WO2018130141A1 - Ic卡自带密码输入系统和ic卡自带密码输入方法 - Google Patents

Ic卡自带密码输入系统和ic卡自带密码输入方法 Download PDF

Info

Publication number
WO2018130141A1
WO2018130141A1 PCT/CN2018/071914 CN2018071914W WO2018130141A1 WO 2018130141 A1 WO2018130141 A1 WO 2018130141A1 CN 2018071914 W CN2018071914 W CN 2018071914W WO 2018130141 A1 WO2018130141 A1 WO 2018130141A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
card
cloud
hash value
input
Prior art date
Application number
PCT/CN2018/071914
Other languages
English (en)
French (fr)
Inventor
萧东
Original Assignee
上海亚融信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海亚融信息技术有限公司 filed Critical 上海亚融信息技术有限公司
Priority to US16/477,941 priority Critical patent/US20190362065A1/en
Publication of WO2018130141A1 publication Critical patent/WO2018130141A1/zh
Priority to US17/994,133 priority patent/US20230086015A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/0772Physical layout of the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/204Point-of-sale [POS] network systems comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • the invention relates to the field of financial card payment, in particular to an IC card self-contained password input system and an IC card self-contained password input method.
  • IC card Integrated Circuit Card
  • smart card also known as smart card, smart card, NFC card (Card with Near Field Communication technology) or microchip card, etc.
  • NFC card Card with Near Field Communication technology
  • microchip card etc.
  • the chip is embedded in the card base to form a card with multiple functions.
  • IC card has been widely used in the fields of identity authentication, bank payment, public transportation, access control and so on because of its inherent information security, portability, and perfect standardization.
  • a bank card with a keyboard in which a keyboard, a memory microchip, a control circuit microchip, an interface, and a micro length are embedded in the bank card.
  • the lithium battery is connected to the memory microchip, the memory microchip is connected to the interface, the interface is also connected to the control circuit microchip, the control circuit microchip is also connected to the keyboard and the memory microchip respectively, and the micro long-lasting lithium battery is connected in the memory micro Chip and control circuit on the microchip.
  • the depositor inserts the bank card with the keyboard into the cash machine at the cash machine, and the card automatically transmits the data such as the password and the withdrawal amount to the cash machine.
  • the cash machine sends a clear signal to the card, and the password and other data in the card are cleared.
  • a bank card having an input/output function is also disclosed. Similar to the previous patent, the storage module for storing the personal security information of the bank card and the personal identification password of the bank card is also set in the bank card. And through the verification of this information to achieve payment.
  • the object of the present invention is to provide an IC card self-contained password input system and an IC card self-contained password input method, and the IC card self-contained password input system using the IC card with a password input method has better security.
  • the present invention provides an IC card self-contained password input system, including: an IC card, a mobile terminal, a payment terminal, and a cloud;
  • the IC card is provided with an input module for inputting a first password, a processor module connected to the input module, and a communication module connected to the processor module, and the communication module establishes a communication connection with the cloud through the payment terminal;
  • the mobile terminal is connected to the cloud, and the mobile terminal is configured to send the second password input and set on the mobile terminal to the cloud after the identity verification by the cloud;
  • the cloud is configured to store the third password, and is further configured to update the stored third password according to the second password, and is further configured to compare the first password and the third password input on the IC card;
  • the verification succeeds, and the cloud then processes the content such as the message forwarded by the payment terminal; if the first password and the third password are different, the verification fails, and the cloud does not process the forwarding by the payment terminal. Message.
  • the invention also provides a method for inputting an IC card with a password, which comprises the following steps:
  • the mobile terminal establishes a communication connection with the cloud
  • the mobile terminal sends a second password to the cloud, and the cloud updates the stored third password based on the second password;
  • the communication module of the IC card establishes a communication connection with the cloud through the payment terminal;
  • the first password of the input module of the IC card, and the communication module of the IC card sends the first password to the cloud through the payment terminal;
  • the cloud compares the first password with the third password. If the first password is the same as the third password, the verification succeeds, and the cloud then processes the packet forwarded by the payment terminal. If the first password and the third password are different, the verification fails. The cloud does not process the packets forwarded by the payment terminal.
  • the present invention attempts to solve the above-mentioned problems of security, convenience and experience from a system level.
  • the user only needs to input a password on his own IC card, is very familiar with his own device, and can enter the password and the transaction asynchronously (allowing the transaction to be performed within a few minutes after the password is entered), so that it can be completed more quickly.
  • the payment process is more convenient.
  • the input module comprises N touch pads or buttons formed as an array on the surface of the IC card, N being a natural number greater than or equal to 4. It is worth mentioning that some prior art proposed to embed a fingerprint identification module on a bank card/credit card for anti-counterfeiting authentication. However, such module cost will be significantly higher than the password input module of this patent.
  • a password can be formed by drawing a gesture on the touch sheet. Therefore, preferably, in the step of inputting the first password to the input module of the IC card, the input module recognizes the input password according to the gesture drawn by the finger on the touch sheet.
  • a touchpad greater than or equal to 4 is sufficient to form a password of sufficient complexity.
  • the password is very easy to remember and is very easy to input.
  • N is equal to 9
  • the touch pad or the button forms a nine-square grid on the surface of the IC card.
  • the touch sheet or button that forms the nine-square grid is in line with the existing user habits, fully taking into account the user experience and improving the user's adaptability.
  • the IC card is further provided with a battery for supplying power to the input module and the processor module.
  • the timing of the input module can be more flexible.
  • the IC card is further provided with a solar charging board or a solar charging film, and the solar charging board or the solar charging film is used for charging the battery. Considering that the power consumption of the input module and the processor module is not high, the solar energy is charged, the power is enough to be guaranteed, and the charging is very convenient.
  • the third password stored in the cloud is a one-way hash value of the third password.
  • the cloud stores the one-way hash value of the third password, only the one-way hash value of the first password and the third password is needed to verify the password, so that the security is better.
  • the mobile terminal sends the second password to the cloud, and the cloud updates the stored third password based on the second password:
  • the cloud calculates a one-way hash value of the second password, and updates the stored one-way hash value of the third password;
  • the second password and the third password are not recorded in the cloud, and even if the data is stolen, the password itself will not be leaked.
  • the mobile terminal calculates a one-way hash value of the second password, and sends the one-way hash value of the second password to the cloud, and the cloud updates the stored one by the received one-way hash value of the second password.
  • One-way hash value of the three passwords One-way hash value of the three passwords.
