WO2018033017A1 - Terminal state conversion method and system for credit granting - Google Patents
Terminal state conversion method and system for credit granting Download PDFInfo
- Publication number
- WO2018033017A1 WO2018033017A1 PCT/CN2017/096835 CN2017096835W WO2018033017A1 WO 2018033017 A1 WO2018033017 A1 WO 2018033017A1 CN 2017096835 W CN2017096835 W CN 2017096835W WO 2018033017 A1 WO2018033017 A1 WO 2018033017A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- data
- authentication
- server
- state
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a terminal state transition method and system for granting credit.
- the terminal In the field of financial payment, in order to ensure the legitimacy of the program on the terminal device, the terminal needs to introduce a digital signature scheme, and the root public key certificate is preset in the terminal, and only the program using the private key corresponding to the work public key certificate of the root public key certificate can be downloaded. To the terminal. When the terminal is in normal use, the program downloaded to the terminal must be signed, which is greatly inconvenient for application developer debugging. In order to facilitate application developer debugging, the terminal has a debugging state, and the application can be downloaded to the terminal without signing.
- the inventor provides a method for terminal state transition of a credit, and the technical solution is as follows:
- a method for transferring terminal state transitions includes the steps of:
- the server sends the first to-be-certified data to the state conversion tool, and the state transition tool obtains the work public key certificate and the work private key from the U-KEY; the state transition tool uses the work private key to perform the first to-be-certified data.
- Encrypting, generating first authentication data the state conversion tool sends the working public key certificate and the first authentication data to the server; the server authenticates the first authentication data; and the terminal sends the second to-be-authenticated data to the state conversion tool ; the state conversion tool uses the work private key Encrypting the second to-be-certified data to generate second authentication data, the state conversion tool sends the working public key certificate and the second authentication data to the terminal; the terminal authenticates the second authentication data; After the authentication data is authenticated and the terminal authenticates the second authentication data, the state transition tool obtains the data to be authenticated from the terminal, and the state transition tool sends the data to be authenticated to the server; the server uses the authentication private key to perform the data to be authenticated. Encrypted to generate authentication data, the
- the server authenticates the first authentication data, including the steps: the server receives the working public key certificate, and the server extracts the public key in the working public key certificate, and the server uses the public key to
- the first authentication data is decrypted, and the plaintext of the data to be authenticated in the first authentication data is obtained, and the plaintext of the data to be authenticated in the first authentication data is consistent with the data to be authenticated.
- the terminal authenticates the second authentication data, including the steps: the terminal receives the working public key certificate, the terminal extracts the public key in the working public key certificate, and the terminal uses the public key to perform the second authentication data.
- Decrypting obtaining the plaintext of the data to be authenticated in the second authentication data, and comparing whether the plaintext of the data to be authenticated in the second authentication data is consistent with the data to be authenticated, and if the matching is the same, the authentication is passed.
- the terminal state includes a usage state and a debug state, and the terminal does not save the application and the key in the usage state and the debug state; the terminal switches from the usage state to the debug state, and the terminal clears the key of the terminal in the usage state.
- the terminal switches from the debug state to the use state, and the terminal clears the application and the key of the terminal in the debug state.
- first to-be-certified data is a random number
- second to-be-certified data is a combination of a terminal board serial number and a random number
- the beneficial effects of the present invention are: the application developer obtains the work public key certificate and the work private key of the U-KEY through the state transition tool, and when the state transition tool obtains the authentication of the server and the terminal, the state transition tool can be directly used.
- the state conversion tool used by the application developer stores the work public key certificate of the terminal root public key certificate and the corresponding private
- the key signature ensures that the application developer has the authority to download the program to the terminal to avoid illegally changing the terminal status.
- the inventor also provides a terminal state transition system for crediting, and the technical solution is as follows:
- a trusted terminal state transition system includes: a server, a terminal, and a state transition tool, and the state transition tool includes: a server authentication module, a terminal authentication module, and a U-KEY interaction module; the server is configured to: send The first to-be-certified data is sent to the state transition tool, and the state transition tool obtains the working public key certificate and the working private key from the U-KEY; the U-KEY interaction module is configured to: use the working private key to the first The server to be authenticated is encrypted to generate the first authentication data.
- the server authentication module is configured to: send the working public key certificate and the first authentication data to the server; the server is used to: The data is used for authentication; the terminal is configured to: send the second to-be-certified data to the state conversion tool; the U-KEY interaction module is configured to: encrypt the second to-be-certified data by using the working private key, to generate a second authentication
- the terminal authentication module is configured to: send the working public key certificate and the second authentication data to the terminal; the terminal is configured to: authenticate the second authentication data; The first authentication data is authenticated and the terminal authenticates the second authentication data, and the terminal authentication module is configured to: obtain data to be authenticated from the terminal; the server authentication module is configured to: send the data to be authenticated to the server The server is further configured to: use the authentication private key to encrypt the to-be-authenticated data to generate authentication data, and the server sends the authentication data to the state conversion tool; the terminal authentication module is further configured to: send the authentication The terminal is further configured to: authenticate the authentication data, and
- the server is configured to: authenticate the first authentication data
- the method includes: the server receives the working public key certificate, and the server extracts the public key in the working public key certificate, and the server uses the public The key decrypts the first authentication data, and obtains the plaintext of the data to be authenticated in the first authentication data, and compares whether the plaintext of the data to be authenticated in the first authentication data is consistent with the data to be authenticated. If the agreement is the same, the authentication is passed; the terminal is configured to: identify the second authentication data. And the terminal receives the working public key certificate, the terminal extracts the public key in the working public key certificate, and the terminal decrypts the second authentication data by using the public key to obtain the second authentication data. Whether the plaintext of the data to be authenticated and the data to be authenticated in the second authentication data are consistent with each other, and if the data is consistent, the authentication is passed.
- the terminal state includes a usage state and a debug state, and the terminal does not save the application and the key in the usage state and the debug state; the terminal switches from the usage state to the debug state, and the terminal clears the key of the terminal in the usage state.
- the terminal switches from the debug state to the use state, and the terminal clears the application and the key of the terminal in the debug state.
- first to-be-certified data is a random number
- second to-be-certified data is a combination of a terminal board serial number and a random number
- the beneficial effects of the present invention are: the application developer obtains the work public key certificate and the work private key of the U-KEY through the state transition tool, and when the state transition tool obtains the authentication of the server and the terminal, the state transition tool can be directly used. To switch the state of the terminal; and the state conversion tool used by the application developer stores the work public key certificate and the corresponding private key signature of the terminal root public key certificate, so as to ensure that the application developer has the right to download the program to the terminal. To avoid illegal conversion of terminal status.
- FIG. 1 is a block diagram of a trusted terminal state transition system of the present invention
- FIG. 2 is a flow chart of a method for converting a terminal state of a credit according to the present invention.
- the U-KEY is inserted in the state transition tool.
- the state transition tool is a PC, where the U-KEY stores the work public key subordinate to the terminal root public key certificate. The certificate and the work private key.
- the state transition tool is installed with interactive software, so that the state transition tool can obtain the work public key certificate and the work private key from the U-KEY.
- Step S201 The state transition tool obtains the first data to be authenticated from the server.
- the server generates the first data to be authenticated.
- the first data to be authenticated is a 16-byte random number, and the state transition tool goes to the slave service.
- the terminal obtains the first data to be authenticated, and after obtaining the state, the state conversion tool sends the first data to be authenticated to the state conversion tool.
- the first to-be-authenticated data may also be a random number of other bytes, which may be a combination of 32-byte letters, numbers, special symbols, etc., in this embodiment, by generating 16-byte random each time. The number ensures that the random number generated each time is different.
- step S202 the state transition tool generates the first authentication data by using the U-KEY; after the state transition tool receives the first data to be authenticated, the state transition tool uses the work private key stored in the U-KEY to pair the first data to be authenticated. Encryption is performed, and the first authentication data is generated after encryption. The first authentication data is ensured by encrypting the first data to be authenticated by using the work private key stored in the U-KEY. In the process of data transmission, it will not be intercepted by other illegal U-KEYs, and it will pretend to be a genuine U-KEY, which will cause security problems.
- the step S203 the state conversion tool sends the first authentication data and the working public key certificate to the server for authentication; the authentication here means that the server decrypts the received first authentication data.
- the authentication means that the server decrypts the received first authentication data.
- the work public key certificate sent here contains a public key that can decrypt the first authentication data, so that the public key can be extracted after the server receives the message, and then the first authentication data is decrypted.
- the first data to be authenticated is: D1, which is encrypted by using the private key S to generate the first authentication data: D2, the public key corresponding to the private key S is G, and the state conversion tool sends the certificate of D2 and G to the certificate.
- the server extracts G from the certificate, and then uses G to decrypt D2 and obtain D1.
- Step S204 The state transition tool acquires the second data to be authenticated from the terminal. Similarly, the terminal generates the second data to be authenticated.
- the second data to be authenticated is a combination of the serial number of the terminal motherboard and the random number. The motherboard serial number is unique and can uniquely identify a terminal. After the terminal generates the second to-be-certified data, the state transition tool obtains the second to-be-certified data.
- step S205 the state transition tool generates the second authentication data using the U-KEY; the state transition tool encrypts the second data to be authenticated using the working private key in the U-KEY to generate the second authentication data.
- the step S206 the state conversion tool sends the second authentication data and the working public key certificate to the terminal for authentication; the authentication here refers to the terminal decrypting the received second authentication data to obtain the plaintext. Whether the comparison plaintext is the same as the second to-be-certified data of the terminal. If the same, the U-KEY passes the authentication of the terminal, and the terminal is recognized, and the U-KEY obtains the information that can be obtained from the terminal and sends the information to the terminal. permission.
- the public key certificate contains a public key that can decrypt the second authentication data, so that the public key can be extracted after the server receives the message, and then the second authentication data is decrypted.
- Step S207 The server verifies the first authentication data authentication and the terminal to the second authentication number authentication; the server receives the working public key certificate, and the server extracts the public key in the working public key certificate, and the server uses the public key.
- the public key decrypts the first authentication data, and obtains the plaintext of the data to be authenticated in the first authentication data, and compares the plaintext of the data to be authenticated in the first authentication data with the first data to be authenticated. Whether it is consistent, if it is consistent, the certification is passed.
