WO2017008730A1 - 一种终端产品模式与开发模式安全切换的方法及系统 - Google Patents

一种终端产品模式与开发模式安全切换的方法及系统 Download PDF

Info

Publication number
WO2017008730A1
WO2017008730A1 PCT/CN2016/089765 CN2016089765W WO2017008730A1 WO 2017008730 A1 WO2017008730 A1 WO 2017008730A1 CN 2016089765 W CN2016089765 W CN 2016089765W WO 2017008730 A1 WO2017008730 A1 WO 2017008730A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
product
development
certificate
storage medium
Prior art date
Application number
PCT/CN2016/089765
Other languages
English (en)
French (fr)
Inventor
林金寒
洪逸轩
Original Assignee
福建联迪商用设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 福建联迪商用设备有限公司 filed Critical 福建联迪商用设备有限公司
Priority to EP16823877.2A priority Critical patent/EP3309702B1/en
Priority to ES16823877T priority patent/ES2937283T3/es
Publication of WO2017008730A1 publication Critical patent/WO2017008730A1/zh
Priority to US15/867,667 priority patent/US10778447B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Definitions

  • the invention relates to a method and a system for safely switching between a terminal product mode and a development mode.
  • any device needs to go through the development process before it can be released as a formal product.
  • the distinction between development stage and product stage is particularly important; if the POS terminal equipment still in the development stage is erroneously circulated as a formal product, the POS terminal will be present. Larger security risks seriously affect the normal use of POS terminals, and the interests of users and operators cannot be guaranteed. Therefore, the distinction between the development mode and the product mode of the terminal device is realized, and the actual development and the authority of the actual product are separated, and the security of the terminal device is improved.
  • the patent application file of the application No. 201210322713.0 provides a method for switching a working mode of a terminal and a terminal; and detecting whether the terminal meets a preset working mode switching condition, and when satisfied, switching the terminal from the first working mode to the second working Mode; implements receiving processing of paging messages.
  • the above application file is not an improvement of the security performance requirements of the terminal, and only provides switching of one of the message receiving working modes in the working state of the terminal, and the problem solved is not to improve the security performance of the terminal device. Therefore, it is necessary to provide a method and system for securely switching between a terminal product mode and a development mode in response to the above problems.
  • the technical problem to be solved by the present invention is to provide a method and system for securely switching between a terminal product mode and a development mode, thereby realizing the separation of the terminal development mode and the product mode, avoiding the terminal in the development stage being used in the market, and avoiding the terminal possibility There are security risks.
  • the first technical solution adopted by the present invention is:
  • a method for securely switching between a terminal product mode and a development mode characterized in that it comprises:
  • Pre-set product CA and development CA preset product CA and development CA in the terminal;
  • the flag bits in the internal FLASH of the preset terminal correspond to the product status and the development status respectively;
  • the first encryptor generates a product public-private key pair; the second encryptor generates a development public-private key pair;
  • the host computer sends a CA state switching instruction to the terminal;
  • the terminal sends the current state to the upper computer according to the flag bit
  • the host computer reads the private key and certificate stored in a secure storage medium
  • the host computer sends the certificate to the terminal
  • the terminal verifies the validity of the certificate by using the CA corresponding to the current state, and obtains a fifth verification result
  • the terminal verifies the legality of the private key, and obtains a sixth verification result
  • a system for securely switching between a terminal product mode and a development mode characterized in that it comprises:
  • the preset module is configured to preset the product CA and the development CA, and the flag bits in the internal FLASH of the preset terminal respectively correspond to the product status and the development status;
  • a preset module for presetting the product CA and the development CA in the terminal
  • An encryption module configured to generate a product public-private key pair using the first encryption machine, and generate a development public-private key pair using the second encryption machine;
  • An issuance module for issuing a product certificate containing the product public key using a product CA; and using a development CA to issue a development certificate including the development public key;
  • a storage module configured to store the product certificate and a product private key in a product security storage medium; storing the development certificate and the development private key in a development security storage medium;
  • a first sending module configured to send, by the host computer, a CA state switching instruction to the terminal
  • a second sending module configured to send, by the terminal, the current state to the upper computer according to the flag bit
  • a reading module configured to read, by the host computer, a private key and a certificate stored in a secure storage medium
  • a third sending module configured to send, by the host computer, the certificate to the terminal
  • a first verification module configured to verify, by using a CA corresponding to the current state, the validity of the certificate, to obtain a fifth verification result
  • a second verification module configured to verify validity of the private key by the terminal, to obtain a sixth verification result
  • a first determining module configured to: if the fifth verification result and the sixth verification result are both legal, determining that the secure storage medium corresponds to a current state of the terminal;
  • a formatting module for formatting a key storage area of the terminal
  • the switching module is configured to rewrite the flag bit and switch the terminal to another state.
  • the invention has the beneficial effects that the present invention configures different CA certificate management institutions corresponding to terminals at different stages to realize the actual development of the terminal and the separation of the rights of the actual products; and the public and private key pairs issued by different CAs are stored in different secure storages.
  • the secure storage medium corresponding to the current CA state of the terminal can successfully rewrite the flag of the terminal after passing the legality verification; realize the secure switching of the different CA states of the terminal, ensuring that the terminal in the test development stage is even wrong. After being circulated as a formal product, it cannot be used normally, so that the interests of users and operators can be guaranteed and the security of terminal equipment can be improved.
  • FIG. 1 is a flow chart showing a method for securely switching between a terminal product mode and a development mode according to the present invention
  • FIG. 2 is a data interaction diagram between a terminal and a host computer in a method for securely switching between a terminal product mode and a development mode according to an embodiment of the present invention
  • FIG. 3 is a block diagram showing the structure of a system for securely switching between a terminal product mode and a development mode
  • FIG. 4 is a block diagram showing the structure of a first verification module in a system for securely switching between a terminal product mode and a development mode according to an embodiment of the present invention.
  • the third sending module 10, the first verifying module; 11, the second verifying module;
  • a first decision module 13. a formatting module; 14. a switching module;
  • 101 a signature unit
  • 102 a sending unit
  • 103 a verification unit.
  • the most critical idea of the present invention is to configure different CA certificate management institutions for terminals at different stages; store the public and private key pairs of certificates issued by different CAs in different secure storage media, and only use the current CA state of the corresponding terminal. After the security storage medium passes the legality verification, the flag of the terminal can be successfully rewritten; the secure switching of different CAs of the terminal is implemented.
  • the present invention provides a method for securely switching between a terminal product mode and a development mode, including:
  • Pre-set product CA and development CA preset product CA and development CA in the terminal;
  • the flag bits in the internal FLASH of the preset terminal correspond to the product status and the development status respectively;
  • the first encryptor generates a product public-private key pair; the second encryptor generates a development public-private key pair;
  • the host computer sends a CA state switching instruction to the terminal;
  • the terminal sends the current state to the upper computer according to the flag bit
  • the host computer reads the private key and certificate stored in a secure storage medium
  • the host computer sends the certificate to the terminal
  • the terminal verifies the validity of the certificate by using the CA corresponding to the current state, and obtains a fifth verification result
  • the terminal verifies the legality of the private key, and obtains a sixth verification result
  • the flag bit can be expressed in four bytes, for example, when the data is 0xFFFFFF, the product mode, when the data is 0xABABABAB, the current development mode; the FLASH characteristic is written as 0xFF after erasing, and the default state is the product state. Effect.
  • the key information storage area of the terminal can be formatted to clear the sensitive information of the current state of the terminal. For example, before switching to the development mode, the information such as the key and certificate corresponding to the product status is cleared to prevent the product. Sensitive information of the status is misused in the development state to improve terminal security.
  • the beneficial effects of the present invention are: the development of the CA and the product CA in the development phase and the product phase of the present invention; and the corresponding certificate and the public and private keys are respectively stored in the development security storage medium and the product security storage medium; After the certificate and public-private key in the secure storage medium are verified by the terminal to verify the validity of the host, the terminal can be successfully switched. Ensure the security of the terminal.
  • the “using the product CA to issue a product certificate containing the product public key; using the development CA to issue a development certificate including the development public key” is specifically:
  • the product public key is signed using the product root private key in the product CA to generate a product certificate signature
  • the development public key is signed using the development root private key in the development CA to generate a development certificate signature
  • the present invention is equipped with a special product CA for the terminal in the product stage, and the corresponding product public and private key pair is issued by the product CA; a special development CA is provided for the terminal in the development stage, and the corresponding product is issued by the development CA. Public-private key pair; to achieve the essential distinction between the terminal in the development phase and the terminal in the product phase.
  • terminal sends the current state to the upper computer according to the flag bit”, specifically:
  • the terminal sends the current state and the first random number to the upper computer according to the flag bit.
  • the terminal uses the CA corresponding to the current state to verify the validity of the certificate, and obtains a fifth verification result; the terminal verifies the validity of the private key, and obtains a sixth verification result; if the fifth verification result and the first If the verification result is legal, it is determined that the one of the secure storage medium corresponds to the current state of the terminal.
  • the upper computer signs the first random number by using the private key, and generates a first random number after signature
  • the terminal verifies the certificate signature in the certificate by using the CA corresponding to the current state;
  • the first random number after the signature is checked using the public key in the certificate
  • the present invention uses the CA corresponding to the current state of the terminal to verify the validity of the certificate and the private key in the secure storage medium, thereby realizing the authority verification of the terminal to the upper computer; and ensuring the reliability of the verification process.
  • the method further includes:
  • the terminal acquires the input PIN code; sends the PIN code to the secure storage medium;
  • the secure storage medium verifies the correctness of the PIN code
  • the "private machine reads a private key and a certificate stored in a secure storage medium" is executed.
  • the present invention can preset the PIN code corresponding to the secure storage medium, and after the upper computer is connected to the secure storage medium, the PIN code is required to be verified; the legality verification of the media owner and the secure storage medium is implemented to ensure secure storage.
  • the media is used by legitimate people to improve the security of terminal state switching.
  • the secure storage medium is an IC card or a U-key.
  • the secure storage medium can exist in the form of an IC card or a U-key, which is convenient for the user to use and has high security storage performance.
  • the second technical solution provided by the present invention is:
  • a system for securely switching between a terminal product mode and a development mode comprising:
  • the preset module 1 is configured to preset the product CA and the development CA, and the flag bits in the internal FLASH of the preset terminal respectively correspond to the product status and the development status;
  • a preset module 2 configured to preset the product CA and the development CA in the terminal
  • the encryption module 3 is configured to generate a product public-private key pair by using the first encryption machine, and generate a development public-private key pair by using the second encryption machine;
  • a storage module 5 configured to store the product certificate and a product private key in a product security storage medium; storing the development certificate and the development private key in a development security storage medium;
  • the first sending module 6 is configured to send, by the host computer, a CA state switching instruction to the terminal;
  • the second sending module 7 is configured to send, by the terminal, the current state to the upper computer according to the flag bit;
  • the reading module 8 is configured to read, by the host computer, a private key and a certificate stored in a secure storage medium;
  • a third sending module 9 is configured to send, by the host computer, the certificate to the terminal;
  • the first verification module 10 is configured to verify, by the terminal, the validity of the certificate by using a CA corresponding to the current state, to obtain a fifth verification result;
  • the second verification module 11 is configured to verify validity of the private key by the terminal, and obtain a sixth verification result
  • the first determining module 12 is configured to: if the fifth verification result and the sixth verification result are both legal, determine that the secure storage medium corresponds to a current state of the terminal;
  • a formatting module 13 for formatting a key storage area of the terminal
  • the switching module 14 is configured to rewrite the flag bit and switch the terminal to another state.
  • the present invention has the beneficial effects that the present invention can read the certificate and the private key in the secure storage medium through the host computer, and interact with the terminal to complete the secure handover of the terminal state.
  • the system for securely switching between the terminal product mode and the development mode includes a host computer, a terminal, and a secure storage medium;
  • the host computer includes a first sending module 6, a reading module 8, and a third sending module 9;
  • the second sending module 7, the first verifying module 10, the second verifying module 11, the first determining module 12, the formatting module 13, and the switching module 14 are included.
  • the second sending module 7 is specifically configured to send, by the terminal, the current state and the first random number to the upper computer according to the flag bit.
  • the first verification module 10 includes a signature unit 101, a sending unit 102, and a verification unit 103;
  • the signature unit 101 is configured to sign, by the host computer, the first random number by using the private key, and generate a first random number after signature;
  • the sending unit 102 is configured to send the first random number after the signature and the certificate to the terminal;
