥的数据处理方法还包括如下步骤S1121-步骤S1124。
步骤S1121,手机安全模块提取待传输信息中的关键信息。
具体的,手机安全模块将会提取待传输信息中的关键信息,以显示给用户确认是否是该信息。例如:
如果本发明应用于机密信息安全传输中,则手机安全模块可以提取机密信息中的文件名等关键信息,以便用户确认是否需要提取该机密文件进行安全输出。
如果本发明应用于网上银行业务中,则手机安全模块可以提取交易信息中的关键信息,例如交易账号和交易金额等关键信息,以便用户确认该笔交易是否为真实的交易。
步骤S1122,手机安全模块控制手机显示屏显示提取出的待传输信息中的关键信息。
具体的,手机安全模块控制手机的显示屏显示提取出来的关键信息,以便用户确认关键信息的真实性,从而保证待传输信息的真实性。另外,通过手机安全模块控制手机的显示屏显示提取出的关键信息,还可以防止通过手机CPU控制手机显示屏显示关键信息可能被篡改的问题,保证通过手机安全模块控制显示的内容为真实的内容,提高安全性。
步骤S1123,手机安全模块接收手机键盘输出的确认指令。
具体的,当用户确认手机显示屏显示的关键信息无误后,按下手机上的确认键,该确认键可以为手机上设置的硬件按键,也可以为触屏手机的虚拟按键,在手机安全模块接收到手机键盘输出的确认指令后,确认待传输信息的真实性,做好后续安全传输的准备。
步骤S1124,在手机安全模块接收到手机键盘输出的确认指令后,执行手机安全模块将第一处理信息发送至用户身份识别卡的步骤。
具体的,只有经过用户按键确认的待传输信息才被认为是真实的待传输信息,保证了待传输信息的真实性,从而提高了机密信息输出的真实性,和交易信息输出的安全性。
当然,本发明实施例1还可以提供一种手机,该手机采用实施例1提供的基于协商密钥的数据处理方法,本发明实施例1的手机至少包括:手机安全模块以及用户身份识别卡;其中,手机安全模块和用户身份识别卡均可以划分为收发单元、加解密单元、计算单元、生成单元、签名单元等模块的任意模块和/或任意组合以完成相应的功能,在此不再一一赘述。
实施例2
本实施例2与实施例1的区别在于手机安全模块与用户身份识别卡之间的认证过程以及密钥生成过程为相反的过程,在此不再一一赘述,仅对本实施例2提供的基于协商密钥的数据处理方法进行简单说明。
图2出示本发明实施例2提供的基于协商密钥的数据处理方法的流程图,参见图2,本发明实施例2的基于协商密钥的数据处理方法,包括以下步骤S201-步骤S211。
步骤S201,用户身份识别卡获取手机安全模块的标识信息。
步骤S202,用户身份识别卡在获取到手机安全模块的标识信息后,根据预设的第一公钥计算算法以及手机安全模块的标识信息计算得到手机安全模块的公钥。
步骤S203,用户身份识别卡获取第一随机因子,根据第一随机因子生成用户身份识别卡端的协商密钥。
步骤S204,用户身份识别卡在获取到第一随机因子后,根据手机安全模块的公钥对第一随机因子进行加密计算,获得第一密文信息。
步骤S205,用户身份识别卡在获得第一密文信息后,根据用户身份识别卡的私钥对第一密文信息进行签名,获得第一签名信息,并将第一签名信息发送至手机安全模块。
步骤S206,手机安全模块获取用户身份识别卡的标识信息。
步骤S207,手机安全模块在获取到用户身份识别卡的标识信息后,根据预设的第二公 钥计算算法以及用户身份识别卡的标识信息计算得到用户身份识别卡的公钥。
步骤S208,手机安全模块在接收到第一签名信息后,根据用户身份识别卡的公钥对第一签名信息进行验证。
步骤S209,手机安全模块在验证第一签名信息通过后,根据手机安全模块的私钥对第一密文信息进行解密,获得第一随机因子。
步骤S210,手机安全模块根据第一随机因子生成手机安全模块端的协商密钥。
步骤S211,手机安全模块与用户身份识别卡之间通过手机安全模块端的协商密钥以及用户身份识别卡端的协商密钥进行信息的安全传输。
由此可见,通过本发明的基于协商密钥的数据处理方法,可以使得手机能够安全执行网上银行业务和/或机密信息传输。
其中,在步骤S211中,手机安全模块与用户身份识别卡之间通过手机安全模块端的协商密钥以及用户身份识别卡端的协商密钥进行信息的安全传输的过程与实施例1相同,在此不再赘述。
当然,本发明实施例2也可以提供一种手机,该手机采用实施例2提供的基于协商密钥的数据处理方法,本发明实施例2的手机至少包括:手机安全模块以及用户身份识别卡;其中,手机安全模块和用户身份识别卡均可以划分为收发单元、加解密单元、计算单元、生成单元、签名单元等模块的任意模块和/或任意组合以完成相应的功能,在此不再一一赘述。
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本发明的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本发明的实施例所属技术领域的技术人员所理解。
应当理解,本发明的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中, 该程序在执行时,包括方法实施例的步骤之一或其组合。
此外,在本发明各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。
上述提到的存储介质可以是只读存储器,磁盘或光盘等。
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不一定指的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。
尽管上面已经示出和描述了本发明的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本发明的限制,本领域的普通技术人员在不脱离本发明的原理和宗旨的情况下在本发明的范围内可以对上述实施例进行变化、修改、替换和变型。本发明的范围由所附权利要求及其等同限定。

