WO2018205056A1 - 一种密钥保全方法和系统 - Google Patents
一种密钥保全方法和系统 Download PDFInfo
- Publication number
- WO2018205056A1 WO2018205056A1 PCT/CN2017/083370 CN2017083370W WO2018205056A1 WO 2018205056 A1 WO2018205056 A1 WO 2018205056A1 CN 2017083370 W CN2017083370 W CN 2017083370W WO 2018205056 A1 WO2018205056 A1 WO 2018205056A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- unit
- mobile terminal
- nfc
- key information
- nfc unit
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Definitions
- the present invention relates to the field of communication security technologies, and in particular, to a key preservation method and system.
- the main way to implement the online operation is to perform inductive communication with other application terminals through a short-range field communication unit on the mobile terminal.
- the short-range field communication unit obtains corresponding user identity information from the user identification chip of the mobile terminal as an operation key, and the short-range field communication unit saves the user identity information in a cache unit such as a random access memory, such that The short-range field communication unit can perform user identity authentication interaction with the application terminal.
- the application terminal After sensing the user identity information in the cache unit, the application terminal identifies the user identity information, and determines whether the user identity information is related to the user. The information in the identity registry matches to determine whether to open application permissions to the mobile terminal. As long as the user province information is copied on the cache unit, the mobile terminal can still obtain the operation authority of the client terminal in the absence of the user identification chip. In this way, other mobile terminals can permanently acquire the user identity information in the user identification chip through the one-time user identification chip, thereby causing the user identity information to be maliciously copied and spread, which not only gives the application terminal identification management band. The risk also brings security risks to sensitive information on the mobile terminal.
- the technical problem to be solved by the present invention is that the NFC unit in the mobile terminal of the prior art can copy the user identity information in the user identification chip of the mobile terminal by a one-time sensing operation. And transferring the copied user identity information to the random access memory, so that the mobile terminal can identify the user identity information with the client terminal in the case that the user identification chip is missing, thereby obtaining the corresponding client.
- the terminal operation authority and the user identity information in the user identification chip are maliciously copied. It is an object of the present invention to provide a key protection that prevents user identity information from being illegally persisted in a cache unit for malicious copying. The full method and system to improve the security of the key information in the user identification chip.
- an embodiment of the present invention provides a key preservation method, where the method includes:
- S101 Obtain a state of an NFC unit in the mobile terminal, if the NFC unit is in an inductive operation state, construct a communication path between the NFC unit and the cache unit, and otherwise, cut off the communication path;
- acquiring the state of the NFC unit in the mobile terminal includes acquiring whether the NFC unit performs the information sensing operation with the application terminal by using the key information;
- the communication path is configured by means of charge transfer between the NFC unit and the cache unit; when the NFC When the logic value register of the unit is written to the second logic value, the NFC unit and the buffer unit cut off the communication path by means of charge blocking;
- the encryption of the key information includes a reverse alignment encryption process or a character reverse string encryption process
- obtaining whether the user identification chip in the mobile terminal is missing is specifically acquiring whether an operating current exists in the user identification chip, and if yes, the mobile terminal does not delete the user identification chip, and if not, Then the mobile terminal is missing the subscriber identity chip.
- the embodiment of the present invention further provides a key security system, wherein the system includes a control unit, a user identification chip, an NFC unit, and a cache unit, where the control unit is configured to control the user identification chip, An operating state of the NFC unit and the cache unit;
- the subscriber identity chip includes key information for identifying a physical address of the mobile terminal
- the NFC unit enables data transmission and sensing operations between the mobile terminal and the application terminal;
- the cache unit is configured to save the key information to enable the NFC unit to acquire an operation authority for the application terminal;
- the control unit is capable of determining whether to delete the key information in the cache unit based on a state in which the user identification chip is missing or not in the mobile terminal;
- the communication path between the NFC unit and the cache unit by means of charge transfer when the logic value of the NFC unit When the register is written to the second logic value, the NFC unit and the cache unit cut off the communication path by means of charge blocking;
- the communication path is used to transmit the key information.
- a security domain is set in the cache unit, and the security domain is a trustzone or a CSE;
- the security domain is configured to save the encrypted key information
- system further includes an encryption unit, and the encryption unit is configured to perform the encryption process on the key information;
- the encryption process is a reverse alignment encryption process or a character reverse string encryption process
- control unit acquires a state in which the mobile terminal is missing or not based on an operating current state inside the user identification chip detected by the current sensor.
- the present invention provides a key preservation method and system for constructing or cutting a communication path between an NFC unit and a cache unit according to a state of an NFC unit in a mobile terminal, and is also capable of identifying a user in the chip.
- the key information is encrypted and stored in a security domain in the cache unit, which prevents double-protection from being stolen and illegally copied in the cache unit; furthermore, the key preservation method and system can also be based on the movement
- the user identification chip in the terminal is missing or not to perform different operations on the identification information in the cache unit, especially when the user identification chip is missing, the cache unit can automatically clear the saved identification information, the method and system In the above manner, the user identity information can be effectively and permanently stored in the cache unit to improve the security of the key information in the user identification chip.