  • the second password itself is not recorded in the mobile terminal, and the second password itself does not appear in the communication channel between the mobile terminal and the cloud, thereby effectively reducing the risk of the second password being stolen.
  • the cloud calculates a one-way hash value of the first password, which is compared with the one-way hash value of the third password;
  • the first password and the third password are not recorded in the cloud, which improves the security of the data.
  • the processor module calculates a one-way hash of the first password The value, and the one-way hash value of the first password is sent to the cloud, and the cloud compares the one-way hash value of the first password with the one-way hash value of the third password.
  • the one-way hash value of the first password is calculated by the processor module and sent to the cloud after being received by the payment terminal. Since only one-way hash value of the first password is received on the payment terminal, the unidirectional hash value of the first password can be greatly improved. Security, effectively reducing the risk of passwords being stolen or modified by payment terminals.
  • FIG. 1 is a system block diagram of an IC card self-contained password input system according to a first embodiment of the present invention
  • FIG. 2 is a front elevational view showing an IC card according to a second embodiment of the present invention.
  • FIG. 3 is a front elevational view showing an IC card according to a third embodiment of the present invention.
  • Figure 4 is a side elevational view showing an IC card according to a fifth embodiment of the present invention.
  • Figure 5 is a front elevational view showing an IC card according to a sixth embodiment of the present invention.
  • FIG. 6 is a flow chart of a method for inputting an IC card with a password according to a seventh embodiment of the present invention.
  • the first embodiment of the present invention provides an IC card self-contained password input system, as shown in FIG. 1, comprising: an IC card, a mobile terminal, a payment terminal, and a cloud;
  • the IC card is provided with an input module for inputting a first password, a processor module connected to the input module, and a communication module connected to the processor module, and the communication module establishes a communication connection with the cloud through the payment terminal;
  • the mobile terminal is connected to the cloud, and the mobile terminal is configured to send the second password input and set on the mobile terminal to the cloud after the identity verification by the cloud;
  • the cloud is configured to store the third password, and is further configured to update the stored third password according to the second password, and is further configured to compare the first password and the third password input on the IC card;
  • the verification succeeds, and the cloud then processes the packet forwarded by the payment terminal. If the first password and the third password are different, the verification fails, and the cloud does not process the packet forwarded by the payment terminal.
  • the third password stored in the cloud may be a default initial password.
  • the stored third password can be updated according to the second password.
  • the original third password may be erased, the content of the second password may be used as the new third password, or the characteristic value of the second password corresponding to the second password may be calculated according to the content of the second password ( For example, a one-way hash value or other correlation value capable of implementing the verification function, the feature value as the content of the new third password, and the like.
  • the comparison between the first password and the third password may be an alignment of the password content, or may be an alignment of the password feature values.
  • the payment terminal forwards the IC card and The communication content of the cloud, which may be the communication content related to the payment, thereby implementing the payment action through the IC card.
  • the present invention attempts to solve the above-mentioned problems of security, convenience and experience from a system level.
  • the user only needs to input a password on his own IC card, is very familiar with his own device, and can enter the password and the transaction asynchronously (allowing the transaction to be performed within a few minutes after the password is entered), so that it can be completed more quickly.
  • the payment process is more convenient.
  • a second embodiment of the present invention provides an IC card self-contained password input system, and the second embodiment is a further improvement of the first embodiment, and the main improvement is that, in the second embodiment of the present invention, the input module
  • the N touch pads 1 or buttons formed as an array on the surface of the IC card are included, and N is a natural number greater than or equal to 4.
  • a password can be formed by drawing a gesture on the touch sheet 1.
  • the number of touch sheets 1 is equal to four.
  • the input module recognizes the entered password according to the gesture drawn by the finger on the touch sheet 1.
  • a touch sheet 1 greater than or equal to 4 is sufficient to form a password of sufficient complexity.
  • the password is very easy to remember and is also very convenient for input.
  • the number of touch sheets 1 or buttons is obviously not limited to four. Considering cost and versatility, 4 to 12 are suitable for the number of touchpads 1 or buttons.
  • a third embodiment of the present invention provides an IC card self-contained password input system, and the third embodiment is different from the first embodiment, and the main difference is that in the second embodiment of the present invention, the touch sheet 1 or the number of buttons is equal to 4; and in the third embodiment of the invention, as shown in FIG. 3, the number of touch pads 1 or buttons is equal to 9.
  • the touch sheet 1 or the button forms a nine-square grid on the surface of the IC card.
  • the touch sheet 1 or button forming the nine-square grid is in line with the existing user habits, fully taking into account the user experience and improving the user's adaptability.
  • a fourth embodiment of the present invention provides an IC card self-contained password input system, and the fourth embodiment is a further improvement of the first to third embodiments, and the main improvement is in the fourth embodiment of the present invention.
  • a battery is also disposed in the IC card, and the battery is used to supply power to the input module and the processor module. When the independent power supply is set, the timing of the input module can be more flexible.
  • a fifth embodiment of the present invention provides an IC card self-contained password input system, and a fifth embodiment is a further improvement of the fourth embodiment.
  • the main improvement is that, in the fifth embodiment of the present invention, reference is made to the figure.
  • the IC card is further provided with a solar charging board 3 or a solar charging film, and the solar charging board 3 or the solar charging film is used to charge the battery. Considering that the power consumption of the input module and the processor module is not high, the solar energy is charged, the power is enough to be guaranteed, and the charging is very convenient.
  • the solar charging board 3 or the solar charging film is disposed on the side opposite to the input module. Since the input module occupies a considerable portion of the surface area of the IC card, and the surface area of the solar charging board 3 directly determines its charging efficiency, the solar charging board 3 or the solar charging film is disposed on the side opposite to the input module, which can The solar charging pad 3 or the solar charging film can take up a larger area, thereby achieving a faster charging rate.
  • a sixth embodiment of the present invention provides an IC card self-contained password input system, and a sixth embodiment is a further improvement of the fifth embodiment, and the main improvement is that, in the sixth embodiment of the present invention, reference is made to the figure.
  • the IC card is further provided with a display screen 2, and the display screen 2 is communicatively connected with the processor module; the display screen 2 is used for displaying the transaction confirmation information sent by the payment device.