- the terminal Receiving, by the terminal, the working public key certificate, the terminal extracting the public key in the working public key certificate, the terminal decrypting the second authentication data by using the public key, and acquiring the data to be authenticated in the second authentication data
- the plaintext compares whether the plaintext of the data to be authenticated in the second authentication data is consistent with the data to be authenticated, and if yes, the authentication passes.
- the server Through the authentication of the U-KEY by the server and the authentication of the U-KEY by the terminal, when both are authenticated, it means that the legality of the U-KEY is recognized by the server and the terminal, then we will
- the holder of the U-KEY is allowed to obtain the data to be authenticated from the terminal by using the state transition tool, and the data is sent to the server, and the server encrypts the authentication data by using the authentication private key, generates authentication data, and sends the authentication data to the terminal through the state conversion tool.
- the terminal authenticates it. If the authentication passes, it means that the server also passes the terminal's approval. Then the holder of the U-KEY approved by the server has the authority to use the state transition tool to legalize the state of the terminal.
- step S208 the state transition tool sends the state to be converted to the terminal, and the terminal switches the state.
- the state transition tool obtains the terminal information and the data to be authenticated from the terminal, where the terminal information refers to the terminal serial number, and the data to be authenticated is the serial number of the motherboard and the random number, wherein the serial number of the motherboard of each terminal is unique, in this implementation
- the random number is a 16-byte random number. In other embodiments, the random number may be a letter or a character of other digits.
- the uniqueness of the data to be authenticated is ensured by using a combination of the motherboard serial number and the random number having the uniquely identified terminal.
- the state transition tool sends this data to the server.
- the server authenticates the terminal information and generates authentication data. After the server obtains the terminal information, it determines the legality of the terminal information, and determines that it is legal. The server then uses the authentication private key to encrypt the authentication data. Authenticate data and send the authentication data to the state transition tool.
- the server judges the terminal information, it not only judges its legitimacy, but also according to The terminal information encrypts the authentication data using a private key corresponding to the terminal.
- the terminal information encrypts the authentication data using a private key corresponding to the terminal.
- the public key used by each terminal is the same for convenience and versatility, so the server only needs to judge the legitimacy of the terminal information, and the server uses the universal private key. Encrypt the authentication data.
- the state conversion tool sends the authentication data to the terminal, and the terminal decrypts the authentication data by using the public key. Because the server uses the private key corresponding to the terminal to encrypt the authentication data, the terminal can decrypt successfully, and after the decryption succeeds, It is judged whether the serial number of the motherboard in the decrypted data is the serial number of the motherboard of the terminal, and if yes, the authentication is passed. After the authentication is passed, the state transition tool sends the state to be converted to the terminal, and the terminal switches to the corresponding state. In this embodiment, in order to ensure security, after the terminal transitions from the debug state to the use state, the application and the key on the device are all cleared; similarly, the terminal is dense from the use state to the debug state. The keys will also be cleared completely.
- the terminal transitions from the usage state to the debug state, security is ensured in order to prevent the user from entering a personal PIN on it.
- the interface of the debug state is obviously different from the state of use.
- a warning box or a watermark pops up every few seconds to prompt the user that the terminal is in the debug state, so that the user does not input the personal PIN on the terminal.
- a scheme of a trusted terminal state transition system of the present invention is as follows:
- the system includes a server 10, a terminal 20, and a state transition tool 30.
- the U-KEY 40 is inserted in the state transition tool 30.
- the state transition tool 30 is a PC, and the terminal root is stored in the U-KEY 40.
- the public key certificate 401 and the work private key 402 of the key certificate are installed.
- the state transition tool 30 is installed with interactive software, so that the state transition tool has a U-KEY interaction module 303.
- the state transition tool 30 further includes: a server authentication module 301 and a terminal authentication module 302.
- the terminal authentication module 302 is mainly used to obtain information from the terminal 20 and send information to the terminal 20.
- the server authentication module 301 is mainly used to Information is obtained from the server 10 and sent to the server 10.
- the server authentication module 301 is configured to: obtain the first data to be authenticated from the server 10; first, the server 10 generates the first data to be authenticated by itself.
- the first data to be authenticated is a 16-byte random number, and the server authenticates.
- the module 301 then obtains the first data to be authenticated from the server 10, and after obtaining the data, the server authentication module 301 sends the first data to be authenticated to the U-KEY interaction module 303.
- the U-KEY interaction module 303 is configured to: use the U-KEY 40 to generate the first authentication data; after the U-KEY interaction module 303 receives the first to-be-authenticated data, the U-KEY interaction module 303 uses the working private key stored in the U-KEY 40. 402 encrypts the first to-be-certified data, and generates the first authentication data after encryption.
- the server authentication module 301 is configured to: send the first authentication data and the working public key certificate 401 to the server 10 for authentication; wherein the working public key certificate 401 sent here can be decrypted.
- the public key of the authentication data is for facilitating the server 10 to extract the public key after receiving it, and then decrypting the first authentication data.
- the terminal authentication module 302 is configured to: acquire the second data to be authenticated from the terminal 20; similarly, the terminal 20 generates the second data to be authenticated.
- the second data to be authenticated is a combination of the terminal serial number and the random number.
- the serial number of the terminal board on the side is unique and can uniquely identify a terminal.
- the U-KEY interaction module 303 is configured to: generate the second authentication data by using the U-KEY 40; the U-KEY interaction module 303 encrypts the second to-be-authenticated data by using the working private key in the U-KEY 40 to generate the second authentication data, and generate After the second authentication data.
- the terminal authentication module 302 is configured to: send the second authentication data and the working public key certificate 401 to the terminal 20 for authentication; wherein the working public key certificate 401 sent here contains a public key that can decrypt the second authentication data, in order to It is convenient for the server 10 to extract the public key after receiving it, and then decrypt the second authentication data.
- the server 10 passes the first authentication data authentication and the terminal 20 and the second authentication number authentication.
- the server 10 is further configured to: receive the working public key certificate 401, and the server 10 extracts the working public key certificate 401.
- the public key the server 10 decrypts the first authentication data by using the public key, and obtains the plaintext of the data to be authenticated in the first authentication data, and compares the plaintext of the data to be authenticated in the first authentication data. Whether it is consistent with the first data to be authenticated, and if the data is consistent, the authentication is passed;
- the terminal 20 is further configured to: receive the working public key certificate 401, the terminal 20 extracts the public key in the working public key certificate 401, and the terminal 20 decrypts the second authentication data by using the public key to obtain the The plaintext of the data to be authenticated in the second authentication data is compared with whether the plaintext of the data to be authenticated in the second authentication data is consistent with the data to be authenticated.
- the terminal authentication module 302 is configured to: send a state to be converted to the terminal 20, and the terminal 20 switches states.
- the terminal authentication module 302 obtains terminal information and data to be authenticated from the terminal 20, where the terminal information refers to a terminal serial number, and the data to be authenticated is a serial number of the motherboard and a random number, wherein the serial number of the motherboard of each terminal 20 is unique.
- the random number is a 16-byte random number. In other embodiments, the random number may be a letter or a character of other digits.
- the server authentication module 301 is configured to: send the data to the server 10.
- the server 10 is configured to: authenticate the terminal information and generate the authentication data; after the server 10 obtains the terminal information, determine the legality of the terminal information, and determine that it is legal, the server 10 treats the authentication private key again.
- the authentication data is encrypted, the authentication data is generated, and the authentication data is sent to the server authentication module 301.
- the server 10 judges the terminal information, it not only judges its legality, but also The authentication data is also encrypted using the private key corresponding to the terminal 20 based on the terminal information.
- the public key used by each terminal 20 is the same for convenience and versatility, so the server 10 only needs to judge the legitimacy of the terminal information, and the server 10 uses the universal The private key encrypts the authentication data.
- the terminal authentication module 302 is configured to: send the authentication data to the terminal 20.
- the terminal 20 is further configured to: use the public key to decrypt the authentication data, because the server 10 uses the private key corresponding to the terminal 20 to encrypt the authentication data, so the terminal 20 can decrypt successfully, and after decryption succeeds, the decryption is determined. Whether the serial number of the motherboard in the data is the serial number of the motherboard of the terminal 20, and if so, the authentication is passed.
- the terminal authentication module 302 is further configured to: send the status to be converted to the terminal 20, and the terminal 20 switches to the corresponding status.
- the terminal 20 transitions from the debug state to the use state, the application program and the key on the device are all cleared; similarly, the terminal 20 is from the use state to the debug state, on the device. The keys will also be cleared.
- the terminal 20 transitions from the usage state to the debug state, security is ensured in order to prevent the user from entering a personal PIN thereon.
- the interface of the debug state is obviously different from the state of use.
- a warning box or a watermark pops up every few seconds to prompt the user that the terminal is in the debug state, so that the user does not enter the personal PIN on the terminal 20. .
- the computer device includes but is not limited to: a personal computer, a server, a general purpose computer, a special purpose computer, a network device, an embedded device, a programmable device, a smart mobile terminal, a smart home device, a wearable smart device, a vehicle smart device, and the like;
- the storage medium includes, but is not limited to, a RAM, a ROM, a magnetic disk, a magnetic tape, an optical disk, a flash memory, a USB flash drive, a mobile hard disk, a memory card, a memory stick, a network server storage, a network cloud storage, and the like.
- the above embodiments are described with reference to flowcharts and/or block diagrams of methods, apparatus (systems), and computer program products according to the embodiments. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG.
- the computer program instructions can be provided to a processor of the computer device to generate a machine such that instructions executed by the processor of the computer device are generated for implementation in the stream
- a device that is a process or a plurality of processes and/or a block diagram of a function specified in a block or blocks.
- the computer program instructions can also be stored in a computer device readable memory that can direct the computer device to operate in a particular manner, such that instructions stored in the computer device readable memory produce an article of manufacture comprising the instruction device, the instruction device being implemented in the process Figure One or more processes and/or block diagrams of the functions specified in a block or blocks.