- FIG. 1 is a schematic flowchart of a key preservation method according to an embodiment of the present invention.
- FIG. 2 is a schematic structural diagram of a key security system according to an embodiment of the present invention.
- FIG. 1 is a schematic flowchart of a key preservation method according to an embodiment of the present invention.
- the method includes:
- the mobile terminal can be, but is not limited to, a smartphone, tablet or smart guest wearable electronic device, and the like, and the mobile terminal has a subscriber identity chip capable of uniquely identifying and indicating its physical identity.
- the user identification chip stores a physical address capable of marking the network access authority of the mobile terminal; preferably, the physical address may be a character string composed of preset characters or the user identification chip is given at the time of completion of creation.
- the network access number the mobile terminal uses the physical address on the user chip as its own identification information.
- the mobile terminal can use the identification information as a unique identification mark in the mobile communication or mobile network. Thereby avoiding crosstalk between different mobile terminals.
- the mobile terminal further includes an NFC unit capable of causing the mobile terminal to perform sensing interaction with other application terminals or smart cards, wherein the NFC unit forms an induced current through an electromagnetic coupling effect of the induction coil, and the NFC is generated by the induced current
- the unit obtains the identification information and transmits it to the application terminal or the smart card.
- the identification information is not derived from the NFC unit.
- the signal is parsed and determines what operation is performed by the NFC unit, wherein the operation signal can be characterized by a different check code for different kinds of operations, for example, if the NFC unit The operation performed is limited to data transmission, the check code in the operation signal is set to “0”, and when the control unit receives the operation signal with the check code “0”, the control unit only performs The operation of data transmission, if the operation performed by the NFC unit is about entry permission, the verification code in the operation signal is set to "1”, and when the control unit receives the operation with the verification code "1"
- the control unit sends an identification information acquisition request to the user identification chip, and the user chip opens the information copy permission to the control unit based on the identification information acquisition request, and then the control unit copies the information from the user identification chip.
- the identification information is written into the cache unit or the identification information is overwritten by the original data of the cache unit.
- the buffer unit is dedicated to storing the identification information required for the NFC unit to perform sensing interaction with the outside world.
- the buffer unit is preferably a random access memory RAM or the like, and the buffer unit allows the control unit to rewrite and overwrite the same. Wait for the operation.
- the identification information is transmitted from the cache unit to the NFC unit through a specific communication path, and the communication path is based on the logical value state of the logical value register in the buffer unit to construct an open state or cut off the closed state.
- the logic value register is preferably a writable control register.
- the specific working process of the logic value register may be: when the control unit acquires the current sensing operation state information of the NFC unit, if the NFC unit performs an operation regarding the identity recognition authority, the control unit copies the identity from the user identification chip. Identifying information and writing it to the cache unit, and the control unit also writes a first logic value A to the logic value register, at which time the logic value register is constructed by means of charge transfer based on the first logic value A a communication path between the cache unit and the NFC unit; if the NFC unit does not perform an operation regarding identity rights, the control unit writes a second logic value B to the logic value register, and the logic value register is based on The second logic value B cuts off the communication path between the buffer unit and the NFC unit by means of charge blocking.
- control unit may also acquire the information transmission type and status between the cache unit and the NFC unit in real time, and the control unit detects the index address data of the information transmitted between the buffer unit and the NFC unit.
- the type of the information is judged. Since the NFC unit is performing an inductive operation, it acquires corresponding information from the different units of the mobile terminal and the client terminal. Or the smart card performs information interaction, and the information transmitted from the different unit to the NFC unit is tagged with corresponding index address data, and the index address data is substantially used to represent the initial source of the information, such that the user identification chip
- the identification information obtained by the copy is tagged with the index address data corresponding to the user identification chip, and the index address data is preferably the physical address string of the user identification chip.
- the control unit matches the obtained index address data with the data in the unit address registry, and determines, according to the result of the matching processing, whether the information currently transmitted between the cache unit and the NFC unit belongs to the identification information. For example, based on the attribute of the information data inherent in different functional units of the mobile terminal, the physical address string of the user identification chip may be set as the key information address in the unit address registry. The physical address string of other functional units is set to a non-key information address, thereby dividing the address data in the unit address registry into two non-overlapping categories.
- the control unit determines, by the matching process, that the information transmitted between the buffer unit and the NFC unit is key information such as identification information
- the control unit sends an encryption trigger control signal to the encryption unit, and the encryption unit is based on the received
- the encryption trigger control signal encrypts the key information, and saves the key information subjected to the encryption process in a security domain of the cache unit.
- the encryption process may be, but not limited to, a reverse alignment encryption process or a character reverse string encryption process.
- the encryption unit saves the encrypted key information to the security domain of the cache unit, and the security domain is preferably a trustzone or a CSE, and the key information in the security domain needs to be determined by the authentication.
- the following can be decoded and loaded into the sensing operation of the NFC unit.
- the above manner can be saved in the cache unit by encrypting the key information such as the identification information and setting the double security protection of the security domain setting.
- the identity information is maliciously stolen and copied, thereby further protecting the security of the identity information.