Claims (11)

  1. 一种基于协商密钥的数据处理方法,其特征在于,包括:
    手机安全模块获取所述用户身份识别卡的标识信息;
    所述手机安全模块在获取到所述用户身份识别卡的标识信息后,根据预设的第一公钥计算算法以及所述用户身份识别卡的标识信息计算得到用户身份识别卡的公钥;
    所述手机安全模块获取第一随机因子,根据所述第一随机因子生成所述手机安全模块端的协商密钥;
    所述手机安全模块在获取到所述第一随机因子后,根据所述用户身份识别卡的公钥对所述第一随机因子进行加密计算,获得第一密文信息;
    所述手机安全模块在获得所述第一密文信息后,根据所述手机安全模块的私钥对所述第一密文信息进行签名,获得第一签名信息,并将所述第一签名信息发送至用户身份识别卡;
    所述用户身份识别卡获取所述手机安全模块的标识信息;
    所述用户身份识别卡在获取到所述手机安全模块的标识信息后,根据预设的第二公钥计算算法以及所述手机安全模块的标识信息计算得到手机安全模块的公钥;
    所述用户身份识别卡在接收到所述第一签名信息后,根据所述手机安全模块的公钥对所述第一签名信息进行验证;
    所述用户身份识别卡在验证所述第一签名信息通过后,根据所述用户身份识别卡的私钥对所述第一密文信息进行解密,获得所述第一随机因子;
    所述用户身份识别卡根据所述第一随机因子生成所述用户身份识别卡端的协商密钥;
    所述手机安全模块与所述用户身份识别卡之间通过所述手机安全模块端的协商密钥以及所述用户身份识别卡端的协商密钥进行信息的安全传输。
  2. 一种基于协商密钥的数据处理方法,其特征在于,包括:
    用户身份识别卡获取所述手机安全模块的标识信息;
    所述用户身份识别卡在获取到所述手机安全模块的标识信息后,根据预设的第一公钥计算算法以及所述手机安全模块的标识信息计算得到手机安全模块的公钥;
    所述用户身份识别卡获取第一随机因子,根据所述第一随机因子生成所述用户身份识别卡端的协商密钥;
    所述用户身份识别卡在获取到所述第一随机因子后,根据所述手机安全模块的公钥对所述第一随机因子进行加密计算,获得第一密文信息;
    所述用户身份识别卡在获得所述第一密文信息后,根据所述用户身份识别卡的私钥对 所述第一密文信息进行签名,获得第一签名信息,并将所述第一签名信息发送至手机安全模块;
    所述手机安全模块获取所述用户身份识别卡的标识信息;
    所述手机安全模块在获取到所述用户身份识别卡的标识信息后,根据预设的第二公钥计算算法以及所述用户身份识别卡的标识信息计算得到用户身份识别卡的公钥;
    所述手机安全模块在接收到所述第一签名信息后,根据所述用户身份识别卡的公钥对所述第一签名信息进行验证;
    所述手机安全模块在验证所述第一签名信息通过后,根据手机安全模块的私钥对所述第一密文信息进行解密,获得所述第一随机因子;
    所述手机安全模块根据所述第一随机因子生成所述手机安全模块端的协商密钥;
    所述手机安全模块与所述用户身份识别卡之间通过所述手机安全模块端的协商密钥以及所述用户身份识别卡端的协商密钥进行信息的安全传输。
  3. 根据权利要求1或2所述的方法,其特征在于,所述手机安全模块与所述用户身份识别卡之间通过所述手机安全模块端的协商密钥以及所述用户身份识别卡端的协商密钥进行信息的安全传输的步骤包括:
    所述手机安全模块获取待传输信息;
    所述手机安全模块通过所述手机安全模块端的协商密钥对所述待传输信息进行加密,获得第三密文信息;
    所述手机安全模块将第一处理信息发送至所述用户身份识别卡,其中,所述第一处理信息至少包括:所述第三密文信息;
    所述用户身份识别卡接收到所述第一处理信息后,通过所述用户身份识别卡端的协商密钥对所述第三密文信息进行解密,获得待传输信息;
    所述用户身份识别卡对所述待传输信息进行签名,获得第二签名信息。
  4. 根据权利要求1或2所述的方法,其特征在于,所述手机安全模块与所述用户身份识别卡之间通过所述手机安全模块端的协商密钥以及所述用户身份识别卡端的协商密钥进行信息的安全传输的步骤包括:
    所述手机安全模块获取待传输信息;
    所述手机安全模块通过所述手机安全模块端的协商密钥对所述待传输信息进行校验计算,获得第一校验信息;
    所述手机安全模块将第一处理信息发送至所述用户身份识别卡,其中,所述第一处理信息至少包括:所述待传输信息和所述第一校验信息;
    所述用户身份识别卡接收到所述第一处理信息后,通过所述用户身份识别卡端的协商 密钥对所述第一处理信息进行验证;
    如果所述用户身份识别卡对所述第一处理信息验证通过,则所述用户身份识别卡对所述待传输信息进行签名,获得第二签名信息。
  5. 根据权利要求1或2所述的方法,其特征在于,所述手机安全模块与所述用户身份识别卡之间通过所述手机安全模块端的协商密钥以及所述用户身份识别卡端的协商密钥进行信息的安全传输的步骤包括:
    所述手机安全模块获取待传输信息;
    所述手机安全模块通过所述手机安全模块端的协商密钥对所述待传输信息进行加密,获得第三密文信息,以及对所述第三密文信息进行校验计算,获得第一校验信息;
    所述手机安全模块将第一处理信息发送至所述用户身份识别卡,其中,所述第一处理信息至少包括:所述第三密文信息和所述第一校验信息;
    所述用户身份识别卡接收到所述第一处理信息后,通过所述用户身份识别卡端的协商密钥对所述第一处理信息进行验证;
    如果所述用户身份识别卡对所述第一处理信息验证通过,则所述用户身份识别卡通过所述用户身份识别卡端的协商密钥对所述第三密文信息进行解密,获得所述待传输信息;
    所述用户身份识别卡对所述待传输信息进行签名,获得第二签名信息。
  6. 根据权利要求3至5任一项所述的方法,其特征在于,在所述用户身份识别卡对所述待传输信息进行签名,获得第二签名信息的步骤之后,所述方法还包括:
    所述用户身份识别卡通过所述用户身份识别卡端的协商密钥对所述第二签名信息进行加密,获得第四密文信息;
    所述用户身份识别卡将第二处理信息发送至所述手机安全模块,其中,所述第二处理信息至少包括:所述第四密文信息;
    所述手机安全模块接收到所述第二处理信息后,通过所述手机安全模块端的协商密钥对所述第四密文信息进行解密,获得所述第二签名信息;
    所述手机安全模块至少将所述第二签名信息外发;或者
    所述用户身份识别卡通过所述用户身份识别卡端的协商密钥对所述第二签名信息进行校验计算,获得第二校验信息;
    所述用户身份识别卡将第二处理信息发送至所述手机安全模块,其中,所述第二处理信息至少包括:所述第二签名信息和所述第二校验信息;
    所述手机安全模块接收到所述第二处理信息后,通过所述手机安全模块端的协商密钥对所述第二处理信息进行验证;
    如果所述手机安全模块对所述第二处理信息验证通过,则所述手机安全模块至少将所 述第二签名信息外发;或者
    所述用户身份识别卡通过所述用户身份识别卡端的协商密钥对所述第二签名信息进行加密,获得第四密文信息,以及对所述第四密文信息进行校验计算,获得第二校验信息;
    所述用户身份识别卡将第二处理信息发送至所述手机安全模块,其中,所述第二处理信息至少包括:所述第四密文信息和所述第二校验信息;
    所述手机安全模块接收到所述第二处理信息后,通过所述手机安全模块端的协商密钥对所述第二处理信息进行验证;
    如果所述手机安全模块对所述第二处理信息验证通过,则通过所述手机安全模块端的协商密钥对所述第四密文信息进行解密,获得所述第二签名信息;
    所述手机安全模块至少将所述第二签名信息外发。
  7. 根据权利要求3至6任一项所述的方法,其特征在于,在所述手机安全模块获取待传输信息的步骤之后,在所述手机安全模块将第一处理信息发送至所述用户身份识别卡的步骤之前,所述方法还包括:
    所述手机安全模块提取所述待传输信息中的关键信息;
    所述手机安全模块控制手机显示屏显示所述提取出的待传输信息中的关键信息;
    所述手机安全模块接收手机键盘输出的确认指令;
    在所述手机安全模块接收到所述手机键盘输出的确认指令后,执行所述手机安全模块将第一处理信息发送至所述用户身份识别卡的步骤。
  8. 根据权利要求1至7任一项所述的方法,其特征在于,所述手机安全模块为独立于手机CPU之外的模块,或者所述手机安全模块设置在所述手机CPU中的安全区域。
  9. 根据权利要求1至8任一项所述的方法,其特征在于,所述第一公钥计算算法与第二公钥计算算法相同。
  10. 根据权利要求1至9任一项所述的方法,其特征在于,
    如果解密所述第一密文信息错误,则返回第一错误信息;
    如果解密所述第二密文信息错误,则返回第二错误信息。
  11. 一种存储介质,其特征在于,所述存储介质设置为存储应用程序,所述应用程序设置为在运行时执行如权利要求1-10任一项所述的基于协商密钥的数据处理方法。
PCT/CN2015/070913 2014-04-25 2015-01-16 一种基于协商密钥的数据处理方法 WO2015161689A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410171107.2A CN103944715B (zh) 2014-04-25 2014-04-25 一种基于协商密钥的数据处理方法
CN201410171107.2 2014-04-25