  • the verification unit 103 is configured to verify, by the terminal, the certificate signature in the certificate by using a CA corresponding to the current state;
  • the second verification module 11 is specifically configured to perform verification of the signed first random number by using a public key in the certificate if the verification unit 103 passes the verification;
  • the first determining module 12 is specifically configured to: when the verification unit passes the verification, determine that the secure storage medium corresponds to a current state of the terminal.
  • the first verification module 10 and the second verification module 11 can verify the validity of the certificate and the private key in the secure storage medium by using the CA corresponding to the current state of the terminal, thereby realizing the authority of the terminal to the upper computer. Verification; ensure the reliability of the verification process.
  • the secure storage medium is an IC card or a U-key.
  • the secure storage medium can exist in the form of an IC card or a U-key, which is convenient for the user to use and has high security storage performance.
  • a first embodiment of the present invention is:
  • a method for securely switching between a terminal product mode and a development mode wherein the secure storage medium is an IC sign Name card; the terminal is a POS terminal.
  • the product CA and the development CA are preset, and the product CA and the development CA are simultaneously preset in the POS terminal;
  • the development CA and the product CA may be different digital certificate authentication centers developed by different third-party organizations or companies, of course, Can be different digital certificate certification centers developed by the same organization or company;
  • the POS terminal is in the product state when the flag bit in the internal FLASH of the POS terminal is 0xFFFFFF, and the POS terminal is in the development state when the flag is 0xABABABAB.
  • the first encryptor generates a product public-private key pair; uses the product root private key in the product CA to sign the product public key, generates a product certificate signature; generates a product certificate including a product public key and a product certificate signature; and the product certificate and The product private key is stored in the product IC signature card; the PIN code corresponding to the product IC signature card is preset, and the PIN code of each IC signature card may be different;
  • the second encryptor generates a product public-private key pair; uses the development root private key in the development CA to sign the development public key, generates a development certificate signature, and generates a development certificate including a development public key and a development certificate signature;
  • the development private key is stored in the development IC signature card; the PIN code corresponding to the development IC signature card is preset;
  • the product personnel insert the product IC signature card into the IC card interface of the host computer;
  • the upper computer reads the product IC signature card and sends a CA state switching instruction to the POS terminal;
  • the POS terminal receives the CA state switching instruction, and determines whether the flag bit is 0xFFFFFFFF; if not, it determines that the POS terminal is currently in the development state, and the IC signature card is not corresponding to the current state, and the operation cannot be performed, and the process ends;
  • the POS terminal returns the current state of the upper computer and the first random number
  • the host computer receives the status reply of the POS terminal and the first random number, and prompts to input the PIN code;
  • the host computer receives the PIN code input by the product personnel, and verifies whether the PIN code is consistent with the preset PIN code through the product IC signature card; if not, the PIN code is incorrect, and the process ends;
  • the upper computer obtains the certificate and the private key stored in the product IC signature card, and uses the private key to sign the first random number rng1 to generate the first random number E (rng1) after the signature;
  • the host computer sends the signed first random number E (rng1) and the product certificate to the POS terminal;
  • the POS terminal uses the product public key Puk in the product certificate to check the signed first random number E(rng1);
  • the product security storage medium is determined to be a legal product security storage medium.
  • the flow required to switch the POS terminal from the development state to the product state is consistent with the flow required to switch the product state to the development state. Repeated.
  • the second embodiment of the present invention provides:
  • a system for securely switching between a terminal product mode and a development mode comprising:
  • the preset module 1 is configured to preset the product CA and the development CA, and the flag bits in the internal FLASH of the preset terminal respectively correspond to the product status and the development status;
  • a preset module 2 configured to preset the product CA and the development CA in the terminal
  • the encryption module 3 is configured to generate a product public-private key pair by using the first encryption machine, and generate a development public-private key pair by using the second encryption machine;
  • a storage module 5 configured to store the product certificate and a product private key in a product security storage medium; storing the development certificate and the development private key in a development security storage medium;
  • the first sending module 6 is configured to send, by the host computer, a CA state switching instruction to the terminal;
  • the second sending module 7 is configured to send, by the terminal, the current state and the first random number to the upper computer according to the flag bit;
  • the reading module 8 is configured to read, by the host computer, a private key and a certificate stored in a secure storage medium;
  • a third sending module 9 is configured to send, by the host computer, the certificate to the terminal;
  • the first verification module 10 is configured to verify the validity of the certificate by using the CA corresponding to the current state, and obtain a fifth verification result.
  • the first verification module 10 includes a signature unit 101, a sending unit 102, and a verification unit. 103;
  • the signature unit 101 is configured to sign, by the host computer, the first random number by using the private key, and generate a first random number after signature;
  • the sending unit 102 is configured to send the first random number after the signature and the certificate to the terminal;
  • the verification unit 103 is configured to verify, by the terminal, the certificate signature in the certificate by using a CA corresponding to the current state;
  • the second verification module 11 is configured to perform verification on the signed first random number by using the public key in the certificate if the verification unit 103 passes the verification;
  • the first determining module 12 is configured to: when the verification unit passes the verification, determine that the secure storage medium corresponds to a current state of the terminal;
  • a formatting module 13 for formatting a key storage area of the terminal
  • the switching module 14 is configured to rewrite the flag bit and switch the terminal to another state.
  • the method and system for securely switching between a terminal product mode and a development mode provided by the present invention are different from the prior art in that the terminal cannot be differentiated in essence at different stages, which may result in an accidental inflow of the terminal of the test development version.
  • the use of the market has the problem of security risks; the present invention corresponds to different CA certificate management organizations at different stages; the public and private key pairs issued by different CAs are stored in different secure storage media, and only the corresponding terminal is currently used.
  • the secure storage medium of the CA state can successfully rewrite the flag of the terminal after passing the legality verification; realize the secure switching of different CAs of the terminal; realize the switching of the terminal state through the interaction between the terminal and the upper computer, and ensure that the terminal without interface configuration still It can realize the security switching of different states; at the same time, it also includes the identity verification of the operation performer of the state switching to ensure the legitimacy of the operation performer; further, it can also set different priority levels for different states of the terminal to achieve security, Fast switching.