- the mobile terminal sets a chip mounting sensing mechanism on the setting area of the user identification chip, and the chip mounting sensing mechanism can detect whether the user identification chip has been correctly inserted into the setting area, and according to the The user identification chip feeds back a corresponding insertion signal to the control unit in the insertion state of the setting area; for example, when the chip mounting sensing mechanism is set on the setting area
- the current sensor detects that the user identification chip is correctly inserted in the setting area, and the current sensor detects the current signal transmitted by the user identification chip. At this time, the current sensor feeds back to the control unit.
- the current sensor cannot detect the current signal transmitted inside the user identification chip, and at this time, the current sensor A signal regarding the interruption of the subscriber identity chip circuit is fed back to the control unit.
- the control unit determines, according to the signal that the user identification chip circuit is turned on or interrupted by the current sensor, whether to instruct the buffer unit to clear all the key information saved by the buffer unit, and the process is specifically: when the control unit detects the user identification chip When the setting area has been correctly inserted, the control unit transmits a signal regarding the user identification chip sound to the NFC unit, so that the NFC unit decrypts the identification information in the security domain in the buffer unit to open the mobile terminal and the application. a data communication interaction authority between the terminals; when the control unit detects that the user identification chip is not correctly inserted into the setting area, the control unit transmits a signal regarding the missing of the user identification chip to the NFC chip, thereby deleting the cache unit Clear its saved identification information.
- the key preservation method can construct or disconnect the communication path between the NFC unit and the cache unit according to the state of the NFC unit in the mobile terminal, and can also identify the key in the chip to the user.
- the information is encrypted and stored in a security domain in the cache unit.
- This double protection prevents theft and illegal copying in the cache unit; in addition, the key preservation method can also identify the user according to the mobile terminal. Whether the chip is missing or not to perform different operations on the identification information in the cache unit, especially when the user identification chip is missing, the cache unit can automatically clear the saved identification information, and the method can effectively
- the user identity information is illegally persisted in the cache unit to improve the security of the key information in the user identification chip.
- FIG. 2 is a schematic structural diagram of a key security system according to an embodiment of the present invention.
- the key security system can identify identity information in a cache unit corresponding to an NFC unit in a mobile terminal.
- the security information such as encryption, security domain preservation or erasure of the key information can effectively keep the user identity information illegally and permanently stored in the cache unit, thereby improving the security of the key information in the user identification chip.
- the key security system includes a control unit, a subscriber identity chip, an NFC unit, a cache unit, and Encryption unit.
- the control unit is configured to control the working states of the subscriber identity chip, the NFC unit, the buffer unit, and the encryption unit, and the information data communication between each other.
- the user identification chip is configured to identify and indicate a physical identity of the mobile terminal, and the user identification chip stores a physical address capable of marking the network access authority of the mobile terminal; the physical address may be composed of preset characters.
- the NFC unit enables the mobile terminal to perform sensing interaction with other application terminals or smart cards.
- the NFC unit forms an induced current through an electromagnetic coupling effect of the induction coil, and acquires the identification information by the NFC unit through the induced current. Go to the application terminal or smart card.
- the buffer unit is dedicated to storing the identification information required for the NFC unit to perform sensing interaction with the outside world.
- the buffer unit is preferably a random access memory RAM or the like, and the buffer unit allows the control unit to rewrite and overwrite the same. Wait for the operation.
- the encryption unit is capable of encrypting the key information such as the identification information based on the received encryption trigger control signal, and storing the key information subjected to the encryption process in the security domain of the cache unit.
- the key security system can construct or disconnect the communication path between the NFC unit and the cache unit according to the state of the NFC unit in the mobile terminal, and can also identify the key in the chip to the user.
- the information is encrypted and stored in a security domain in the cache unit.
- This double protection prevents theft and illegal copying in the cache unit; in addition, the key security system can also identify the user according to the mobile terminal. Whether the chip is missing or not to perform different operations on the identification information in the cache unit, especially when the user identification chip is missing, the cache unit can automatically clear the saved identification information, and the system can effectively
- the user identity information is illegally persisted in the cache unit to improve the security of the key information in the user identification chip.
- the machine can be read into a storage medium, and when executed, the program can include the flow of an embodiment of the methods as described above.