  • the display screen 2 is disposed on the same side as the input module, and the transaction confirmation information is displayed by the display screen 2, so that the user can always input the password to confirm the transaction. Focus on the IC card, which effectively prevents others from snooping the password.
  • a seventh embodiment of the present invention provides a method for inputting an IC card with a password. Referring to FIG. 6, the method includes the following steps:
  • the mobile terminal establishes a communication connection with the cloud
  • the mobile terminal sends a second password to the cloud, and the cloud updates the stored third password based on the second password;
  • the communication module of the IC card establishes a communication connection with the cloud through the payment terminal;
  • the first password of the input module of the IC card, and the communication module of the IC card sends the first password to the cloud through the payment terminal;
  • the cloud compares the first password with the third password. If the first password is the same as the third password, the verification succeeds, and the cloud then processes the packet forwarded by the payment terminal. If the first password and the third password are different, the verification fails. The cloud does not process the packets forwarded by the payment terminal.
  • the step of "establishing a communication connection between the communication module of the IC card and the cloud” may be in the "first password to the input module of the IC card, and the communication module of the IC card will pass the payment terminal"
  • a password is sent to the cloud at any time before this step, and there is no strict step sequence limitation.
  • the mobile terminal may first establish a communication connection with the cloud, and after updating the third password, the communication module of the IC card establishes a communication connection with the cloud, or may not directly update the third password, and directly adopt the old third password. To verify the comparison with the first password.
  • the third password stored in the cloud may be a default initial password.
  • the stored third password can be updated according to the second password.
  • the original third password may be erased, the content of the second password may be used as the new third password, or the characteristic value of the second password corresponding to the second password may be calculated according to the content of the second password ( For example, a one-way hash value or other correlation value capable of implementing the verification function, the feature value as the content of the new third password, and the like.
  • the comparison between the first password and the third password may be an alignment of the password content, or may be an alignment of the password feature values.
  • the payment terminal forwards the IC card and The communication content of the cloud, which may be the communication content related to the payment, thereby implementing the payment action through the IC card.
  • the present invention attempts to solve the above-mentioned problems of safety, convenience and hygiene from a system level.
  • the present invention improves the data processing efficiency by setting the cloud and uniformly managing the user's password data by the cloud.
  • the password in the cloud is modified by the mobile terminal, so that the privacy is better.
  • the user inputs a password from the IC card
  • the payment terminal forwards the password input from the IC card
  • the cloud verifies the password from the IC card. Since the user password is not required to be stored in the IC card, it has better security.
  • the user only needs to input a password on his own IC card, and is very familiar with his own device, so that the payment can be completed faster, and the convenience is better.
  • An eighth embodiment of the present invention provides a method for inputting an IC card with a password.
  • the eighth embodiment is a further improvement of the seventh embodiment.
  • the main improvement is that in the eighth embodiment of the present invention: the cloud
  • the stored third password is a one-way hash value of the third password.
  • the cloud stores the one-way hash value of the third password, only the one-way hash value of the first password and the third password is needed to verify the password, so that the security is better.
  • the mobile terminal sends the second password to the cloud, and the cloud updates the stored third password based on the second password:
  • the cloud calculates a one-way hash value of the second password, and updates the stored one-way hash value of the third password;
  • the second password and the third password are not recorded in the cloud, and even if the data is stolen, the password will not be leaked.
  • the one-way hash value referred to in this embodiment may be an MD5 code, a SHA-256 code, or the like.
  • a ninth embodiment of the present invention provides a method for inputting an IC card with a password.
  • the ninth embodiment is different from the eighth embodiment, and the main difference is that in the eighth embodiment of the present invention, the cloud is provided.
  • a one-way hash value of the second password is calculated; and in the ninth embodiment of the invention, the one-way hash value of the second password is calculated by the mobile terminal.
  • the mobile terminal sends a second password to the cloud, and the cloud updates the stored third password based on the second password: the mobile terminal calculates a one-way hash value of the second password, and one-way hash of the second password The value is sent to the cloud, and the cloud updates the stored one-way hash value of the third password by the received one-way hash value of the second password.
  • the second password itself is not recorded in the mobile terminal, and the second password itself does not appear in the communication channel between the mobile terminal and the cloud, thereby effectively reducing the risk of the second password being stolen.
  • a tenth embodiment of the present invention provides a method for inputting an IC card with a password
  • a tenth embodiment is a further improvement of any one of the seventh to ninth embodiments, and the main improvement is that in the present invention
  • the cloud calculates a one-way hash value of the first password, and compares the one-way hash value of the third password;
  • the first password and the third password are not recorded in the cloud, which improves the security of the data.
  • An eleventh embodiment of the present invention provides a method for inputting an IC card with a password.
  • the eleventh embodiment is different from the tenth embodiment, and the main difference is that in the tenth embodiment of the present invention, The cloud calculates a one-way hash value of the first password; and in the eleventh embodiment of the invention, the one-way hash value of the first password is calculated by the processor module.
  • the processor module calculates the one-way of the first password.
  • the hash value is sent to the cloud, and the cloud compares the one-way hash value of the first password with the one-way hash value of the third password.
  • the one-way hash value of the first password is calculated by the processor module and sent to the cloud after being received by the payment terminal. Since only one-way hash value of the first password is received on the payment terminal, the unidirectional hash value of the first password can be greatly improved. Security, effectively reducing the risk of passwords being stolen or modified by payment terminals.
  • a twelfth embodiment of the present invention provides a method for inputting an IC card with a password
  • a twelfth embodiment is a further improvement of any one of the seventh to eleventh embodiments, and the main improvement is that
  • the method further includes the following steps:
  • the processor module obtains transaction confirmation information from the payment device and sends it to display screen 2.
  • the transaction confirmation information is displayed by the display screen 2, so that the user can always pay attention to the IC card from the time of inputting the password to confirming the transaction, thereby effectively preventing others from snooping the password.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一种IC卡自带密码输入系统和IC卡自带密码输入方法,IC卡自带密码输入系统包括:IC卡、移动终端,支付终端和云端;IC卡上设有用于输入第一密码的输入模块、与输入模块相连接的处理器模块、与处理器模块相连接的通信模块,通信模块通过支付终端与云端建立通信连接;移动终端与云端通信连接,移动终端用于在通过云端的身份验证后将移动终端上输入并设置的第二密码发送至云端;云端用于存储第三密码,还用于根据第二密码更新所存储的第三密码,还用于比对IC卡上输入的第一密码与第三密码。这一IC卡自带密码输入系统以及IC卡自带密码输入方法具有更好的安全性。