Abstract

一种终端产品模式与开发模式安全切换的方法及系统,解决现有技术可能导致测试开发版本的终端意外流入市场使用,存在安全隐患的问题;方法对应处于不同阶段的终端配置不同的CA证书管理机构;将不同CA颁发的证书公私钥对存储在不同的安全存储介质中,只有使用对应终端当前所处CA状态的安全存储介质在通过合法性验证后,才能成功改写终端的标志位;实现终端不同CA状态的安全切换,确保处于测试开发阶段的终端即使错误地以正式产品身份流通出去后,也无法正常地被使用,使用户和运营商的利益得到保证,提高终端设备的安全性,实现安全、快速的切换。

Description

一种终端产品模式与开发模式安全切换的方法及系统 技术领域
本发明涉及一种终端产品模式与开发模式安全切换的方法及系统。
背景技术
任何设备都需要经历开发过程,才能作为正式的产品发布。特别是针对有安全性能要求的特殊终端设备,如POS终端,开发阶段和产品阶段的区分显得格外重要;若将还处于开发阶段的POS终端设备错误的以正式产品流通出去,将导致POS终端存在较大的安全隐患,严重影响POS终端的正常使用,用户和运营商的利益也无法得到保证。因此,实现终端设备的开发模式和产品模式的区分,将实际开发和实际产品的权限分离,将提高终端设备的安全性。
申请号为201210322713.0的专利申请文件,提供一种终端的工作模式切换方法及终端;通过检测终端是否满足预设工作模式切换条件,当满足时,则将终端从第一工作模式切换至第二工作模式;实现寻呼消息的接收处理。
上述申请文件并非出于终端的安全性能要求实现的改进,且仅提供终端工作状态中的其中一种消息接收工作模式的切换,所解决的问题并非提高终端设备的安全性能。因此,有必要针对上述问题,提供一种终端产品模式与开发模式安全切换的方法及系统。
发明内容
本发明所要解决的技术问题是:提供一种终端产品模式与开发模式安全切换的方法及系统,实现终端开发模式和产品模式的分离,避免处于开发阶段的终端流入市场中被使用,规避终端可能存在的安全隐患。
为了解决上述技术问题,本发明采用的第一个技术方案为:
一种终端产品模式与开发模式安全切换的方法,其特征在于,包括:
预设产品CA和开发CA;将产品CA和开发CA预置在终端中;
预设终端内部FLASH中的标志位分别对应产品状态和开发状态;
第一加密机生成产品公私钥对;第二加密机生成开发公私钥对;
使用产品CA颁发包含所述产品公钥的产品证书;使用开发CA颁发包含所述开发公钥的开发证书;
将所述产品证书和产品私钥存储在产品安全存储介质中;将所述开发证书和开发私钥存储在开发安全存储介质中;
上位机发送CA状态切换指令至终端;
终端依据所述标志位发送当前所处状态至上位机;
上位机读取一安全存储介质中存储的私钥和证书;
上位机发送所述证书至终端;
终端使用当前状态对应的CA验证所述证书的合法性,得到第五验证结果;
终端验证所述私钥的合法性,得到第六验证结果;
若第五验证结果和第六验证结果均为合法,则判定所述一安全存储介质与终端当前所处状态对应;
格式化终端的密钥存储区;改写标志位,切换终端为另一状态。
本发明提供的第二个技术方案为:
一种终端产品模式与开发模式安全切换的系统,其特征在于,包括:
预设模块,用于预设产品CA和开发CA,以及预设终端内部FLASH中的标志位分别对应产品状态和开发状态;
预置模块,用于将产品CA和开发CA预置在终端中;
加密模块,用于使用第一加密机生成产品公私钥对,以及使用第二加密机生成开发公私钥对;
颁发模块,用于使用产品CA颁发包含所述产品公钥的产品证书;使用开发CA颁发包含所述开发公钥的开发证书;
存储模块,用于将所述产品证书和产品私钥存储在产品安全存储介质中;将所述开发证书和开发私钥存储在开发安全存储介质中;
第一发送模块,用于上位机发送CA状态切换指令至终端;
第二发送模块,用于终端依据所述标志位发送当前所处状态至上位机;
读取模块,用于上位机读取一安全存储介质中存储的私钥和证书;
第三发送模块,用于上位机发送所述证书至终端;
第一验证模块,用于终端使用当前状态对应的CA验证所述证书的合法性,得到第五验证结果;
第二验证模块,用于终端验证所述私钥的合法性,得到第六验证结果;
第一判定模块,用于若第五验证结果和第六验证结果均为合法,则判定所述一安全存储介质与终端当前所处状态对应;
格式化模块,用于格式化终端的密钥存储区;
切换模块,用于改写标志位,切换终端为另一状态。
本发明的有益效果在于:本发明对应处于不同阶段的终端配置不同的CA证书管理机构,实现终端实际开发和实际产品的权限分离;通过将不同CA颁发的证书公私钥对存储在不同的安全存储介质中,只有使用对应终端当前所处CA状态的安全存储介质在通过合法性验证后,才能成功改写终端的标志位;实现终端不同CA状态的安全切换,确保处于测试开发阶段的终端即使错误的以正式产品身份流通出去后,也无法正常地被使用,使用户和运营商的利益得到保证,提高终端设备的安全性。
附图说明
图1为本发明一种终端产品模式与开发模式安全切换的方法的流程方框图;
图2本发明为一具体实施方式一种终端产品模式与开发模式安全切换的方法中终端与上位机的数据交互图;
图3本发明为一种终端产品模式与开发模式安全切换的系统的结构组成方框图;
图4本发明为一具体实施方式一种终端产品模式与开发模式安全切换的系统中第一验证模块的结构组成方框图。
标号说明:
1、预设模块;2、预置模块;3、加密模块;4、颁发模块;
5、存储模块;6、第一发送模块;7、第二发送模块;8、读取模块;
9、第三发送模块;10、第一验证模块;11、第二验证模块;
12、第一判定模块;13、格式化模块;14、切换模块;
101、签名单元;102、发送单元;103、验证单元。
具体实施方式
本发明最关键的构思在于:对应处于不同阶段的终端配置不同的CA证书管理机构;将不同CA颁发的证书公私钥对存储在不同的安全存储介质中,只有使用对应终端当前所处CA状态的安全存储介质在通过合法性验证后,才能成功改写终端的标志位;实现终端不同CA的安全切换。
本发明涉及的技术术语解释:
Figure PCTCN2016089765-appb-000001
请参照图1以及图2,本发明提供一种终端产品模式与开发模式安全切换的方法,包括:
预设产品CA和开发CA;将产品CA和开发CA预置在终端中;