- These computer program instructions can also be loaded onto a computer device such that a series of operational steps are performed on the computer device to produce computer-implemented processing, such that instructions executed on the computer device are provided for implementing one or more processes in the flowchart And/or block diagram of the steps of a function specified in a box or blocks.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A terminal state conversion method and system for credit granting in the present invention relate to the technical field of communications. The terminal state conversion method for credit granting comprises: a server side sends first to-be-authenticated data to a state conversion tool; the state conversion tool encrypts the first to-be-authenticated data to generate first authentication data; the server authenticates the first authentication data; a terminal sends second to-be-authenticated second data to the state conversion tool; the state conversion tool encrypts the second to-be-authenticated data to generate second authentication data; and the terminal authenticates the second authentication data.
Description
本发明涉及通信技术领域,特别涉及一种授信的终端状态转换方法和系统。The present invention relates to the field of communications technologies, and in particular, to a terminal state transition method and system for granting credit.
金融支付领域,为保证终端设备上程序的合法性,终端需要引入数字签名方案,在终端预置根公钥证书,只有使用根公钥证书下属的工作公钥证书对应的私钥的程序才能下载到终端。终端在正常使用状态下,下载到终端的程序都要进行签名,对应用程序开发人员调试造成极大不便。为了方便应用开发人员调试,终端有一个调试状态,应用程序不需要签名就可以下载到终端。In the field of financial payment, in order to ensure the legitimacy of the program on the terminal device, the terminal needs to introduce a digital signature scheme, and the root public key certificate is preset in the terminal, and only the program using the private key corresponding to the work public key certificate of the root public key certificate can be downloaded. To the terminal. When the terminal is in normal use, the program downloaded to the terminal must be signed, which is greatly inconvenient for application developer debugging. In order to facilitate application developer debugging, the terminal has a debugging state, and the application can be downloaded to the terminal without signing.
发明内容Summary of the invention
为此,需要提供一种授信的终端状态转换方法,用以解决对终端进行调试态和使用态的转换问题,应用开发人员使用状态转换工具进行服务端和终端共同认证通过后,就可以切换终端的状态,既方便又安全。Therefore, it is necessary to provide a terminal state transition method for crediting, which is used to solve the problem of debugging the debugging state and the usage state of the terminal. After the application developer uses the state transition tool to perform the mutual authentication of the server and the terminal, the terminal can be switched. The state is convenient and safe.
为实现上述目的,发明人提供了一种授信的终端状态转换方法,技术方案如下:In order to achieve the above object, the inventor provides a method for terminal state transition of a credit, and the technical solution is as follows:
一种授信的终端状态转换方法,包括步骤:A method for transferring terminal state transitions includes the steps of:
服务端发送第一待认证数据给状态转换工具,所述状态转换工具从U-KEY获取工作公钥证书和工作私钥;状态转换工具使用所述工作私钥对所述第一待认证数据进行加密,生成第一认证数据,状态转换工具发送所述工作公钥证书和所述第一认证数据给服务端;服务端对第一认证数据进行认证;终端发送第二待认证数据给状态转换工具;状态转换工具使用所述工作私钥
对第二待认证数据进行加密,生成第二认证数据,状态转换工具发送所述工作公钥证书和所述第二认证数据给终端;终端对第二认证数据进行认证;若服务端对第一认证数据认证通过且终端对第二认证数据认证通过,状态转换工具从终端获取待认证数据,状态转换工具发送所述待认证数据给服务端;服务端使用认证私钥对所述待认证数据进行加密生成认证数据,服务端发送所述认证数据给状态转换工具,状态转换工具发送所述认证数据给终端;终端对所述认证数据进行认证,若认证通过,对终端状态进行转换。The server sends the first to-be-certified data to the state conversion tool, and the state transition tool obtains the work public key certificate and the work private key from the U-KEY; the state transition tool uses the work private key to perform the first to-be-certified data. Encrypting, generating first authentication data, the state conversion tool sends the working public key certificate and the first authentication data to the server; the server authenticates the first authentication data; and the terminal sends the second to-be-authenticated data to the state conversion tool ; the state conversion tool uses the work private key
Encrypting the second to-be-certified data to generate second authentication data, the state conversion tool sends the working public key certificate and the second authentication data to the terminal; the terminal authenticates the second authentication data; After the authentication data is authenticated and the terminal authenticates the second authentication data, the state transition tool obtains the data to be authenticated from the terminal, and the state transition tool sends the data to be authenticated to the server; the server uses the authentication private key to perform the data to be authenticated. Encrypted to generate authentication data, the server sends the authentication data to the state transition tool, and the state transition tool sends the authentication data to the terminal; the terminal authenticates the authentication data, and if the authentication passes, the terminal state is converted.
进一步的,服务端对第一认证数据进行认证,包括步骤:服务端接收所述工作公钥证书,服务端提取所述工作公钥证书中的公钥,服务端使用所述公钥对所述第一认证数据进行解密,获取所述第一认证数据中的待认证数据明文,比对所述第一认证数据中的待认证数据明文与所述第一待认证数据是否一致,若一致,认证通过;终端对第二认证数据进行认证,包括步骤:终端接收所述工作公钥证书,终端提取所述工作公钥证书中的公钥,终端使用所述公钥对所述第二认证数据进行解密,获取所述第二认证数据中的待认证数据明文,比对所述第二认证数据中的待认证数据明文与所述第二待认证数据是否一致,若一致,认证通过。Further, the server authenticates the first authentication data, including the steps: the server receives the working public key certificate, and the server extracts the public key in the working public key certificate, and the server uses the public key to The first authentication data is decrypted, and the plaintext of the data to be authenticated in the first authentication data is obtained, and the plaintext of the data to be authenticated in the first authentication data is consistent with the data to be authenticated. The terminal authenticates the second authentication data, including the steps: the terminal receives the working public key certificate, the terminal extracts the public key in the working public key certificate, and the terminal uses the public key to perform the second authentication data. Decrypting, obtaining the plaintext of the data to be authenticated in the second authentication data, and comparing whether the plaintext of the data to be authenticated in the second authentication data is consistent with the data to be authenticated, and if the matching is the same, the authentication is passed.
进一步的,所述终端状态包括使用态和调试态,终端不保存使用态和调试态下的应用程序和密钥;终端从使用态切换到调试态,终端清除所述使用态下终端的密钥;终端从调试态切换到使用态,终端清除所述调试态下终端的应用程序和密钥。Further, the terminal state includes a usage state and a debug state, and the terminal does not save the application and the key in the usage state and the debug state; the terminal switches from the usage state to the debug state, and the terminal clears the key of the terminal in the usage state. The terminal switches from the debug state to the use state, and the terminal clears the application and the key of the terminal in the debug state.
进一步的,所述第一待认证数据是随机数,所述第二待认证数据是终端主板序列号与随机数的组合。Further, the first to-be-certified data is a random number, and the second to-be-certified data is a combination of a terminal board serial number and a random number.
本发明的有益效果是:应用开发人员通过状态转换工具获取U-KEY的工作公钥证书和工作私钥,而当状态转换工具获得服务端和终端的认证通过后,就可以直接使用状态转换工具来切换终端的状态;并且应用开发人员使用的状态转换工具中,存储的是终端根公钥证书下属的工作公钥证书及对应的私
钥签名,保证应用开发人员本来就有权限下载程序到终端,避免非法转换终端状态。The beneficial effects of the present invention are: the application developer obtains the work public key certificate and the work private key of the U-KEY through the state transition tool, and when the state transition tool obtains the authentication of the server and the terminal, the state transition tool can be directly used. To switch the state of the terminal; and the state conversion tool used by the application developer stores the work public key certificate of the terminal root public key certificate and the corresponding private
The key signature ensures that the application developer has the authority to download the program to the terminal to avoid illegally changing the terminal status.
为实现上述目的,发明人还提供了一种授信的终端状态转换系统,技术方案如下:In order to achieve the above object, the inventor also provides a terminal state transition system for crediting, and the technical solution is as follows:
一种授信的终端状态转换系统,包括:服务端、终端、状态转换工具,所述状态转换工具包括:服务端认证模块、终端认证模块和U-KEY交互模块;所述服务端用于:发送第一待认证数据给状态转换工具,所述状态转换工具从U-KEY获取工作公钥证书和工作私钥;所述U-KEY交互模块用于:使用所述工作私钥对所述第一待认证数据进行加密,生成第一认证数据;所述服务端认证模块用于:发送所述工作公钥证书和所述第一认证数据给服务端;所述服务端用于:对第一认证数据进行认证;所述终端用于:发送第二待认证数据给状态转换工具;所述U-KEY交互模块用于:使用所述工作私钥对第二待认证数据进行加密,生成第二认证数据;所述终端认证模块用于:发送所述工作公钥证书和所述第二认证数据给终端;所述终端用于:对第二认证数据进行认证;若服务端对第一认证数据认证通过且终端对第二认证数据认证通过,所述终端认证模块用于:从终端获取待认证数据;所述服务端认证模块用于:发送所述待认证数据给服务端;所述服务端还用于:使用认证私钥对所述待认证数据进行加密生成认证数据,服务端发送所述认证数据给状态转换工具;所述终端认证模块还用于:发送所述认证数据给终端;所述终端还用于:对所述认证数据进行认证,若认证通过,对终端状态进行转换。A trusted terminal state transition system includes: a server, a terminal, and a state transition tool, and the state transition tool includes: a server authentication module, a terminal authentication module, and a U-KEY interaction module; the server is configured to: send The first to-be-certified data is sent to the state transition tool, and the state transition tool obtains the working public key certificate and the working private key from the U-KEY; the U-KEY interaction module is configured to: use the working private key to the first The server to be authenticated is encrypted to generate the first authentication data. The server authentication module is configured to: send the working public key certificate and the first authentication data to the server; the server is used to: The data is used for authentication; the terminal is configured to: send the second to-be-certified data to the state conversion tool; the U-KEY interaction module is configured to: encrypt the second to-be-certified data by using the working private key, to generate a second authentication The terminal authentication module is configured to: send the working public key certificate and the second authentication data to the terminal; the terminal is configured to: authenticate the second authentication data; The first authentication data is authenticated and the terminal authenticates the second authentication data, and the terminal authentication module is configured to: obtain data to be authenticated from the terminal; the server authentication module is configured to: send the data to be authenticated to the server The server is further configured to: use the authentication private key to encrypt the to-be-authenticated data to generate authentication data, and the server sends the authentication data to the state conversion tool; the terminal authentication module is further configured to: send the authentication The terminal is further configured to: authenticate the authentication data, and if the authentication passes, convert the terminal status.