Description

IC卡自带密码输入系统和IC卡自带密码输入方法 技术领域
本发明涉及金融卡支付领域,特别涉及一种IC卡自带密码输入系统和IC卡自带密码输入方法。
背景技术
IC卡(Integrated Circuit Card,集成电路卡),也称智能卡(Smart card)、智慧卡(Intelligent card)、NFC卡(釆用Near Field Communication技术的卡)或微芯片卡等,其将一个微电子芯片嵌入卡基中,形成了具备多种功能的卡片。IC卡由于其固有的信息安全、便于携带、比较完善的标准化等优点,在身份认证、银行支付、公共交通、门禁管理等领域都得到了普遍的应用。
出于安全的考虑,在使用IC卡作支付交易时,通常都需要输入密码。在现有的应用场景中,由于软硬件的限制,通常需要在POS机这样的支付终端上输入密码,而在支付终端上输入密码将带来许多问题:
1、具有安全隐患,恶意的商家或第三方有可能通过改装支付终端,或窥视来窃取用户的密码;
2、增加交易时间,由于用户在陌生的硬件设备上输入密码,每次都需要熟悉不同的设备,并且交易与密码输入需同步进行,增加了交易时间;
3、不卫生,由于支付终端的卫生状况堪忧,容易通过用户的手指传播细菌,影响用户体验。
在申请号为CN200420014345.4的中国实用新型专利中,公开了一种自带键盘的银行卡,在所述的银行卡上内嵌有键盘、存储器微芯片、控制电路微芯片、接口、微型长效锂电池,键盘与存储器微芯片相连,存储器微芯片与接口相连,接口还与控制电路微芯片相连,控制电路微芯片还分别与键盘、存储器微芯片相连,微型长效锂电池连接在存储器微芯片及控制电路微芯片上。
在该实用新型中提到,在使用该种自带键盘的银行卡的过程中,储户在取款前需要先在家中或其它比较安全的地方利用银行卡的自带键盘键入密码、取款金额等数据,使得卡中暂存这些数据。
然后,储户才到取款机处将自带键盘的银行卡插入取款机,该卡便自 动将密码、取款金额等数据传输给取款机。取款完成后,取款机给该卡一个清除信号,该卡中的密码等数据便被清除。
申请号为CN201010502426.9的中国发明专利申请中,同样也公开了一种具有输入输出功能的银行卡。与上一专利类似,同样也是在银行卡中设置了用户存储银行卡个人安全信息和银行卡个人识别密码的存储模块。并通过对这些信息的验证来实现支付。
然而,这些支付系统都是不完善的。在这些专利中,用户可以输入密码、卡片上的计算芯片可以验证用户输入密码正确与否,有些甚至可以在已知旧密码的情形下,修改成新密码。但是,如何设置初姶密码,如何重置密码(在用户合理遗忘密码情形下),并没有在上述专利中涉及。而这些密码设置、重置功能正是密码安全体系的重要组成部分。而仅仅依靠IC卡上有限的输入、显示、和通信能力,实现密码的设置、重置功能目前既不现实,也不安全。
发明内容
本发明的目的在于提供一种IC卡自带密码输入系统和IC卡自带密码输入方法,采用了该IC卡自带密码输入方法的IC卡自带密码输入系统具有更好的安全性。
为了解决上述技术问题,本发明提供了一种IC卡自带密码输入系统,包括:IC卡、移动终端,支付终端和云端;
其中,IC卡上设有用于输入第一密码的输入模块、与输入模块相连接的处理器模块、与处理器模块相连接的通信模块,通信模块通过支付终端与云端建立通信连接;
移动终端与云端通信连接,移动终端用于在通过云端的身份验证后将移动终端上输入并设置的第二密码发送至云端;
云端用于存储第三密码,还用于根据第二密码更新所存储的第三密码,还用于比对IC卡上输入的第一密码与第三密码;
若第一密码与第三密码相同,则验证通过,云端接着处理由支付终端转发的报文等内容;若第一密码和第三密码不同,则验证失败,云端不处理由所述支付终端转发的报文。
本发明还提供了一种IC卡自带密码输入方法,其特征在于,包含如下步骤:
移动终端与云端建立通信连接;
移动终端通过云端的身份验证;
移动终端向云端发送第二密码,云端基于第二密码更新所存储的第三密码;
IC卡的通信模块通过支付终端与云端建立通信连接;
向IC卡的输入模块第一密码,IC卡的通信模块通过支付终端将第一密码发送至云端;
云端比对第一密码和第三密码,若第一密码与第三密码相同,则验证通过,云端接着处理由支付终端转发的报文;若第一密码和第三密码不同,则验证失败,云端不处理由支付终端转发的报文。
相比于现有技术而言,本发明尝试从系统层面来解决上述的安全性、便捷性和体验性的问题。
首先,本发明中用户仅需在自己的IC卡上输入密码,十分熟悉自身设备,并且输入密码与交易可以异步进行(允许在输入密码之后的几分钟内进行交易),因此可以更快速地完成支付过程,具有更好的便捷性。
其次,由于IC卡是个人定制的,因此排除了不卫生等问题,提高了用户体验。
作为优选,输入模块包括N个在IC卡表面形成为阵列的触摸片或按键,N为大于或等于4的自然数。值得一提的是,有些现有技术中提出了在银行卡/信用卡上嵌入指纹识别模块进行防伪认证。但这样的模块成本会显著高于本专利的密码输入模块。
当触摸片的数量大于或等于4时,即可通过在触摸片上绘制手势来形成密码。因此,作为优选,在向IC卡的输入模块输入第一密码的步骤中,输入模块根据手指在触摸片上所绘制的手势来识别所输入的密码。在允许一套密码中多次使用同一片触摸片时,大于或等于4个的触摸片足以形成足够复杂度的密码。而且当触摸片数量为4个时,密码十分便于记忆,也十分便于输入。
而进一步地,作为优选,N等于9,触摸片或按键在IC卡表面形成九宫格。形成九宫格的触摸片或按键与现有的用户习惯一脉相承,充分地考虑到了用户体验,提高了用户的适应性。
另外,作为优选,IC卡内还设置有电池,电池用于为输入模块和处理器模块供电。设置有独立的供电时,输入模块的使用时机可以更加灵活。
进一步地,作为优选,IC卡上还设有太阳能充电板或太阳能充电薄膜, 太阳能充电板或太阳能充电薄膜用于为电池充电。考虑到输入模块和处理器模块的功耗都不高,采用太阳能方式充电,电量就足以得到保证,而且充电也十分方便。
进一步地,作为优选,云端所存储的第三密码为第三密码的单向散列值。当云端所存储是第三密码的单向散列值时,仅需比对第一密码和第三密码的单向散列值,即可实现密码的验证,因此具有更好的安全性。
进一步地,作为优选,在移动终端向云端发送第二密码,云端基于第二密码更新所存储的第三密码的步骤中:
云端计算出第二密码的单向散列值,并更新所存储的第三密码的单向散列值;