预设终端内部FLASH中的标志位分别对应产品状态和开发状态;
第一加密机生成产品公私钥对;第二加密机生成开发公私钥对;
使用产品CA颁发包含所述产品公钥的产品证书;使用开发CA颁发包含所 述开发公钥的开发证书;
将所述产品证书和产品私钥存储在产品安全存储介质中;将所述开发证书和开发私钥存储在开发安全存储介质中;
上位机发送CA状态切换指令至终端;
终端依据所述标志位发送当前所处状态至上位机;
上位机读取一安全存储介质中存储的私钥和证书;
上位机发送所述证书至终端;
终端使用当前状态对应的CA验证所述证书的合法性,得到第五验证结果;
终端验证所述私钥的合法性,得到第六验证结果;
若第五验证结果和第六验证结果均为合法,则判定所述一安全存储介质与终端当前所处状态对应;
格式化终端的密钥存储区;改写标志位,切换终端为另一状态。
需要说明的是,在CPU的内部FLASH中,存在一个标志用来表示终端当前是开发CA还是产品CA。所述标志位可以使用四字节表示,如当数据为0xFFFFFFFF时为产品模式,数据为0xABABABAB时表示当前为开发模式;FLASH的特性是擦除后均被写为0xFF,达到默认状态为产品状态的效果。
在终端状态切换过程中,通过格式化终端的密钥存储区,能够对终端当前状态的敏感信息进行清除,如切换为开发模式之前,则清除产品状态对应的密钥、证书等信息,防止产品状态的敏感信息被误用至开发状态中,提高终端安全性。
从上述描述可知,本发明的有益效果在于:本发明对应开发阶段和产品阶段配置开发CA和产品CA;并将对应的证书和公私钥分别存储在开发安全存储介质和产品安全存储介质中;通过安全存储介质中的证书和公私钥对完成终端对上位机的合法性验证后,才能成功切换终端的状态;确保终端的安全性。
进一步的,所述“使用产品CA颁发包含所述产品公钥的产品证书;使用开发CA颁发包含所述开发公钥的开发证书”具体为:
使用产品CA中的产品根私钥对产品公钥进行签名,生成产品证书签名;
生成包括产品公钥和产品证书签名的产品证书;
使用开发CA中的开发根私钥对开发公钥进行签名,生成开发证书签名;
生成包括开发公钥和开发证书签名的开发证书。
由上述描述可知,本发明针对处于产品阶段的终端配备专门的产品CA,并由产品CA颁发相应的产品公私钥对;针对处于开发阶段的终端配备专门的开发CA,由开发CA颁发相应的产品公私钥对;以实现开发阶段的终端与产品阶段的终端在本质上的区分。
进一步的,所述“终端依据所述标志位发送当前所处状态至上位机”具体为:
终端依据所述标志位发送当前所处状态和第一随机数至上位机。
进一步的,所述“终端使用当前状态对应的CA验证所述证书的合法性,得到第五验证结果;终端验证所述私钥的合法性,得到第六验证结果;若第五验证结果和第六验证结果均为合法,则判定所述一安全存储介质与终端当前所处状态对应”具体为:
上位机使用所述私钥对所述第一随机数进行签名,生成签名后第一随机数;
发送所述签名后第一随机数和所述证书至终端;
终端使用当前状态对应的CA验证所述证书中的证书签名;
若验证通过,则使用所述证书中的公钥对所述签名后第一随机数进行验签;
若验签通过,则判定所述一安全存储介质与终端当前所处状态对应。
由上述描述可知,本发明使用终端当前所处状态对应的CA来验证安全存储介质中证书和私钥的合法性,进而实现终端对上位机的权限验证;确保验证过程的可靠性。
进一步的,所述“上位机读取一安全存储介质中存储的私钥和证书”之前进一步包括:
预设对应所述一安全存储介质的PIN码;
终端获取输入的PIN码;发送所述PIN码至所述一安全存储介质中;
所述一安全存储介质验证所述PIN码的正确性;
若验证通过,则执行所述“上位机读取一安全存储介质中存储的私钥和证书”。
由上述描述可知,本发明能够预设与安全存储介质对应的PIN码,并在上位机连接安全存储介质后,要求验证PIN码;实现介质所有者与安全存储介质的合法性验证,确保安全存储介质为合法者所使用,提高终端状态切换的安全性。
进一步的,所述安全存储介质为IC卡或U-key。
由上述描述可知,安全存储介质可以以IC卡或者U-key形式存在,方便用户的使用,且具备较高的安全存储性能。
请参阅图3,本发明提供的第二个技术方案为:
一种终端产品模式与开发模式安全切换的系统,包括:
预设模块1,用于预设产品CA和开发CA,以及预设终端内部FLASH中的标志位分别对应产品状态和开发状态;
预置模块2,用于将产品CA和开发CA预置在终端中;
加密模块3,用于使用第一加密机生成产品公私钥对,以及使用第二加密机生成开发公私钥对;
颁发模块4,用于使用产品CA颁发包含所述产品公钥的产品证书;使用开发CA颁发包含所述开发公钥的开发证书;
存储模块5,用于将所述产品证书和产品私钥存储在产品安全存储介质中;将所述开发证书和开发私钥存储在开发安全存储介质中;
第一发送模块6,用于上位机发送CA状态切换指令至终端;
第二发送模块7,用于终端依据所述标志位发送当前所处状态至上位机;
读取模块8,用于上位机读取一安全存储介质中存储的私钥和证书;
第三发送模块9,用于上位机发送所述证书至终端;
第一验证模块10,用于终端使用当前状态对应的CA验证所述证书的合法性,得到第五验证结果;
第二验证模块11,用于终端验证所述私钥的合法性,得到第六验证结果;
第一判定模块12,用于若第五验证结果和第六验证结果均为合法,则判定所述一安全存储介质与终端当前所处状态对应;
格式化模块13,用于格式化终端的密钥存储区;
切换模块14,用于改写标志位,切换终端为另一状态。
从上述描述可知,本发明的有益效果在于:本发明能够通过上位机来读取安全存储介质中的证书和私钥,并与终端进行交互,完成终端状态地安全切换。
优选的,所述终端产品模式与开发模式安全切换的系统包括上位机、终端和安全存储介质;所述上位机包括第一发送模块6、读取模块8和第三发送模块9;所述终端包括第二发送模块7、第一验证模块10、第二验证模块11、第一判定模块12、格式化模块13和切换模块14。
进一步的,所述第二发送模块7具体用于终端依据所述标志位发送当前所处状态和第一随机数至上位机。
请参阅图4,进一步的,所述第一验证模块10包括签名单元101、发送单元102和验证单元103;
所述签名单元101,用于上位机使用所述私钥对所述第一随机数进行签名,生成签名后第一随机数;