进一步的,所述服务端用于:对第一认证数据进行认证,包括:服务端接收所述工作公钥证书,服务端提取所述工作公钥证书中的公钥,服务端使用所述公钥对所述第一认证数据进行解密,获取所述第一认证数据中的待认证数据明文,比对所述第一认证数据中的待认证数据明文与所述第一待认证数据是否一致,若一致,认证通过;所述终端用于:对第二认证数据进行认
证,包括:终端接收所述工作公钥证书,终端提取所述工作公钥证书中的公钥,终端使用所述公钥对所述第二认证数据进行解密,获取所述第二认证数据中的待认证数据明文,比对所述第二认证数据中的待认证数据明文与所述第二待认证数据是否一致,若一致,认证通过。Further, the server is configured to: authenticate the first authentication data, and the method includes: the server receives the working public key certificate, and the server extracts the public key in the working public key certificate, and the server uses the public The key decrypts the first authentication data, and obtains the plaintext of the data to be authenticated in the first authentication data, and compares whether the plaintext of the data to be authenticated in the first authentication data is consistent with the data to be authenticated. If the agreement is the same, the authentication is passed; the terminal is configured to: identify the second authentication data.
And the terminal receives the working public key certificate, the terminal extracts the public key in the working public key certificate, and the terminal decrypts the second authentication data by using the public key to obtain the second authentication data. Whether the plaintext of the data to be authenticated and the data to be authenticated in the second authentication data are consistent with each other, and if the data is consistent, the authentication is passed.
进一步的,所述终端状态包括使用态和调试态,终端不保存使用态和调试态下的应用程序和密钥;终端从使用态切换到调试态,终端清除所述使用态下终端的密钥;终端从调试态切换到使用态,终端清除所述调试态下终端的应用程序和密钥。Further, the terminal state includes a usage state and a debug state, and the terminal does not save the application and the key in the usage state and the debug state; the terminal switches from the usage state to the debug state, and the terminal clears the key of the terminal in the usage state. The terminal switches from the debug state to the use state, and the terminal clears the application and the key of the terminal in the debug state.
进一步的,所述第一待认证数据是随机数,所述第二待认证数据是终端主板序列号与随机数的组合。Further, the first to-be-certified data is a random number, and the second to-be-certified data is a combination of a terminal board serial number and a random number.
本发明的有益效果是:应用开发人员通过状态转换工具获取U-KEY的工作公钥证书和工作私钥,而当状态转换工具获得服务端和终端的认证通过后,就可以直接使用状态转换工具来切换终端的状态;并且应用开发人员使用的状态转换工具中,存储的是终端根公钥证书下属的工作公钥证书及对应的私钥签名,保证应用开发人员本来就有权限下载程序到终端,避免非法转换终端状态。The beneficial effects of the present invention are: the application developer obtains the work public key certificate and the work private key of the U-KEY through the state transition tool, and when the state transition tool obtains the authentication of the server and the terminal, the state transition tool can be directly used. To switch the state of the terminal; and the state conversion tool used by the application developer stores the work public key certificate and the corresponding private key signature of the terminal root public key certificate, so as to ensure that the application developer has the right to download the program to the terminal. To avoid illegal conversion of terminal status.
图1为本发明一种授信的终端状态转换系统的模块图;1 is a block diagram of a trusted terminal state transition system of the present invention;
图2为本发明一种授信的终端状态转换方法的流程图。2 is a flow chart of a method for converting a terminal state of a credit according to the present invention.
附图标记说明:Description of the reference signs:
10、服务端,10, the server,
20、终端,20, the terminal,
30、状态转换工具,30, state transition tool,
40、U-KEY,
40, U-KEY,
301、服务端认证模块,301, a server authentication module,
302、终端认证模块,302, terminal authentication module,
303、U-KEY交互模块,303, U-KEY interaction module,
401、工作公钥证书,401, work public key certificate,
402、工作私钥。402, work private key.
为详细说明技术方案的技术内容、构造特征、所实现目的及效果,以下结合具体实施例并配合附图详予说明。The detailed description of the technical content, structural features, and the objects and effects of the technical solutions will be described in detail below with reference to the specific embodiments and the accompanying drawings.
请参阅图2,在本实施例中,U-KEY是插在状态转换工具上,本实施例中,状态转换工具为PC,其中U-KEY中存储有终端根公钥证书下属的工作公钥证书及工作私钥,当U-KEY插在状态转换工具上后,状态转换工具上安装有交互软件,使得状态转换工具可以从U-KEY上获取工作公钥证书和工作私钥。Referring to FIG. 2, in the embodiment, the U-KEY is inserted in the state transition tool. In this embodiment, the state transition tool is a PC, where the U-KEY stores the work public key subordinate to the terminal root public key certificate. The certificate and the work private key. When the U-KEY is inserted into the state transition tool, the state transition tool is installed with interactive software, so that the state transition tool can obtain the work public key certificate and the work private key from the U-KEY.
具体实现步骤如下:The specific implementation steps are as follows:
步骤S201:状态转换工具从服务端获取第一待认证数据;首先服务端自己生成第一待认证数据,本实施例中第一待认证数据是16字节随机数,状态转换工具再去从服务端获取第一待认证数据,获取到后,状态转换工具把第一待认证数据发送给状态转换工具。Step S201: The state transition tool obtains the first data to be authenticated from the server. First, the server generates the first data to be authenticated. In this embodiment, the first data to be authenticated is a 16-byte random number, and the state transition tool goes to the slave service. The terminal obtains the first data to be authenticated, and after obtaining the state, the state conversion tool sends the first data to be authenticated to the state conversion tool.
在其它实施例中,第一待认证数据也可以是其它字节的随机数,可以是32字节的字母、数字和特殊符号等等的组合,本实施例中通过每次生成16字节随机数,确保了每次产生的随机数不一样。In other embodiments, the first to-be-authenticated data may also be a random number of other bytes, which may be a combination of 32-byte letters, numbers, special symbols, etc., in this embodiment, by generating 16-byte random each time. The number ensures that the random number generated each time is different.
于是在步骤S202中:状态转换工具使用U-KEY生成第一认证数据;状态转换工具收到第一待认证数据后,状态转换工具使用U-KEY中存储的工作私钥对第一待认证数据进行加密,加密后生成第一认证数据。通过使用U-KEY中存储的工作私钥对第一待认证数据进行加密,确保了生成的第一认证数据
在数据传输的过程中不会被其它非法的U-KEY截取,去冒充真正合法的U-KEY,引发安全性问题。Then in step S202: the state transition tool generates the first authentication data by using the U-KEY; after the state transition tool receives the first data to be authenticated, the state transition tool uses the work private key stored in the U-KEY to pair the first data to be authenticated. Encryption is performed, and the first authentication data is generated after encryption. The first authentication data is ensured by encrypting the first data to be authenticated by using the work private key stored in the U-KEY.
In the process of data transmission, it will not be intercepted by other illegal U-KEYs, and it will pretend to be a genuine U-KEY, which will cause security problems.
生成第一认证数据后,步骤S203:状态转换工具将第一认证数据和工作公钥证书发给服务端进行认证;这边的认证是指服务端通过对接收到的第一认证数据进行解密,获取明文,比对明文是否与服务端的第一待认证数据相同,如果相同,则U-KEY通过了服务端的认证,获得了服务端的认可,既U-KEY取得了可以从服务端获取信息并且给服务端发送信息的权限。其中这边所发送的工作公钥证书里面含有可以解密第一认证数据的公钥,是为了方便服务端收到以后可以提取里面的公钥,再去解密第一认证数据。比如第一待认证数据是:D1,使用私钥S对其进行加密,生成第一认证数据:D2,私钥S对应的公钥是G,状态转换工具把D2和含有G的证书发送给了服务端,服务端从证书中提取G,再用G去解密D2,获取到D1。After the first authentication data is generated, the step S203: the state conversion tool sends the first authentication data and the working public key certificate to the server for authentication; the authentication here means that the server decrypts the received first authentication data. Obtaining plaintext, whether the plaintext is the same as the first data to be authenticated on the server. If they are the same, the U-KEY passes the authentication of the server and obtains the approval of the server. The U-KEY can obtain information from the server and give The server sends permission to send information. The work public key certificate sent here contains a public key that can decrypt the first authentication data, so that the public key can be extracted after the server receives the message, and then the first authentication data is decrypted. For example, the first data to be authenticated is: D1, which is encrypted by using the private key S to generate the first authentication data: D2, the public key corresponding to the private key S is G, and the state conversion tool sends the certificate of D2 and G to the certificate. On the server side, the server extracts G from the certificate, and then uses G to decrypt D2 and obtain D1.
步骤S204:状态转换工具从终端获取第二待认证数据;同样地,终端生成第二待认证数据,本实施例中第二待认证数据是终端主板序列号和随机数的组合,这边的终端主板序列号具有唯一性,可以唯一标识一个终端。终端生成第二待认证数据后,状态转换工具就去获取第二待认证数据。Step S204: The state transition tool acquires the second data to be authenticated from the terminal. Similarly, the terminal generates the second data to be authenticated. In this embodiment, the second data to be authenticated is a combination of the serial number of the terminal motherboard and the random number. The motherboard serial number is unique and can uniquely identify a terminal. After the terminal generates the second to-be-certified data, the state transition tool obtains the second to-be-certified data.
在步骤S205中:状态转换工具使用U-KEY生成第二认证数据;状态转换工具使用U-KEY中的工作私钥对第二待认证数据进行加密,生成第二认证数据。通过使用U-KEY中存储的工作私钥对第一待认证数据进行加密,确保了生成的第二认证数据在数据传输的过程中不会被其它非法的U-KEY截取,去冒充真正合法的U-KEY,引发安全性问题。In step S205: the state transition tool generates the second authentication data using the U-KEY; the state transition tool encrypts the second data to be authenticated using the working private key in the U-KEY to generate the second authentication data. By encrypting the first to-be-authenticated data by using the working private key stored in the U-KEY, it is ensured that the generated second authentication data is not intercepted by other illegal U-KEYs during the data transmission process, and the impersonation is truly legal. U-KEY, causing security issues.
生成第二认证数据后,步骤S206:状态转换工具将第二认证数据和工作公钥证书发给终端进行认证;这边的认证是指终端通过对接收到的第二认证数据进行解密,获取明文,比对明文是否与终端的第二待认证数据相同,如果相同,则U-KEY通过了终端的认证,获得了终端的认可,既U-KEY取得了可以从终端获取信息并且给终端发送信息的权限。其中这边所发送的工作
公钥证书里面含有可以解密第二认证数据的公钥,是为了方便服务端收到以后可以提取里面的公钥,再去解密第二认证数据。After the second authentication data is generated, the step S206: the state conversion tool sends the second authentication data and the working public key certificate to the terminal for authentication; the authentication here refers to the terminal decrypting the received second authentication data to obtain the plaintext. Whether the comparison plaintext is the same as the second to-be-certified data of the terminal. If the same, the U-KEY passes the authentication of the terminal, and the terminal is recognized, and the U-KEY obtains the information that can be obtained from the terminal and sends the information to the terminal. permission. The work sent here
The public key certificate contains a public key that can decrypt the second authentication data, so that the public key can be extracted after the server receives the message, and then the second authentication data is decrypted.
步骤S207:服务端对第一认证数据认证和终端对第二认证数认证是否都通过;服务端接收所述工作公钥证书,服务端提取所述工作公钥证书中的公钥,服务端使用所述公钥对所述第一认证数据进行解密,获取所述第一认证数据中的待认证数据明文,比对所述第一认证数据中的待认证数据明文与所述第一待认证数据是否一致,若一致,认证通过。Step S207: The server verifies the first authentication data authentication and the terminal to the second authentication number authentication; the server receives the working public key certificate, and the server extracts the public key in the working public key certificate, and the server uses the public key. The public key decrypts the first authentication data, and obtains the plaintext of the data to be authenticated in the first authentication data, and compares the plaintext of the data to be authenticated in the first authentication data with the first data to be authenticated. Whether it is consistent, if it is consistent, the certification is passed.
终端接收所述工作公钥证书,终端提取所述工作公钥证书中的公钥,终端使用所述公钥对所述第二认证数据进行解密,获取所述第二认证数据中的待认证数据明文,比对所述第二认证数据中的待认证数据明文与所述第二待认证数据是否一致,若一致,认证通过。Receiving, by the terminal, the working public key certificate, the terminal extracting the public key in the working public key certificate, the terminal decrypting the second authentication data by using the public key, and acquiring the data to be authenticated in the second authentication data The plaintext compares whether the plaintext of the data to be authenticated in the second authentication data is consistent with the data to be authenticated, and if yes, the authentication passes.
通过服务端对U-KEY的认证和终端对U-KEY的认证,当两者都认证通过时,也就意味着U-KEY的合法性得到了服务端和终端的认可,那么接下来我们就允许U-KEY的持有者使用状态转换工具从终端获取待认证数据,发送给服务端,服务端使用认证私钥对待认证数据进行加密,生成认证数据,通过状态转换工具把认证数据发送给终端,终端对其进行认证,若认证通过,既意味着服务端也通过了终端的认可,那么通过服务端认可的U-KEY的持有者便有权限可以使用状态转换工具对终端的状态进行合法地转换,避免非法转换,并且在U-KEY通过服务端和终端认证通过以后,后续的步骤都可以自动完成,大大提高了转换的速度,极大地方便了应用程序开发人员的调试。在步骤S208中:状态转换工具发送要转换的状态给终端,终端转换状态。状态转换工具会从终端获取终端信息和待认证数据,所述终端信息是指终端序列号,待认证数据是主板序列号和随机数,其中每个终端的主板序列号是唯一的,在本实施例中随机数为16字节随机数,在其他实施例中,随机数可以为其他位数的字母或者字符都可以。通过使用具有唯一标识终端的主板序列号与随机数的组合,确保了待认证数据的唯一性。
Through the authentication of the U-KEY by the server and the authentication of the U-KEY by the terminal, when both are authenticated, it means that the legality of the U-KEY is recognized by the server and the terminal, then we will The holder of the U-KEY is allowed to obtain the data to be authenticated from the terminal by using the state transition tool, and the data is sent to the server, and the server encrypts the authentication data by using the authentication private key, generates authentication data, and sends the authentication data to the terminal through the state conversion tool. The terminal authenticates it. If the authentication passes, it means that the server also passes the terminal's approval. Then the holder of the U-KEY approved by the server has the authority to use the state transition tool to legalize the state of the terminal. Ground conversion, to avoid illegal conversion, and after U-KEY through the server and terminal authentication, the subsequent steps can be completed automatically, greatly improving the speed of conversion, greatly facilitating the debugging of application developers. In step S208: the state transition tool sends the state to be converted to the terminal, and the terminal switches the state. The state transition tool obtains the terminal information and the data to be authenticated from the terminal, where the terminal information refers to the terminal serial number, and the data to be authenticated is the serial number of the motherboard and the random number, wherein the serial number of the motherboard of each terminal is unique, in this implementation In the example, the random number is a 16-byte random number. In other embodiments, the random number may be a letter or a character of other digits. The uniqueness of the data to be authenticated is ensured by using a combination of the motherboard serial number and the random number having the uniquely identified terminal.
状态转换工具把这些数据发送给服务端。服务端对终端信息进行认证,并生成认证数据;服务端获取到终端信息后,判断该终端信息的合法性,判断其是合法的以后,服务端再使用认证私钥对待认证数据进行加密,生成认证数据,并把认证数据发送给状态转换工具。The state transition tool sends this data to the server. The server authenticates the terminal information and generates authentication data. After the server obtains the terminal information, it determines the legality of the terminal information, and determines that it is legal. The server then uses the authentication private key to encrypt the authentication data. Authenticate data and send the authentication data to the state transition tool.
在本实施例中,出于安全性要求较高的考虑,因为每个终端使用的公钥都是不一样的,因此在服务端判断终端信息的时候,不仅仅判断其合法性,同时也根据该终端信息,使用与该终端对应的私钥对待认证数据进行加密。通过使用私钥对待认证数据进行加密,确保了生成的认证数据在数据传输的过程中不会被其它非法者截取,去冒充真正合法的服务端,对终端进行欺骗,引发安全性问题。In this embodiment, because the security requirements are relatively high, because the public key used by each terminal is different, when the server judges the terminal information, it not only judges its legitimacy, but also according to The terminal information encrypts the authentication data using a private key corresponding to the terminal. By using the private key to encrypt the authentication data, it is ensured that the generated authentication data is not intercepted by other illegal persons in the process of data transmission, and it is impersonated as a legitimate server to deceive the terminal and cause security problems.
而在一些其他的实施例中,出于方便性和通用性的考虑,每个终端使用的公钥是一样的,因此服务端只需判断终端信息的合法性,并且服务端用通用的私钥对待认证数据进行加密。In some other embodiments, the public key used by each terminal is the same for convenience and versatility, so the server only needs to judge the legitimacy of the terminal information, and the server uses the universal private key. Encrypt the authentication data.
状态转换工具发送所述认证数据给终端,终端使用公钥对认证数据进行解密,因为服务端用的是与该终端对应的私钥对待认证数据进行加密,因此终端可解密成功,解密成功后,判断解密后的数据中的主板序列号是否是本终端的主板序列号,如果是,则认证通过。认证通过后,状态转换工具发送要转换的状态给终端,终端转换到对应状态。在本实施例中,为了保证安全性,在终端从调试态转入使用态后,设备上的应用程序和密钥会被全部清除;同样地终端从使用态到调试态后,设备上的密钥也会被全部清除。The state conversion tool sends the authentication data to the terminal, and the terminal decrypts the authentication data by using the public key. Because the server uses the private key corresponding to the terminal to encrypt the authentication data, the terminal can decrypt successfully, and after the decryption succeeds, It is judged whether the serial number of the motherboard in the decrypted data is the serial number of the motherboard of the terminal, and if yes, the authentication is passed. After the authentication is passed, the state transition tool sends the state to be converted to the terminal, and the terminal switches to the corresponding state. In this embodiment, in order to ensure security, after the terminal transitions from the debug state to the use state, the application and the key on the device are all cleared; similarly, the terminal is dense from the use state to the debug state. The keys will also be cleared completely.
在某些实施例中,终端从使用态转换到调试态的时候,为了避免用户在这上面输入个人PIN,确保安全性。调试态的界面与使用态有明显区别,调试态下会每隔几秒弹出警告框或水印等方式提示,提示使用者这个终端处于调试态,以免使用者在这种终端上输入个人的PIN。
In some embodiments, when the terminal transitions from the usage state to the debug state, security is ensured in order to prevent the user from entering a personal PIN on it. The interface of the debug state is obviously different from the state of use. In the debug state, a warning box or a watermark pops up every few seconds to prompt the user that the terminal is in the debug state, so that the user does not input the personal PIN on the terminal.
请参阅图1,在某些实施例中,本发明一种授信的终端状态转换系统的方案如下:Referring to FIG. 1, in some embodiments, a scheme of a trusted terminal state transition system of the present invention is as follows:
系统包括:服务端10、终端20和状态转换工具30,其中U-KEY40是插在状态转换工具30上,本实施例中,状态转换工具30为PC,其中U-KEY40中存储有终端根公钥证书下属的工作公钥证书401及工作私钥402,当U-KEY40插在状态转换工具30上后,状态转换工具30上安装有交互软件,使得状态转换工具具有U-KEY交互模块303,其中状态转换工具30还包括:服务端认证模块301和终端认证模块302,其中终端认证模块302主要是用来从终端20获取信息和发送信息给终端20,其中服务端认证模块301主要是用来从服务端10获取信息和发送信息给服务端10。The system includes a server 10, a terminal 20, and a state transition tool 30. The U-KEY 40 is inserted in the state transition tool 30. In this embodiment, the state transition tool 30 is a PC, and the terminal root is stored in the U-KEY 40. The public key certificate 401 and the work private key 402 of the key certificate are installed. After the U-KEY 40 is inserted into the state transition tool 30, the state transition tool 30 is installed with interactive software, so that the state transition tool has a U-KEY interaction module 303. The state transition tool 30 further includes: a server authentication module 301 and a terminal authentication module 302. The terminal authentication module 302 is mainly used to obtain information from the terminal 20 and send information to the terminal 20. The server authentication module 301 is mainly used to Information is obtained from the server 10 and sent to the server 10.
具体如下:details as follows:
服务端认证模块301用于:从服务端10获取第一待认证数据;首先服务端10自己生成第一待认证数据,本实施例中第一待认证数据是16字节随机数,服务端认证模块301再去从服务端10获取第一待认证数据,获取到后,服务端认证模块301把第一待认证数据发送给U-KEY交互模块303。The server authentication module 301 is configured to: obtain the first data to be authenticated from the server 10; first, the server 10 generates the first data to be authenticated by itself. In this embodiment, the first data to be authenticated is a 16-byte random number, and the server authenticates. The module 301 then obtains the first data to be authenticated from the server 10, and after obtaining the data, the server authentication module 301 sends the first data to be authenticated to the U-KEY interaction module 303.
U-KEY交互模块303用于:使用U-KEY40生成第一认证数据;U-KEY交互模块303收到第一待认证数据后,U-KEY交互模块303使用U-KEY40中存储的工作私钥402对第一待认证数据进行加密,加密后生成第一认证数据。The U-KEY interaction module 303 is configured to: use the U-KEY 40 to generate the first authentication data; after the U-KEY interaction module 303 receives the first to-be-authenticated data, the U-KEY interaction module 303 uses the working private key stored in the U-KEY 40. 402 encrypts the first to-be-certified data, and generates the first authentication data after encryption.
生成第一认证数据后,服务端认证模块301用于:将第一认证数据和工作公钥证书401发给服务端10进行认证;其中这边所发送的工作公钥证书401里面含有可以解密第一认证数据的公钥,是为了方便服务端10收到以后可以提取里面的公钥,再去解密第一认证数据。After the first authentication data is generated, the server authentication module 301 is configured to: send the first authentication data and the working public key certificate 401 to the server 10 for authentication; wherein the working public key certificate 401 sent here can be decrypted. The public key of the authentication data is for facilitating the server 10 to extract the public key after receiving it, and then decrypting the first authentication data.
终端认证模块302用于:从终端20获取第二待认证数据;同样地,终端20生成第二待认证数据,本实施例中第二待认证数据是终端主板序列号和随机数的组合,这边的终端主板序列号具有唯一性,可以唯一标识一个终端。
终端20生成第二待认证数据后,终端认证模块302就去获取第二待认证数据,并且终端认证模块302把第二待认证数据发送给U-KEY交互模块303。The terminal authentication module 302 is configured to: acquire the second data to be authenticated from the terminal 20; similarly, the terminal 20 generates the second data to be authenticated. In this embodiment, the second data to be authenticated is a combination of the terminal serial number and the random number. The serial number of the terminal board on the side is unique and can uniquely identify a terminal.
After the terminal 20 generates the second data to be authenticated, the terminal authentication module 302 obtains the second data to be authenticated, and the terminal authentication module 302 sends the second data to be authenticated to the U-KEY interaction module 303.
U-KEY交互模块303用于:使用U-KEY40生成第二认证数据;U-KEY交互模块303使用U-KEY40中的工作私钥对第二待认证数据进行加密,生成第二认证数据,生成第二认证数据后。The U-KEY interaction module 303 is configured to: generate the second authentication data by using the U-KEY 40; the U-KEY interaction module 303 encrypts the second to-be-authenticated data by using the working private key in the U-KEY 40 to generate the second authentication data, and generate After the second authentication data.
终端认证模块302用于:将第二认证数据和工作公钥证书401发给终端20进行认证;其中这边所发送的工作公钥证书401里面含有可以解密第二认证数据的公钥,是为了方便服务端10收到以后可以提取里面的公钥,再去解密第二认证数据。The terminal authentication module 302 is configured to: send the second authentication data and the working public key certificate 401 to the terminal 20 for authentication; wherein the working public key certificate 401 sent here contains a public key that can decrypt the second authentication data, in order to It is convenient for the server 10 to extract the public key after receiving it, and then decrypt the second authentication data.
服务端10对第一认证数据认证和终端20对第二认证数认证是否都通过;服务端10还用于:接收所述工作公钥证书401,服务端10提取所述工作公钥证书401中的公钥,服务端10使用所述公钥对所述第一认证数据进行解密,获取所述第一认证数据中的待认证数据明文,比对所述第一认证数据中的待认证数据明文与所述第一待认证数据是否一致,若一致,认证通过;The server 10 passes the first authentication data authentication and the terminal 20 and the second authentication number authentication. The server 10 is further configured to: receive the working public key certificate 401, and the server 10 extracts the working public key certificate 401. The public key, the server 10 decrypts the first authentication data by using the public key, and obtains the plaintext of the data to be authenticated in the first authentication data, and compares the plaintext of the data to be authenticated in the first authentication data. Whether it is consistent with the first data to be authenticated, and if the data is consistent, the authentication is passed;
终端20还用于:接收所述工作公钥证书401,终端20提取所述工作公钥证书401中的公钥,终端20使用所述公钥对所述第二认证数据进行解密,获取所述第二认证数据中的待认证数据明文,比对所述第二认证数据中的待认证数据明文与所述第二待认证数据是否一致,若一致,认证通过。The terminal 20 is further configured to: receive the working public key certificate 401, the terminal 20 extracts the public key in the working public key certificate 401, and the terminal 20 decrypts the second authentication data by using the public key to obtain the The plaintext of the data to be authenticated in the second authentication data is compared with whether the plaintext of the data to be authenticated in the second authentication data is consistent with the data to be authenticated.
两者都验证通过,那么也就意味着U-KEY40的合法性得到了服务端10和终端20的认可,那么接下来我们就允许U-KEY40的持有者使用状态转换工具30从服务端10获取认证数据,用于终端20的认证;Both of them are verified, which means that the legality of the U-KEY 40 is recognized by the server 10 and the terminal 20, then we allow the holder of the U-KEY 40 to use the state transition tool 30 from the server 10 Acquiring authentication data for authentication of the terminal 20;
终端认证模块302用于:发送要转换的状态给终端20,终端20转换状态。终端认证模块302会从终端20获取终端信息和待认证数据,所述终端信息是指终端序列号,待认证数据是主板序列号和随机数,其中每个终端20的主板序列号是唯一的,在本实施例中随机数为16字节随机数,在其他实施例中,随机数可以为其他位数的字母或者字符都可以。
The terminal authentication module 302 is configured to: send a state to be converted to the terminal 20, and the terminal 20 switches states. The terminal authentication module 302 obtains terminal information and data to be authenticated from the terminal 20, where the terminal information refers to a terminal serial number, and the data to be authenticated is a serial number of the motherboard and a random number, wherein the serial number of the motherboard of each terminal 20 is unique. In this embodiment, the random number is a 16-byte random number. In other embodiments, the random number may be a letter or a character of other digits.
服务端认证模块301用于:把这些数据发送给服务端10。The server authentication module 301 is configured to: send the data to the server 10.
服务端10用于:对终端信息进行认证,并生成认证数据;服务端10获取到终端信息后,判断该终端信息的合法性,判断其是合法的以后,服务端10再使用认证私钥对待认证数据进行加密,生成认证数据,并把认证数据发送给服务端认证模块301。The server 10 is configured to: authenticate the terminal information and generate the authentication data; after the server 10 obtains the terminal information, determine the legality of the terminal information, and determine that it is legal, the server 10 treats the authentication private key again. The authentication data is encrypted, the authentication data is generated, and the authentication data is sent to the server authentication module 301.
在本实施例中,出于安全性要求较高的考虑,因为每个终端20使用的公钥都是不一样的,因此在服务端10判断终端信息的时候,不仅仅判断其合法性,同时也根据该终端信息,使用与该终端20对应的私钥对待认证数据进行加密。In this embodiment, for the sake of high security requirements, since the public key used by each terminal 20 is different, when the server 10 judges the terminal information, it not only judges its legality, but also The authentication data is also encrypted using the private key corresponding to the terminal 20 based on the terminal information.
而在一些其他的实施例中,出于方便性和通用性的考虑,每个终端20使用的公钥是一样的,因此服务端10只需判断终端信息的合法性,并且服务端10用通用的私钥对待认证数据进行加密。In some other embodiments, the public key used by each terminal 20 is the same for convenience and versatility, so the server 10 only needs to judge the legitimacy of the terminal information, and the server 10 uses the universal The private key encrypts the authentication data.
终端认证模块302用于:把所述认证数据发送给终端20。The terminal authentication module 302 is configured to: send the authentication data to the terminal 20.
终端20还用于:使用公钥对认证数据进行解密,因为服务端10用的是与该终端20对应的私钥对待认证数据进行加密,因此终端20可解密成功,解密成功后,判断解密后的数据中的主板序列号是否是本终端20的主板序列号,如果是,则认证通过。The terminal 20 is further configured to: use the public key to decrypt the authentication data, because the server 10 uses the private key corresponding to the terminal 20 to encrypt the authentication data, so the terminal 20 can decrypt successfully, and after decryption succeeds, the decryption is determined. Whether the serial number of the motherboard in the data is the serial number of the motherboard of the terminal 20, and if so, the authentication is passed.
认证通过后,终端认证模块302还用于:发送要转换的状态给终端20,终端20转换到对应状态。在本实施例中,为了保证安全性,在终端20从调试态转入使用态后,设备上的应用程序和密钥会被全部清除;同样地终端20从使用态到调试态后,设备上的密钥也会被全部清除。After the authentication is passed, the terminal authentication module 302 is further configured to: send the status to be converted to the terminal 20, and the terminal 20 switches to the corresponding status. In this embodiment, in order to ensure security, after the terminal 20 transitions from the debug state to the use state, the application program and the key on the device are all cleared; similarly, the terminal 20 is from the use state to the debug state, on the device. The keys will also be cleared.
在某些实施例中,终端20从使用态转换到调试态的时候,为了避免用户在这上面输入个人PIN,确保安全性。调试态的界面与使用态有明显区别,调试态下会每隔几秒弹出警告框或水印等方式提示,提示使用者这个终端处于调试态,以免使用者在这种终端20上输入个人的PIN。
In some embodiments, when the terminal 20 transitions from the usage state to the debug state, security is ensured in order to prevent the user from entering a personal PIN thereon. The interface of the debug state is obviously different from the state of use. In the debug state, a warning box or a watermark pops up every few seconds to prompt the user that the terminal is in the debug state, so that the user does not enter the personal PIN on the terminal 20. .
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者终端设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者终端设备所固有的要素。在没有更多限制的情况下,由语句“包括……”或“包含……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者终端设备中还存在另外的要素。此外,在本文中,“大于”、“小于”、“超过”等理解为不包括本数;“以上”、“以下”、“以内”等理解为包括本数。It should be noted that, in this context, relational terms such as first and second are used merely to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply such entities or operations. There is any such actual relationship or order between them. Furthermore, the terms "comprises" or "comprising" or "comprising" or any other variations are intended to encompass a non-exclusive inclusion, such that a process, method, article, or terminal device that includes a plurality of elements includes not only those elements but also Other elements that are included, or include elements inherent to such a process, method, article, or terminal device. An element defined by the phrase "including" or "comprising" does not exclude the presence of additional elements in the process, method, article or terminal device including the element. In addition, in this document, “greater than”, “less than”, “exceeded”, etc. are understood as not including the number; “above”, “below”, “inside”, etc. are understood to include the number.
本领域内的技术人员应明白,上述各实施例可提供为方法、装置、或计算机程序产品。这些实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。上述各实施例涉及的方法中的全部或部分步骤可以通过程序来指令相关的硬件来完成,所述的程序可以存储于计算机设备可读取的存储介质中,用于执行上述各实施例方法所述的全部或部分步骤。所述计算机设备,包括但不限于:个人计算机、服务器、通用计算机、专用计算机、网络设备、嵌入式设备、可编程设备、智能移动终端、智能家居设备、穿戴式智能设备、车载智能设备等;所述的存储介质,包括但不限于:RAM、ROM、磁碟、磁带、光盘、闪存、U盘、移动硬盘、存储卡、记忆棒、网络服务器存储、网络云存储等。Those skilled in the art will appreciate that the various embodiments described above can be provided as a method, apparatus, or computer program product. These embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware aspects. All or part of the steps involved in the foregoing embodiments may be completed by a program instructing related hardware, and the program may be stored in a storage medium readable by a computer device for executing the method embodiments of the foregoing embodiments. All or part of the steps described. The computer device includes but is not limited to: a personal computer, a server, a general purpose computer, a special purpose computer, a network device, an embedded device, a programmable device, a smart mobile terminal, a smart home device, a wearable smart device, a vehicle smart device, and the like; The storage medium includes, but is not limited to, a RAM, a ROM, a magnetic disk, a magnetic tape, an optical disk, a flash memory, a USB flash drive, a mobile hard disk, a memory card, a memory stick, a network server storage, a network cloud storage, and the like.
上述各实施例是参照根据实施例所述的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到计算机设备的处理器以产生一个机器,使得通过计算机设备的处理器执行的指令产生用于实现在流
程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The above embodiments are described with reference to flowcharts and/or block diagrams of methods, apparatus (systems), and computer program products according to the embodiments. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. The computer program instructions can be provided to a processor of the computer device to generate a machine such that instructions executed by the processor of the computer device are generated for implementation in the stream
A device that is a process or a plurality of processes and/or a block diagram of a function specified in a block or blocks.
这些计算机程序指令也可存储在能引导计算机设备以特定方式工作的计算机设备可读存储器中,使得存储在该计算机设备可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer device readable memory that can direct the computer device to operate in a particular manner, such that instructions stored in the computer device readable memory produce an article of manufacture comprising the instruction device, the instruction device being implemented in the process Figure One or more processes and/or block diagrams of the functions specified in a block or blocks.
这些计算机程序指令也可装载到计算机设备上,使得在计算机设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer device such that a series of operational steps are performed on the computer device to produce computer-implemented processing, such that instructions executed on the computer device are provided for implementing one or more processes in the flowchart And/or block diagram of the steps of a function specified in a box or blocks.
尽管已经对上述各实施例进行了描述,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例做出另外的变更和修改,所以以上所述仅为本发明的实施例,并非因此限制本发明的专利保护范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围之内。
Although the above embodiments have been described, those skilled in the art can make other changes and modifications to these embodiments once they have learned the basic inventive concept, so the above is only the implementation of the present invention. For example, the scope of the patent protection of the present invention is not limited thereto, and equivalent structural or equivalent process transformations made by using the description of the present invention and the contents of the drawings, or directly or indirectly applied to other related technical fields, are equally included in the present invention. Within the scope of patent protection of the invention.
Claims (8)
- 一种授信的终端状态转换方法,其特征在于,包括步骤:A method for transferring terminal state transitions, comprising the steps of:服务端发送第一待认证数据给状态转换工具,所述状态转换工具从U-KEY获取工作公钥证书和工作私钥;The server sends the first to-be-certified data to the state transition tool, and the state transition tool obtains the working public key certificate and the work private key from the U-KEY;状态转换工具使用所述工作私钥对所述第一待认证数据进行加密,生成第一认证数据,状态转换工具发送所述工作公钥证书和所述第一认证数据给服务端;The state transition tool encrypts the first to-be-certified data by using the working private key to generate first authentication data, and the state transition tool sends the working public key certificate and the first authentication data to the server;服务端对第一认证数据进行认证;The server authenticates the first authentication data;终端发送第二待认证数据给状态转换工具;The terminal sends the second to-be-certified data to the state transition tool;状态转换工具使用所述工作私钥对第二待认证数据进行加密,生成第二认证数据,状态转换工具发送所述工作公钥证书和所述第二认证数据给终端;The state conversion tool encrypts the second to-be-certified data by using the working private key to generate second authentication data, and the state conversion tool sends the working public key certificate and the second authentication data to the terminal;终端对第二认证数据进行认证;The terminal authenticates the second authentication data;若服务端对第一认证数据认证通过且终端对第二认证数据认证通过,状态转换工具从终端获取待认证数据,状态转换工具发送所述待认证数据给服务端;If the server authenticates the first authentication data and the terminal authenticates the second authentication data, the state transition tool obtains the data to be authenticated from the terminal, and the state transition tool sends the data to be authenticated to the server.服务端使用认证私钥对所述待认证数据进行加密生成认证数据,服务端发送所述认证数据给状态转换工具,状态转换工具发送所述认证数据给终端;The server uses the authentication private key to encrypt the data to be authenticated to generate authentication data, and the server sends the authentication data to the state conversion tool, and the state conversion tool sends the authentication data to the terminal.终端对所述认证数据进行认证,若认证通过,对终端状态进行转换。The terminal authenticates the authentication data, and if the authentication passes, the terminal status is converted.
- 根据权利要求1所述的一种授信的终端状态转换方法,其特征在于,A method for converting a terminal state of a credit according to claim 1, wherein:服务端对第一认证数据进行认证,包括步骤:The server authenticates the first authentication data, including the steps:服务端接收所述工作公钥证书,服务端提取所述工作公钥证书中的公钥,服务端使用所述公钥对所述第一认证数据进行解密,获取所述第一认证数据中的待认证数据明文,比对所述第一认证数据中的待认证数据明文与所述第一待认证数据是否一致,若一致,认证通过;The server receives the working public key certificate, and the server extracts the public key in the working public key certificate, and the server decrypts the first authentication data by using the public key to obtain the first authentication data. Whether the plaintext of the data to be authenticated is the same as the data to be authenticated in the first authentication data, and if the data is consistent, the authentication is passed;终端对第二认证数据进行认证,包括步骤:The terminal authenticates the second authentication data, including the steps:终端接收所述工作公钥证书,终端提取所述工作公钥证书中的公钥,终端使用所述公钥对所述第二认证数据进行解密,获取所述第二认证数据中的 待认证数据明文,比对所述第二认证数据中的待认证数据明文与所述第二待认证数据是否一致,若一致,认证通过。The terminal receives the working public key certificate, the terminal extracts the public key in the working public key certificate, and the terminal decrypts the second authentication data by using the public key to obtain the second authentication data. Whether the plaintext of the data to be authenticated is the same as the data to be authenticated in the second authentication data, and if the data is consistent, the authentication is passed.
- 根据权利要求1所述的一种授信的终端状态转换方法,其特征在于,A method for converting a terminal state of a credit according to claim 1, wherein:所述终端状态包括使用态和调试态,终端不保存使用态和调试态下的应用程序和密钥;The terminal status includes a usage state and a debug state, and the terminal does not save the application and the key in the usage state and the debug state;终端从使用态切换到调试态,终端清除所述使用态下终端的密钥;The terminal switches from the use state to the debug state, and the terminal clears the key of the terminal in the use state;终端从调试态切换到使用态,终端清除所述调试态下终端的应用程序和密钥。The terminal switches from the debug state to the use state, and the terminal clears the application and the key of the terminal in the debug state.
- 根据权利要求1所述的一种授信的终端状态转换方法,其特征在于,A method for converting a terminal state of a credit according to claim 1, wherein:所述第一待认证数据是随机数,所述第二待认证数据是终端主板序列号与随机数的组合。The first to-be-certified data is a random number, and the second to-be-certified data is a combination of a terminal board serial number and a random number.
- 一种授信的终端状态转换系统,其特征在于,包括:服务端、终端、状态转换工具,所述状态转换工具包括:服务端认证模块、终端认证模块和U-KEY交互模块;A trusted terminal state transition system, comprising: a server, a terminal, and a state transition tool, wherein the state transition tool comprises: a server authentication module, a terminal authentication module, and a U-KEY interaction module;所述服务端用于:发送第一待认证数据给状态转换工具,所述状态转换工具从U-KEY获取工作公钥证书和工作私钥;The server is configured to: send a first to-be-certified data to a state transition tool, where the state transition tool obtains a working public key certificate and a work private key from the U-KEY;所述U-KEY交互模块用于:使用所述工作私钥对所述第一待认证数据进行加密,生成第一认证数据;The U-KEY interaction module is configured to: encrypt the first to-be-certified data by using the working private key to generate first authentication data;所述服务端认证模块用于:发送所述工作公钥证书和所述第一认证数据给服务端;The server authentication module is configured to: send the working public key certificate and the first authentication data to a server;所述服务端用于:对第一认证数据进行认证;The server is configured to: authenticate the first authentication data;所述终端用于:发送第二待认证数据给状态转换工具;The terminal is configured to: send a second to-be-certified data to a state transition tool;所述U-KEY交互模块用于:使用所述工作私钥对第二待认证数据进行加密,生成第二认证数据;The U-KEY interaction module is configured to: encrypt the second to-be-certified data by using the working private key, to generate second authentication data;所述终端认证模块用于:发送所述工作公钥证书和所述第二认证数据给终端; The terminal authentication module is configured to: send the working public key certificate and the second authentication data to the terminal;所述终端用于:对第二认证数据进行认证;The terminal is configured to: authenticate the second authentication data;若服务端对第一认证数据认证通过且终端对第二认证数据认证通过,所述终端认证模块用于:从终端获取待认证数据;If the server authenticates the first authentication data and the terminal authenticates the second authentication data, the terminal authentication module is configured to: obtain data to be authenticated from the terminal;所述服务端认证模块用于:发送所述待认证数据给服务端;The server authentication module is configured to: send the data to be authenticated to a server;所述服务端还用于:使用认证私钥对所述待认证数据进行加密生成认证数据,服务端发送所述认证数据给状态转换工具;The server is further configured to: use the authentication private key to encrypt the to-be-authenticated data to generate authentication data, and the server sends the authentication data to the state transition tool;所述终端认证模块还用于:发送所述认证数据给终端;The terminal authentication module is further configured to: send the authentication data to the terminal;所述终端还用于:对所述认证数据进行认证,若认证通过,对终端状态进行转换。The terminal is further configured to: authenticate the authentication data, and if the authentication passes, convert the terminal status.
- 根据权利要求5所述的一种授信的终端状态转换系统,其特征在于,A trusted terminal state transition system according to claim 5, wherein所述服务端用于:对第一认证数据进行认证,包括:The server is configured to: authenticate the first authentication data, including:服务端接收所述工作公钥证书,服务端提取所述工作公钥证书中的公钥,服务端使用所述公钥对所述第一认证数据进行解密,获取所述第一认证数据中的待认证数据明文,比对所述第一认证数据中的待认证数据明文与所述第一待认证数据是否一致,若一致,认证通过;The server receives the working public key certificate, and the server extracts the public key in the working public key certificate, and the server decrypts the first authentication data by using the public key to obtain the first authentication data. Whether the plaintext of the data to be authenticated is the same as the data to be authenticated in the first authentication data, and if the data is consistent, the authentication is passed;所述终端用于:对第二认证数据进行认证,包括:The terminal is configured to: authenticate the second authentication data, including:终端接收所述工作公钥证书,终端提取所述工作公钥证书中的公钥,终端使用所述公钥对所述第二认证数据进行解密,获取所述第二认证数据中的待认证数据明文,比对所述第二认证数据中的待认证数据明文与所述第二待认证数据是否一致,若一致,认证通过。Receiving, by the terminal, the working public key certificate, the terminal extracting the public key in the working public key certificate, the terminal decrypting the second authentication data by using the public key, and acquiring the data to be authenticated in the second authentication data The plaintext compares whether the plaintext of the data to be authenticated in the second authentication data is consistent with the data to be authenticated, and if yes, the authentication passes.
- 根据权利要求5所述的一种授信的终端状态转换系统,其特征在于,A trusted terminal state transition system according to claim 5, wherein所述终端状态包括使用态和调试态,终端不保存使用态和调试态下的应用程序和密钥;The terminal status includes a usage state and a debug state, and the terminal does not save the application and the key in the usage state and the debug state;终端从使用态切换到调试态,终端清除所述使用态下终端的密钥;The terminal switches from the use state to the debug state, and the terminal clears the key of the terminal in the use state;终端从调试态切换到使用态,终端清除所述调试态下终端的应用程序和密钥。 The terminal switches from the debug state to the use state, and the terminal clears the application and the key of the terminal in the debug state.
- 根据权利要求5所述的一种授信的终端状态转换系统,其特征在于,A trusted terminal state transition system according to claim 5, wherein所述第一待认证数据是随机数,所述第二待认证数据是终端主板序列号与随机数的组合。 The first to-be-certified data is a random number, and the second to-be-certified data is a combination of a terminal board serial number and a random number.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610680420.8 | 2016-08-18 | ||
CN201610680420.8A CN106161036B (en) | 2016-08-18 | 2016-08-18 | A kind of mobile station (MS) state transition method and system of credit |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018033017A1 true WO2018033017A1 (en) | 2018-02-22 |
Family
ID=57331311
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/096835 WO2018033017A1 (en) | 2016-08-18 | 2017-08-10 | Terminal state conversion method and system for credit granting |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106161036B (en) |
WO (1) | WO2018033017A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111901117A (en) * | 2019-05-06 | 2020-11-06 | 深圳大普微电子科技有限公司 | Safety authentication method and system based on JTAG interface |
US20230048889A1 (en) * | 2020-01-08 | 2023-02-16 | Lenovo (Beijing) Ltd. | Method and apparatus for timely scheduling |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106161036B (en) * | 2016-08-18 | 2019-04-23 | 福建联迪商用设备有限公司 | A kind of mobile station (MS) state transition method and system of credit |
CN113541966A (en) * | 2021-07-23 | 2021-10-22 | 湖北亿咖通科技有限公司 | Authority management method, device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040250082A1 (en) * | 2003-03-28 | 2004-12-09 | Fujitsu Limited | Digital signature generation method, digital signature authentication method, digital signature generation request program and digital signature authentication request program |
CN103516524A (en) * | 2013-10-21 | 2014-01-15 | 北京旋极信息技术股份有限公司 | Security authentication method and system |
CN104581706A (en) * | 2015-01-09 | 2015-04-29 | 上海华申智能卡应用系统有限公司 | Data security interactive method based on asymmetric encryption technology between intelligent mobile terminals |
CN105827412A (en) * | 2016-03-14 | 2016-08-03 | 中金金融认证中心有限公司 | Authentication method, server and client |
CN106161036A (en) * | 2016-08-18 | 2016-11-23 | 福建联迪商用设备有限公司 | The mobile station (MS) state transition method of a kind of credit and system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9350708B2 (en) * | 2010-06-01 | 2016-05-24 | Good Technology Corporation | System and method for providing secured access to services |
CN102737311B (en) * | 2012-05-11 | 2016-08-24 | 福建联迪商用设备有限公司 | Internet bank security authentication method and system |
CN102801524B (en) * | 2012-06-13 | 2015-01-21 | 天津大学 | Trust-theory-based trusted service system based on trusted authentication system |
CN103731266B (en) * | 2012-10-12 | 2017-05-10 | 北京微智全景信息技术有限公司 | Method and system for authenticating electronic certificate |
CN103490895B (en) * | 2013-09-12 | 2016-09-14 | 电小虎能源科技(北京)有限公司 | A kind of industrial control identity authentication applying the close algorithm of state and device |
-
2016
- 2016-08-18 CN CN201610680420.8A patent/CN106161036B/en active Active
-
2017
- 2017-08-10 WO PCT/CN2017/096835 patent/WO2018033017A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040250082A1 (en) * | 2003-03-28 | 2004-12-09 | Fujitsu Limited | Digital signature generation method, digital signature authentication method, digital signature generation request program and digital signature authentication request program |
CN103516524A (en) * | 2013-10-21 | 2014-01-15 | 北京旋极信息技术股份有限公司 | Security authentication method and system |
CN104581706A (en) * | 2015-01-09 | 2015-04-29 | 上海华申智能卡应用系统有限公司 | Data security interactive method based on asymmetric encryption technology between intelligent mobile terminals |
CN105827412A (en) * | 2016-03-14 | 2016-08-03 | 中金金融认证中心有限公司 | Authentication method, server and client |
CN106161036A (en) * | 2016-08-18 | 2016-11-23 | 福建联迪商用设备有限公司 | The mobile station (MS) state transition method of a kind of credit and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111901117A (en) * | 2019-05-06 | 2020-11-06 | 深圳大普微电子科技有限公司 | Safety authentication method and system based on JTAG interface |
US20230048889A1 (en) * | 2020-01-08 | 2023-02-16 | Lenovo (Beijing) Ltd. | Method and apparatus for timely scheduling |
Also Published As
Publication number | Publication date |
---|---|
CN106161036B (en) | 2019-04-23 |
CN106161036A (en) | 2016-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113545006B (en) | Remote authorized access locked data storage device | |
TWI809292B (en) | Data encryption and decryption method, device, storage medium and encrypted file | |
CN110401615B (en) | Identity authentication method, device, equipment, system and readable storage medium | |
CN107743067B (en) | Method, system, terminal and storage medium for issuing digital certificate | |
WO2018040880A1 (en) | Method and system for granting authority to acquire terminal attack alarm information log | |
CN106452764B (en) | Method for automatically updating identification private key and password system | |
US20240179005A1 (en) | Advanced crypto token authentication | |
EP3001598B1 (en) | Method and system for backing up private key in electronic signature token | |
CN107733636B (en) | Authentication method and authentication system | |
WO2018033017A1 (en) | Terminal state conversion method and system for credit granting | |
CN109922027B (en) | Credible identity authentication method, terminal and storage medium | |
WO2016054905A1 (en) | Method for processing data | |
CN111124453B (en) | Method for upgrading firmware program of terminal equipment | |
CN113316915B (en) | Unlocking a data storage device | |
CN112528236B (en) | Application software authorization method based on virtual machine | |
CN105099705A (en) | Safety communication method and system based on USB protocol | |
CN112800392A (en) | Authorization method and device based on soft certificate and storage medium | |
CN108768941B (en) | Method and device for remotely unlocking safety equipment | |
CN113545021B (en) | Registration of pre-authorized devices | |
CN106797381B (en) | Communication adapter for user authentication | |
CN105873043B (en) | Method and system for generating and applying network private key for mobile terminal | |
WO2018033016A1 (en) | Method and system for authorizing conversion of terminal state | |
WO2018040881A1 (en) | Method and system for authorizing to clear attack alarm for terminal | |
CN110968878A (en) | Information transmission method, system, electronic device and readable medium | |
CN110210189B (en) | Software verification method, software and hardware binding method and programmable device thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17840991 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17840991 Country of ref document: EP Kind code of ref document: A1 |