- the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
本发明实施例公开了一种密钥保全方法,所述方法包括:S101、获取移动终端中NFC单元的状态,若所述NFC单元处于感应操作状态,则构建所述NFC单元与缓存单元的通信路径,否则,切断所述通信路径;S102、获取所述NFC单元与所述缓存单元之间的信息传输状态,若所述NFC单元向所述缓存单元传输密钥信息,则将所述密钥信息加密后保存在所述缓存单元的安全域;S103、获取所述移动终端中的用户识别芯片是否缺失,若是,则删除所述安全域中的密钥信息,若否,则将所述密钥信息进行解密以开放所述移动终端与应用终端的交互权限。本发明实施例还公开了一种密钥保全系统。采用本发明,能提供一种具有高安全性的密钥保全方法。
Description
本发明涉及通信安全技术领域,尤其涉及一种密钥保全方法和系统。
随着移动通信技术的发展,手机等移动终端已经进入了人们生活的方方面面。用户可通过智能手机来进行移动支付和身份认证等不同形式的线上操作,目前实施该线上操作的主要方式有通过移动终端上的近距离场通信单元来与其他应用终端进行感应通信,该近距离场通信单元会从该移动终端的用户识别芯片中获取相应的用户身份信息作为操作密钥,该近距离场通信单元会将该用户身份信息保存在随机存取存储器等缓存单元中,这样该近距离场通信单元能够与该应用终端进行用户身份认证交互,该应用终端感应到该缓存单元中的用户身份信息后,就会对该用户身份信息进行识别,判断该用户身份信息是否与用户身份注册表中的信息相匹配,从而决定是否向该移动终端开放应用权限。由于只要该缓存单元上被复制了该用户省份信息,该移动终端在缺失用户识别芯片的情况下,该移动终端依然可获取该客户终端的操作权限。这样就会造成其他移动终端通过一次性的用户识别芯片就可永久获取该用户识别芯片中的用户身份信息,从而导致该用户身份信息被恶意复制和扩散,这不仅给该应用终端的识别管理带来风险,也给该移动终端上的敏感信息带来安全隐患。
发明内容
针对上述现有技术存在的缺陷,本发明所要解决的技术问题在于现有技术的移动终端中的NFC单元可通过一次性的感应操作就能够将移动终端的用户识别芯片中的用户身份信息进行复制,并将该复制的用户身份信息转移保存到随机存取存储器中,这样该移动终端就可在该用户识别芯片缺失的情况下也能与客户终端进行用户身份信息的识别,从而获取相应的客户终端操作权限,以及导致该用户识别芯片中的用户身份信息被恶意复制。本发明的目的在于提供一种避免用户身份信息被非法永久存留在缓存单元中以被恶意复制的密钥保
全方法和系统,以提高用户识别芯片中密钥信息的安全性。
为了解决上述技术问题,本发明实施例提供一种密钥保全方法,其特征在于,所述方法包括:
S101、获取移动终端中NFC单元的状态,若所述NFC单元处于感应操作状态,则构建所述NFC单元与缓存单元的通信路径,否则,切断所述通信路径;
S102、获取所述NFC单元与所述缓存单元之间的信息传输状态,若所述NFC单元向所述缓存单元传输密钥信息,则将所述密钥信息加密后保存在所述缓存单元的安全域;
S103、获取所述移动终端中的用户识别芯片是否缺失,若是,则删除所述安全域中的密钥信息,若否,则将所述密钥信息进行解密以开放所述移动终端与应用终端的交互权限;
进一步,在S101中,获取移动终端中NFC单元的状态包括获取所述NFC单元是否采用所述密钥信息与所述应用终端进行信息感应操作;
进一步,在S101中,当所述NFC单元的逻辑值寄存器被写入第一逻辑值时,所述NFC单元与所述缓存单元之间通过电荷传递的方式构件所述通信路径;当所述NFC单元的所述逻辑值寄存器被写入第二逻辑值时,所述NFC单元与所述缓存单元之间通过电荷阻隔的方式切断所述通信路径;
进一步,在S102中,所述密钥信息的加密包括逆向排列加密处理或者字符反串加密处理;
进一步,在S103中,获取所述移动终端中的用户识别芯片是否缺失具体为获取所述用户识别芯片内部是否存在工作电流,若是,则所述移动终端不缺失所述用户识别芯片,若否,则所述移动终端缺失所述用户识别芯片。
相应地,本发明实施例还提供一种密钥保全系统,其特征在于,所述系统包括控制单元、用户识别芯片、NFC单元和缓存单元,所述控制单元用于控制所述用户识别芯片、所述NFC单元和所述缓存单元的工作状态;
所述用户识别芯片包含用于标识移动终端物理地址的密钥信息;
所述NFC单元能够使所述移动终端与应用终端之间进行数据传输和感应操作;
所述缓存单元用于保存所述密钥信息以使所述NFC单元获取对所述应用终端的操作权限;
所述控制单元能够基于所述用户识别芯片在所述移动终端缺失与否的状态,决定是否删除所述缓存单元中的所述密钥信息;
进一步,当所述NFC单元的逻辑值寄存器被写入第一逻辑值时,所述NFC单元与所述缓存单元之间通过电荷传递的方式构件通信路径;当所述NFC单元的所述逻辑值寄存器被写入第二逻辑值时,所述NFC单元与所述缓存单元之间通过电荷阻隔的方式切断所述通信路径;
其中,所述通信路径用于传输所述密钥信息;
进一步,所述缓存单元中设置安全域,所述安全域为trustzone或者CSE;
所述安全域用于保存经过加密处理的所述密钥信息;
进一步,所述系统还包括加密单元,所述加密单元用于对所述密钥信息进行所述加密处理;
其中,所述加密处理为逆向排列加密处理或者字符反串加密处理;
进一步,所述控制单元基于电流传感器检测的所述用户识别芯片内部的工作电流状态,来获取所述移动终端缺失与否的状态。
本发明通过上述技术方案提供一种密钥保全方法和系统通过根据移动终端中NFC单元的状态对NFC单元与缓存单元之间通信路径进行构建或者切断的操作,并且还能够对用户识别芯片中的密钥信息进行加密处理以及保存在缓存单元中的安全域内,这种通过双重保护的方式来防止该缓存单元中的被窃取和非法复制;此外,该密钥保全方法和系统还能根据该移动终端中用户识别芯片缺失与否来对该缓存单元中的身份识别信息执行不同的操作,特别是当该用户识别芯片缺失时,该缓存单元能够自动清除其保存的身份识别信息,该方法和系统通过上述方式能够有效地用户身份信息被非法永久存留在缓存单元中,以提高用户识别芯片中密钥信息的安全性。
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述
中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例提供的一种密钥保全方法的流程示意图;
图2是本发明实施例提供的一种密钥保全系统的结构示意图。
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
参见图1,为本发明实施例提供的一种密钥保全方法的流程示意图,在本发明实施例中,所述方法包括:
S101、获取移动终端中NFC单元的状态,若该NFC单元处于感应操作状态,则构建该NFC单元与缓存单元的通信路径,否则,切断该通信路径。
具体而言,该移动终端可为但不限于是智能手机、平板电脑或者智能客穿戴电子设备等,并且该移动终端具有能够唯一地标识和指示其物理身份的用户识别芯片。该用户识别芯片上保存有能够对该移动终端的网络准入权限进行标记的物理地址;优选地,该物理地址可为都预设字符组成的字符串或者该用户识别芯片在制作完毕时被赋予的网络准入编号;该移动终端将该用户芯片上的物理地址作为自身的身份识别信息,理论上,该移动终端可将该身份识别信息作为自身在移动通信或者移动网络中的唯一识别标记,从而避免不同移动终端相互之间的识别串扰。该移动终端还包括NFC单元,该NFC单元能够使该移动终端与其他应用终端或者智能卡进行信息的感应交互,该NFC单元通过其中感应线圈的电磁耦合效应形成感应电流,并通过该感应电流将NFC单元获取到该身份识别信息传送到该应用终端或者智能卡上。其中,该身份识别信息并不是来源于该NFC单元的,当该NFC单元通过该移动终端的软件程序端被触发启动时,该NFC单元将操作信号反馈至控制单元中,该控制单元对该操作信号进行解析并判断该NFC单元是执行何种操作,其中关于不同种类的操作,该操作信号可通过不同的校验码进行表征,举例而言,若该NFC单元所
进行的操作只限于数据传输时,该操作信号中的校验码被设为“0”,当该控制单元接收到该具有校验码“0”的操作信号时,该控制单元只执行关于该数据传输的操作,若该NFC单元所进行的操作是关于准入权限进入时,该操作信号中的验证码被设为“1”,当该控制单元接收到该具有验证码“1”的操作信号时,该控制单元会向该用户识别芯片发送身份识别信息获取请求,该用户芯片基于该身份识别信息获取请求向该控制单元开放信息复制权限,随后该控制单元从该用户识别芯片中复制该身份识别信息,并将该身份识别信息写入该缓存单元中或者将该身份识别信息覆盖该缓存单元原有的数据。
该缓存单元是专用于保存该NFC单元与外界进行感应交互操作是所需要的身份识别信息的,该缓存单元优选为随机存取存储器RAM等,该缓存单元允许该控制单元对其进行改写和覆盖等操作。实际上,该身份识别信息是通过特定的通信路径从该缓存单元向该NFC单元传递的,该通信路径是基于该缓存单元中逻辑值寄存器的逻辑值状态来进行构建开放状态或者切断关闭状态的切换,该逻辑值寄存器优选为可编写控制寄存器。该逻辑值寄存器的具体工作过程可为:当该控制单元获取该NFC单元当前的感应操作状态信息,若该NFC单元执行关于身份识别权限操作,则该控制单元从该用户识别芯片中复制该身份识别信息并将其写入该缓存单元中,同时该控制单元还向该逻辑值寄存器写入第一逻辑值A,此时该逻辑值寄存器基于该第一逻辑值A通过电荷传递的方式来构建该缓存单元和该NFC单元之间的通信路径;若该NFC单元并不是执行关于身份识别权限操作,则该控制单元向该逻辑值寄存器写入第二逻辑值B,此时该逻辑值寄存器基于该第二逻辑值B通过电荷阻隔的方式来切断该缓存单元和该NFC单元之间的通信路径。
S102、获取该NFC单元与该缓存单元之间的信息传输状态,若该NFC单元向该缓存单元传输密钥信息,则将该密钥信息加密后保存在该缓存单元的安全域。
具体而言,该控制单元还可实时获取该缓存单元与该NFC单元之间的信息传输类型和状态,该控制单元通过检测该缓存单元与该NFC单元之间传输的信息的索引地址数据来对该信息的类型进行判断。由于在该NFC单元在进行感应操作时,其会从该移动终端的不同单元中获取相应的信息与该客户终端
或者智能卡进行信息交互,而从该不同的单元传送到该NFC单元的信息都会标签上相应的索引地址数据,该索引地址数据实质上用于表征该信息的初始来源,这样从该用户识别芯片中复制获得的该身份识别信息就会被标签上与该用户识别芯片相对应的索引地址数据,此时该索引地址数据优选为该用户识别芯片的物理地址字符串。该控制单元将获取到的索引地址数据与单元地址注册表中的数据进行匹配处理,并基于该匹配处理的结果来判断当前该缓存单元与该NFC单元之间的传输的信息是否属于身份识别信息等密钥信息;举例而言,基于该移动终端的不同功能单元中固有信息数据的属性,该单元地址注册表中可只将该用户识别芯片的物理地址字符串设定为密钥信息地址,而其他功能单元的物理地址字符串则设定为非密钥信息地址,从而将该单元地址注册表中的地址数据划分为两个不重叠的类别。
当该控制单元通过该匹配处理判断该缓存单元与该NFC单元之间传输的信息为身份识别信息等密钥信息时,该控制单元向加密单元发送加密触发控制信号,该加密单元基于接收到的该加密触发控制信号对该密钥信息进行加密处理,并将经过该加密处理的密钥信息保存在该缓存单元的安全域中。其中,该加密处理可为但不限于是逆向排列加密处理或者字符反串加密处理等。随后,该加密单元将经过加密处理后的该密钥信息保存到该缓存单元的安全域中,该安全域优选为trustzone或者CSE等,该安全域中的密钥信息需要在鉴权确定的前提下才能被解码和加载到该NFC单元的感应操作中,上述方式通过对该身份识别信息等密钥信息进行加密处理和安全域设置的双重安全保护设置,这样能够有效避免保存在该缓存单元中的身份识别信息被恶意窃取和复制,从而更近一步地保护该身份识别信息的安全性。
S103、获取该移动终端中的用户识别芯片是否缺失,若是,则删除该安全域中的密钥信息,若否,则将该密钥信息进行解密以开放移动终端与应用终端的交互权限。
具体而言,该移动终端在该用户识别芯片的设置区域上设定了芯片安设感应机制,该芯片安设感应机制能够检测该用户识别芯片是否已经正确的插入该设置区域上,并根据该用户识别芯片在该设置区域的插入状态向该控制单元反馈相应的插入信号;举例而言,当芯片安设感应机制是通过在该设置区域上设
定电流传感器来实现的,当该用户识别芯片正确地插设在该设置区域上时,该电流传感器会检测到该用户识别芯片内部传输的电流信号,此时,该电流传感器向该控制单元反馈关于该用户识别芯片电路导通的信号,当该用回识别芯片没有正确地插入该设置区域上时,该电流传感器会无法检测到该用户识别芯片内部传输的电流信号,此时,该电流传感器向该控制单元反馈关于该用户识别芯片电路中断的信号。
该控制单元根据该电流传感器反馈的用户识别芯片电路导通或者中断的信号来决定是否指示该缓存单元清除其保存的所有密钥信息,其过程具体为:当该控制单元检测到该用户识别芯片已经正确插入该设置区域时,该控制单元向该NFC单元传送关于用户识别芯片健全的信号,从而使该NFC单元对该缓存单元内安全域中的身份识别信息进行解密以开放该移动终端与应用终端之间的数据通信交互权限;当该控制单元检测到该用户识别芯片并没有正确插入该设置区域时,该控制单元向该NFC芯片传送关于用户识别芯片缺失的信号,从而使该缓存单元删除清空其保存的身份识别信息。
从上述实施例可以看出,该密钥保全方法通过根据移动终端中NFC单元的状态对NFC单元与缓存单元之间通信路径进行构建或者切断的操作,并且还能够对用户识别芯片中的密钥信息进行加密处理以及保存在缓存单元中的安全域内,这种通过双重保护的方式来防止该缓存单元中的被窃取和非法复制;此外,该密钥保全方法还能根据该移动终端中用户识别芯片缺失与否来对该缓存单元中的身份识别信息执行不同的操作,特别是当该用户识别芯片缺失时,该缓存单元能够自动清除其保存的身份识别信息,该方法通过上述方式能够有效地用户身份信息被非法永久存留在缓存单元中,以提高用户识别芯片中密钥信息的安全性。
参见图2,为本发明实施例提供的一种密钥保全系统的结构示意图,在本发明实施例中,该密钥保全系统能够在对移动终端中NFC单元对应的缓存单元内的身份识别信息等密钥信息进行加密、安全域保存或者清除等保全操作,其能够有效地用户身份信息被非法永久存留在缓存单元中,从而提高用户识别芯片中密钥信息的安全性。
该密钥保全系统包括控制单元、用户识别芯片、NFC单元、缓存单元和
加密单元。该控制单元用于控制该用户识别芯片、NFC单元、缓存单元和加密单元的工作状态以及相互之间的信息数据通信。
该用户识别芯片是用于标识和指示移动终端的物理身份的,该用户识别芯片上保存有能够对该移动终端的网络准入权限进行标记的物理地址;该物理地址可为都预设字符组成的字符串或者该用户识别芯片在制作完毕时被赋予的网络准入编号。
该NFC单元能够使该移动终端与其他应用终端或者智能卡进行信息的感应交互,该NFC单元通过其中感应线圈的电磁耦合效应形成感应电流,并通过该感应电流将NFC单元获取到该身份识别信息传送到该应用终端或者智能卡上。
该缓存单元是专用于保存该NFC单元与外界进行感应交互操作是所需要的身份识别信息的,该缓存单元优选为随机存取存储器RAM等,该缓存单元允许该控制单元对其进行改写和覆盖等操作。
该加密单元能够基于接收到的该加密触发控制信号对该身份识别信息等密钥信息进行加密处理,并将经过该加密处理的密钥信息保存在该缓存单元的安全域中。
关于本实施例涉及的术语的含义以及举例,可以参考图1对应的实施例。此处不再赘述。
从上述实施例可以看出,该密钥保全系统通过根据移动终端中NFC单元的状态对NFC单元与缓存单元之间通信路径进行构建或者切断的操作,并且还能够对用户识别芯片中的密钥信息进行加密处理以及保存在缓存单元中的安全域内,这种通过双重保护的方式来防止该缓存单元中的被窃取和非法复制;此外,该密钥保全系统还能根据该移动终端中用户识别芯片缺失与否来对该缓存单元中的身份识别信息执行不同的操作,特别是当该用户识别芯片缺失时,该缓存单元能够自动清除其保存的身份识别信息,该系统通过上述方式能够有效地用户身份信息被非法永久存留在缓存单元中,以提高用户识别芯片中密钥信息的安全性。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算
机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
以上所揭露的仅为本发明一种较佳实施例而已,当然不能以此来限定本发明之权利范围,本领域普通技术人员可以理解实现上述实施例的全部或部分流程,并依本发明权利要求所作的等同变化,仍属于发明所涵盖的范围。
Claims (10)
- 一种密钥保全方法,其特征在于,所述方法包括:S101、获取移动终端中NFC单元的状态,若所述NFC单元处于感应操作状态,则构建所述NFC单元与缓存单元的通信路径,否则,切断所述通信路径;S102、获取所述NFC单元与所述缓存单元之间的信息传输状态,若所述NFC单元向所述缓存单元传输密钥信息,则将所述密钥信息加密后保存在所述缓存单元的安全域;S103、获取所述移动终端中的用户识别芯片是否缺失,若是,则删除所述安全域中的密钥信息,若否,则将所述密钥信息进行解密以开放所述移动终端与应用终端的交互权限。
- 根据权利要求1所述的方法,其特征在于,在S101中,获取移动终端中NFC单元的状态包括获取所述NFC单元是否采用所述密钥信息与所述应用终端进行信息感应操作。
- 根据权利要求1所述的方法,其特征在于,在S101中,当所述NFC单元的逻辑值寄存器被写入第一逻辑值时,所述NFC单元与所述缓存单元之间通过电荷传递的方式构件所述通信路径;当所述NFC单元的所述逻辑值寄存器被写入第二逻辑值时,所述NFC单元与所述缓存单元之间通过电荷阻隔的方式切断所述通信路径。
- 根据权利要求1所述的方法,其特征在于,在S102中,所述密钥信息的加密包括逆向排列加密处理或者字符反串加密处理。
- 根据权利要求1所述的方法,其特征在于,在S103中,获取所述移动终端中的用户识别芯片是否缺失具体为获取所 述用户识别芯片内部是否存在工作电流,若是,则所述移动终端不缺失所述用户识别芯片,若否,则所述移动终端缺失所述用户识别芯片。
- 一种密钥保全系统,其特征在于,所述系统包括控制单元、用户识别芯片、NFC单元和缓存单元,所述控制单元用于控制所述用户识别芯片、所述NFC单元和所述缓存单元的工作状态;所述用户识别芯片包含用于标识移动终端物理地址的密钥信息;所述NFC单元能够使所述移动终端与应用终端之间进行数据传输和感应操作;所述缓存单元用于保存所述密钥信息以使所述NFC单元获取对所述应用终端的操作权限;所述控制单元能够基于所述用户识别芯片在所述移动终端缺失与否的状态,决定是否删除所述缓存单元中的所述密钥信息。
- 根据权利要求6所述的系统,其特征在于,当所述NFC单元的逻辑值寄存器被写入第一逻辑值时,所述NFC单元与所述缓存单元之间通过电荷传递的方式构件通信路径;当所述NFC单元的所述逻辑值寄存器被写入第二逻辑值时,所述NFC单元与所述缓存单元之间通过电荷阻隔的方式切断所述通信路径;其中,所述通信路径用于传输所述密钥信息。
- 根据权利要求6所述的系统,其特征在于,所述缓存单元中设置安全域,所述安全域为trustzone或者CSE;所述安全域用于保存经过加密处理的所述密钥信息。
- 根据权利要求8所述的系统,其特征在于,所述系统还包括加密单元,所述加密单元用于对所述密钥信息进行所述加密处理;其中,所述加密处理为逆向排列加密处理或者字符反串加密处理。
- 根据权利要求6所述的系统,其特征在于,所述控制单元基于电流传感器检测的所述用户识别芯片内部的工作电流状态,来获取所述移动终端缺失与否的状态。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/083370 WO2018205056A1 (zh) | 2017-05-07 | 2017-05-07 | 一种密钥保全方法和系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/083370 WO2018205056A1 (zh) | 2017-05-07 | 2017-05-07 | 一种密钥保全方法和系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018205056A1 true WO2018205056A1 (zh) | 2018-11-15 |
Family
ID=64104124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/083370 WO2018205056A1 (zh) | 2017-05-07 | 2017-05-07 | 一种密钥保全方法和系统 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2018205056A1 (zh) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110018683A1 (en) * | 2008-03-18 | 2011-01-27 | Eads Secure Networks | Management of the identities of users in a system |
CN103870759A (zh) * | 2014-03-27 | 2014-06-18 | 上海斐讯数据通信技术有限公司 | 一种nfc加密的方法、系统及移动终端 |
US20150044964A1 (en) * | 2013-08-08 | 2015-02-12 | Apple Inc. | Management of near field communications using low power modes of an electronic device |
CN105872955A (zh) * | 2016-04-29 | 2016-08-17 | 昆山维信诺科技有限公司 | 整合近场通信的触控集成电路及其近场通信方法 |
CN106301485A (zh) * | 2015-06-25 | 2017-01-04 | 宇龙计算机通信科技(深圳)有限公司 | 一种安全通讯方法及移动终端 |
WO2017012176A1 (zh) * | 2015-07-23 | 2017-01-26 | 宇龙计算机通信科技(深圳)有限公司 | 基于hce的移动支付方法及装置、移动终端 |
-
2017
- 2017-05-07 WO PCT/CN2017/083370 patent/WO2018205056A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110018683A1 (en) * | 2008-03-18 | 2011-01-27 | Eads Secure Networks | Management of the identities of users in a system |
US20150044964A1 (en) * | 2013-08-08 | 2015-02-12 | Apple Inc. | Management of near field communications using low power modes of an electronic device |
CN103870759A (zh) * | 2014-03-27 | 2014-06-18 | 上海斐讯数据通信技术有限公司 | 一种nfc加密的方法、系统及移动终端 |
CN106301485A (zh) * | 2015-06-25 | 2017-01-04 | 宇龙计算机通信科技(深圳)有限公司 | 一种安全通讯方法及移动终端 |
WO2017012176A1 (zh) * | 2015-07-23 | 2017-01-26 | 宇龙计算机通信科技(深圳)有限公司 | 基于hce的移动支付方法及装置、移动终端 |
CN105872955A (zh) * | 2016-04-29 | 2016-08-17 | 昆山维信诺科技有限公司 | 整合近场通信的触控集成电路及其近场通信方法 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9780947B1 (en) | Computer programs, secret management methods and systems | |
TWI486772B (zh) | 在安全元件的設計中使用主記憶體的安全架構 | |
CN104951409B (zh) | 一种基于硬件的全盘加密系统及加密方法 | |
JP5055375B2 (ja) | 支払データの保護 | |
KR101567902B1 (ko) | Nfc 가능 디바이스용 다수-발급사 시큐어 엘리먼트 파티션 아키텍처 | |
KR101613146B1 (ko) | 데이터베이스 암호화 방법 | |
WO2013155562A1 (en) | Nfc card lock | |
WO2011137743A1 (zh) | 一种文件保护方法及系统 | |
CN103106372A (zh) | 用于Android系统的轻量级隐私数据加密方法及系统 | |
KR20180026722A (ko) | 제어되는 암호화 키 관리에 의해 소프트웨어 모듈들을 격리하기 위한 방법을 위한 메모리 캐시들 및 캐싱된 소프트웨어 모듈 아이덴티티들의 보안 핸들링 | |
US9276748B2 (en) | Data-encrypting method and decrypting method for a mobile phone | |
CN108763917A (zh) | 一种数据加解密方法及装置 | |
WO2017166362A1 (zh) | 一种esim号码的写入方法、安全系统、esim号码服务器及终端 | |
KR20180117278A (ko) | 모바일기기의 데이터 삭제방법 | |
CN113574828A (zh) | 一种安全芯片、安全处理方法及相关设备 | |
CN101727558A (zh) | 一种计算机密码清除方法、计算机和服务器 | |
CN108229190B (zh) | 透明加解密的控制方法、装置、程序、存储介质和电子设备 | |
JP2020508533A (ja) | セグメント化されたキー認証システム | |
JPWO2007142072A1 (ja) | 端末装置及びこれを備えたデータ管理システム | |
CN114239015A (zh) | 数据的安全管理方法、装置、数据云平台以及存储介质 | |
CN104579673A (zh) | Rfid卡与读卡器之间的交互认证方法 | |
US11507958B1 (en) | Trust-based security for transaction payments | |
US12002040B2 (en) | Device driver for contactless payments | |
WO2018205056A1 (zh) | 一种密钥保全方法和系统 | |
Saeed et al. | Evaluating Near‐Field Communication tag security for identity theft prevention |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17908970 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17908970 Country of ref document: EP Kind code of ref document: A1 |