所述发送单元102,用于发送所述签名后第一随机数和所述证书至终端;
所述验证单元103,用于终端使用当前状态对应的CA验证所述证书中的证书签名;
所述第二验证模块11,具体用于若所述验证单元103验证通过,则使用所述证书中的公钥对所述签名后第一随机数进行验签;
所述第一判定模块12,具体用于当所述验签单元验签通过,则判定所述一安全存储介质与终端当前所处状态对应。
由上述可知,本发明能够通过第一验证模块10和第二验证模块11使用终端当前所处状态对应的CA来验证安全存储介质中证书和私钥的合法性,进而实现终端对上位机的权限验证;确保验证过程的可靠性。
进一步的,所述安全存储介质为IC卡或U-key。
由上述可知,安全存储介质可以以IC卡或者U-key形式存在,方便用户的使用,且具备较高的安全存储性能。
请参照图2,本发明的实施例一为:
一种终端产品模式与开发模式安全切换的方法,所述安全存储介质为IC签 名卡;所述终端为POS终端。
预设产品CA和开发CA,并将产品CA和开发CA同时预置在POS终端中;所述开发CA和产品CA可以是不同第三方组织或公司所开发的不同数字证书认证中心,当然,也可以是同一组织或公司开发的不同数字证书认证中心;
预设POS终端内部FLASH中的标志位为0xFFFFFFFF时POS终端为产品状态,标志位为0xABABABAB时POS终端为开发状态;
第一加密机生成产品公私钥对;使用产品CA中的产品根私钥对产品公钥进行签名,生成产品证书签名;生成包括产品公钥和产品证书签名的产品证书;将所述产品证书和产品私钥存储在产品IC签名卡中;预设与产品IC签名卡相对应的PIN码,可以每一张IC签名卡的PIN码都不一样;
第二加密机生成产品公私钥对;使用开发CA中的开发根私钥对开发公钥进行签名,生成开发证书签名;生成包括开发公钥和开发证书签名的开发证书;将所述开发证书和开发私钥存储在开发IC签名卡中;预设与开发IC签名卡相对应的PIN码;
产品人员将产品IC签名卡插入上位机的IC卡接口中;
上位机读取产品IC签名卡,并发送CA状态切换指令至POS终端;
POS终端接收所述CA状态切换指令,并判断标志位是否为0xFFFFFFFF;若不是,则判定POS终端当前处于开发状态,则提示IC签名卡与当前状态不对应,无法执行操作,结束流程;
若标志位为0xFFFFFFFF,则判定当前处于产品状态,POS终端回复上位机当前所处状态,以及第一随机数;
上位机接收POS终端的状态回复和第一随机数,提示输入PIN码;
上位机接收产品人员输入的PIN码,并通过产品IC签名卡验证PIN码是否与预设的PIN码一致;若不一致,则提示PIN码错误,结束流程;
若一致,则判定所述产品IC签名卡为插卡人合法所有;
上位机获取产品IC签名卡中存储的证书和私钥,并使用私钥对第一随机数rng1进行签名,生成签名后的第一随机数E(rng1);
上位机发送签名后的第一随机数E(rng1)和产品证书至POS终端;
POS终端接收所述产品证书,并使用产品CA的产品根公钥对所述产品证书中的产品证书签名进行验证;
若验证通过,则判定所述产品证书为合法的证书;
POS终端使用产品证书中的产品公钥Puk对签名后的第一随机数E(rng1)进行验签;
若验签通过,则判定所述产品IC签名卡中存储的私钥为合法私钥;进而判定所述产品安全存储介质为合法的产品安全存储介质。
格式化终端的密钥存储区,清除产品状态所涉及的包括密钥和证书等的敏感信息;改写标志位为标志位为0xABABABAB,切换终端为开发CA状态;
当开发人员使用开发IC签名卡通过上位机执行POS终端的状态切换操作,将POS终端从开发状态切换成产品状态时所需的流程与上述产品状态切换成开发状态所需流程一致,在此不累述。
请参阅图3和图4,本发明提供的实施例二为:
一种终端产品模式与开发模式安全切换的系统,包括:
预设模块1,用于预设产品CA和开发CA,以及预设终端内部FLASH中的标志位分别对应产品状态和开发状态;
预置模块2,用于将产品CA和开发CA预置在终端中;
加密模块3,用于使用第一加密机生成产品公私钥对,以及使用第二加密机生成开发公私钥对;
颁发模块4,用于使用产品CA颁发包含所述产品公钥的产品证书;使用开发CA颁发包含所述开发公钥的开发证书;
存储模块5,用于将所述产品证书和产品私钥存储在产品安全存储介质中;将所述开发证书和开发私钥存储在开发安全存储介质中;
第一发送模块6,用于上位机发送CA状态切换指令至终端;
第二发送模块7,用于终端依据所述标志位发送当前所处状态和第一随机数至上位机;
读取模块8,用于上位机读取一安全存储介质中存储的私钥和证书;
第三发送模块9,用于上位机发送所述证书至终端;
第一验证模块10,用于终端使用当前状态对应的CA验证所述证书的合法性,得到第五验证结果;具体的,所述第一验证模块10包括签名单元101、发送单元102和验证单元103;
所述签名单元101,用于上位机使用所述私钥对所述第一随机数进行签名,生成签名后第一随机数;
所述发送单元102,用于发送所述签名后第一随机数和所述证书至终端;
所述验证单元103,用于终端使用当前状态对应的CA验证所述证书中的证书签名;
第二验证模块11,用于若所述验证单元103验证通过,则使用所述证书中的公钥对所述签名后第一随机数进行验签;
第一判定模块12,用于当所述验签单元验签通过,则判定所述一安全存储介质与终端当前所处状态对应;
格式化模块13,用于格式化终端的密钥存储区;
切换模块14,用于改写标志位,切换终端为另一状态。
综上所述,本发明提供的一种终端产品模式与开发模式安全切换的方法及系统,区别于现有技术无法实现终端从本质上区分所处不同阶段,可能导致测试开发版本的终端意外流入市场使用,存在安全隐患的问题;本发明对应处于不同阶段的终端配置不同的CA证书管理机构;将不同CA颁发的证书公私钥对存储在不同的安全存储介质中,只有使用对应终端当前所处CA状态的安全存储介质在通过合法性验证后,才能成功改写终端的标志位;实现终端不同CA的安全切换;通过终端与上位机的交互来实现终端状态的切换,确保无接口配置的终端仍能实现不同状态的安全切换;同时,还包括了对状态切换的操作执行者的身份验证,确保操作执行者的合法性;进一步的,还可以对终端的不同状态设置不同优先级别,实现安全、快速的切换。