Publications (1)

Publication Number Publication Date
WO2015161689A1 true WO2015161689A1 (zh) 2015-10-29

Family

ID=51192215

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/070913 WO2015161689A1 (zh) 2014-04-25 2015-01-16 一种基于协商密钥的数据处理方法

Country Status (3)

Country Link
CN (1) CN103944715B (zh)
HK (1) HK1199979A1 (zh)
WO (1) WO2015161689A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115118439A (zh) * 2022-08-29 2022-09-27 北京智芯微电子科技有限公司 终端数字身份的校验方法及系统

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103944715B (zh) * 2014-04-25 2017-09-19 天地融科技股份有限公司 一种基于协商密钥的数据处理方法
CN105989476A (zh) * 2014-11-07 2016-10-05 天地融科技股份有限公司 数据交互方法
CN110458551A (zh) * 2014-11-07 2019-11-15 天地融科技股份有限公司 数据交互系统
CN105991533A (zh) * 2014-11-07 2016-10-05 天地融科技股份有限公司 数据交互方法
CN105989477A (zh) * 2014-11-07 2016-10-05 天地融科技股份有限公司 数据交互方法
CN105812334B (zh) * 2014-12-31 2019-02-05 北京华虹集成电路设计有限责任公司 一种网络认证方法
CN105991535A (zh) * 2015-02-03 2016-10-05 天地融科技股份有限公司 数据交互方法
CN106067874B (zh) * 2016-05-20 2019-07-12 深圳市金立通信设备有限公司 一种将数据记录至服务器端的方法、终端和服务器
CN109068321B (zh) * 2018-07-19 2021-07-02 飞天诚信科技股份有限公司 协商会话密钥的方法、系统、移动终端及智能家居设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989991A (zh) * 2010-11-24 2011-03-23 北京天地融科技有限公司 安全导入密钥的方法及电子签名工具、认证设备及系统
CN103188215A (zh) * 2011-12-27 2013-07-03 上海博泰悦臻电子设备制造有限公司 电子银行的安全管理方法及服务终端、电子银行系统
CN103747443A (zh) * 2013-11-29 2014-04-23 厦门盛华电子科技有限公司 一种基于手机用户识别卡多安全域装置及其鉴权方法
CN103746802A (zh) * 2014-01-27 2014-04-23 天地融科技股份有限公司 一种基于协商密钥的数据处理方法和手机
CN103944715A (zh) * 2014-04-25 2014-07-23 天地融科技股份有限公司 一种基于协商密钥的数据处理方法

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100484036C (zh) * 2006-09-28 2009-04-29 北京理工大学 通过相邻监督对网络非法节点进行检测的方法
CN101296107B (zh) * 2007-04-27 2012-03-28 上海贝尔阿尔卡特股份有限公司 通信网络中基于身份标识加密技术的安全通信方法及装置
CN101227275A (zh) * 2008-02-13 2008-07-23 刘海云 随机加密和穷举法解密相结合的加密方法
CN101820613B (zh) * 2009-02-27 2014-03-19 中兴通讯股份有限公司 一种应用下载的系统和方法
CN101867472B (zh) * 2009-04-14 2012-07-04 航天信息股份有限公司 一种基于用户身份标识的非对称组加解密方法
CN102209066B (zh) * 2010-03-31 2015-03-11 中国移动通信集团公司 网络认证的方法和设备
KR101234784B1 (ko) * 2011-05-30 2013-02-20 삼성에스디에스 주식회사 아이디 기반 암호화 방법 및 그 장치
CN103002442A (zh) * 2012-12-20 2013-03-27 邱华 无线局域网密钥安全分发方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989991A (zh) * 2010-11-24 2011-03-23 北京天地融科技有限公司 安全导入密钥的方法及电子签名工具、认证设备及系统
CN103188215A (zh) * 2011-12-27 2013-07-03 上海博泰悦臻电子设备制造有限公司 电子银行的安全管理方法及服务终端、电子银行系统
CN103747443A (zh) * 2013-11-29 2014-04-23 厦门盛华电子科技有限公司 一种基于手机用户识别卡多安全域装置及其鉴权方法
CN103746802A (zh) * 2014-01-27 2014-04-23 天地融科技股份有限公司 一种基于协商密钥的数据处理方法和手机
CN103944715A (zh) * 2014-04-25 2014-07-23 天地融科技股份有限公司 一种基于协商密钥的数据处理方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115118439A (zh) * 2022-08-29 2022-09-27 北京智芯微电子科技有限公司 终端数字身份的校验方法及系统
CN115118439B (zh) * 2022-08-29 2023-01-20 北京智芯微电子科技有限公司 终端数字身份的校验方法及系统

Also Published As

Publication number Publication date
HK1199979A1 (zh) 2015-07-24
CN103944715B (zh) 2017-09-19
CN103944715A (zh) 2014-07-23

Similar Documents

Publication Publication Date Title
US20240007308A1 (en) Confidential authentication and provisioning
WO2015161689A1 (zh) 一种基于协商密钥的数据处理方法
WO2019233204A1 (zh) 密钥管理方法、装置、系统、存储介质和计算机设备
US9467430B2 (en) Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware
US8621210B2 (en) Ad-hoc trust establishment using visual verification
AU2019240671A1 (en) Methods for secure cryptogram generation
CN103095456B (zh) 交易报文的处理方法和系统
EP3324572B1 (en) Information transmission method and mobile device
US20200014538A1 (en) Methods and systems to facilitate authentication of a user
WO2018127081A1 (zh) 一种加密密钥获取方法及系统
WO2015135398A1 (zh) 一种基于协商密钥的数据处理方法
WO2015158172A1 (zh) 一种用户身份识别卡
CN103532719B (zh) 动态口令生成方法和系统、交易请求的处理方法和系统
WO2014107977A1 (zh) 密钥保护方法和系统
CN109150897B (zh) 一种端到端的通信加密方法及装置
CN109861813B (zh) 基于非对称密钥池的抗量子计算https通信方法和系统
JP2014517567A (ja) 疑似帯域外認証アーキテクチャを用いる鍵管理
CN104836784B (zh) 一种信息处理方法、客户端和服务器
WO2014114191A1 (zh) 一种智能卡安全通讯的方法
WO2016054905A1 (zh) 一种数据处理方法
WO2014187206A1 (zh) 一种备份电子签名令牌中私钥的方法和系统
CN114900304B (zh) 数字签名方法和装置、电子设备和计算机可读存储介质
WO2015109958A1 (zh) 一种基于协商密钥的数据处理方法和手机
CN112487380A (zh) 一种数据交互方法、装置、设备及介质
WO2015158173A1 (zh) 一种基于协商密钥的数据处理方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15783256

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15783256

Country of ref document: EP

Kind code of ref document: A1