此时,云端内不会记录第二密码和第三密码,即便数据被盗取,密码本身也不会被泄漏。
或者,移动终端计算出第二密码的单向散列值,并将第二密码的单向散列值发送给云端,云端通过收到的第二密码的单向散列值更新所存储的第三密码的单向散列值。
此时,移动终端内也不记录第二密码本身,在移动终端与云端的通信通道内也不会出现第二密码本身,有效地降低了第二密码被窃取的风险。
同样的,作为优选,在云端比对第一密码和第三密码的步骤中,云端计算出第一密码的单向散列值,与第三密码的单向散列值相比对;
此时,云端内也不会记录第一密码和第三密码,提高了数据的安全性。
或者,在IC卡的处理器模块通过IC卡的通信模块将第一密码发送至云端和云端比对第一密码和第三密码的步骤中,处理器模块计算出第一密码的单向散列值,并将第一密码的单向散列值发送至云端,云端将第一密码的单向散列值与第三密码的单向散列值相比对。
此时,经由处理器模块计算出第一密码的单向散列值在经支付终端后发送至云端,由于支付终端上仅收到了第一密码的单向散列值,因此可以大幅度地提高安全性,有效降低经过伪造或改装后的支付终端窃取密码的风险。
附图说明
图1是本发明第一实施方式IC卡自带密码输入系统的系统框图;
图2是本发明第二实施方式IC卡的正面示意图;
图3是本发明第三实施方式IC卡的正面示意图;
图4是本发明第五实施方式IC卡的侧面示意图;
图5是本发明第六实施方式IC卡的正面示意图;
图6是本发明第七实施方式IC卡自带密码输入方法流程图。
附图标记说明:
1-触摸片;2-显示屏;3-太阳能充电板。
具体实施方式
实施方式一
本发明的第一实施方式提供了一种IC卡自带密码输入系统,参见图1所示,包括:IC卡、移动终端,支付终端和云端;
其中,IC卡上设有用于输入第一密码的输入模块、与输入模块相连接的处理器模块、与处理器模块相连接的通信模块,通信模块通过支付终端与云端建立通信连接;
移动终端与云端通信连接,移动终端用于在通过云端的身份验证后将移动终端上输入并设置的第二密码发送至云端;
云端用于存储第三密码,还用于根据第二密码更新所存储的第三密码,还用于比对IC卡上输入的第一密码与第三密码;
若第一密码与第三密码相同,则验证通过,云端接着处理由支付终端转发的报文;若第一密码和第三密码不同,则验证失败,云端不处理由支付终端转发的报文。
在本实施方式中,云端所存储的第三密码可以是一个默认的初始密码。在收到移动终端发送来的第二密码后,即可根据第二密码更新所存储的第三密码。对于具体的更新方式而言,本领域的普通技术人员可以根据现有技术中的密码技术作出选择。例如最简单的,可以选择擦除原有的第三密码,将第二密码的内容作为新的第三密码,也可以根据第二密码的内容计算出与之对应的第二密码的特征值(例如单向散列值或其它的能够实现校验功能的相关值),将特征值作为新的第三密码的内容,等等。
同样的,在本实施方式中,第一密码与第三密码的比对可以是对密码内容的比对,也可以是对密码特征值的比对,当验证通过时,支付终端转发IC卡与云端的通信内容,这一通信内容可以是与支付有关的通信内容,从而通过IC卡实现支付动作。
相比于现有技术而言,本发明尝试从系统层面来解决上述的安全性、便捷性和体验性的问题。
首先,本发明中用户仅需在自己的IC卡上输入密码,十分熟悉自身设备,并且输入密码与交易可以异步进行(允许在输入密码之后的几分钟内进行交易),因此可以更快速地完成支付过程,具有更好的便捷性。
其次,由于IC卡是个人定制的,因此排除了不卫生等问题,提高了用户体验。
实施方式二
本发明的第二实施方式提供了一种IC卡自带密码输入系统,第二实施方式是第一实施方式的进一步改进,主要改进之处在于,在本发明的第二实施方式中,输入模块包括N个在IC卡表面形成为阵列的触摸片1或按键,N为大于或等于4的自然数。
当触摸片1的数量大于或等于4时,即可通过在触摸片1上绘制手势来形成密码。在本实施方式中,参见图2所示,触摸片1的数量等于4。在向IC卡的输入模块输入第一密码的步骤中,输入模块根据手指在触摸片1上所绘制的手势来识别所输入的密码。在允许一套密码中多次使用同一片触摸片1时,大于或等于4个的触摸片1足以形成足够复杂度的密码。而且当触摸片1数量为4个时,密码十分便于记忆,也十分便于输入。
当然,在本实施方式中,触摸片1或按键的数量显然并不限于4个。考虑到成本和泛用性,4至12个为较为适合的触摸片1或按键的数量选择。
值得一提的是,有些现有技术中提出了在银行卡/信用卡上嵌入指纹识别模块进行防伪认证。但这样的模块成本会显著高于本专利的密码输入模块。
实施方式三
本发明的第三实施方式提供了一种IC卡自带密码输入系统,第三实施方式与第一实施方式有所不同,主要不同之处在于,在本发明的第二实施方式中,触摸片1或按键的数量等于4;而在本发明的第三实施方式中,参见图3所示,触摸片1或按键的数量等于9。
触摸片1或按键在IC卡表面形成九宫格。形成九宫格的触摸片1或按键与现有的用户习惯一脉相承,充分地考虑到了用户体验,提高了用户的适应性。
实施方式四
本发明的第四实施方式提供了一种IC卡自带密码输入系统,第四实施方式是第一实施方式至第三实施方式的进一步改进,主要改进之处在于,在本发明的第四实施方式中,IC卡内还设置有电池,电池用于为输入模块 和处理器模块供电。设置有独立的供电时,输入模块的使用时机可以更加灵活。
实施方式五
本发明的第五实施方式提供了一种IC卡自带密码输入系统,第五实施方式是第四实施方式的进一步改进,主要改进之处在于,在本发明的第五实施方式中,参见图4所示,IC卡上还设有太阳能充电板3或太阳能充电薄膜,太阳能充电板3或太阳能充电薄膜用于为电池充电。考虑到输入模块和处理器模块的功耗都不高,采用太阳能方式充电,电量就足以得到保证,而且充电也十分方便。
值得一提的是,在本实施方式中,太阳能充电板3或太阳能充电薄膜设置于与输入模块相背的一面上。由于输入模块会占用相当一部分的IC卡表面积,而太阳能充电板3的表面积直接决定了其充电效率,因此,将太阳能充电板3或太阳能充电薄膜设置在与输入模块相背的一面上,可以使得太阳能充电板3或太阳能充电薄膜得以占用更大的面积,从而获得更快的充电速率。
实施方式六
本发明的第六实施方式提供了一种IC卡自带密码输入系统,第六实施方式是第五实施方式的进一步改进,主要改进之处在于,在本发明的第六实施方式中,参见图5所示,IC卡上还设置有显示屏2,显示屏2与处理器模块通信连接;显示屏2用于显示支付设备所发出的交易确认信息。
值得一提的是,在本实施方式中,显示屏2设置于与输入模块相同的一面上,借由显示屏2来显示交易确认信息,使得用户从输入密码至确认交易的过程中可以始终将注意力放在IC卡上,进而有效防止旁人窥探密码。
实施方式七
本发明的第七实施方式提供了一种IC卡自带密码输入方法,参见图6所示,包含如下步骤:
移动终端与云端建立通信连接;
移动终端通过云端的身份验证;
移动终端向云端发送第二密码,云端基于第二密码更新所存储的第三密码;
IC卡的通信模块通过支付终端与云端建立通信连接;
向IC卡的输入模块第一密码,IC卡的通信模块通过支付终端将第一密码发送至云端;
云端比对第一密码和第三密码,若第一密码与第三密码相同,则验证通过,云端接着处理由支付终端转发的报文;若第一密码和第三密码不同,则验证失败,云端不处理由支付终端转发的报文。
值得一提的是,在本实施方式中,“IC卡的通信模块与云端建立通信连接”这一步骤可以处于“向IC卡的输入模块第一密码,IC卡的通信模块通过支付终端将第一密码发送至云端”这一步骤之前的任意时刻发生,并没有严格的步骤顺序的限制。例如,移动终端可以先与云端建立通信连接,更新完第三密码之后,再令“IC卡的通信模块与云端建立通信连接”,也可以不更新第三密码,直接采用旧有的第三密码来与第一密码进行验证比对。
在本实施方式中,云端所存储的第三密码可以是一个默认的初始密码。在收到移动终端发送来的第二密码后,即可根据第二密码更新所存储的第三密码。对于具体的更新方式而言,本领域的普通技术人员可以根据现有技术中的密码技术作出选择。例如最简单的,可以选择擦除原有的第三密码,将第二密码的内容作为新的第三密码,也可以根据第二密码的内容计算出与之对应的第二密码的特征值(例如单向散列值或其它的能够实现校验功能的相关值),将特征值作为新的第三密码的内容,等等。
同样的,在本实施方式中,第一密码与第三密码的比对可以是对密码内容的比对,也可以是对密码特征值的比对,当验证通过时,支付终端转发IC卡与云端的通信内容,这一通信内容可以是与支付有关的通信内容,从而通过IC卡实现支付动作。
相比于现有技术而言,本发明尝试从系统层面来解决上述的安全性、便捷性和卫生性的问题。
首先,本发明通过设置有云端,由云端统一管理用户的密码数据,提高了数据处理效率。通过云端与移动终端的交互,实现了通过移动终端修改处于云端的密码,因此具有更好的私密性。在本发明中,用户从IC卡输入密码,支付终端转发从IC卡输入的密码,云端验证来自IC卡的密码,由于无需将用户密码存储于IC卡内,因此具有更好的安全性。
其次,本发明中用户仅需在自己的IC卡上输入密码,十分熟悉自身设备,因此可以更快地完成支付,具有更好的便捷性。
再次,由于IC卡是个人定制的,因此排除了卫生问题,提高了用户体验。
实施方式八
本发明的第八实施方式提供了一种IC卡自带密码输入方法,第八实施方式是第七实施方式的进一步改进,主要改进之处在于,在本发明的第八实施方式中:云端所存储的第三密码为第三密码的单向散列值。当云端所存储是第三密码的单向散列值时,仅需比对第一密码和第三密码的单向散列值,即可实现密码的验证,因此具有更好的安全性。
具体而言,在移动终端向云端发送第二密码,云端基于第二密码更新所存储的第三密码的步骤中:
云端计算出第二密码的单向散列值,并更新所存储的第三密码的单向散列值;
此时,云端内不会记录第二密码和第三密码,即便数据被盗取,密码也不会被泄漏。
值得一提的是,本实施方式所指的单向散列值,可以是MD5码,SHA-256码等等。
实施方式九
本发明的第九实施方式提供了一种IC卡自带密码输入方法,第九实施方式与第八实施方式有所不同,主要不同之处在于,在本发明的第八实施方式中,由云端计算出第二密码的单向散列值;而在本发明的第九实施方式中,由移动终端计算出第二密码的单向散列值。
在移动终端向云端发送第二密码,云端基于第二密码更新所存储的第三密码的步骤中:移动终端计算出第二密码的单向散列值,并将第二密码的单向散列值发送给云端,云端通过收到的第二密码的单向散列值更新所存储的第三密码的单向散列值。
此时,移动终端内也不记录第二密码本身,在移动终端与云端的通信通道内也不会出现第二密码本身,有效地降低了第二密码被窃取的风险。
实施方式十
本发明的第十实施方式提供了一种IC卡自带密码输入方法,第十实施方式是第七至第九实施方式中任意一实施方式的进一步改进,主要改进之处在于,在本发明的第十实施方式中:在云端比对第一密码和第三密码的步骤中,云端计算出第一密码的单向散列值,与第三密码的单向散列值相比对;
此时,云端内也不会记录第一密码和第三密码,提高了数据的安全性。
实施方式十一
本发明的第十一实施方式提供了一种IC卡自带密码输入方法,第十 一实施方式与第十实施方式有所不同,主要不同之处在于,在本发明的第十实施方式中,云端计算出第一密码的单向散列值;而在本发明的第十一实施方式中,由处理器模块计算出第一密码的单向散列值。
具体而言,在IC卡的处理器模块通过IC卡的通信模块将第一密码发送至云端和云端比对第一密码和第三密码的步骤中,处理器模块计算出第一密码的单向散列值,并将第一密码的单向散列值发送至云端,云端将第一密码的单向散列值与第三密码的单向散列值相比对。
此时,经由处理器模块计算出第一密码的单向散列值在经支付终端后发送至云端,由于支付终端上仅收到了第一密码的单向散列值,因此可以大幅度地提高安全性,有效降低经过伪造或改装后的支付终端窃取密码的风险。
实施方式十二
本发明的第十二实施方式提供了一种IC卡自带密码输入方法,第十二实施方式是第七至第十一实施方式中任意一实施方式的进一步改进,主要改进之处在于,在本发明的第十二实施方式中,在通信模块与支付设备建立通信连接的步骤之后,在向输入模块输入密码的步骤之前,还包括如下步骤:
处理器模块从支付设备上取得交易确认信息,并发送至显示屏2。借由显示屏2来显示交易确认信息,使得用户从输入密码至确认交易的过程中可以始终将注意力放在IC卡上,进而有效防止旁人窥探密码。
本领域的普通技术人员可以理解,在上述的各实施方式中,为了使读者更好地理解本申请而提出了许多技术细节。但是,即使没有这些技术细节和基于上述各实施方式的种种变化和修改,也可以基本实现本申请各权利要求所要求保护的技术方案。因此,在实际应用中,可以在形式上和细节上对上述实施方式作各种改变,而不偏离本专利的精神和范围。

Claims (10)

  1. 一种IC卡自带密码输入系统,包括:IC卡、移动终端,支付终端和云端;
    其中,所述IC卡上设有用于输入第一密码的输入模块、与所述输入模块相连接的处理器模块、与所述处理器模块相连接的通信模块,所述通信模块通过所述支付终端与所述云端建立通信连接;
    所述移动终端与所述云端通信连接,所述移动终端用于在通过所述云端的身份验证后将所述移动终端上输入并设置的第二密码发送至所述云端;
    所述云端用于存储第三密码,还用于根据所述第二密码更新所存储的第三密码,还用于比对所述IC卡上输入的第一密码与所述第三密码;
    若所述第一密码与所述第三密码相同,则验证通过,所述云端接着处理由所述支付终端转发的报文;若所述第一密码和所述第三密码不同,则验证失败,云端不处理由所述支付终端转发的报文。
  2. 根据权利要求1所述的IC卡自带密码输入系统,其特征在于,所述输入模块包括N个在所述IC卡表面形成为阵列的触摸片或按键,所述N为大于或等于4的自然数。
  3. 根据权利要求2所述的IC卡支付系统,其特征在于,所述N等于9,所述触摸片在所述IC卡表面形成九宫格。
  4. 根据权利要求1所述的IC卡支付系统,其特征在于,所述IC卡内还设置有电池,所述电池用于为所述输入模块和所述处理器模块供电。
  5. 根据权利要求4所述的IC卡支付系统,其特征在于,所述IC卡上还设有太阳能充电板或太阳能充电薄膜,所述太阳能充电板或太阳能充电薄膜用于为所述电池充电。
  6. 一种IC卡自带密码设置方法,其特征在于,包含如下步骤:
    移动终端与云端建立通信连接;
    移动终端通过所述云端的身份验证;
    移动终端向所述云端发送第二密码,所述云端基于所述第二密码更新所存储的第三密码;
    IC卡的通信模块通过支付终端与云端建立通信连接;
    向所述IC卡的输入模块输入第一密码,所述IC卡的通信模块通过支付终端将所述第一密码发送至所述云端;
    所述云端比对所述第一密码和第三密码,若所述第一密码与所述第三 密码相同,则验证通过,云端接着处理由支付终端转发的报文;若所述第一密码和所述第三密码不同,则验证失败,云端不处理由支付终端转发的报文。
  7. 根据权利要求6所述的IC卡自带密码输入方法,其特征在于,所述云端所存储的第三密码为所述第三密码的单向散列值。
  8. 根据权利要求7所述的IC卡自带密码输入方法,其特征在于,在所述在移动终端向所述云端发送第二密码,所述云端基于所述第二密码更新所存储的第三密码的步骤中:
    所述云端计算出所述第二密码的单向散列值,并更新所存储的第三密码的单向散列值;
    或者,所述移动终端计算出所述第二密码的单向散列值,并将所述第二密码的单向散列值发送给云端,所述云端通过收到的所述第二密码的单向散列值更新所存储的第三密码的单向散列值。
  9. 根据权利要求7所述的IC卡自带密码输入方法,其特征在于,在所述云端比对所述第一密码和第三密码的步骤中,所述云端计算出所述第一密码的单向散列值,与所述第三密码的单向散列值相比对;
    或者,在所述IC卡的处理器模块通过所述IC卡的通信模块将所述第一密码发送至所述云端和所述云端比对所述第一密码和第三密码的步骤中,所述处理器模块计算出所述第一密码的单向散列值,并将所述第一密码的单向散列值经支付终端发送至云端,所述云端将所述第一密码的单向散列值与所述第三密码的单向散列值相比对。
  10. 根据权利要求6所述的IC卡自带密码输入方法,其特征在于,在向所述IC卡的输入模块输入第一密码的步骤中,所述输入模块根据手指在触摸片上所绘制的手势来识别所输入的密码。
PCT/CN2018/071914 2017-01-16 2018-01-09 Ic卡自带密码输入系统和ic卡自带密码输入方法 WO2018130141A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US16/477,941 US20190362065A1 (en) 2017-01-16 2018-01-09 Password input system included in ic card and password input method included in ic card
US17/994,133 US20230086015A1 (en) 2017-01-16 2022-11-25 Ic card asymmetric labelling system and ic card built-in password input system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710028208.8A CN106845978A (zh) 2017-01-16 2017-01-16 Ic卡自带密码输入系统和ic卡自带密码输入方法
CN201710028208.8 2017-01-16

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US16/477,941 A-371-Of-International US20190362065A1 (en) 2017-01-16 2018-01-09 Password input system included in ic card and password input method included in ic card
US17/994,133 Continuation-In-Part US20230086015A1 (en) 2017-01-16 2022-11-25 Ic card asymmetric labelling system and ic card built-in password input system

Publications (1)

Publication Number Publication Date
WO2018130141A1 true WO2018130141A1 (zh) 2018-07-19

Family

ID=59123807

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/071914 WO2018130141A1 (zh) 2017-01-16 2018-01-09 Ic卡自带密码输入系统和ic卡自带密码输入方法

Country Status (3)

Country Link
US (1) US20190362065A1 (zh)
CN (1) CN106845978A (zh)
WO (1) WO2018130141A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845978A (zh) * 2017-01-16 2017-06-13 上海亚融信息技术有限公司 Ic卡自带密码输入系统和ic卡自带密码输入方法
CN110097357A (zh) * 2019-03-23 2019-08-06 嘉兴捷威进出口有限公司 云闪付银行卡及使用方法
JP7338386B2 (ja) * 2019-10-04 2023-09-05 富士フイルムビジネスイノベーション株式会社 情報処理装置、情報処理システム及びプログラム

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050103839A1 (en) * 2002-05-31 2005-05-19 Infineon Technologies Ag Authorization means security module terminal system
CN2814519Y (zh) * 2004-10-18 2006-09-06 王肃 自带键盘的银行卡
CN101957933A (zh) * 2010-09-30 2011-01-26 钱袋网(北京)信息技术有限公司 具有输入输出功能的银行卡
CN106169091A (zh) * 2016-07-03 2016-11-30 恒宝股份有限公司 一种金融卡及其使用方法
CN106203586A (zh) * 2016-06-28 2016-12-07 北京华大领创智能科技有限公司 金融ic卡、支付系统及支付方法
CN106845978A (zh) * 2017-01-16 2017-06-13 上海亚融信息技术有限公司 Ic卡自带密码输入系统和ic卡自带密码输入方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318143A (zh) * 2014-11-13 2015-01-28 中国建设银行股份有限公司 一种金融ic卡及基于该卡的密码输入方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050103839A1 (en) * 2002-05-31 2005-05-19 Infineon Technologies Ag Authorization means security module terminal system
CN2814519Y (zh) * 2004-10-18 2006-09-06 王肃 自带键盘的银行卡
CN101957933A (zh) * 2010-09-30 2011-01-26 钱袋网(北京)信息技术有限公司 具有输入输出功能的银行卡
CN106203586A (zh) * 2016-06-28 2016-12-07 北京华大领创智能科技有限公司 金融ic卡、支付系统及支付方法
CN106169091A (zh) * 2016-07-03 2016-11-30 恒宝股份有限公司 一种金融卡及其使用方法
CN106845978A (zh) * 2017-01-16 2017-06-13 上海亚融信息技术有限公司 Ic卡自带密码输入系统和ic卡自带密码输入方法

Also Published As

Publication number Publication date
US20190362065A1 (en) 2019-11-28
CN106845978A (zh) 2017-06-13

Similar Documents

Publication Publication Date Title
US9674705B2 (en) Method and system for secure peer-to-peer mobile communications
US7357309B2 (en) EMV transactions in mobile terminals
CN204496559U (zh) 可穿戴式支付终端
US9262761B2 (en) Time-varying security code for enabling authorizations and other uses of financial accounts
CN104616148A (zh) 一种可穿戴式支付终端的支付方法及该支付终端
US11824642B2 (en) Systems and methods for provisioning biometric image templates to devices for use in user authentication
WO2008006290A1 (en) Method, device, server and system for authenticating identity with biological character
CN104504563B (zh) 一种移动信息安全设备及其工作方法
JP2015511336A (ja) Id認証
CN101692277A (zh) 一种用于移动通信设备的生物识别加密支付系统及其方法
US20190065919A1 (en) Payment Card With Integrated Biometric Sensor And Power Source
WO2018130141A1 (zh) Ic卡自带密码输入系统和ic卡自带密码输入方法
KR101226607B1 (ko) 엔에프씨 칩이 내장된 핸드폰을 이용한 오티피 발생장치와 방법
US20210287221A1 (en) Systems and methods for active signature detection
CN115715397A (zh) 具有用户可信纽带的多用智能卡
CN105913109A (zh) 一种指纹加密eid金融卡及实现方法
CN206506540U (zh) 一种智能密钥设备及业务办理系统
KR20100020116A (ko) 지문인식 기능을 갖는 오티피 발생장치와 그 제어방법
CN208673379U (zh) 安全认证装置及系统
CN104933461A (zh) 具有可视Key功能的金融IC卡、交易系统及交易方法
US20230086015A1 (en) Ic card asymmetric labelling system and ic card built-in password input system
CN201015050Y (zh) 可显示和操作业务的电子认证与支付终端
CN108665267A (zh) 安全认证装置及系统
US20230342777A1 (en) Card for secure interactions by utilizing multiple card credentials
CN203909935U (zh) 一种用于移动终端的金融安全系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18738953

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18738953

Country of ref document: EP

Kind code of ref document: A1