Claims (10)

  1. 一种终端产品模式与开发模式安全切换的方法,其特征在于,包括:
    预设产品CA和开发CA;将产品CA和开发CA预置在终端中;
    预设终端内部FLASH中的标志位分别对应产品状态和开发状态;
    第一加密机生成产品公私钥对;第二加密机生成开发公私钥对;
    使用产品CA颁发包含所述产品公钥的产品证书;使用开发CA颁发包含所述开发公钥的开发证书;
    将所述产品证书和产品私钥存储在产品安全存储介质中;将所述开发证书和开发私钥存储在开发安全存储介质中;
    上位机发送CA状态切换指令至终端;
    终端依据所述标志位发送当前所处状态至上位机;
    上位机读取一安全存储介质中存储的私钥和证书;
    上位机发送所述证书至终端;
    终端使用当前状态对应的CA验证所述证书的合法性,得到第五验证结果;
    终端验证所述私钥的合法性,得到第六验证结果;
    若第五验证结果和第六验证结果均为合法,则判定所述一安全存储介质与终端当前所处状态对应;
    格式化终端的密钥存储区;改写标志位,切换终端为另一状态。
  2. 如权利要求1所述的一种终端产品模式与开发模式安全切换的方法,其特征在于,所述“使用产品CA颁发包含所述产品公钥的产品证书;使用开发CA颁发包含所述开发公钥的开发证书”具体为:
    使用产品CA中的产品根私钥对产品公钥进行签名,生成产品证书签名;
    生成包括产品公钥和产品证书签名的产品证书;
    使用开发CA中的开发根私钥对开发公钥进行签名,生成开发证书签名;
    生成包括开发公钥和开发证书签名的开发证书。
  3. 如权利要求1所述的一种终端产品模式与开发模式安全切换的方法,其特征在于,所述“终端依据所述标志位发送当前所处状态至上位机”具体为:
    终端依据所述标志位发送当前所处状态和第一随机数至上位机。
  4. 如权利要求3所述的一种终端产品模式与开发模式安全切换的方法,其 特征在于,所述“终端使用当前状态对应的CA验证所述证书的合法性,得到第五验证结果;终端验证所述私钥的合法性,得到第六验证结果;若第五验证结果和第六验证结果均为合法,则判定所述一安全存储介质与终端当前所处状态对应”具体为:
    上位机使用所述私钥对所述第一随机数进行签名,生成签名后第一随机数;
    发送所述签名后第一随机数和所述证书至终端;
    终端使用当前状态对应的CA验证所述证书中的证书签名;
    若验证通过,则使用所述证书中的公钥对所述签名后第一随机数进行验签;
    若验签通过,则判定所述一安全存储介质与终端当前所处状态对应。
  5. 如权利要求1-4任意一项所述的一种终端产品模式与开发模式安全切换的方法,其特征在于,所述“上位机读取一安全存储介质中存储的私钥和证书”之前进一步包括:
    预设对应所述一安全存储介质的PIN码;
    终端获取输入的PIN码;发送所述PIN码至所述一安全存储介质中;
    所述一安全存储介质验证所述PIN码的正确性;
    若验证通过,则执行所述“上位机读取一安全存储介质中存储的私钥和证书”。
  6. 如权利要求1-4任意一项所述的一种终端产品模式与开发模式安全切换的方法,其特征在于,所述安全存储介质为IC卡或U-key。
  7. 一种终端产品模式与开发模式安全切换的系统,其特征在于,包括:
    预设模块,用于预设产品CA和开发CA,以及预设终端内部FLASH中的标志位分别对应产品状态和开发状态;
    预置模块,用于将产品CA和开发CA预置在终端中;
    加密模块,用于使用第一加密机生成产品公私钥对,以及使用第二加密机生成开发公私钥对;
    颁发模块,用于使用产品CA颁发包含所述产品公钥的产品证书;使用开发CA颁发包含所述开发公钥的开发证书;
    存储模块,用于将所述产品证书和产品私钥存储在产品安全存储介质中; 将所述开发证书和开发私钥存储在开发安全存储介质中;
    第一发送模块,用于上位机发送CA状态切换指令至终端;
    第二发送模块,用于终端依据所述标志位发送当前所处状态至上位机;
    读取模块,用于上位机读取一安全存储介质中存储的私钥和证书;
    第三发送模块,用于上位机发送所述证书至终端;
    第一验证模块,用于终端使用当前状态对应的CA验证所述证书的合法性,得到第五验证结果;
    第二验证模块,用于终端验证所述私钥的合法性,得到第六验证结果;
    第一判定模块,用于若第五验证结果和第六验证结果均为合法,则判定所述一安全存储介质与终端当前所处状态对应;
    格式化模块,用于格式化终端的密钥存储区;
    切换模块,用于改写标志位,切换终端为另一状态。
  8. 如权利要求7所述的一种终端产品模式与开发模式安全切换的系统,其特征在于,所述第二发送模块具体用于终端依据所述标志位发送当前所处状态和第一随机数至上位机。
  9. 如权利要求8所述的一种终端产品模式与开发模式安全切换的系统,其特征在于,所述第一验证模块包括签名单元、发送单元和验证单元;
    所述签名单元,用于上位机使用所述私钥对所述第一随机数进行签名,生成签名后第一随机数;
    所述发送单元,用于发送所述签名后第一随机数和所述证书至终端;
    所述验证单元,用于终端使用当前状态对应的CA验证所述证书中的证书签名;
    所述第二验证模块,具体用于若所述验证单元验证通过,则使用所述证书中的公钥对所述签名后第一随机数进行验签;
    所述第一判定模块,具体用于当所述验签单元验签通过,则判定所述一安全存储介质与终端当前所处状态对应。
  10. 如权利要求7所述的一种终端产品模式与开发模式安全切换的系统,其特征在于,所述安全存储介质为IC卡或U-key。
PCT/CN2016/089765 2015-07-16 2016-07-12 一种终端产品模式与开发模式安全切换的方法及系统 WO2017008730A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP16823877.2A EP3309702B1 (en) 2015-07-16 2016-07-12 Method and system for securely switching terminal between product mode and development mode
ES16823877T ES2937283T3 (es) 2015-07-16 2016-07-12 Método y sistema para conmutar de manera segura un terminal entre modo de producto y modo de desarrollo
US15/867,667 US10778447B2 (en) 2015-07-16 2018-01-10 Method and system for safely switching between product mode and development mode of terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510417560.1 2015-07-16
CN201510417560.1A CN105117665B (zh) 2015-07-16 2015-07-16 一种终端产品模式与开发模式安全切换的方法及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/867,667 Continuation US10778447B2 (en) 2015-07-16 2018-01-10 Method and system for safely switching between product mode and development mode of terminal

Publications (1)

Publication Number Publication Date
WO2017008730A1 true WO2017008730A1 (zh) 2017-01-19

Family

ID=54665649

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/089765 WO2017008730A1 (zh) 2015-07-16 2016-07-12 一种终端产品模式与开发模式安全切换的方法及系统

Country Status (5)

Country Link
US (1) US10778447B2 (zh)
EP (1) EP3309702B1 (zh)
CN (1) CN105117665B (zh)
ES (1) ES2937283T3 (zh)
WO (1) WO2017008730A1 (zh)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117665B (zh) * 2015-07-16 2017-10-31 福建联迪商用设备有限公司 一种终端产品模式与开发模式安全切换的方法及系统
CN106897606B (zh) * 2015-12-18 2020-02-21 东莞酷派软件技术有限公司 一种刷机防护方法和装置
CN105930718A (zh) * 2015-12-29 2016-09-07 中国银联股份有限公司 一种销售点终端模式切换方法及装置
CN106330877B (zh) * 2016-08-18 2019-07-05 福建联迪商用设备有限公司 一种授权对终端状态进行转换的方法和系统
CN107133512B (zh) * 2017-03-14 2020-07-28 万达百汇科技(深圳)有限公司 Pos终端控制方法和装置
CN108337093A (zh) * 2017-12-26 2018-07-27 福建联迪商用设备有限公司 Pos设备身份识别方法、pos设备及服务器
CN112699343A (zh) * 2019-10-23 2021-04-23 华为技术有限公司 一种软件完整性保护、校验的方法及装置
DE102020003072B3 (de) 2020-05-22 2021-07-15 Daimler Ag Verfahren zur sicheren Nutzung von kryptografischem Material
CN112134711B (zh) * 2020-09-24 2021-05-07 深圳市捷诚技术服务有限公司 Apk签名信息的安全验证方法、装置以及pos机
CN113595739B (zh) * 2021-07-30 2023-06-30 宁波三星医疗电气股份有限公司 一种实现智能电表安全套件切换的系统及切换方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010033603A (ja) * 2009-11-09 2010-02-12 Panasonic Corp 情報処理装置
CN102571338A (zh) * 2010-12-23 2012-07-11 北京时代凌宇科技有限公司 一种基于pki技术的物联网认证方法及系统
CN104636666A (zh) * 2013-11-07 2015-05-20 中国移动通信集团公司 一种用于移动终端进行安全地信息处理的方法和安全装置
CN105117665A (zh) * 2015-07-16 2015-12-02 福建联迪商用设备有限公司 一种终端产品模式与开发模式安全切换的方法及系统
CN105120066A (zh) * 2015-07-16 2015-12-02 福建联迪商用设备有限公司 一种终端产品模式与开发模式安全切换的方法及系统

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6711684B1 (en) * 1999-06-08 2004-03-23 General Instrument Corporation Variable security code download for an embedded processor
JP3761432B2 (ja) * 2001-08-03 2006-03-29 日本電気株式会社 通信システムおよびユーザ端末およびicカードおよび認証システムおよび接続および通信の制御システムおよびプログラム
US7366906B2 (en) * 2003-03-19 2008-04-29 Ricoh Company, Ltd. Digital certificate management system, digital certificate management apparatus, digital certificate management method, program and computer readable information recording medium
CN101127111A (zh) * 2006-08-18 2008-02-20 中信银行 网上银行u盘key加密、认证的装置和方法
CN101364187A (zh) * 2007-08-08 2009-02-11 黄金富 可对抗木马程式的双操作系统计算机
US8250366B2 (en) * 2008-09-09 2012-08-21 International Business Machines Corporation Method and system for electronic vehicle document display
US8214630B2 (en) * 2009-02-24 2012-07-03 General Instrument Corporation Method and apparatus for controlling enablement of JTAG interface
JP4861452B2 (ja) * 2009-05-29 2012-01-25 シャープ株式会社 文書処理自動化システム及び画像形成装置
US8464038B2 (en) * 2009-10-13 2013-06-11 Google Inc. Computing device with developer mode
GB2477774A (en) * 2010-02-12 2011-08-17 Icera Inc Overriding production processor authentication restrictions through remote security unit for development code testing
DE102010030590A1 (de) * 2010-06-28 2011-12-29 Bundesdruckerei Gmbh Verfahren zur Erzeugung eines Zertifikats
US8776205B2 (en) * 2010-10-29 2014-07-08 GM Global Technology Operations LLC Secure connection systems and methods for vehicles
US8581618B1 (en) * 2012-02-14 2013-11-12 Social Silicon, Inc. Apparatus for controlling the usability of intellectual property within a programmable device and method of using
EP2820546B1 (en) * 2012-03-02 2019-07-31 INSIDE Secure Blackbox security provider programming system permitting multiple customer use and in field conditional access switching
CN103686951B (zh) 2012-09-03 2018-06-01 联想(北京)有限公司 终端的工作模式切换方法及终端
US20140075517A1 (en) * 2012-09-12 2014-03-13 GM Global Technology Operations LLC Authorization scheme to enable special privilege mode in a secure electronic control unit
CN103701609B (zh) * 2013-03-15 2016-09-28 福建联迪商用设备有限公司 一种服务器与操作终端双向认证的方法及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010033603A (ja) * 2009-11-09 2010-02-12 Panasonic Corp 情報処理装置
CN102571338A (zh) * 2010-12-23 2012-07-11 北京时代凌宇科技有限公司 一种基于pki技术的物联网认证方法及系统
CN104636666A (zh) * 2013-11-07 2015-05-20 中国移动通信集团公司 一种用于移动终端进行安全地信息处理的方法和安全装置
CN105117665A (zh) * 2015-07-16 2015-12-02 福建联迪商用设备有限公司 一种终端产品模式与开发模式安全切换的方法及系统
CN105120066A (zh) * 2015-07-16 2015-12-02 福建联迪商用设备有限公司 一种终端产品模式与开发模式安全切换的方法及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3309702A4 *

Also Published As

Publication number Publication date
CN105117665B (zh) 2017-10-31
EP3309702A1 (en) 2018-04-18
CN105117665A (zh) 2015-12-02
ES2937283T3 (es) 2023-03-27
EP3309702A4 (en) 2018-05-23
EP3309702B1 (en) 2022-11-02
US10778447B2 (en) 2020-09-15
US20180139060A1 (en) 2018-05-17

Similar Documents

Publication Publication Date Title
WO2017008730A1 (zh) 一种终端产品模式与开发模式安全切换的方法及系统
JP6665217B2 (ja) カードリーダとモバイルデバイスとの間のセキュアなセッションの確立
RU2607620C2 (ru) Средство чтения смарт-карты с безопасной функцией журналирования
US7788730B2 (en) Secure bytecode instrumentation facility
JP5693595B2 (ja) 一往復での鍵証明
KR100806477B1 (ko) 리모트 액세스 시스템, 게이트웨이, 클라이언트 기기,프로그램 및 기억 매체
RU2523304C2 (ru) Доверенный администратор достоверности (tim)
CN105893837B (zh) 应用程序安装方法、安全加密芯片及终端
US10382209B2 (en) Privacy control using unique identifiers associated with sensitive data elements of a group
US7246375B1 (en) Method for managing a secure terminal
WO2017008729A1 (zh) 一种终端产品模式与开发模式安全切换的方法及系统
CN107133520A (zh) 云计算平台的可信度量方法和装置
CN106156618A (zh) 一种安全芯片、移动终端和实现移动终端系统安全的方法
KR20170124510A (ko) 보안 터널 기반 인증 방법 및 장치
CN111147259B (zh) 鉴权方法和设备
CN112825093B (zh) 安全基线检查方法、主机、服务器、电子设备及存储介质
KR102048025B1 (ko) 인증 프로토콜에 기반하여 문서를 안전하고 편리하게 승인하는 시스템 및 방법
US8914901B2 (en) Trusted storage and display
EP1715613A1 (en) Method and system for securing point to point connections
JP4893410B2 (ja) 端末装置
Gunasinghe CLOUD BASED SECURE ELEMENT IMPLEMENTATION FOR ANDROID HOST CARD EMULATION
CN110502360A (zh) 一种高级加密标准协处理器自检的方法
BR102017004113A2 (pt) método e sistema para garantir a segurança de dados e funções legalmente relevantes em equipamentos eletrônicos
KR20090129084A (ko) 시각 확인을 이용한 데이터 송신 사스템 및 이를 이용한데이터 송신 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16823877

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2016823877

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE