WO2020172887A1 - Data processing method, apparatus, smart card, terminal device, and server - Google Patents

Data processing method, apparatus, smart card, terminal device, and server Download PDF

Info

Publication number
WO2020172887A1
WO2020172887A1 PCT/CN2019/076583 CN2019076583W WO2020172887A1 WO 2020172887 A1 WO2020172887 A1 WO 2020172887A1 CN 2019076583 W CN2019076583 W CN 2019076583W WO 2020172887 A1 WO2020172887 A1 WO 2020172887A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
authentication
private key
server
terminal device
Prior art date
Application number
PCT/CN2019/076583
Other languages
French (fr)
Chinese (zh)
Inventor
何永德
谢翔
傅志敬
孙立林
Original Assignee
云图有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 云图有限公司 filed Critical 云图有限公司
Priority to PCT/CN2019/076583 priority Critical patent/WO2020172887A1/en
Publication of WO2020172887A1 publication Critical patent/WO2020172887A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the embodiments of this specification relate to the field of computer technology, and in particular to a data processing method, device, smart card, terminal device, and server.
  • a mobile communication system may include a smart card, a network server, and terminal equipment.
  • the smart card can be assigned a user identification code IMSI and a secret key ki when signing a contract (registration).
  • the smart card can store the user identification code IMSI and the key ki.
  • the network server can obtain the user identification code IMSI and the key ki; can generate a random number RAND; can generate a response SRESa according to the key ki and the random number RAND; can identify the user identity
  • the code IMSI is stored correspondingly to the random number RAND and the response SRESa respectively.
  • the smart card may be installed in the terminal device.
  • the terminal device can send a network access request to the network server.
  • the network access request may carry the user identification code IMSI.
  • the network server can receive the network access request; can read the pre-stored random number RAND according to the user identification code IMSI; and can send an authentication request to the terminal device.
  • the random number RAND may be carried in the authentication request.
  • the terminal device may receive the authentication request; may send the authentication request to the smart card.
  • the smart card can receive the authentication request; can generate a response SRESb according to the random number RAND and the key ki; and can send the generated response SRESb to the terminal device.
  • the terminal device may receive the response SRESb; may send the response SRESb to the network server.
  • the network server can receive the response SRESb; can read the pre-stored response SRESa according to the user identification code IMSI; can compare the response SRESb with the response SRESa; if the two are the same, determine the authentication result of the terminal device If the two are not the same, it is determined that the authentication result of the terminal device is a failure.
  • the network side can authenticate the terminal device, but the terminal device cannot authenticate the network side. Since only one-way authentication can be performed in the above-mentioned related technologies, it is possible for mobile users to access illegal networks (for example, pseudo base stations) and thus to steal private information.
  • illegal networks for example, pseudo base stations
  • the purpose of the embodiments of this specification is to provide a data processing method, device, smart card, terminal equipment, and server to realize two-way authentication between the network side and the terminal equipment.
  • a data processing method including: a terminal device sends a first device identifier to a server; the server receives the first device identifier; and according to the first device identifier Generate a device private key; generate an authentication key according to the device private key, the card private key of the smart card, and its own server private key; use the card public key of the smart card to perform the authentication on the device private key and the authentication key respectively Encryption to obtain the device private key ciphertext and the authentication key ciphertext; send the device private key ciphertext and the authentication key ciphertext to the terminal device; the terminal device receives and sends the device private key ciphertext to the smart card And the authentication key ciphertext; the smart card receives the device private key ciphertext and the authentication key ciphertext; uses the card private key to separately authenticate the device private key ciphertext and the authentication key The key ciphertext is decrypted to obtain the device private key
  • a data processing method is provided, which is applied to a terminal device, including: sending a device identification to a server; receiving a device private key ciphertext and an authentication key sent by the server Ciphertext; the device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext is obtained by encrypting the authentication key; the device private key and the authentication The right keys are calculated based on the device identification; send the device private key ciphertext and the authentication key ciphertext to the smart card; receive the device private key and the authentication key sent by the smart card; store the The device private key and the authentication key.
  • a data processing device which is applied to a terminal device, and includes: a first sending unit for sending a device identifier to a server; a first receiving unit for receiving The device private key ciphertext and the authentication key ciphertext sent by the server; the device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext is obtained by encrypting the authentication key Obtained through encryption; the device private key and the authentication key are both calculated according to the device identification; the second sending unit is used to send the device private key ciphertext and the authentication to the smart card The key ciphertext; the second receiving unit is used to receive the device private key and the authentication key sent by the smart card; the storage unit is used to store the device private key and the authentication key.
  • a terminal device including: a memory, configured to store computer instructions; and a processor, configured to execute the computer instructions to implement the method described in the second aspect Method steps.
  • a data processing method applied to a server including: receiving a first device identifier sent by a terminal device; generating a device private key according to the first device identifier Generate an authentication key according to the device private key, the card private key of the smart card and its own server private key; use the card public key of the smart card to respectively encrypt the device private key and the authentication key to obtain the device Private key ciphertext and authentication key ciphertext; sending the device private key ciphertext and the authentication key ciphertext to the terminal device.
  • a data processing apparatus applied to a server, including: a receiving unit for receiving a first device identifier sent by a terminal device; a first generating unit for using For generating the device private key according to the first device identification; the second generating unit is used to generate the authentication key according to the device private key, the smart card's private key and its own server private key; the encryption unit is used to use The card public key of the smart card respectively encrypts the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext; the sending unit is used to send the device private key to the terminal device Ciphertext and the ciphertext of the authentication key.
  • a server including: a memory, configured to store computer instructions; a processor, configured to execute the computer instructions to implement the method according to the fifth aspect step.
  • a data processing method applied to a smart card including: receiving a device private key ciphertext and an authentication key ciphertext sent by a terminal device; the device The private key cipher text is obtained by encrypting the device private key; the authentication key cipher text is obtained by encrypting the authentication key; using its own card private key to separately encrypt the device private key cipher text Decrypt the ciphertext with the authentication key to obtain the device private key and the authentication key; store the authentication key; and send the device private key and the authentication key to a terminal device.
  • a data processing device applied to a smart card including: a receiving unit for receiving a device private key ciphertext and an authentication key ciphertext sent by a terminal device
  • the device private key ciphertext is obtained by encrypting the device private key
  • the authentication key ciphertext is obtained by encrypting the authentication key
  • the decryption unit is used to use its own card private
  • the key respectively decrypts the device private key ciphertext and the authentication key ciphertext to obtain the device private key and the authentication key
  • the storage unit is used to store the authentication key
  • the sending unit is used to Send the device private key and the authentication key to the terminal device.
  • a smart card including: a memory, configured to store computer instructions; a processor, configured to execute the computer instructions to implement the method according to the eighth aspect step.
  • a data processing method which includes: a server based on a held server private key, a terminal device based on the held device private key, and a smart card based on the held card
  • the private key performs multi-party security calculations together to obtain an authentication key; the server authenticates the terminal device based on the authentication key; the terminal device authenticates the server based on the authentication key .
  • a data processing method including: a server based on a held server private key, and a terminal device based on the held device private key and the card private key of the smart card, Perform multi-party security calculations together to obtain an authentication key; the server authenticates the terminal device based on the authentication key; the terminal device authenticates the server based on the authentication key.
  • a data processing method applied to a server including: performing multi-party security calculations based on the server's private key to obtain an authentication key; and based on the authentication secret Key to authenticate the terminal device.
  • a data processing device applied to a server including: a computing unit for performing multi-party secure calculations based on the server's private key to obtain an authentication key;
  • the right unit is configured to authenticate the terminal device based on the authentication key.
  • a server including: a memory, configured to store computer instructions; and a processor, configured to execute the computer instructions to implement the method described in the thirteenth aspect Method steps.
  • a data processing method is provided, which is applied to a terminal device, including: performing multi-party secure calculation based on the device private key to obtain an authentication key; based on the authentication The key is used to authenticate the server.
  • a data processing device applied to a terminal device including: a computing unit, configured to perform multi-party secure calculation based on the device private key to obtain an authentication key;
  • the authentication unit is configured to authenticate the server based on the authentication key.
  • a terminal device including: a memory, configured to store computer instructions; and a processor, configured to execute the computer instructions to implement as described in the sixteenth aspect The method steps described.
  • both the terminal device and the server can obtain the authentication key.
  • the server may authenticate the terminal device based on the authentication key.
  • the terminal device may authenticate the server based on the authentication key. In this way, mutual authentication between the terminal device and the server can be realized.
  • Figure 1 is an authentication flow chart in related technologies
  • FIG. 2 is a schematic diagram of the functional structure of a mobile communication system according to an embodiment of the specification
  • FIG. 3 is a flowchart of a data processing method according to an embodiment of the specification.
  • Fig. 5 is a flowchart of a data processing method according to an embodiment of the specification.
  • Fig. 6 is a flowchart of a data processing method according to an embodiment of the specification.
  • FIG. 7 is a flowchart of a data processing method according to an embodiment of this specification.
  • FIG. 8 is a flowchart of a data processing method according to an embodiment of the specification.
  • Fig. 9 is a flowchart of a data processing method according to an embodiment of the specification.
  • FIG. 10 is a flowchart of a data processing method according to an embodiment of this specification.
  • FIG. 11 is a schematic diagram of the functional structure of a data processing device according to an embodiment of the specification.
  • FIG. 12 is a schematic diagram of the functional structure of a terminal device according to an embodiment of the specification.
  • FIG. 13 is a schematic diagram of the functional structure of a data processing device according to an embodiment of the specification.
  • FIG. 14 is a schematic diagram of the functional structure of a server according to an embodiment of the specification.
  • 15 is a schematic diagram of the functional structure of a data processing device according to an embodiment of the specification.
  • 16 is a schematic diagram of the functional structure of a smart card according to an embodiment of the specification.
  • FIG. 17 is a schematic diagram of the functional structure of a data processing device according to an embodiment of the specification.
  • FIG. 18 is a schematic diagram of the functional structure of a data processing device according to an embodiment of the specification.
  • the key ki is only stored on the smart card. In this way, there is a risk of the smart card being copied and embezzled.
  • the embodiment of this specification provides a mobile communication system.
  • the mobile communication system may include a smart card, terminal equipment, network server and base station server.
  • the smart card may be an integrated circuit card with data processing functions and storage functions, such as a SIM card (Subscriber Identity Module, user identification card), USIM card (Universal Subscriber Identity Module, global user identification card), and UIM card (User Identity Module). Module) and so on.
  • the terminal device may be a device capable of providing users with voice and/or data connectivity, such as a mobile phone (also referred to as a "cellular phone"), a cordless phone, a handheld device, a vehicle-mounted device, a wearable device, and so on.
  • the network server may be used to provide communication services, and may specifically include one or more functional units.
  • the network server may be a network and switching subsystem (Network Switching Subsystem, NSS) server, and may specifically include a mobile service switching center (Mobile Service Switching Center, MSC), a visitor location register (Visitor Location Register, VLR), One or more of a home location register (Home Location Register, HLR) and an authentication center (Authentication Center, AUC).
  • NSS Network Switching Subsystem
  • MSC Mobile Service Switching Center
  • VLR visitor location register
  • HLR Home Location Register
  • AUC authentication center
  • the base station server may be used to provide data transmission service between the terminal device and the network server.
  • the base station server may be a base station system (Base Station System, BSS) server.
  • BSS Base Station System
  • the smart card may be installed on the terminal device.
  • the terminal device can perform wireless communication with the network server.
  • the terminal device may perform wireless communication with the network server through the transparent transmission of the base station server.
  • the wireless communication can use any of a variety of communication standards, protocols and technologies, including but not limited to Global System for Mobile Communications (GSM), Wideband Code Division Multiple Access (W-CDMA), Code Division Multiple Access (CDMA) ), Time Division Multiple Access (TDMA) and so on.
  • GSM Global System for Mobile Communications
  • W-CDMA Wideband Code Division Multiple Access
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • the smart card may be assigned a user identification code (International Mobile Subscriber Identity, IMSI) and a public-private key pair when signing a contract (registration).
  • the user identification code can be used to distinguish mobile users.
  • the public-private key pair of the smart card may include a card public key and a card private key. In this way, the smart card can store the user identification code, the card private key, and the card public key.
  • the card private key may be expressed as sk1
  • the card public key may be expressed as pk1.
  • the network server can obtain the user identification code, the card private key, and the card public key; and can generate a public-private key pair of the terminal device and its own public-private key pair.
  • the public-private key pair of the terminal device may include a device public key and a device private key.
  • the public-private key pair of the server may include a server public key and a server private key.
  • the network server can associate the user identification code with the card public key, the card private key, the device public key, the device private key, the server public key, and the server private key.
  • the server private key may be expressed as sk2
  • the server public key may be expressed as pk2
  • the device private key may be expressed as sk3
  • the device public key may be expressed as pk3.
  • the network server may generate a random number as an authentication random number (RAND); may store the user identification code and the authentication random number correspondingly; and may generate authentication response data according to the authentication random number ( SRES); the user identification code and the authentication response data can be stored correspondingly.
  • RAND authentication random number
  • SRES authentication random number
  • the network server may use the A3 algorithm (an encryption algorithm) to generate the authentication response data according to the card private key and the authentication random number.
  • This specification provides an embodiment of the data processing method. This embodiment can be applied to a smart card activation scenario, and can include the following steps.
  • Step S11 The terminal device sends the first device identifier to the server.
  • Step S12 The server receives the first device identification; and generates a device private key according to the first device identification.
  • the first device identifier may be used to identify the terminal device, for example, may be the serial number (International Mobile Equipment Identity, IMEI) of the terminal device.
  • the server may be used to provide communication services, for example, may be the previous web server.
  • a smart card may be installed in the terminal device.
  • the terminal device can send a network access request to the server.
  • the user identification code may be carried in the network access request.
  • the terminal device may send a network access request to the server after being turned on.
  • the server can correspondingly store the user identification code and the authentication random number.
  • the server can receive the network access request; can read the pre-stored authentication random number according to the user identification code; and can send the authentication random number to the terminal device.
  • the terminal device can receive the authentication random number; can send the authentication random number to the smart card.
  • the smart card can receive the authentication random number; can generate authentication response data according to the authentication random number; and can send the authentication response data to a terminal device.
  • the smart card may use the A3 algorithm to generate the authentication response data according to its own card private key and the authentication random number.
  • the terminal device may receive the authentication response data; may send the authentication response data and the first device identifier to the server.
  • the server can correspondingly store the user identification code and the authentication response data.
  • the server can receive the authentication response data and the first device identification; can read the pre-stored authentication response data according to the user identity identification; can combine the received authentication response data with the read authentication response
  • the data is compared; if they are the same, the device private key can be generated according to the first device identifier; if they are not the same, the network access request can be ignored.
  • the server may generate the public-private key pair of the terminal device according to the first device identifier.
  • the public-private key pair of the terminal device may include a device private key and a device public key.
  • the device private key generated by the server may be expressed as sk3'
  • the device public key generated by the server may be expressed as pk3'.
  • the server can detect whether the user identification code meets a preset condition.
  • the preset condition may include: the user identification code is not bound to a device identification; the user identification code is bound to a second device identification, and the second device identification is different from the first device identification. If the preset condition is met, the server may generate a device private key according to the first device identification. If the preset conditions are not met, the server considers that the smart card is already in the activated state; the steps related to the activation scenario can be ended.
  • the server when it is detected that the user identification code is not bound to the device identification, the server considers the smart card to be used for the first time; the user identification code and the first device identification may also be bound. In this way, the binding of the smart card and the terminal device can be realized, and the smart card can be prevented from being stolen and used on other terminal devices.
  • the server When it is detected that the user identification code is bound to the second device identification, the server considers that the smart card has replaced the terminal device; it can also cancel the binding relationship between the user identification code and the second device identification ; The user identification code and the first device identification can be bound. In this way, terminal equipment can be replaced.
  • the server may also send an identification key acquisition request to the terminal device.
  • the terminal device can receive the identity recognition key acquisition request; can send the identity recognition key to the server.
  • the identification key may be, for example, a PIN (Personal Identification Number) code.
  • the identity recognition key may also be a password that can be input by the user, such as a login password.
  • the server may receive the identification key; may verify the identification key; if the verification is passed, the user identification code and the first device identification may be bound, or may be cancelled The binding relationship between the user identification code and the second device identification, and the user identification code and the first device identification are bound.
  • the server can store the user identification code corresponding to the device public key and the device private key respectively.
  • the stored device private key can be expressed as sk3, and the stored device public key can be expressed as pk3.
  • the server can also use the device public key generated in step S12 to update the pre-stored device public key; and can use the device private key generated in step S12 to update the pre-stored device private key.
  • the device private key generated in step S12 can be expressed as sk3'
  • the device public key generated in step S12 can be expressed as pk3'.
  • the server can use the device private key sk3' to update the device private key sk3, and can use the device public key pk3' to update the device public key pk3.
  • Step S13 The server generates an authentication key according to the device private key, the card private key of the smart card, and its own server private key.
  • the server can store the user identification code corresponding to the card private key and the server private key respectively.
  • the server can read the pre-stored card private key and server private key according to the user identification code; it can generate an authentication key according to the generated device private key, the read card private key, and the read server private key.
  • the server may generate a specific private key according to the device private key, the card private key, and the server private key; and may generate the specific public key as the authentication key according to the specific private key.
  • the read card private key can be represented as sk1
  • the read server private key can be represented as sk2
  • the generated device private key can be represented as sk3'.
  • the server may calculate the specific public key pk as the authentication key according to the specific private key sk.
  • Step S14 The server encrypts the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext.
  • the server can store the user identification code and the card public key correspondingly through the signing process. In this way, the server can read the pre-stored card public key according to the user identity; the read card public key can be used to respectively encrypt the device private key and the authentication key to obtain the device private key Cipher text and authentication key cipher text.
  • Step S15 The server sends the device private key ciphertext and the authentication key ciphertext to the terminal device.
  • Step S16 The terminal device receives and sends the device private key ciphertext and the authentication key ciphertext to the smart card.
  • Step S17 The smart card receives the device private key ciphertext and the authentication key ciphertext; decrypts the device private key ciphertext and the authentication key ciphertext to obtain the device private key and the authentication key key.
  • the smart card can obtain the card private key through the signing process.
  • the smart card can receive the device private key ciphertext and the authentication key ciphertext; the card private key can be used to decrypt the device private key ciphertext and the authentication key ciphertext respectively , Get the device private key and authentication key.
  • Step S18 The smart card stores the authentication key, and sends the device private key and the authentication key to the terminal device.
  • Step S19 The terminal device receives and stores the device private key and the authentication key.
  • the terminal device may store the device private key and the authentication key in a Trusted Execution Environment (TEE).
  • TEE Trusted Execution Environment
  • the terminal device can obtain the device private key and the authentication key
  • the smart card can obtain the card private key and the authentication key
  • the server can obtain the server private key and the authentication key, which is the subsequent authentication process. to offer comfort.
  • this embodiment can store the device private key, the card private key, and the server private key on three different media respectively, thereby reducing the risk of the smart card being copied and misused.
  • This specification provides another embodiment of the data processing method.
  • This embodiment takes the terminal device in the embodiment described in FIG. 3 as the main body, and may include the following steps.
  • Step S21 Send the device identification to the server.
  • Step S22 Receive the device private key ciphertext and the authentication key ciphertext sent by the server.
  • the device private key ciphertext is obtained by encrypting the device private key.
  • the authentication key ciphertext is obtained by encrypting the authentication key. Both the device private key and the authentication key are calculated according to the device identifier;
  • Step S23 Send the device private key ciphertext and the authentication key ciphertext to the smart card.
  • Step S24 Receive the device private key and authentication key sent by the smart card.
  • Step S25 Store the device private key and the authentication key.
  • This specification provides another embodiment of the data processing method.
  • This embodiment takes the server in the embodiment described in FIG. 3 as the main body, and may include the following steps.
  • Step S31 Receive the first device identifier sent by the terminal device.
  • Step S32 Generate a device private key according to the first device identification.
  • Step S33 Generate an authentication key according to the device private key, the card private key of the smart card, and the server private key of itself.
  • Step S34 Use the card public key of the smart card to respectively encrypt the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext.
  • Step S35 Send the device private key ciphertext and the authentication key ciphertext to the terminal device.
  • This specification provides another embodiment of the data processing method.
  • This embodiment takes the smart card in the embodiment described in FIG. 3 as the main body, and may include the following steps.
  • Step S41 Receive the device private key ciphertext and the authentication key ciphertext sent by the terminal device.
  • the device private key ciphertext is obtained by encrypting the device private key.
  • the authentication key ciphertext is obtained by encrypting the authentication key.
  • Step S42 Use its own card private key to decrypt the device private key cipher text and the authentication key cipher text respectively to obtain the device private key and the authentication key.
  • Step S43 Store the authentication key.
  • Step S44 Send the device private key and the authentication key to the terminal device.
  • Step S51 Based on the server private key held by the server, the terminal device based on the held device private key, and the smart card based on the held card private key, perform multi-party security calculations to obtain an authentication key.
  • Secure Muti-Party Computation is an algorithm to protect data privacy.
  • Multiple participants can use secure multi-party computing technology to perform collaborative calculations and obtain calculation results without leaking their own data.
  • n ⁇ 2; x 1 ,...,x n are the data of the participants P 1 ,...,P n respectively; y is the calculation result.
  • the participants P 1 ,..., P n can all obtain the calculation result y.
  • the server can obtain the server private key, the terminal device can obtain the device private key, and the smart card can obtain the card private key.
  • the server may use the server private key as an input parameter
  • the terminal device may use the device private key as an input parameter
  • the smart card may use the card private key as an input parameter to jointly perform multi-party security calculations.
  • the server, the terminal device and the smart card can all obtain the calculation result.
  • the calculation result may specifically include a signature key.
  • the server may be used to provide communication services, for example, may be the previous web server.
  • a smart card may be installed in the terminal device.
  • the terminal device may send a service processing request to the server.
  • the service processing request may be, for example, a voice call request or a data connection request.
  • the server may receive the service processing request; may send an authentication request to the terminal device.
  • the terminal device can receive the authentication request; can send the authentication request to the smart card.
  • the server may use the server private key as an input parameter
  • the terminal device may use the device private key as an input parameter
  • the smart card may use the card private key as an input parameter to jointly perform multi-party security calculations.
  • the server after receiving the service processing request, the server may calculate the time interval between the current time and the time when the last authentication passed; under the condition that the time interval reaches a preset time interval, An authentication request can be sent to the terminal device.
  • Step S52 The server authenticates the terminal device based on the authentication key.
  • the server may obtain the authentication key in advance through the activation process. In this way, the server can compare the calculated authentication key with the preset authentication key; if they are the same, it can determine that the authentication result of the terminal device is successful, so as to allow the terminal device to access; if If they are not the same, it can be determined that the authentication result of the terminal device is a failure, so as to deny the access of the terminal device.
  • Step S53 The terminal device authenticates the server based on the authentication key.
  • the terminal device can obtain the authentication key in advance through the activation process. In this way, the terminal can compare the calculated authentication key with the preset authentication key; if they are the same, the server is considered to be a legitimate server, and the communication network corresponding to the server is secure. The authentication result of the server is successful; if they are not the same, the server is considered to be an illegal server, and the communication network corresponding to the server is insecure, and the authentication result of the server can be determined to be a failure.
  • the smart card may authenticate the terminal device based on the authentication key. Specifically, as mentioned above, the smart card can obtain the authentication key in advance through the activation process. In this way, the smart card can compare the calculated authentication key with the preset authentication key; if they are the same, determine that the authentication result of the terminal device is successful; if not, determine the authentication of the terminal device The result is failure.
  • both the terminal device and the server can obtain the authentication key.
  • the server may authenticate the terminal device based on the authentication key.
  • the terminal device may authenticate the server based on the authentication key. In this way, mutual authentication between the terminal device and the server can be realized.
  • Step S61 Based on the server private key held by the server, and the terminal device based on the held device private key and the card private key of the smart card, jointly perform multi-party security calculations to obtain an authentication key.
  • the server may be used to provide communication services, for example, may be the previous web server.
  • a smart card may be installed in the terminal device.
  • the terminal device may send a service processing request to the server.
  • the service processing request may be, for example, a voice call request or a data connection request.
  • the server may receive the service processing request; may send an authentication request to the terminal device.
  • the terminal device may receive the authentication request.
  • the server can obtain the server private key
  • the terminal device can obtain the device private key
  • the smart card can obtain the card private key.
  • the terminal device may send a key acquisition request to the smart card.
  • the smart card can receive the key acquisition request; can send the card private key to the terminal device.
  • the terminal device can receive the card private key.
  • the terminal device may use the device private key and the card private key as input parameters, and the server may use the server private key as input parameters to jointly perform multi-party security calculations. Both the server and the terminal device can obtain the calculation result.
  • the calculation result may specifically include a signature key.
  • Step S62 The server authenticates the terminal device based on the authentication key.
  • Step S63 The terminal device authenticates the server based on the authentication key.
  • the terminal device and the server can obtain the authentication key respectively.
  • the server may authenticate the terminal device based on the authentication key.
  • the terminal device can authenticate the server based on the authentication key. In this way, mutual authentication between the terminal device and the server can be realized.
  • the terminal device in view of the weak computing power of the smart card, in order to improve the efficiency of multi-party secure computing, the terminal device can obtain the card private key of the smart card, so that the terminal device and the server participate in the multi-party secure computing, avoiding the smart card from directly participating in the multi-party secure computing.
  • This specification provides another embodiment of the data processing method. This embodiment can be applied to authentication scenarios. This embodiment takes the server as the execution subject, and may include the following steps.
  • Step S71 Perform multi-party security calculation based on the server private key to obtain an authentication key.
  • the input parameters of the multi-party secure calculation include the server private key of the server, the device private key of the terminal device, and the card private key of the smart card.
  • the multi-party secure calculation may be jointly executed by the server, terminal device and smart card.
  • the server can obtain the server private key
  • the terminal device can obtain the device private key
  • the smart card can obtain the card private key.
  • the server may use the server private key as an input parameter
  • the terminal device may use the device private key as an input parameter
  • the smart card may use the card private key as an input parameter to jointly perform multi-party security calculations.
  • the server, the terminal device and the smart card can all obtain the calculation result.
  • the calculation result may specifically include a signature key.
  • the multi-party secure computing may be performed jointly by the server and the terminal device.
  • the terminal device may send a key acquisition request to the smart card.
  • the smart card can receive the key acquisition request; can send the card private key to the terminal device.
  • the terminal device can receive the card private key.
  • the terminal device may use the device private key and the card private key as input parameters, and the server may use the server private key as input parameters to jointly perform multi-party security calculations. Both the server and the terminal device can obtain the calculation result.
  • the calculation result may specifically include a signature key.
  • Step S72 Perform authentication on the terminal device based on the authentication key.
  • This specification provides another embodiment of the data processing method. This embodiment can be applied to authentication scenarios. This embodiment takes the terminal device as the execution subject, and may include the following steps.
  • Step S81 Perform multi-party security calculation based on the device private key to obtain an authentication key.
  • the input parameters of the multi-party secure calculation include the server private key of the server, the device private key of the terminal device, and the card private key of the smart card.
  • the multi-party secure calculation may be jointly executed by the server, terminal device and smart card.
  • the server can obtain the server private key
  • the terminal device can obtain the device private key
  • the smart card can obtain the card private key.
  • the server may use the server private key as an input parameter
  • the terminal device may use the device private key as an input parameter
  • the smart card may use the card private key as an input parameter to jointly perform multi-party security calculations.
  • the server, the terminal device and the smart card can all obtain the calculation result.
  • the calculation result may specifically include a signature key.
  • the multi-party secure computing may be performed jointly by the server and the terminal device.
  • the terminal device may send a key acquisition request to the smart card.
  • the smart card can receive the key acquisition request; can send the card private key to the terminal device.
  • the terminal device can receive the card private key.
  • the terminal device may use the device private key and the card private key as input parameters, and the server may use the server private key as input parameters to jointly perform multi-party security calculations. Both the server and the terminal device can obtain the calculation result.
  • the calculation result may specifically include a signature key.
  • Step S82 Authenticate the server based on the authentication key.
  • the embodiment of this specification provides a data processing device applied to terminal equipment, including:
  • the first sending unit 91 is configured to send a device identifier to the server
  • the first receiving unit 92 is configured to receive the device private key ciphertext and the authentication key ciphertext sent by the server; the device private key ciphertext is obtained by encrypting the device private key; the authentication key The ciphertext is obtained by encrypting the authentication key; the device private key and the authentication key are both calculated according to the device identification;
  • the second sending unit 93 is configured to send the device private key ciphertext and the authentication key ciphertext to the smart card;
  • the second receiving unit 94 is configured to receive the device private key and authentication key sent by the smart card;
  • the storage unit 95 is used to store the device private key and the authentication key.
  • the embodiment of this specification provides a terminal device.
  • the terminal device may include a memory and a processor.
  • the memory can be implemented in any suitable way.
  • the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a U disk.
  • the memory can be used to store computer instructions.
  • the processor can be implemented in any suitable way.
  • the processor may take the form of a microprocessor or a processor and a computer-readable medium, logic gates, switches, application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), programmable logic controller and embedded microcontroller form, etc.
  • ASIC Application Specific Integrated Circuit
  • the processor may execute the computer instructions to implement the following steps: send the device identification to the server; receive the device private key ciphertext and the authentication key ciphertext sent by the server; the device private key ciphertext is obtained by The authentication key is obtained by encrypting the key; the authentication key ciphertext is obtained by encrypting the authentication key; the device private key and the authentication key are both calculated based on the device identification;
  • the smart card sends the device private key ciphertext and the authentication key ciphertext; receives the device private key and the authentication key sent by the smart card; and stores the device private key and the authentication key.
  • the embodiment of this specification provides a data processing device applied to a server, including:
  • the receiving unit 101 is configured to receive a first device identifier sent by a terminal device
  • the first generating unit 102 is configured to generate a device private key according to the first device identification
  • the second generating unit 103 is configured to generate an authentication key according to the device private key, the card private key of the smart card, and its own server private key;
  • the encryption unit 104 is configured to use the card public key of the smart card to respectively encrypt the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext;
  • the sending unit 105 is configured to send the device private key ciphertext and the authentication key ciphertext to the terminal device.
  • the embodiment of this specification provides a server.
  • the server may include a memory and a processor.
  • the memory can be implemented in any suitable way.
  • the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a U disk.
  • the memory can be used to store computer instructions.
  • the processor can be implemented in any suitable way.
  • the processor may take the form of a microprocessor or a processor and a computer-readable medium, logic gates, switches, application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), programmable logic controller and embedded microcontroller form, etc.
  • ASIC Application Specific Integrated Circuit
  • the processor may execute the computer instructions to implement the following steps: receiving a first device identification sent by a terminal device; generating a device private key according to the first device identification; according to the device private key, the card private key of the smart card, and The server private key generates the authentication key; the card public key of the smart card is used to encrypt the device private key and the authentication key respectively to obtain the device private key ciphertext and the authentication key ciphertext; to the terminal The device sends the device private key ciphertext and the authentication key ciphertext.
  • the embodiment of this specification provides a data processing device applied to a smart card, including:
  • the receiving unit 111 is configured to receive the device private key ciphertext and the authentication key ciphertext sent by the terminal device; the device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext The text is obtained by encrypting the authentication key;
  • the decryption unit 112 is configured to use its card private key to decrypt the device private key ciphertext and the authentication key ciphertext respectively to obtain the device private key and the authentication key;
  • the storage unit 113 is configured to store the authentication key
  • the sending unit 114 is configured to send the device private key and the authentication key to the terminal device.
  • the embodiment of this specification provides a smart card.
  • the smart card may include a memory and a processor.
  • the memory can be implemented in any suitable way.
  • the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a U disk.
  • the memory can be used to store computer instructions.
  • the processor can be implemented in any suitable way.
  • the processor may take the form of a microprocessor or a processor and a computer-readable medium, logic gates, switches, application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), programmable logic controller and embedded microcontroller form, etc.
  • ASIC Application Specific Integrated Circuit
  • the processor may execute the computer instructions to implement the following steps: receive the device private key ciphertext and the authentication key ciphertext sent by the terminal device; the device private key ciphertext is obtained by encrypting the device private key The authentication key ciphertext is obtained by encrypting the authentication key; using its own card private key to decrypt the device private key ciphertext and the authentication key ciphertext respectively to obtain the device Private key and authentication key; store the authentication key; send the device private key and the authentication key to a terminal device.
  • the embodiment of this specification provides a data processing device applied to a server, including:
  • the calculation unit 121 is configured to perform multi-party security calculations based on the server private key to obtain an authentication key
  • the authentication unit 122 is configured to authenticate the terminal device based on the authentication key.
  • the embodiment of this specification provides a server.
  • the server may include a memory and a processor.
  • the memory can be implemented in any suitable way.
  • the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a U disk.
  • the memory can be used to store computer instructions.
  • the processor can be implemented in any suitable way.
  • the processor may take the form of a microprocessor or a processor and a computer-readable medium, logic gates, switches, application specific integrated circuits that store computer-readable program codes (such as software or firmware) executable by the (micro)processor ( Application Specific Integrated Circuit (ASIC), programmable logic controller and embedded microcontroller form, etc.
  • the processor may execute the computer instructions to implement the following steps: perform multi-party secure calculation based on the server private key to obtain an authentication key; and based on the authentication key, authenticate the terminal device.
  • the embodiment of this specification provides a data processing device applied to terminal equipment, including:
  • the calculation unit 131 is configured to perform multi-party security calculations based on the device private key to obtain an authentication key
  • the authentication unit 132 is configured to authenticate the server based on the authentication key.
  • the embodiment of this specification provides a terminal device.
  • the terminal device may include a memory and a processor.
  • the memory can be implemented in any suitable way.
  • the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a U disk.
  • the memory can be used to store computer instructions.
  • the processor can be implemented in any suitable way.
  • the processor may take the form of a microprocessor or a processor and a computer-readable medium, logic gates, switches, application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), programmable logic controller and embedded microcontroller form, etc.
  • the processor may execute the computer instructions to implement the following steps: perform multi-party secure calculation based on the private key of the device to obtain an authentication key; and authenticate the server based on the authentication key.
  • a programmable logic device Programmable Logic Device, PLD
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
  • This manual can be used in many general or special computer system environments or configurations.
  • program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
  • This specification can also be practiced in distributed computing environments, in which tasks are performed by remote processing devices connected through a communication network.
  • program modules can be located in local and remote computer storage media including storage devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Provided are a data processing method, apparatus, smart card, terminal device, and server. The method comprises: a server, on the basis of a private key it holds, and a terminal device, on the basis of a device private key it holds, and a smart card, on the basis of a private key it holds, collectively perform a multi-party security calculation to obtain an authentication key; on the basis of said authentication key, the server authenticates the terminal device; on the basis of the authentication key, the terminal device authenticates the server.

Description

数据处理方法、装置、智能卡、终端设备和服务器Data processing method, device, smart card, terminal equipment and server 技术领域Technical field
本说明书实施例涉及计算机技术领域,特别涉及一种数据处理方法、装置、智能卡、终端设备和服务器。The embodiments of this specification relate to the field of computer technology, and in particular to a data processing method, device, smart card, terminal device, and server.
背景技术Background technique
目前,移动通信系统已经在世界范围内获得广泛应用。Currently, mobile communication systems have been widely used worldwide.
在相关技术中,移动通信系统可以包括智能卡、网络服务器和终端设备。智能卡在签约(注册登记)时,可以被分配了用户身份识别码IMSI和密钥ki。所述智能卡可以存储所述用户身份识别码IMSI和所述密钥ki。通过签约过程,所述网络服务器可以获得用户身份识别码IMSI和密钥ki;可以生成随机数RAND;可以根据所述密钥ki和所述随机数RAND生成响应SRESa;可以将所述用户身份识别码IMSI分别与所述随机数RAND、所述响应SRESa进行对应存储。In related technologies, a mobile communication system may include a smart card, a network server, and terminal equipment. The smart card can be assigned a user identification code IMSI and a secret key ki when signing a contract (registration). The smart card can store the user identification code IMSI and the key ki. Through the signing process, the network server can obtain the user identification code IMSI and the key ki; can generate a random number RAND; can generate a response SRESa according to the key ki and the random number RAND; can identify the user identity The code IMSI is stored correspondingly to the random number RAND and the response SRESa respectively.
请参阅图1。所述终端设备中可以安装有所述智能卡。这样所述终端设备可以向所述网络服务器发送网络接入请求。所述网络接入请求中可以携带有所述用户身份识别码IMSI。所述网络服务器可以接收所述网络接入请求;可以根据所述用户身份识别码IMSI读取预先存储的随机数RAND;可以向所述终端设备发送鉴权请求。所述鉴权请求中可以携带有所述随机数RAND。所述终端设备可以接收所述鉴权请求;可以向所述智能卡发送所述鉴权请求。所述智能卡可以接收所述鉴权请求;可以根据所述随机数RAND和所述密钥ki生成响应SRESb;可以向所述终端设备发送生成的响应SRESb。所述终端设备可以接收所述响应SRESb;可以向所述网络服务器发送所述响应SRESb。所述网络服务器可以接收响应SRESb;可以根据所述用户身份识别码IMSI读取预先存储的响应SRESa;可以将响应SRESb与响应SRESa进行比较;若二者相同,确定所述终端设备的鉴权结果为成功;若二者不相同,确定所述终端设备的鉴权结果为失败。Please refer to Figure 1. The smart card may be installed in the terminal device. In this way, the terminal device can send a network access request to the network server. The network access request may carry the user identification code IMSI. The network server can receive the network access request; can read the pre-stored random number RAND according to the user identification code IMSI; and can send an authentication request to the terminal device. The random number RAND may be carried in the authentication request. The terminal device may receive the authentication request; may send the authentication request to the smart card. The smart card can receive the authentication request; can generate a response SRESb according to the random number RAND and the key ki; and can send the generated response SRESb to the terminal device. The terminal device may receive the response SRESb; may send the response SRESb to the network server. The network server can receive the response SRESb; can read the pre-stored response SRESa according to the user identification code IMSI; can compare the response SRESb with the response SRESa; if the two are the same, determine the authentication result of the terminal device If the two are not the same, it is determined that the authentication result of the terminal device is a failure.
上述相关技术中,网络侧能够对终端设备进行鉴权,但终端设备无法对网络侧进行鉴权。由于上述相关技术中仅能够进行单向鉴权,这样移动用户有可能接入非法网络(例如伪基站),从而被盗取隐私信息。In the above related technologies, the network side can authenticate the terminal device, but the terminal device cannot authenticate the network side. Since only one-way authentication can be performed in the above-mentioned related technologies, it is possible for mobile users to access illegal networks (for example, pseudo base stations) and thus to steal private information.
发明内容Summary of the invention
本说明书实施例的目的是提供一种数据处理方法、装置、智能卡、终端设备和服务 器,以实现网络侧和终端设备之间的双向鉴权。The purpose of the embodiments of this specification is to provide a data processing method, device, smart card, terminal equipment, and server to realize two-way authentication between the network side and the terminal equipment.
为实现上述目的,本说明书中一个或多个实施例提供的技术方案如下。In order to achieve the foregoing objectives, the technical solutions provided by one or more embodiments in this specification are as follows.
根据本说明书一个或多个实施例的第一方面,提供了一种数据处理方法,包括:终端设备向服务器发送第一设备标识;服务器接收所述第一设备标识;根据所述第一设备标识生成设备私钥;根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成鉴权密钥;使用智能卡的卡公钥分别对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文;向终端设备发送所述设备私钥密文和所述鉴权密钥密文;终端设备接收并向智能卡发送所述设备私钥密文和所述鉴权密钥密文;智能卡接收所述设备私钥密文和所述鉴权密钥密文;使用所述卡私钥分别对所述设备私钥密文和所述鉴权密钥密文进行解密,得到设备私钥和鉴权密钥;存储所述鉴权密钥;向终端设备发送所述设备私钥和所述鉴权密钥;终端设备接收并存储所述设备私钥和所述鉴权密钥。According to a first aspect of one or more embodiments of this specification, a data processing method is provided, including: a terminal device sends a first device identifier to a server; the server receives the first device identifier; and according to the first device identifier Generate a device private key; generate an authentication key according to the device private key, the card private key of the smart card, and its own server private key; use the card public key of the smart card to perform the authentication on the device private key and the authentication key respectively Encryption to obtain the device private key ciphertext and the authentication key ciphertext; send the device private key ciphertext and the authentication key ciphertext to the terminal device; the terminal device receives and sends the device private key ciphertext to the smart card And the authentication key ciphertext; the smart card receives the device private key ciphertext and the authentication key ciphertext; uses the card private key to separately authenticate the device private key ciphertext and the authentication key The key ciphertext is decrypted to obtain the device private key and the authentication key; store the authentication key; send the device private key and the authentication key to the terminal device; the terminal device receives and stores the device The private key and the authentication key.
根据本说明书一个或多个实施例的第二方面,提供了一种数据处理方法,应用于终端设备,包括:向服务器发送设备标识;接收服务器发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;所述设备私钥和所述鉴权密钥均是根据所述设备标识计算得到的;向智能卡发送所述设备私钥密文和所述鉴权密钥密文;接收智能卡发来的设备私钥和鉴权密钥;存储所述设备私钥和所述鉴权密钥。According to a second aspect of one or more embodiments of this specification, a data processing method is provided, which is applied to a terminal device, including: sending a device identification to a server; receiving a device private key ciphertext and an authentication key sent by the server Ciphertext; the device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext is obtained by encrypting the authentication key; the device private key and the authentication The right keys are calculated based on the device identification; send the device private key ciphertext and the authentication key ciphertext to the smart card; receive the device private key and the authentication key sent by the smart card; store the The device private key and the authentication key.
根据本说明书一个或多个实施例的第三方面,提供了一种数据处理装置,应用于终端设备,包括:第一发送单元,用于向服务器发送设备标识;第一接收单元,用于接收服务器发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;所述设备私钥和所述鉴权密钥均是根据所述设备标识计算得到的;第二发送单元,用于向智能卡发送所述设备私钥密文和所述鉴权密钥密文;第二接收单元,用于接收智能卡发来的设备私钥和鉴权密钥;存储单元,用于存储所述设备私钥和所述鉴权密钥。According to a third aspect of one or more embodiments of this specification, there is provided a data processing device, which is applied to a terminal device, and includes: a first sending unit for sending a device identifier to a server; a first receiving unit for receiving The device private key ciphertext and the authentication key ciphertext sent by the server; the device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext is obtained by encrypting the authentication key Obtained through encryption; the device private key and the authentication key are both calculated according to the device identification; the second sending unit is used to send the device private key ciphertext and the authentication to the smart card The key ciphertext; the second receiving unit is used to receive the device private key and the authentication key sent by the smart card; the storage unit is used to store the device private key and the authentication key.
根据本说明书一个或多个实施例的第四方面,提供了一种终端设备,包括:存储器,用于存储计算机指令;处理器,用于执行所述计算机指令以实现如第二方面所述的方法步骤。According to a fourth aspect of one or more embodiments of this specification, there is provided a terminal device, including: a memory, configured to store computer instructions; and a processor, configured to execute the computer instructions to implement the method described in the second aspect Method steps.
根据本说明书一个或多个实施例的第五方面,提供了一种数据处理方法,应用于服务器,包括:接收终端设备发来的第一设备标识;根据所述第一设备标识生成设备私钥;根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成鉴权密钥;使用智能卡的 卡公钥分别对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文;向终端设备发送所述设备私钥密文和所述鉴权密钥密文。According to the fifth aspect of one or more embodiments of this specification, there is provided a data processing method applied to a server, including: receiving a first device identifier sent by a terminal device; generating a device private key according to the first device identifier Generate an authentication key according to the device private key, the card private key of the smart card and its own server private key; use the card public key of the smart card to respectively encrypt the device private key and the authentication key to obtain the device Private key ciphertext and authentication key ciphertext; sending the device private key ciphertext and the authentication key ciphertext to the terminal device.
根据本说明书一个或多个实施例的第六方面,提供了一种数据处理装置,应用于服务器,包括:接收单元,用于接收终端设备发来的第一设备标识;第一生成单元,用于根据所述第一设备标识生成设备私钥;第二生成单元,用于根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成鉴权密钥;加密单元,用于使用智能卡的卡公钥分别对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文;发送单元,用于向终端设备发送所述设备私钥密文和所述鉴权密钥密文。According to a sixth aspect of one or more embodiments of the present specification, there is provided a data processing apparatus, applied to a server, including: a receiving unit for receiving a first device identifier sent by a terminal device; a first generating unit for using For generating the device private key according to the first device identification; the second generating unit is used to generate the authentication key according to the device private key, the smart card's private key and its own server private key; the encryption unit is used to use The card public key of the smart card respectively encrypts the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext; the sending unit is used to send the device private key to the terminal device Ciphertext and the ciphertext of the authentication key.
根据本说明书一个或多个实施例的第七方面,提供了一种服务器,包括:存储器,用于存储计算机指令;处理器,用于执行所述计算机指令以实现如第五方面所述的方法步骤。According to a seventh aspect of one or more embodiments of this specification, a server is provided, including: a memory, configured to store computer instructions; a processor, configured to execute the computer instructions to implement the method according to the fifth aspect step.
根据本说明书一个或多个实施例的第八方面,提供了一种数据处理方法,应用于智能卡,包括:接收终端设备发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;使用自身的卡私钥分别对所述设备私钥密文和所述鉴权密钥密文进行解密,得到设备私钥和鉴权密钥;存储所述鉴权密钥;向终端设备发送所述设备私钥和所述鉴权密钥。According to an eighth aspect of one or more embodiments of this specification, there is provided a data processing method applied to a smart card, including: receiving a device private key ciphertext and an authentication key ciphertext sent by a terminal device; the device The private key cipher text is obtained by encrypting the device private key; the authentication key cipher text is obtained by encrypting the authentication key; using its own card private key to separately encrypt the device private key cipher text Decrypt the ciphertext with the authentication key to obtain the device private key and the authentication key; store the authentication key; and send the device private key and the authentication key to a terminal device.
根据本说明书一个或多个实施例的第九方面,提供了一种数据处理装置,应用于智能卡,包括:接收单元,用于接收终端设备发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;解密单元,用于使用自身的卡私钥分别对所述设备私钥密文和所述鉴权密钥密文进行解密,得到设备私钥和鉴权密钥;存储单元,用于存储所述鉴权密钥;发送单元,用于向终端设备发送所述设备私钥和所述鉴权密钥。According to the ninth aspect of one or more embodiments of this specification, there is provided a data processing device applied to a smart card, including: a receiving unit for receiving a device private key ciphertext and an authentication key ciphertext sent by a terminal device The device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext is obtained by encrypting the authentication key; the decryption unit is used to use its own card private The key respectively decrypts the device private key ciphertext and the authentication key ciphertext to obtain the device private key and the authentication key; the storage unit is used to store the authentication key; the sending unit is used to Send the device private key and the authentication key to the terminal device.
根据本说明书一个或多个实施例的第十方面,提供了一种智能卡,包括:存储器,用于存储计算机指令;处理器,用于执行所述计算机指令以实现如第八方面所述的方法步骤。According to a tenth aspect of one or more embodiments of this specification, there is provided a smart card, including: a memory, configured to store computer instructions; a processor, configured to execute the computer instructions to implement the method according to the eighth aspect step.
根据本说明书一个或多个实施例的第十一方面,提供了一种数据处理方法,包括:服务器基于持有的服务器私钥,终端设备基于持有的设备私钥,智能卡基于持有的卡私钥,共同执行多方安全计算,得到鉴权密钥;服务器基于所述鉴权密钥,对所述终端设备进行鉴权;终端设备基于所述鉴权密钥,对所述服务器进行鉴权。According to the eleventh aspect of one or more embodiments of this specification, a data processing method is provided, which includes: a server based on a held server private key, a terminal device based on the held device private key, and a smart card based on the held card The private key performs multi-party security calculations together to obtain an authentication key; the server authenticates the terminal device based on the authentication key; the terminal device authenticates the server based on the authentication key .
根据本说明书一个或多个实施例的第十二方面,提供了一种数据处理方法,包括: 服务器基于持有的服务器私钥,终端设备基于持有的设备私钥和智能卡的卡私钥,共同执行多方安全计算,得到鉴权密钥;服务器基于所述鉴权密钥,对所述终端设备进行鉴权;终端设备基于所述鉴权密钥,对所述服务器进行鉴权。According to a twelfth aspect of one or more embodiments of this specification, a data processing method is provided, including: a server based on a held server private key, and a terminal device based on the held device private key and the card private key of the smart card, Perform multi-party security calculations together to obtain an authentication key; the server authenticates the terminal device based on the authentication key; the terminal device authenticates the server based on the authentication key.
根据本说明书一个或多个实施例的第十三方面,提供了一种数据处理方法,应用于服务器,包括:基于服务器私钥执行多方安全计算,得到鉴权密钥;基于所述鉴权密钥,对所述终端设备进行鉴权。According to the thirteenth aspect of one or more embodiments of the present specification, there is provided a data processing method applied to a server, including: performing multi-party security calculations based on the server's private key to obtain an authentication key; and based on the authentication secret Key to authenticate the terminal device.
根据本说明书一个或多个实施例的第十四方面,提供了一种数据处理装置,应用于服务器,包括:计算单元,用于基于服务器私钥执行多方安全计算,得到鉴权密钥;鉴权单元,用于基于所述鉴权密钥,对所述终端设备进行鉴权。According to a fourteenth aspect of one or more embodiments of this specification, there is provided a data processing device applied to a server, including: a computing unit for performing multi-party secure calculations based on the server's private key to obtain an authentication key; The right unit is configured to authenticate the terminal device based on the authentication key.
根据本说明书一个或多个实施例的第十五方面,提供了一种服务器,包括:存储器,用于存储计算机指令;处理器,用于执行所述计算机指令以实现如第十三方面所述的方法步骤。According to a fifteenth aspect of one or more embodiments of the present specification, there is provided a server, including: a memory, configured to store computer instructions; and a processor, configured to execute the computer instructions to implement the method described in the thirteenth aspect Method steps.
根据本说明书一个或多个实施例的第十六方面,提供了一种数据处理方法,应用于终端设备,包括:基于设备私钥执行多方安全计算,得到鉴权密钥;基于所述鉴权密钥,对所述服务器进行鉴权。According to the sixteenth aspect of one or more embodiments of this specification, a data processing method is provided, which is applied to a terminal device, including: performing multi-party secure calculation based on the device private key to obtain an authentication key; based on the authentication The key is used to authenticate the server.
根据本说明书一个或多个实施例的第十七方面,提供了一种数据处理装置,应用于终端设备,包括:计算单元,用于基于设备私钥执行多方安全计算,得到鉴权密钥;鉴权单元,用于基于所述鉴权密钥,对所述服务器进行鉴权。According to a seventeenth aspect of one or more embodiments of this specification, there is provided a data processing device applied to a terminal device, including: a computing unit, configured to perform multi-party secure calculation based on the device private key to obtain an authentication key; The authentication unit is configured to authenticate the server based on the authentication key.
根据本说明书一个或多个实施例的第十八方面,提供了一种终端设备,包括:存储器,用于存储计算机指令;处理器,用于执行所述计算机指令以实现如第十六方面所述的方法步骤。According to an eighteenth aspect of one or more embodiments of the present specification, there is provided a terminal device, including: a memory, configured to store computer instructions; and a processor, configured to execute the computer instructions to implement as described in the sixteenth aspect The method steps described.
由以上本说明书实施例提供的技术方案可见,本说明书实施例中,通过多方安全计算,终端设备和服务器均可以获得鉴权密钥。所述服务器可以基于所述鉴权密钥对终端设备进行鉴权。所述终端设备可以基于所述鉴权密钥对所述服务器进行鉴权。这样可以实现终端设备和服务器之间的相互鉴权。It can be seen from the technical solutions provided in the above embodiments of this specification that, in the embodiments of this specification, through multi-party secure computing, both the terminal device and the server can obtain the authentication key. The server may authenticate the terminal device based on the authentication key. The terminal device may authenticate the server based on the authentication key. In this way, mutual authentication between the terminal device and the server can be realized.
附图说明Description of the drawings
为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性 的前提下,还可以根据这些附图获得其他的附图。In order to more clearly explain the technical solutions in the embodiments of this specification or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description are only These are some embodiments described in this specification. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without creative labor.
图1为相关技术中的一种鉴权流程图;Figure 1 is an authentication flow chart in related technologies;
图2为本说明书实施例一种移动通信系统的功能结构示意图;2 is a schematic diagram of the functional structure of a mobile communication system according to an embodiment of the specification;
图3为本说明书实施例一种数据处理方法的流程图;Figure 3 is a flowchart of a data processing method according to an embodiment of the specification;
图4为本说明书实施例一种数据处理方法的流程图;4 is a flowchart of a data processing method according to an embodiment of the specification;
图5为本说明书实施例一种数据处理方法的流程图;Fig. 5 is a flowchart of a data processing method according to an embodiment of the specification;
图6为本说明书实施例一种数据处理方法的流程图;Fig. 6 is a flowchart of a data processing method according to an embodiment of the specification;
图7为本说明书实施例一种数据处理方法的流程图;FIG. 7 is a flowchart of a data processing method according to an embodiment of this specification;
图8为本说明书实施例一种数据处理方法的流程图;FIG. 8 is a flowchart of a data processing method according to an embodiment of the specification;
图9为本说明书实施例一种数据处理方法的流程图;Fig. 9 is a flowchart of a data processing method according to an embodiment of the specification;
图10为本说明书实施例一种数据处理方法的流程图;FIG. 10 is a flowchart of a data processing method according to an embodiment of this specification;
图11为本说明书实施例一种数据处理装置的功能结构示意图;11 is a schematic diagram of the functional structure of a data processing device according to an embodiment of the specification;
图12为本说明书实施例一种终端设备的功能结构示意图;FIG. 12 is a schematic diagram of the functional structure of a terminal device according to an embodiment of the specification;
图13为本说明书实施例一种数据处理装置的功能结构示意图;13 is a schematic diagram of the functional structure of a data processing device according to an embodiment of the specification;
图14为本说明书实施例一种服务器的功能结构示意图;14 is a schematic diagram of the functional structure of a server according to an embodiment of the specification;
图15为本说明书实施例一种数据处理装置的功能结构示意图;15 is a schematic diagram of the functional structure of a data processing device according to an embodiment of the specification;
图16为本说明书实施例一种智能卡的功能结构示意图;16 is a schematic diagram of the functional structure of a smart card according to an embodiment of the specification;
图17为本说明书实施例一种数据处理装置的功能结构示意图;FIG. 17 is a schematic diagram of the functional structure of a data processing device according to an embodiment of the specification;
图18为本说明书实施例一种数据处理装置的功能结构示意图。FIG. 18 is a schematic diagram of the functional structure of a data processing device according to an embodiment of the specification.
具体实施方式detailed description
下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本说明书保护的范围。The technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described embodiments are only a part of the embodiments of this specification, not all of the embodiments. Based on the embodiments in this specification, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this specification.
此外,上述相关技术中,密钥ki仅存储在智能卡上。这样存在智能卡被复制盗用的风险。In addition, in the above related technology, the key ki is only stored on the smart card. In this way, there is a risk of the smart card being copied and embezzled.
请参阅图2。本说明书实施例提供一种移动通信系统。所述移动通信系统可以包括智能卡、终端设备、网络服务器和基站服务器。所述智能卡可以为具有数据处理功能和存储功能的集成电路卡,诸如SIM卡(Subscriber Identity Module,用户身份识别卡)、 USIM卡(Universal Subscriber Identity Module,全球用户识别卡)、UIM卡(User Identify Module)等等。所述终端设备可以为能够向用户提供语音和/或具有数据连通功能的设备,诸如移动电话(又称为“蜂窝电话”)、无绳电话、手持设备、车载设备、可穿戴设备等等。所述网络服务器可以用于提供通信服务,具体可以包括一个或多个功能单元。例如,所述网络服务器可以为网络和交换子系统(Network Switching Subsystem,NSS)的服务器,具体可以包括移动业务交换中心(Mobile Service Switching Center,MSC)、拜访位置寄存器(Visitor Location Register,VLR)、归属位置寄存器(Home Location Register,HLR)、鉴权中心(Authentication Center,AUC)中的一个或多个。所述基站服务器可以用于在所述终端设备和所述网络服务器之间提供数据传输服务。例如,所述基站服务器可以为基站子系统(Base Station System,BSS)的服务器。Please refer to Figure 2. The embodiment of this specification provides a mobile communication system. The mobile communication system may include a smart card, terminal equipment, network server and base station server. The smart card may be an integrated circuit card with data processing functions and storage functions, such as a SIM card (Subscriber Identity Module, user identification card), USIM card (Universal Subscriber Identity Module, global user identification card), and UIM card (User Identity Module). Module) and so on. The terminal device may be a device capable of providing users with voice and/or data connectivity, such as a mobile phone (also referred to as a "cellular phone"), a cordless phone, a handheld device, a vehicle-mounted device, a wearable device, and so on. The network server may be used to provide communication services, and may specifically include one or more functional units. For example, the network server may be a network and switching subsystem (Network Switching Subsystem, NSS) server, and may specifically include a mobile service switching center (Mobile Service Switching Center, MSC), a visitor location register (Visitor Location Register, VLR), One or more of a home location register (Home Location Register, HLR) and an authentication center (Authentication Center, AUC). The base station server may be used to provide data transmission service between the terminal device and the network server. For example, the base station server may be a base station system (Base Station System, BSS) server.
在一些实施例中,所述智能卡可以安装于所述终端设备上。如此通过运行所述智能卡,所述终端设备可以与所述网络服务器进行无线通信。所述终端设备具体可以经由所述基站服务器的透传,与所述网络服务器之间进行无线通信。所述无线通信可以使用多种通信标准、协议和技术中的任何一种,包括但不局限于全球移动通信系统(GSM)、宽带码分多址(W-CDMA)、码分多址(CDMA)、时分多址(TDMA)等等。In some embodiments, the smart card may be installed on the terminal device. In this way, by running the smart card, the terminal device can perform wireless communication with the network server. Specifically, the terminal device may perform wireless communication with the network server through the transparent transmission of the base station server. The wireless communication can use any of a variety of communication standards, protocols and technologies, including but not limited to Global System for Mobile Communications (GSM), Wideband Code Division Multiple Access (W-CDMA), Code Division Multiple Access (CDMA) ), Time Division Multiple Access (TDMA) and so on.
在一些实施例中,所述智能卡在签约(注册登记)时,可以被分配了用户身份识别码(International Mobile Subscriber Identity,IMSI)和公私钥对。所述用户身份识别码可以用于区分移动用户。所述智能卡的公私钥对可以包括卡公钥和卡私钥。如此所述智能卡可以存储所述用户身份识别码、所述卡私钥、所述卡公钥。例如,所述卡私钥可以表示为sk1,所述卡公钥可以表示为pk1。In some embodiments, the smart card may be assigned a user identification code (International Mobile Subscriber Identity, IMSI) and a public-private key pair when signing a contract (registration). The user identification code can be used to distinguish mobile users. The public-private key pair of the smart card may include a card public key and a card private key. In this way, the smart card can store the user identification code, the card private key, and the card public key. For example, the card private key may be expressed as sk1, and the card public key may be expressed as pk1.
通过签约,所述网络服务器可以获得所述用户身份识别码、所述卡私钥、所述卡公钥;可以生成所述终端设备的公私钥对、自身的公私钥对。所述终端设备的公私钥对可以包括设备公钥和设备私钥。所述服务器的公私钥对可以包括服务器公钥和服务器私钥。如此所述网络服务器可以将所述用户身份识别码分别与所述卡公钥、所述卡私钥、所述设备公钥、所述设备私钥、所述服务器公钥和所述服务器私钥进行对应存储。例如,所述服务器私钥可以表示为sk2,所述服务器公钥可以表示为pk2,所述设备私钥可以表示为sk3,所述设备公钥可以表示为pk3。Through the contract, the network server can obtain the user identification code, the card private key, and the card public key; and can generate a public-private key pair of the terminal device and its own public-private key pair. The public-private key pair of the terminal device may include a device public key and a device private key. The public-private key pair of the server may include a server public key and a server private key. In this way, the network server can associate the user identification code with the card public key, the card private key, the device public key, the device private key, the server public key, and the server private key. Perform corresponding storage. For example, the server private key may be expressed as sk2, the server public key may be expressed as pk2, the device private key may be expressed as sk3, and the device public key may be expressed as pk3.
所述网络服务器可以生成随机数作为鉴权随机数(RAND);可以将所述用户身份识别码与所述鉴权随机数进行对应存储;可以根据所述鉴权随机数生成鉴权响应数据(SRES);可以将所述用户身份识别码与所述鉴权响应数据进行对应存储。例如,所述 网络服务器可以使用A3算法(一种加密算法),根据所述卡私钥和所述鉴权随机数生成所述鉴权响应数据。The network server may generate a random number as an authentication random number (RAND); may store the user identification code and the authentication random number correspondingly; and may generate authentication response data according to the authentication random number ( SRES); the user identification code and the authentication response data can be stored correspondingly. For example, the network server may use the A3 algorithm (an encryption algorithm) to generate the authentication response data according to the card private key and the authentication random number.
请参阅图3。本说明书提供数据处理方法的一个实施例。该实施例可以适用于智能卡的激活场景,可以包括以下步骤。Please refer to Figure 3. This specification provides an embodiment of the data processing method. This embodiment can be applied to a smart card activation scenario, and can include the following steps.
步骤S11:终端设备向服务器发送第一设备标识。Step S11: The terminal device sends the first device identifier to the server.
步骤S12:服务器接收所述第一设备标识;根据所述第一设备标识生成设备私钥。Step S12: The server receives the first device identification; and generates a device private key according to the first device identification.
在一些实施例中,所述第一设备标识可以用于标识所述终端设备,例如可以为所述终端设备的串号(International Mobile Equipment Identity,IMEI)等。所述服务器可以用于提供通信服务,例如可以为前面的网络服务器。In some embodiments, the first device identifier may be used to identify the terminal device, for example, may be the serial number (International Mobile Equipment Identity, IMEI) of the terminal device. The server may be used to provide communication services, for example, may be the previous web server.
在一些实施例中,所述终端设备中可以安装有智能卡。如此所述终端设备可以向所述服务器发送网络接入请求。所述网络接入请求中可以携带有用户身份识别码。在一个场景示例中,所述终端设备可以在开机后,向所述服务器发送网络接入请求。In some embodiments, a smart card may be installed in the terminal device. In this way, the terminal device can send a network access request to the server. The user identification code may be carried in the network access request. In an example scenario, the terminal device may send a network access request to the server after being turned on.
如前所述,通过签约过程,所述服务器可以将用户身份识别码与鉴权随机数进行对应存储。如此所述服务器可以接收所述网络接入请求;可以根据所述用户身份识别码读取预先存储的鉴权随机数;可以向所述终端设备发送所述鉴权随机数。所述终端设备可以接收所述鉴权随机数;可以向智能卡发送所述鉴权随机数。所述智能卡可以接收所述鉴权随机数;可以根据所述鉴权随机数生成鉴权应答数据;可以向终端设备发送所述鉴权应答数据。例如,所述智能卡可以使用A3算法,根据自身的卡私钥和所述鉴权随机数生成所述鉴权响应数据。所述终端设备可以接收所述鉴权应答数据;可以向所述服务器发送所述鉴权应答数据和所述第一设备标识。As mentioned above, through the signing process, the server can correspondingly store the user identification code and the authentication random number. In this way, the server can receive the network access request; can read the pre-stored authentication random number according to the user identification code; and can send the authentication random number to the terminal device. The terminal device can receive the authentication random number; can send the authentication random number to the smart card. The smart card can receive the authentication random number; can generate authentication response data according to the authentication random number; and can send the authentication response data to a terminal device. For example, the smart card may use the A3 algorithm to generate the authentication response data according to its own card private key and the authentication random number. The terminal device may receive the authentication response data; may send the authentication response data and the first device identifier to the server.
如前所述,通过签约过程,所述服务器可以将用户身份识别码与鉴权响应数据进行对应存储。如此所述服务器可以接收鉴权应答数据和所述第一设备标识;可以根据所述用户身份标识读取预先存储的鉴权应答数据;可以将接收的鉴权应答数据与读取的鉴权应答数据进行比较;若相同,可以根据所述第一设备标识生成设备私钥;若不相同,可以忽略所述网络接入请求。具体地,所述服务器可以根据所述第一设备标识生成所述终端设备的公私钥对。所述终端设备的公私钥对可以包括设备私钥和设备公钥。例如,所述服务器生成的设备私钥可以表示为sk3’,所述服务器生成的设备公钥可以表示为pk3’。As mentioned above, through the signing process, the server can correspondingly store the user identification code and the authentication response data. In this way, the server can receive the authentication response data and the first device identification; can read the pre-stored authentication response data according to the user identity identification; can combine the received authentication response data with the read authentication response The data is compared; if they are the same, the device private key can be generated according to the first device identifier; if they are not the same, the network access request can be ignored. Specifically, the server may generate the public-private key pair of the terminal device according to the first device identifier. The public-private key pair of the terminal device may include a device private key and a device public key. For example, the device private key generated by the server may be expressed as sk3', and the device public key generated by the server may be expressed as pk3'.
在一些实施例中,所述服务器可以检测所述用户识别码是否满足预置条件。所述预置条件可以包括:所述用户身份识别码没有绑定设备标识;所述用户身份识别码绑定有 第二设备标识,所述第二设备标识与所述第一设备标识不同。若满足预置条件,所述服务器可以根据所述第一设备标识生成设备私钥。若不满足预置条件,所述服务器便认为智能卡已处于激活状态;可以结束激活场景相关步骤。In some embodiments, the server can detect whether the user identification code meets a preset condition. The preset condition may include: the user identification code is not bound to a device identification; the user identification code is bound to a second device identification, and the second device identification is different from the first device identification. If the preset condition is met, the server may generate a device private key according to the first device identification. If the preset conditions are not met, the server considers that the smart card is already in the activated state; the steps related to the activation scenario can be ended.
进一步地,在检测到所述用户识别码没有绑定设备标识时,所述服务器便认为所述智能卡为首次使用;还可以将所述用户身份识别码和所述第一设备标识进行绑定。这样便能够实现智能卡与终端设备的绑定,防止该智能卡被盗用于其它终端设备上。在检测到所述用户识别码绑定有第二设备标识时,所述服务器便认为智能卡更换了终端设备;还可以取消所述用户身份识别码和所述第二设备标识之间的绑定关系;可以将所述用户身份识别码和所述第一设备标识进行绑定。这样便能够实现终端设备的更换。Further, when it is detected that the user identification code is not bound to the device identification, the server considers the smart card to be used for the first time; the user identification code and the first device identification may also be bound. In this way, the binding of the smart card and the terminal device can be realized, and the smart card can be prevented from being stolen and used on other terminal devices. When it is detected that the user identification code is bound to the second device identification, the server considers that the smart card has replaced the terminal device; it can also cancel the binding relationship between the user identification code and the second device identification ; The user identification code and the first device identification can be bound. In this way, terminal equipment can be replaced.
更进一步地,若满足预置条件,所述服务器还可以向终端设备发送身份识别密钥获取请求。所述终端设备可以接收所述身份识别密钥获取请求;可以向服务器发送身份识别密钥。所述身份识别密钥例如可以为PIN(Personal Identification Number)码。当然,所述身份识别密钥还可以为用户输入的能够识别身份的密码,例如登录密码等。所述服务器可以接收所述身份识别密钥;可以对所述身份识别密钥进行验证;若验证通过,可以将所述用户身份识别码和所述第一设备标识进行绑定,或者,可以取消所述用户身份识别码和所述第二设备标识之间的绑定关系、且将所述用户身份识别码和所述第一设备标识进行绑定。Furthermore, if the preset conditions are met, the server may also send an identification key acquisition request to the terminal device. The terminal device can receive the identity recognition key acquisition request; can send the identity recognition key to the server. The identification key may be, for example, a PIN (Personal Identification Number) code. Of course, the identity recognition key may also be a password that can be input by the user, such as a login password. The server may receive the identification key; may verify the identification key; if the verification is passed, the user identification code and the first device identification may be bound, or may be cancelled The binding relationship between the user identification code and the second device identification, and the user identification code and the first device identification are bound.
进一步地,如前所述,通过签约过程,所述服务器可以将用户身份识别码分别与设备公钥、设备私钥进行对应存储。例如,存储的设备私钥可以表示为sk3,存储的设备公钥可以表示为pk3。如此若满足预置条件,所述服务器还可以使用步骤S12生成的设备公钥对预先存储的设备公钥进行更新;可以使用步骤S12生成的设备私钥对预先存储的设备私钥进行更新。延续前例,步骤S12生成的设备私钥可以表示为sk3’,步骤S12生成的设备公钥可以表示为pk3’。那么,所述服务器可以使用设备私钥sk3’对设备私钥sk3进行更新,可以使用设备公钥pk3’对设备公钥pk3进行更新。Further, as mentioned above, through the signing process, the server can store the user identification code corresponding to the device public key and the device private key respectively. For example, the stored device private key can be expressed as sk3, and the stored device public key can be expressed as pk3. In this way, if the preset conditions are met, the server can also use the device public key generated in step S12 to update the pre-stored device public key; and can use the device private key generated in step S12 to update the pre-stored device private key. Continuing the previous example, the device private key generated in step S12 can be expressed as sk3', and the device public key generated in step S12 can be expressed as pk3'. Then, the server can use the device private key sk3' to update the device private key sk3, and can use the device public key pk3' to update the device public key pk3.
步骤S13:服务器根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成鉴权密钥。Step S13: The server generates an authentication key according to the device private key, the card private key of the smart card, and its own server private key.
在一些实施例中,如前所述,通过签约过程,所述服务器可以将用户身份识别码分别与卡私钥和服务器私钥进行对应存储。如此所述服务器可以根据所述用户身份识别码读取预先存储的卡私钥和服务器私钥;可以根据生成的设备私钥、读取的卡私钥和读取的服务器私钥生成鉴权密钥。具体地,所述服务器可以根据设备私钥、卡私钥和服务器 私钥生成特定私钥;可以根据所述特定私钥生成特定公钥作为鉴权密钥。例如,读取的卡私钥可以表示为sk1,读取的服务器私钥可以表示为sk2,生成的设备私钥可以表示为sk3’。那么,所述服务器可以计算函数sk=f(sk1,sk2,sk3’),sk表示特定私钥。所述服务器可以根据特定私钥sk计算特定公钥pk作为鉴权密钥。In some embodiments, as described above, through the signing process, the server can store the user identification code corresponding to the card private key and the server private key respectively. In this way, the server can read the pre-stored card private key and server private key according to the user identification code; it can generate an authentication key according to the generated device private key, the read card private key, and the read server private key. key. Specifically, the server may generate a specific private key according to the device private key, the card private key, and the server private key; and may generate the specific public key as the authentication key according to the specific private key. For example, the read card private key can be represented as sk1, the read server private key can be represented as sk2, and the generated device private key can be represented as sk3'. Then, the server can calculate the function sk=f(sk1, sk2, sk3'), where sk represents a specific private key. The server may calculate the specific public key pk as the authentication key according to the specific private key sk.
步骤S14:服务器对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文。Step S14: The server encrypts the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext.
在一些实施例中,如前所述,通过签约过程,所述服务器可以将用户身份识别码与卡公钥进行对应存储。如此所述服务器可以根据所述用户身份标识读取预先存储的卡公钥;可以使用读取的卡公钥,分别对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文。In some embodiments, as mentioned above, the server can store the user identification code and the card public key correspondingly through the signing process. In this way, the server can read the pre-stored card public key according to the user identity; the read card public key can be used to respectively encrypt the device private key and the authentication key to obtain the device private key Cipher text and authentication key cipher text.
步骤S15:服务器向终端设备发送所述设备私钥密文和所述鉴权密钥密文。Step S15: The server sends the device private key ciphertext and the authentication key ciphertext to the terminal device.
步骤S16:终端设备接收并向智能卡发送所述设备私钥密文和所述鉴权密钥密文。Step S16: The terminal device receives and sends the device private key ciphertext and the authentication key ciphertext to the smart card.
步骤S17:智能卡接收所述设备私钥密文和所述鉴权密钥密文;对所述设备私钥密文和所述鉴权密钥密文进行解密,得到设备私钥和鉴权密钥。Step S17: The smart card receives the device private key ciphertext and the authentication key ciphertext; decrypts the device private key ciphertext and the authentication key ciphertext to obtain the device private key and the authentication key key.
在一些实施例中,如前所述,通过签约过程,所述智能卡可以获得卡私钥。如此所述智能卡可以接收所述设备私钥密文和所述鉴权密钥密文;可以使用所述卡私钥分别对所述设备私钥密文和所述鉴权密钥密文进行解密,得到设备私钥和鉴权密钥。In some embodiments, as mentioned above, the smart card can obtain the card private key through the signing process. In this way, the smart card can receive the device private key ciphertext and the authentication key ciphertext; the card private key can be used to decrypt the device private key ciphertext and the authentication key ciphertext respectively , Get the device private key and authentication key.
步骤S18:智能卡存储所述鉴权密钥,向终端设备发送所述设备私钥和所述鉴权密钥。Step S18: The smart card stores the authentication key, and sends the device private key and the authentication key to the terminal device.
步骤S19:终端设备接收并存储所述设备私钥和所述鉴权密钥。Step S19: The terminal device receives and stores the device private key and the authentication key.
例如,所述终端设备可以将所述设备私钥和所述鉴权密钥存储至可信执行环境(Trusted Execution Environment,TEE)。这样可以增加所述设备私钥和所述鉴权密钥的安全性,降低所述设备私钥和所述鉴权密钥被泄漏的风险。For example, the terminal device may store the device private key and the authentication key in a Trusted Execution Environment (TEE). This can increase the security of the device private key and the authentication key, and reduce the risk of the device private key and the authentication key being leaked.
本实施例的数据处理方法,终端设备可以获得设备私钥和鉴权密钥,智能卡可以获得卡私钥和鉴权密钥,服务器可以获得服务器私钥和鉴权密钥,为后续鉴权过程提供方便。相较于仅将密钥存储于智能卡上,本实施例可以将设备私钥、卡私钥和服务器私钥分别存储于三种不同的介质上,从而能够降低智能卡被复制盗用的风险。In the data processing method of this embodiment, the terminal device can obtain the device private key and the authentication key, the smart card can obtain the card private key and the authentication key, and the server can obtain the server private key and the authentication key, which is the subsequent authentication process. to offer comfort. Compared with only storing the key on the smart card, this embodiment can store the device private key, the card private key, and the server private key on three different media respectively, thereby reducing the risk of the smart card being copied and misused.
请参阅图4。本说明书提供数据处理方法的另一个实施例。该实施例以图3描述实施例中的终端设备为主体,可以包括以下步骤。Please refer to Figure 4. This specification provides another embodiment of the data processing method. This embodiment takes the terminal device in the embodiment described in FIG. 3 as the main body, and may include the following steps.
步骤S21:向服务器发送设备标识。Step S21: Send the device identification to the server.
步骤S22:接收服务器发来的设备私钥密文和鉴权密钥密文。Step S22: Receive the device private key ciphertext and the authentication key ciphertext sent by the server.
所述设备私钥密文是通过对设备私钥进行加密得到的。所述鉴权密钥密文是通过对鉴权密钥进行加密得到的。所述设备私钥和所述鉴权密钥均是根据所述设备标识计算得到的;The device private key ciphertext is obtained by encrypting the device private key. The authentication key ciphertext is obtained by encrypting the authentication key. Both the device private key and the authentication key are calculated according to the device identifier;
步骤S23:向智能卡发送所述设备私钥密文和所述鉴权密钥密文。Step S23: Send the device private key ciphertext and the authentication key ciphertext to the smart card.
步骤S24:接收智能卡发来的设备私钥和鉴权密钥。Step S24: Receive the device private key and authentication key sent by the smart card.
步骤S25:存储所述设备私钥和所述鉴权密钥。Step S25: Store the device private key and the authentication key.
请参阅图5。本说明书提供数据处理方法的另一个实施例。该实施例以图3描述实施例中的服务器为主体,可以包括以下步骤。Please refer to Figure 5. This specification provides another embodiment of the data processing method. This embodiment takes the server in the embodiment described in FIG. 3 as the main body, and may include the following steps.
步骤S31:接收终端设备发来的第一设备标识。Step S31: Receive the first device identifier sent by the terminal device.
步骤S32:根据所述第一设备标识生成设备私钥。Step S32: Generate a device private key according to the first device identification.
步骤S33:根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成鉴权密钥。Step S33: Generate an authentication key according to the device private key, the card private key of the smart card, and the server private key of itself.
步骤S34:使用智能卡的卡公钥分别对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文。Step S34: Use the card public key of the smart card to respectively encrypt the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext.
步骤S35:向终端设备发送所述设备私钥密文和所述鉴权密钥密文。Step S35: Send the device private key ciphertext and the authentication key ciphertext to the terminal device.
请参阅图6。本说明书提供数据处理方法的另一个实施例。该实施例以图3描述实施例中的智能卡为主体,可以包括以下步骤。Please refer to Figure 6. This specification provides another embodiment of the data processing method. This embodiment takes the smart card in the embodiment described in FIG. 3 as the main body, and may include the following steps.
步骤S41:接收终端设备发来的设备私钥密文和鉴权密钥密文。Step S41: Receive the device private key ciphertext and the authentication key ciphertext sent by the terminal device.
所述设备私钥密文是通过对设备私钥进行加密得到的。所述鉴权密钥密文是通过对鉴权密钥进行加密得到的。The device private key ciphertext is obtained by encrypting the device private key. The authentication key ciphertext is obtained by encrypting the authentication key.
步骤S42:使用自身的卡私钥分别对所述设备私钥密文和所述鉴权密钥密文进行解密,得到设备私钥和鉴权密钥。Step S42: Use its own card private key to decrypt the device private key cipher text and the authentication key cipher text respectively to obtain the device private key and the authentication key.
步骤S43:存储所述鉴权密钥。Step S43: Store the authentication key.
步骤S44:向终端设备发送所述设备私钥和所述鉴权密钥。Step S44: Send the device private key and the authentication key to the terminal device.
请参阅图7。本说明书提供数据处理方法的另一个实施例。该实施例可以适用于鉴权场景,可以包括以下步骤。Refer to Figure 7. This specification provides another embodiment of the data processing method. This embodiment can be applied to an authentication scenario and can include the following steps.
步骤S51:服务器基于持有的服务器私钥,终端设备基于持有的设备私钥,智能卡基于持有的卡私钥,共同执行多方安全计算,得到鉴权密钥。Step S51: Based on the server private key held by the server, the terminal device based on the held device private key, and the smart card based on the held card private key, perform multi-party security calculations to obtain an authentication key.
在一些实施例中,安全多方计算(Secure Muti-Party Computation,MPC)是一种保护数据隐私安全的算法。多个参与方可以在不泄漏自身数据的前提下,使用安全多方计算技术进行协作计算,得到计算结果。例如,使用安全多方计算技术,参与方P 1,…,P n可以协作计算函数y=f(x 1,…,x n)。其中,n≥2;x 1,...,x n分别为参与方P 1,…,P n的数据;y为计算结果。参与方P 1,…,P n均可以获得所述计算结果y。 In some embodiments, Secure Muti-Party Computation (MPC) is an algorithm to protect data privacy. Multiple participants can use secure multi-party computing technology to perform collaborative calculations and obtain calculation results without leaking their own data. For example, using secure multi-party computing technology, the participants P 1 ,..., P n can cooperate to calculate the function y=f(x 1 ,..., x n ). Among them, n≥2; x 1 ,...,x n are the data of the participants P 1 ,...,P n respectively; y is the calculation result. The participants P 1 ,..., P n can all obtain the calculation result y.
如前所述,通过签约过程和激活过程,所述服务器可以获得服务器私钥,所述终端设备可以获得设备私钥,所述智能卡可以获得卡私钥。如此所述服务器可以服务器私钥作为输入参数,所述终端设备可以以设备私钥作为输入参数,所述智能卡可以以卡私钥作为输入参数,共同执行多方安全计算。所述服务器、所述终端设备和所述智能卡均可以获得计算结果。所述计算结果具体可以包括签名密钥。As mentioned above, through the signing process and the activation process, the server can obtain the server private key, the terminal device can obtain the device private key, and the smart card can obtain the card private key. In this way, the server may use the server private key as an input parameter, the terminal device may use the device private key as an input parameter, and the smart card may use the card private key as an input parameter to jointly perform multi-party security calculations. The server, the terminal device and the smart card can all obtain the calculation result. The calculation result may specifically include a signature key.
在一些实施例中,所述服务器可以用于提供通信服务,例如可以为前面的网络服务器。所述终端设备中可以安装有智能卡。所述终端设备可以向所述服务器发送业务处理请求。所述业务处理请求例如可以为语音通话请求、或数据连通请求等。所述服务器可以接收所述业务处理请求;可以向所述终端设备发送鉴权请求。所述终端设备可以接收所述鉴权请求;可以向所述智能卡发送鉴权请求。如此,所述服务器可以以服务器私钥作为输入参数、所述终端设备可以以设备私钥作为输入参数,所述智能卡可以以卡私钥作为输入参数,共同执行多方安全计算。在一个场景示例中,在接收到所述业务处理请求以后,所述服务器可以计算当前时刻与上一次鉴权通过时刻之间的时间间隔;在所述时间间隔达到预设时间间隔的条件下,可以向所述终端设备发送鉴权请求。In some embodiments, the server may be used to provide communication services, for example, may be the previous web server. A smart card may be installed in the terminal device. The terminal device may send a service processing request to the server. The service processing request may be, for example, a voice call request or a data connection request. The server may receive the service processing request; may send an authentication request to the terminal device. The terminal device can receive the authentication request; can send the authentication request to the smart card. In this way, the server may use the server private key as an input parameter, the terminal device may use the device private key as an input parameter, and the smart card may use the card private key as an input parameter to jointly perform multi-party security calculations. In an example scenario, after receiving the service processing request, the server may calculate the time interval between the current time and the time when the last authentication passed; under the condition that the time interval reaches a preset time interval, An authentication request can be sent to the terminal device.
步骤S52:服务器基于所述鉴权密钥,对所述终端设备进行鉴权。Step S52: The server authenticates the terminal device based on the authentication key.
在一些实施例中,如前所述,通过激活过程,所述服务器可以预先获得鉴权密钥。如此所述服务器可以将计算的鉴权密钥与预置的鉴权密钥进行比较;若相同,可以确定所述终端设备的鉴权结果为成功,以允许所述终端设备的接入;若不相同,可以确定所述终端设备的鉴权结果为失败,以拒绝所述终端设备的接入。In some embodiments, as mentioned above, the server may obtain the authentication key in advance through the activation process. In this way, the server can compare the calculated authentication key with the preset authentication key; if they are the same, it can determine that the authentication result of the terminal device is successful, so as to allow the terminal device to access; if If they are not the same, it can be determined that the authentication result of the terminal device is a failure, so as to deny the access of the terminal device.
步骤S53:终端设备基于所述鉴权密钥,对所述服务器进行鉴权。Step S53: The terminal device authenticates the server based on the authentication key.
在一些实施例中,如前所述,通过激活过程,所述终端设备可以预先获得鉴权密钥。如此所述终端可以将计算的鉴权密钥与预置的鉴权密钥进行比较;若相同,便认为所述服务器为合法服务器,所述服务器对应的通信网络是安全的,进而可以确定所述服务器 的鉴权结果为成功;若不相同,便认为所述服务器为非法服务器,所述服务器对应的通信网络是不安全的,进而可以确定所述服务器的鉴权结果为失败。In some embodiments, as mentioned above, the terminal device can obtain the authentication key in advance through the activation process. In this way, the terminal can compare the calculated authentication key with the preset authentication key; if they are the same, the server is considered to be a legitimate server, and the communication network corresponding to the server is secure. The authentication result of the server is successful; if they are not the same, the server is considered to be an illegal server, and the communication network corresponding to the server is insecure, and the authentication result of the server can be determined to be a failure.
在一些实施例中,智能卡可以基于所述鉴权密钥,对所述终端设备进行鉴权。具体地,如前所述,通过激活过程,所述智能卡可以预先获得鉴权密钥。如此所述智能卡可以将计算的鉴权密钥与预置的鉴权密钥进行比较;若相同,确定所述终端设备的鉴权结果为成功;若不相同,确定所述终端设备的鉴权结果为失败。In some embodiments, the smart card may authenticate the terminal device based on the authentication key. Specifically, as mentioned above, the smart card can obtain the authentication key in advance through the activation process. In this way, the smart card can compare the calculated authentication key with the preset authentication key; if they are the same, determine that the authentication result of the terminal device is successful; if not, determine the authentication of the terminal device The result is failure.
本实施例的数据处理方法,通过多方安全计算,终端设备和服务器均可以获得鉴权密钥。所述服务器可以基于所述鉴权密钥对终端设备进行鉴权。所述终端设备可以基于所述鉴权密钥对所述服务器进行鉴权。这样可以实现终端设备和服务器之间的相互鉴权。In the data processing method of this embodiment, through multi-party secure calculation, both the terminal device and the server can obtain the authentication key. The server may authenticate the terminal device based on the authentication key. The terminal device may authenticate the server based on the authentication key. In this way, mutual authentication between the terminal device and the server can be realized.
请参阅图8。本说明书提供数据处理方法的另一个实施例。该实施例可以适用于鉴权场景,可以包括以下步骤。Refer to Figure 8. This specification provides another embodiment of the data processing method. This embodiment can be applied to an authentication scenario and can include the following steps.
步骤S61:服务器基于持有的服务器私钥,终端设备基于持有的设备私钥和智能卡的卡私钥,共同执行多方安全计算,得到鉴权密钥。Step S61: Based on the server private key held by the server, and the terminal device based on the held device private key and the card private key of the smart card, jointly perform multi-party security calculations to obtain an authentication key.
在一些实施例中,所述服务器可以用于提供通信服务,例如可以为前面的网络服务器。所述终端设备中可以安装有智能卡。所述终端设备可以向所述服务器发送业务处理请求。所述业务处理请求例如可以为语音通话请求、或数据连通请求等。所述服务器可以接收所述业务处理请求;可以向所述终端设备发送鉴权请求。所述终端设备可以接收所述鉴权请求。In some embodiments, the server may be used to provide communication services, for example, may be the previous web server. A smart card may be installed in the terminal device. The terminal device may send a service processing request to the server. The service processing request may be, for example, a voice call request or a data connection request. The server may receive the service processing request; may send an authentication request to the terminal device. The terminal device may receive the authentication request.
如前所述,通过签约过程和激活过程,所述服务器可以获得服务器私钥,所述终端设备可以获得设备私钥,所述智能卡可以获得卡私钥。鉴于智能卡的计算能力较弱,为了提高多方安全计算的效率,所述终端设备可以向所述智能卡发送密钥获取请求。所述智能卡可以接收所述密钥获取请求;可以向所述终端设备发送卡私钥。所述终端设备可以接收所述卡私钥。所述终端设备可以以设备私钥和所述卡私钥作为输入参数,所述服务器可以以服务器私钥作为输入参数,共同执行多方安全计算。所述服务器和所述终端设备均可以获得计算结果。所述计算结果具体可以包括签名密钥。As mentioned above, through the signing process and the activation process, the server can obtain the server private key, the terminal device can obtain the device private key, and the smart card can obtain the card private key. In view of the weak computing capability of the smart card, in order to improve the efficiency of multi-party secure computing, the terminal device may send a key acquisition request to the smart card. The smart card can receive the key acquisition request; can send the card private key to the terminal device. The terminal device can receive the card private key. The terminal device may use the device private key and the card private key as input parameters, and the server may use the server private key as input parameters to jointly perform multi-party security calculations. Both the server and the terminal device can obtain the calculation result. The calculation result may specifically include a signature key.
步骤S62:服务器基于所述鉴权密钥,对所述终端设备进行鉴权。Step S62: The server authenticates the terminal device based on the authentication key.
步骤S63:终端设备基于所述鉴权密钥,对所述服务器进行鉴权。Step S63: The terminal device authenticates the server based on the authentication key.
本实施例的数据处理方法,通过多方安全计算,终端设备和服务器可以分别获得鉴权密钥。所述服务器可以基于所述鉴权密钥对终端设备进行鉴权。所述终端设备可以基 于所述鉴权密钥对所述服务器进行鉴权。这样可以实现终端设备和服务器之间的相互鉴权。此外,鉴于智能卡的计算能力较弱,为了提高多方安全计算的效率,终端设备可以获得智能卡的卡私钥,从而由终端设备和服务器参与多方安全计算,避免了智能卡直接参与多方安全计算。In the data processing method of this embodiment, through multi-party secure calculation, the terminal device and the server can obtain the authentication key respectively. The server may authenticate the terminal device based on the authentication key. The terminal device can authenticate the server based on the authentication key. In this way, mutual authentication between the terminal device and the server can be realized. In addition, in view of the weak computing power of the smart card, in order to improve the efficiency of multi-party secure computing, the terminal device can obtain the card private key of the smart card, so that the terminal device and the server participate in the multi-party secure computing, avoiding the smart card from directly participating in the multi-party secure computing.
请参阅图9。本说明书提供数据处理方法的另一个实施例。该实施例可以适用于鉴权场景。该实施例以服务器为执行主体,可以包括以下步骤。Refer to Figure 9. This specification provides another embodiment of the data processing method. This embodiment can be applied to authentication scenarios. This embodiment takes the server as the execution subject, and may include the following steps.
步骤S71:基于服务器私钥执行多方安全计算,得到鉴权密钥。Step S71: Perform multi-party security calculation based on the server private key to obtain an authentication key.
在一些实施例中,所述多方安全计算的输入参数包括所述服务器的服务器私钥、终端设备的设备私钥和智能卡的卡私钥。In some embodiments, the input parameters of the multi-party secure calculation include the server private key of the server, the device private key of the terminal device, and the card private key of the smart card.
所述多方安全计算可以是由服务器、终端设备和智能卡共同执行的。具体地,如前所述,通过签约过程和激活过程,所述服务器可以获得服务器私钥,所述终端设备可以获得设备私钥,所述智能卡可以获得卡私钥。如此所述服务器可以服务器私钥作为输入参数,所述终端设备可以以设备私钥作为输入参数,所述智能卡可以以卡私钥作为输入参数,共同执行多方安全计算。所述服务器、所述终端设备和所述智能卡均可以获得计算结果。所述计算结果具体可以包括签名密钥。The multi-party secure calculation may be jointly executed by the server, terminal device and smart card. Specifically, as described above, through the signing process and the activation process, the server can obtain the server private key, the terminal device can obtain the device private key, and the smart card can obtain the card private key. In this way, the server may use the server private key as an input parameter, the terminal device may use the device private key as an input parameter, and the smart card may use the card private key as an input parameter to jointly perform multi-party security calculations. The server, the terminal device and the smart card can all obtain the calculation result. The calculation result may specifically include a signature key.
或者,鉴于智能卡的计算能力较弱,为了提高多方安全计算的效率,所述多方安全计算可以是由服务器和终端设备共同执行的。具体地,所述终端设备可以向所述智能卡发送密钥获取请求。所述智能卡可以接收所述密钥获取请求;可以向所述终端设备发送卡私钥。所述终端设备可以接收所述卡私钥。所述终端设备可以以设备私钥和所述卡私钥作为输入参数,所述服务器可以以服务器私钥作为输入参数,共同执行多方安全计算。所述服务器和所述终端设备均可以获得计算结果。所述计算结果具体可以包括签名密钥。Or, in view of the weak computing power of the smart card, in order to improve the efficiency of multi-party secure computing, the multi-party secure computing may be performed jointly by the server and the terminal device. Specifically, the terminal device may send a key acquisition request to the smart card. The smart card can receive the key acquisition request; can send the card private key to the terminal device. The terminal device can receive the card private key. The terminal device may use the device private key and the card private key as input parameters, and the server may use the server private key as input parameters to jointly perform multi-party security calculations. Both the server and the terminal device can obtain the calculation result. The calculation result may specifically include a signature key.
步骤S72:基于所述鉴权密钥,对所述终端设备进行鉴权。Step S72: Perform authentication on the terminal device based on the authentication key.
请参阅图10。本说明书提供数据处理方法的另一个实施例。该实施例可以适用于鉴权场景。该实施例以终端设备为执行主体,可以包括以下步骤。Refer to Figure 10. This specification provides another embodiment of the data processing method. This embodiment can be applied to authentication scenarios. This embodiment takes the terminal device as the execution subject, and may include the following steps.
步骤S81:基于设备私钥执行多方安全计算,得到鉴权密钥。Step S81: Perform multi-party security calculation based on the device private key to obtain an authentication key.
所述多方安全计算的输入参数包括服务器的服务器私钥、所述终端设备的设备私钥和智能卡的卡私钥。The input parameters of the multi-party secure calculation include the server private key of the server, the device private key of the terminal device, and the card private key of the smart card.
所述多方安全计算可以是由服务器、终端设备和智能卡共同执行的。具体地,如前 所述,通过签约过程和激活过程,所述服务器可以获得服务器私钥,所述终端设备可以获得设备私钥,所述智能卡可以获得卡私钥。如此所述服务器可以服务器私钥作为输入参数,所述终端设备可以以设备私钥作为输入参数,所述智能卡可以以卡私钥作为输入参数,共同执行多方安全计算。所述服务器、所述终端设备和所述智能卡均可以获得计算结果。所述计算结果具体可以包括签名密钥。The multi-party secure calculation may be jointly executed by the server, terminal device and smart card. Specifically, as described above, through the signing process and the activation process, the server can obtain the server private key, the terminal device can obtain the device private key, and the smart card can obtain the card private key. In this way, the server may use the server private key as an input parameter, the terminal device may use the device private key as an input parameter, and the smart card may use the card private key as an input parameter to jointly perform multi-party security calculations. The server, the terminal device and the smart card can all obtain the calculation result. The calculation result may specifically include a signature key.
或者,鉴于智能卡的计算能力较弱,为了提高多方安全计算的效率,所述多方安全计算可以是由服务器和终端设备共同执行的。具体地,所述终端设备可以向所述智能卡发送密钥获取请求。所述智能卡可以接收所述密钥获取请求;可以向所述终端设备发送卡私钥。所述终端设备可以接收所述卡私钥。所述终端设备可以以设备私钥和所述卡私钥作为输入参数,所述服务器可以以服务器私钥作为输入参数,共同执行多方安全计算。所述服务器和所述终端设备均可以获得计算结果。所述计算结果具体可以包括签名密钥。Or, in view of the weak computing power of the smart card, in order to improve the efficiency of multi-party secure computing, the multi-party secure computing may be performed jointly by the server and the terminal device. Specifically, the terminal device may send a key acquisition request to the smart card. The smart card can receive the key acquisition request; can send the card private key to the terminal device. The terminal device can receive the card private key. The terminal device may use the device private key and the card private key as input parameters, and the server may use the server private key as input parameters to jointly perform multi-party security calculations. Both the server and the terminal device can obtain the calculation result. The calculation result may specifically include a signature key.
步骤S82:基于所述鉴权密钥,对所述服务器进行鉴权。Step S82: Authenticate the server based on the authentication key.
请参阅图11。本说明书实施例提供一种数据处理装置,应用于终端设备,包括:Refer to Figure 11. The embodiment of this specification provides a data processing device applied to terminal equipment, including:
第一发送单元91,用于向服务器发送设备标识;The first sending unit 91 is configured to send a device identifier to the server;
第一接收单元92,用于接收服务器发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;所述设备私钥和所述鉴权密钥均是根据所述设备标识计算得到的;The first receiving unit 92 is configured to receive the device private key ciphertext and the authentication key ciphertext sent by the server; the device private key ciphertext is obtained by encrypting the device private key; the authentication key The ciphertext is obtained by encrypting the authentication key; the device private key and the authentication key are both calculated according to the device identification;
第二发送单元93,用于向智能卡发送所述设备私钥密文和所述鉴权密钥密文;The second sending unit 93 is configured to send the device private key ciphertext and the authentication key ciphertext to the smart card;
第二接收单元94,用于接收智能卡发来的设备私钥和鉴权密钥;The second receiving unit 94 is configured to receive the device private key and authentication key sent by the smart card;
存储单元95,用于存储所述设备私钥和所述鉴权密钥。The storage unit 95 is used to store the device private key and the authentication key.
请参阅图12。本说明书实施例提供一种终端设备。所述终端设备可以包括存储器和处理器。Refer to Figure 12. The embodiment of this specification provides a terminal device. The terminal device may include a memory and a processor.
所述存储器可以按任何适当的方式实现。例如,所述存储器可以为只读存储器、机械硬盘、固态硬盘、或U盘等。所述存储器可以用于存储计算机指令。The memory can be implemented in any suitable way. For example, the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a U disk. The memory can be used to store computer instructions.
所述处理器可以按任何适当的方式实现。例如,处理器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式等等。所述处理器可以执行所述计算 机指令实现以下步骤:向服务器发送设备标识;接收服务器发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;所述设备私钥和所述鉴权密钥均是根据所述设备标识计算得到的;向智能卡发送所述设备私钥密文和所述鉴权密钥密文;接收智能卡发来的设备私钥和鉴权密钥;存储所述设备私钥和所述鉴权密钥。The processor can be implemented in any suitable way. For example, the processor may take the form of a microprocessor or a processor and a computer-readable medium, logic gates, switches, application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), programmable logic controller and embedded microcontroller form, etc. The processor may execute the computer instructions to implement the following steps: send the device identification to the server; receive the device private key ciphertext and the authentication key ciphertext sent by the server; the device private key ciphertext is obtained by The authentication key is obtained by encrypting the key; the authentication key ciphertext is obtained by encrypting the authentication key; the device private key and the authentication key are both calculated based on the device identification; The smart card sends the device private key ciphertext and the authentication key ciphertext; receives the device private key and the authentication key sent by the smart card; and stores the device private key and the authentication key.
请参阅图13。本说明书实施例提供一种数据处理装置,应用于服务器,包括:Refer to Figure 13. The embodiment of this specification provides a data processing device applied to a server, including:
接收单元101,用于接收终端设备发来的第一设备标识;The receiving unit 101 is configured to receive a first device identifier sent by a terminal device;
第一生成单元102,用于根据所述第一设备标识生成设备私钥;The first generating unit 102 is configured to generate a device private key according to the first device identification;
第二生成单元103,用于根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成鉴权密钥;The second generating unit 103 is configured to generate an authentication key according to the device private key, the card private key of the smart card, and its own server private key;
加密单元104,用于使用智能卡的卡公钥分别对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文;The encryption unit 104 is configured to use the card public key of the smart card to respectively encrypt the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext;
发送单元105,用于向终端设备发送所述设备私钥密文和所述鉴权密钥密文。The sending unit 105 is configured to send the device private key ciphertext and the authentication key ciphertext to the terminal device.
请参阅图14。本说明书实施例提供一种服务器。所述服务器可以包括存储器和处理器。Refer to Figure 14. The embodiment of this specification provides a server. The server may include a memory and a processor.
所述存储器可以按任何适当的方式实现。例如,所述存储器可以为只读存储器、机械硬盘、固态硬盘、或U盘等。所述存储器可以用于存储计算机指令。The memory can be implemented in any suitable way. For example, the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a U disk. The memory can be used to store computer instructions.
所述处理器可以按任何适当的方式实现。例如,处理器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式等等。所述处理器可以执行所述计算机指令实现以下步骤:接收终端设备发来的第一设备标识;根据所述第一设备标识生成设备私钥;根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成鉴权密钥;使用智能卡的卡公钥分别对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文;向终端设备发送所述设备私钥密文和所述鉴权密钥密文。The processor can be implemented in any suitable way. For example, the processor may take the form of a microprocessor or a processor and a computer-readable medium, logic gates, switches, application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), programmable logic controller and embedded microcontroller form, etc. The processor may execute the computer instructions to implement the following steps: receiving a first device identification sent by a terminal device; generating a device private key according to the first device identification; according to the device private key, the card private key of the smart card, and The server private key generates the authentication key; the card public key of the smart card is used to encrypt the device private key and the authentication key respectively to obtain the device private key ciphertext and the authentication key ciphertext; to the terminal The device sends the device private key ciphertext and the authentication key ciphertext.
请参阅图15。本说明书实施例提供一种数据处理装置,应用于智能卡,包括:Refer to Figure 15. The embodiment of this specification provides a data processing device applied to a smart card, including:
接收单元111,用于接收终端设备发来的设备私钥密文和鉴权密钥密文;所述设备 私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;The receiving unit 111 is configured to receive the device private key ciphertext and the authentication key ciphertext sent by the terminal device; the device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext The text is obtained by encrypting the authentication key;
解密单元112,用于使用自身的卡私钥分别对所述设备私钥密文和所述鉴权密钥密文进行解密,得到设备私钥和鉴权密钥;The decryption unit 112 is configured to use its card private key to decrypt the device private key ciphertext and the authentication key ciphertext respectively to obtain the device private key and the authentication key;
存储单元113,用于存储所述鉴权密钥;The storage unit 113 is configured to store the authentication key;
发送单元114,用于向终端设备发送所述设备私钥和所述鉴权密钥。The sending unit 114 is configured to send the device private key and the authentication key to the terminal device.
请参阅图16。本说明书实施例提供一种智能卡。所述智能卡可以包括存储器和处理器。Refer to Figure 16. The embodiment of this specification provides a smart card. The smart card may include a memory and a processor.
所述存储器可以按任何适当的方式实现。例如,所述存储器可以为只读存储器、机械硬盘、固态硬盘、或U盘等。所述存储器可以用于存储计算机指令。The memory can be implemented in any suitable way. For example, the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a U disk. The memory can be used to store computer instructions.
所述处理器可以按任何适当的方式实现。例如,处理器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式等等。所述处理器可以执行所述计算机指令实现以下步骤:接收终端设备发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;使用自身的卡私钥分别对所述设备私钥密文和所述鉴权密钥密文进行解密,得到设备私钥和鉴权密钥;存储所述鉴权密钥;向终端设备发送所述设备私钥和所述鉴权密钥。The processor can be implemented in any suitable way. For example, the processor may take the form of a microprocessor or a processor and a computer-readable medium, logic gates, switches, application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), programmable logic controller and embedded microcontroller form, etc. The processor may execute the computer instructions to implement the following steps: receive the device private key ciphertext and the authentication key ciphertext sent by the terminal device; the device private key ciphertext is obtained by encrypting the device private key The authentication key ciphertext is obtained by encrypting the authentication key; using its own card private key to decrypt the device private key ciphertext and the authentication key ciphertext respectively to obtain the device Private key and authentication key; store the authentication key; send the device private key and the authentication key to a terminal device.
请参阅图17。本说明书实施例提供一种数据处理装置,应用于服务器,包括:Refer to Figure 17. The embodiment of this specification provides a data processing device applied to a server, including:
计算单元121,用于基于服务器私钥执行多方安全计算,得到鉴权密钥;The calculation unit 121 is configured to perform multi-party security calculations based on the server private key to obtain an authentication key;
鉴权单元122,用于基于所述鉴权密钥,对所述终端设备进行鉴权。The authentication unit 122 is configured to authenticate the terminal device based on the authentication key.
请参阅图14。本说明书实施例提供一种服务器。所述服务器可以包括存储器和处理器。Refer to Figure 14. The embodiment of this specification provides a server. The server may include a memory and a processor.
所述存储器可以按任何适当的方式实现。例如,所述存储器可以为只读存储器、机械硬盘、固态硬盘、或U盘等。所述存储器可以用于存储计算机指令。The memory can be implemented in any suitable way. For example, the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a U disk. The memory can be used to store computer instructions.
所述处理器可以按任何适当的方式实现。例如,处理器可以采取例如微处理器或处 理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式等等。所述处理器可以执行所述计算机指令实现以下步骤:基于服务器私钥执行多方安全计算,得到鉴权密钥;基于所述鉴权密钥,对所述终端设备进行鉴权。The processor can be implemented in any suitable way. For example, the processor may take the form of a microprocessor or a processor and a computer-readable medium, logic gates, switches, application specific integrated circuits that store computer-readable program codes (such as software or firmware) executable by the (micro)processor ( Application Specific Integrated Circuit (ASIC), programmable logic controller and embedded microcontroller form, etc. The processor may execute the computer instructions to implement the following steps: perform multi-party secure calculation based on the server private key to obtain an authentication key; and based on the authentication key, authenticate the terminal device.
请参阅图18。本说明书实施例提供一种数据处理装置,应用于终端设备,包括:Refer to Figure 18. The embodiment of this specification provides a data processing device applied to terminal equipment, including:
计算单元131,用于基于设备私钥执行多方安全计算,得到鉴权密钥;The calculation unit 131 is configured to perform multi-party security calculations based on the device private key to obtain an authentication key;
鉴权单元132,用于基于所述鉴权密钥,对所述服务器进行鉴权。The authentication unit 132 is configured to authenticate the server based on the authentication key.
请参阅图12。本说明书实施例提供一种终端设备。所述终端设备可以包括存储器和处理器。Refer to Figure 12. The embodiment of this specification provides a terminal device. The terminal device may include a memory and a processor.
所述存储器可以按任何适当的方式实现。例如,所述存储器可以为只读存储器、机械硬盘、固态硬盘、或U盘等。所述存储器可以用于存储计算机指令。The memory can be implemented in any suitable way. For example, the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a U disk. The memory can be used to store computer instructions.
所述处理器可以按任何适当的方式实现。例如,处理器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式等等。所述处理器可以执行所述计算机指令实现以下步骤:基于设备私钥执行多方安全计算,得到鉴权密钥;基于所述鉴权密钥,对所述服务器进行鉴权。The processor can be implemented in any suitable way. For example, the processor may take the form of a microprocessor or a processor and a computer-readable medium, logic gates, switches, application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), programmable logic controller and embedded microcontroller form, etc. The processor may execute the computer instructions to implement the following steps: perform multi-party secure calculation based on the private key of the device to obtain an authentication key; and authenticate the server based on the authentication key.
需要说明的是,本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同或相似的部分互相参见即可,每个实施例重点说明的都是与其它实施例的不同之处。尤其,对于装置实施例、终端设备实施例、服务器实施例、智能卡实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。It should be noted that the various embodiments in this specification are described in a progressive manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. Place. In particular, for the device embodiment, terminal device embodiment, server embodiment, and smart card embodiment, since they are basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
本领域技术人员在阅读本说明书文件之后,可以无需创造性劳动想到将本说明书列举的部分或全部实施例进行任意组合,这些组合也在本说明书公开和保护的范围内。After reading the documents of this specification, those skilled in the art can think of any combination of some or all of the embodiments listed in this specification without creative work, and these combinations are also within the scope of disclosure and protection of this specification.
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如, 对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片2。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog2。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, the improvement of a technology can be clearly distinguished between hardware improvements (for example, improvements in circuit structures such as diodes, transistors, switches, etc.) or software improvements (improvements in method flow). However, with the development of technology, the improvement of many methods and processes of today can be regarded as a direct improvement of the hardware circuit structure. Designers almost always get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by hardware entity modules. For example, a programmable logic device (Programmable Logic Device, PLD) (for example, a Field Programmable Gate Array (FPGA)) is such an integrated circuit whose logic function is determined by the user's programming of the device. It is programmed by the designer to "integrate" a digital system on a piece of PLD without requiring the chip manufacturer to design and manufacture a dedicated integrated circuit chip 2. Moreover, nowadays, instead of manually making integrated circuit chips, this kind of programming is mostly realized by using "logic compiler" software, which is similar to the software compiler used in program development and writing, but before compilation The original code must also be written in a specific programming language, which is called Hardware Description Language (HDL), and there is not only one type of HDL, but many types, such as ABEL (Advanced Boolean Expression Language) , AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description), etc., currently most commonly used The ones are VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog2. It should also be clear to those skilled in the art that just a little bit of logic programming of the method flow in the above-mentioned hardware description languages and programming into an integrated circuit can easily obtain the hardware circuit that implements the logic method flow.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The systems, devices, modules, or units illustrated in the above embodiments may be specifically implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. Specifically, the computer may be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本说明书可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本说明书的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本说明书各个实施例或者实施例的某些部分所述的方法。From the description of the foregoing implementation manners, it can be known that those skilled in the art can clearly understand that this specification can be implemented by means of software plus a necessary general hardware platform. Based on this understanding, the technical solution of this specification can be embodied in the form of a software product, which can be stored in a storage medium, such as ROM/RAM, magnetic disk. , CD-ROM, etc., including a number of instructions to make a computer device (which may be a personal computer, server, or network device, etc.) execute the methods described in each embodiment of this specification or some parts of the embodiment.
本说明书可用于众多通用或专用的计算机系统环境或配置中。例如:个人计算机、 服务器计算机、手持设备或便携式设备、平板型设备、多处理器系统、基于微处理器的系统、置顶盒、可编程的消费电子设备、网络PC、小型计算机、大型计算机、包括以上任何系统或设备的分布式计算环境等等。This manual can be used in many general or special computer system environments or configurations. For example: personal computers, server computers, handheld or portable devices, tablet devices, multi-processor systems, microprocessor-based systems, set-top boxes, programmable consumer electronics devices, network PCs, small computers, large computers, including Distributed computing environment for any of the above systems or equipment, etc.
本说明书可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。This specification may be described in the general context of computer-executable instructions executed by a computer, such as program modules. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. This specification can also be practiced in distributed computing environments, in which tasks are performed by remote processing devices connected through a communication network. In a distributed computing environment, program modules can be located in local and remote computer storage media including storage devices.
虽然通过实施例描绘了本说明书,本领域普通技术人员知道,本说明书有许多变形和变化而不脱离本说明书的精神,希望所附的权利要求包括这些变形和变化而不脱离本说明书的精神。Although the description has been described through the embodiments, those of ordinary skill in the art know that there are many variations and changes in the specification without departing from the spirit of the specification, and it is hoped that the appended claims include these variations and changes without departing from the spirit of the specification.

Claims (40)

  1. 一种数据处理方法,包括:A data processing method, including:
    终端设备向服务器发送第一设备标识;The terminal device sends the first device identifier to the server;
    服务器接收所述第一设备标识;根据所述第一设备标识生成设备私钥;根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成鉴权密钥;使用智能卡的卡公钥分别对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文;向终端设备发送所述设备私钥密文和所述鉴权密钥密文;The server receives the first device identification; generates a device private key according to the first device identification; generates an authentication key according to the device private key, the card private key of the smart card, and its own server private key; uses the smart card public key The key respectively encrypts the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext; sending the device private key ciphertext and the authentication key to the terminal device Ciphertext
    终端设备接收并向智能卡发送所述设备私钥密文和所述鉴权密钥密文;The terminal device receives and sends the device private key ciphertext and the authentication key ciphertext to the smart card;
    智能卡接收所述设备私钥密文和所述鉴权密钥密文;使用所述卡私钥分别对所述设备私钥密文和所述鉴权密钥密文进行解密,得到设备私钥和鉴权密钥;存储所述鉴权密钥;向终端设备发送所述设备私钥和所述鉴权密钥;The smart card receives the device private key ciphertext and the authentication key ciphertext; uses the card private key to decrypt the device private key ciphertext and the authentication key ciphertext respectively to obtain the device private key And an authentication key; storing the authentication key; sending the device private key and the authentication key to a terminal device;
    终端设备接收并存储所述设备私钥和所述鉴权密钥。The terminal device receives and stores the device private key and the authentication key.
  2. 如权利要求1所述的方法,在生成鉴权密钥的步骤中包括:The method according to claim 1, wherein the step of generating an authentication key comprises:
    服务器根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成特定私钥;根据所述特定私钥生成特定公钥作为鉴权密钥。The server generates a specific private key according to the device private key, the card private key of the smart card, and its own server private key; and generates the specific public key as an authentication key according to the specific private key.
  3. 如权利要求1所述的方法,所述方法还包括:The method of claim 1, further comprising:
    终端设备向服务器发送用户身份识别码;The terminal device sends the user identification code to the server;
    服务器接收所述用户身份识别码;检测所述用户身份识别码是否满足预置条件;The server receives the user identification code; detects whether the user identification code meets a preset condition;
    在生成设备私钥的步骤中包括:The steps of generating the device private key include:
    若满足,服务器根据所述第一设备标识生成设备私钥。If it is satisfied, the server generates a device private key according to the first device identification.
  4. 如权利要求3所述的方法,所述预置条件包括:The method according to claim 3, wherein the preset conditions include:
    所述用户身份识别码没有绑定设备标识;The user identification code is not bound to the device identification;
    若满足,所述方法还包括:If it is satisfied, the method further includes:
    服务器将所述用户身份识别码和所述第一设备标识进行绑定。The server binds the user identification code and the first device identifier.
  5. 如权利要求4所述的方法,所述方法还包括:The method of claim 4, further comprising:
    服务器向终端设备发送身份识别密钥获取请求;The server sends an identification key acquisition request to the terminal device;
    终端设备接收所述身份识别密钥获取请求;向服务器发送身份识别密钥;The terminal device receives the identity recognition key acquisition request; sends the identity recognition key to the server;
    服务器接收所述身份识别密钥;对所述身份识别密钥进行验证;The server receives the identity recognition key; verifies the identity recognition key;
    在将所述用户身份识别码和所述第一设备标识进行绑定的步骤中包括:The step of binding the user identification code and the first device identifier includes:
    若验证通过,服务器将所述用户身份识别码和所述第一设备标识进行绑定。If the verification is passed, the server binds the user identification code and the first device identifier.
  6. 如权利要求3所述的方法,所述预置条件包括:The method according to claim 3, wherein the preset conditions include:
    所述用户身份识别码绑定有第二设备标识;The user identification code is bound with a second device identifier;
    若满足,所述方法还包括:If it is satisfied, the method further includes:
    服务器取消所述用户身份识别码和所述第二设备标识之间的绑定关系;将所述用户身份识别码和所述第一设备标识进行绑定。The server cancels the binding relationship between the user identification code and the second device identification; binds the user identification code and the first device identification.
  7. 如权利要求6所述的方法,所述方法还包括:The method of claim 6, further comprising:
    服务器向终端设备发送身份识别密钥获取请求;The server sends an identification key acquisition request to the terminal device;
    终端设备接收所述身份识别密钥获取请求;向服务器发送身份识别密钥;The terminal device receives the identity recognition key acquisition request; sends the identity recognition key to the server;
    服务器接收所述身份识别密钥;对所述身份识别密钥进行验证;The server receives the identity recognition key; verifies the identity recognition key;
    所述服务器取消所述用户身份识别码和所述第二设备标识之间的绑定关系;将所述用户身份识别码和所述第一设备标识进行绑定,包括:The server cancels the binding relationship between the user identification code and the second device identification; binding the user identification code and the first device identification includes:
    若验证通过,服务器取消所述用户身份识别码和所述第二设备标识之间的绑定关系;将所述用户身份识别码和所述第一设备标识进行绑定。If the verification is passed, the server cancels the binding relationship between the user identification code and the second device identification; binds the user identification code and the first device identification.
  8. 如权利要求1所述的方法,所述方法还包括:The method of claim 1, further comprising:
    服务器向终端设备发送鉴权随机数;The server sends the authentication random number to the terminal device;
    终端设备接收并向智能卡发送所述鉴权随机数;The terminal device receives and sends the authentication random number to the smart card;
    智能卡接收所述鉴权随机数;根据所述鉴权随机数计算鉴权应答数据;向终端设备发送所述鉴权应答数据;The smart card receives the authentication random number; calculates authentication response data according to the authentication random number; sends the authentication response data to the terminal device;
    终端设备接收并向服务器发送所述鉴权应答数据;The terminal device receives and sends the authentication response data to the server;
    服务器接收所述鉴权应答数据;将接收的鉴权应答数据与预置鉴权应答数据进行比较;The server receives the authentication response data; compares the received authentication response data with preset authentication response data;
    在生成设备私钥的步骤中包括:The steps of generating the device private key include:
    若相同,服务器根据所述第一设备标识生成设备私钥。If they are the same, the server generates a device private key according to the first device identification.
  9. 一种数据处理方法,应用于终端设备,包括:A data processing method applied to terminal equipment, including:
    向服务器发送设备标识;Send the device ID to the server;
    接收服务器发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;所述设备私钥和所述鉴权密钥均是根据所述设备标识计算得到的;Receive the device private key ciphertext and authentication key ciphertext sent by the server; the device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext is obtained by encrypting the authentication key Key is obtained through encryption; the device private key and the authentication key are both calculated according to the device identifier;
    向智能卡发送所述设备私钥密文和所述鉴权密钥密文;Sending the device private key ciphertext and the authentication key ciphertext to the smart card;
    接收智能卡发来的设备私钥和鉴权密钥;Receive the device private key and authentication key sent by the smart card;
    存储所述设备私钥和所述鉴权密钥。Store the device private key and the authentication key.
  10. 如权利要求9所述的方法,所述方法还包括:The method according to claim 9, further comprising:
    接收服务器发来的鉴权随机数;Receive the authentication random number sent by the server;
    向智能卡发送所述鉴权随机数;Sending the authentication random number to the smart card;
    接收智能卡发来的鉴权应答数据;所述鉴权应答数据是根据所述鉴权随机数计算得到的;Receiving authentication response data sent by the smart card; the authentication response data is calculated according to the authentication random number;
    向服务器发送所述鉴权应答数据。Send the authentication response data to the server.
  11. 一种数据处理装置,应用于终端设备,包括:A data processing device applied to terminal equipment, including:
    第一发送单元,用于向服务器发送设备标识;The first sending unit is used to send the device identification to the server;
    第一接收单元,用于接收服务器发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;所述设备私钥和所述鉴权密钥均是根据所述设备标识计算得到的;The first receiving unit is configured to receive the device private key ciphertext and the authentication key ciphertext sent by the server; the device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext The text is obtained by encrypting the authentication key; the device private key and the authentication key are both calculated according to the device identification;
    第二发送单元,用于向智能卡发送所述设备私钥密文和所述鉴权密钥密文;The second sending unit is configured to send the device private key ciphertext and the authentication key ciphertext to the smart card;
    第二接收单元,用于接收智能卡发来的设备私钥和鉴权密钥;The second receiving unit is used to receive the device private key and the authentication key sent by the smart card;
    存储单元,用于存储所述设备私钥和所述鉴权密钥。The storage unit is used to store the device private key and the authentication key.
  12. 一种终端设备,包括:A terminal device, including:
    存储器,用于存储计算机指令;Memory, used to store computer instructions;
    处理器,用于执行所述计算机指令以实现如权利要求9或10所述的方法步骤。The processor is configured to execute the computer instructions to implement the method steps according to claim 9 or 10.
  13. 一种数据处理方法,应用于服务器,包括:A data processing method applied to a server, including:
    接收终端设备发来的第一设备标识;Receiving the first device identifier sent by the terminal device;
    根据所述第一设备标识生成设备私钥;Generating a device private key according to the first device identification;
    根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成鉴权密钥;Generate an authentication key according to the device private key, the card private key of the smart card, and its own server private key;
    使用智能卡的卡公钥分别对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文;Use the card public key of the smart card to respectively encrypt the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext;
    向终端设备发送所述设备私钥密文和所述鉴权密钥密文。Send the device private key ciphertext and the authentication key ciphertext to the terminal device.
  14. 如权利要求13所述的方法,在生成鉴权密钥的步骤中包括:The method according to claim 13, wherein the step of generating an authentication key comprises:
    根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成特定私钥;Generate a specific private key according to the device private key, the card private key of the smart card, and its own server private key;
    根据所述特定私钥生成特定公钥作为鉴权密钥。Generate a specific public key as an authentication key according to the specific private key.
  15. 如权利要求13所述的方法,所述方法还包括:The method of claim 13, further comprising:
    接收用户身份识别码;Receive user identification code;
    检测所述用户身份识别码是否满足预置条件;Detecting whether the user identification code meets a preset condition;
    在生成设备私钥的步骤中包括:The steps of generating the device private key include:
    若满足,根据所述第一设备标识生成设备私钥。If it is satisfied, the device private key is generated according to the first device identification.
  16. 如权利要求15所述的方法,所述预置条件包括:The method according to claim 15, wherein the preset conditions include:
    所述用户身份识别码没有绑定设备标识;The user identification code is not bound to the device identification;
    若满足,所述方法还包括:If it is satisfied, the method further includes:
    将所述用户身份识别码和所述第一设备标识进行绑定。Bind the user identification code and the first device identifier.
  17. 如权利要求16所述的方法,所述方法还包括:The method of claim 16, further comprising:
    向终端设备发送身份识别密钥获取请求;Send an identification key acquisition request to the terminal device;
    接收终端设备发来的身份识别密钥;Receive the identification key sent by the terminal device;
    对所述身份识别密钥进行验证;Verify the identity key;
    在将所述用户身份识别码和所述第一设备标识进行绑定的步骤中包括:The step of binding the user identification code and the first device identifier includes:
    若验证通过,将所述用户身份识别码和所述第一设备标识进行绑定。If the verification is passed, the user identification code and the first device identification are bound.
  18. 如权利要求15所述的方法,所述预置条件包括:The method according to claim 15, wherein the preset conditions include:
    所述用户身份识别码绑定有第二设备标识;The user identification code is bound with a second device identifier;
    若满足,所述方法还包括:If it is satisfied, the method further includes:
    取消所述用户身份识别码和所述第二设备标识之间的绑定关系;将所述用户身份识别码和所述第一设备标识进行绑定。Cancel the binding relationship between the user identification code and the second device identification; bind the user identification code and the first device identification.
  19. 如权利要求18所述的方法,所述方法还包括:The method of claim 18, further comprising:
    向终端设备发送身份识别密钥获取请求;Send an identification key acquisition request to the terminal device;
    接收终端设备发来的身份识别密钥;Receive the identification key sent by the terminal device;
    对所述身份识别密钥进行验证;Verify the identity key;
    所述取消所述用户身份识别码和所述第二设备标识之间的绑定关系;将所述用户身份识别码和所述第一设备标识进行绑定,包括:The canceling the binding relationship between the user identification code and the second device identification; binding the user identification code and the first device identification includes:
    若验证通过,取消所述用户身份识别码和所述第二设备标识之间的绑定关系;将所述用户身份识别码和所述第一设备标识进行绑定。If the verification is passed, cancel the binding relationship between the user identification code and the second device identification; bind the user identification code and the first device identification.
  20. 如权利要求13所述的方法,所述方法还包括:The method of claim 13, further comprising:
    向终端设备发送鉴权随机数;Send an authentication random number to the terminal device;
    接收终端设备发来的根据所述鉴权随机数计算得到的鉴权应答数据;Receiving the authentication response data calculated according to the authentication random number sent by the terminal device;
    将接收的鉴权应答数据与预置鉴权应答数据进行比较;Compare the received authentication response data with the preset authentication response data;
    在生成设备私钥的步骤中包括:The steps of generating the device private key include:
    若相同,根据所述第一设备标识生成设备私钥。If they are the same, generate a device private key according to the first device identification.
  21. 一种数据处理装置,应用于服务器,包括:A data processing device applied to a server, including:
    接收单元,用于接收终端设备发来的第一设备标识;The receiving unit is configured to receive the first device identifier sent by the terminal device;
    第一生成单元,用于根据所述第一设备标识生成设备私钥;A first generating unit, configured to generate a device private key according to the first device identifier;
    第二生成单元,用于根据所述设备私钥、智能卡的卡私钥和自身的服务器私钥生成鉴权密钥;The second generating unit is configured to generate an authentication key according to the device private key, the card private key of the smart card, and its own server private key;
    加密单元,用于使用智能卡的卡公钥分别对所述设备私钥和所述鉴权密钥进行加密,得到设备私钥密文和鉴权密钥密文;An encryption unit, configured to use the card public key of the smart card to respectively encrypt the device private key and the authentication key to obtain the device private key ciphertext and the authentication key ciphertext;
    发送单元,用于向终端设备发送所述设备私钥密文和所述鉴权密钥密文。The sending unit is configured to send the device private key ciphertext and the authentication key ciphertext to the terminal device.
  22. 一种服务器,包括:A server that includes:
    存储器,用于存储计算机指令;Memory, used to store computer instructions;
    处理器,用于执行所述计算机指令以实现如权利要求13至20任一项所述的方法步骤。The processor is configured to execute the computer instructions to implement the method steps according to any one of claims 13 to 20.
  23. 一种数据处理方法,应用于智能卡,包括:A data processing method applied to a smart card, including:
    接收终端设备发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;Receive the device private key ciphertext and authentication key ciphertext sent by the terminal device; the device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext is obtained by authenticating The key is encrypted;
    使用自身的卡私钥分别对所述设备私钥密文和所述鉴权密钥密文进行解密,得到设备私钥和鉴权密钥;Use its own card private key to decrypt the device private key ciphertext and the authentication key ciphertext respectively to obtain the device private key and the authentication key;
    存储所述鉴权密钥;Store the authentication key;
    向终端设备发送所述设备私钥和所述鉴权密钥。Send the device private key and the authentication key to the terminal device.
  24. 如权利要求23所述的方法,所述方法还包括:The method of claim 23, further comprising:
    接收终端设备发来的鉴权随机数;Receive the authentication random number sent by the terminal device;
    根据所述鉴权随机数计算鉴权应答数据;Calculating authentication response data according to the authentication random number;
    向终端设备发送所述鉴权应答数据。Send the authentication response data to the terminal device.
  25. 一种数据处理装置,应用于智能卡,包括:A data processing device applied to a smart card, including:
    接收单元,用于接收终端设备发来的设备私钥密文和鉴权密钥密文;所述设备私钥密文是通过对设备私钥进行加密得到的;所述鉴权密钥密文是通过对鉴权密钥进行加密得到的;The receiving unit is configured to receive the device private key ciphertext and the authentication key ciphertext sent by the terminal device; the device private key ciphertext is obtained by encrypting the device private key; the authentication key ciphertext It is obtained by encrypting the authentication key;
    解密单元,用于使用自身的卡私钥分别对所述设备私钥密文和所述鉴权密钥密文进 行解密,得到设备私钥和鉴权密钥;The decryption unit is configured to use its own card private key to decrypt the device private key cipher text and the authentication key cipher text respectively to obtain the device private key and the authentication key;
    存储单元,用于存储所述鉴权密钥;A storage unit for storing the authentication key;
    发送单元,用于向终端设备发送所述设备私钥和所述鉴权密钥。The sending unit is configured to send the device private key and the authentication key to the terminal device.
  26. 一种智能卡,包括:A smart card including:
    存储器,用于存储计算机指令;Memory, used to store computer instructions;
    处理器,用于执行所述计算机指令以实现如权利要求23或24所述的方法步骤。The processor is configured to execute the computer instructions to implement the method steps according to claim 23 or 24.
  27. 一种数据处理方法,包括:A data processing method, including:
    服务器基于持有的服务器私钥,终端设备基于持有的设备私钥,智能卡基于持有的卡私钥,共同执行多方安全计算,得到鉴权密钥;The server is based on the server private key it holds, the terminal device is based on the device private key it holds, and the smart card is based on the card private key it holds to jointly perform multi-party security calculations to obtain the authentication key;
    服务器基于所述鉴权密钥,对所述终端设备进行鉴权;The server authenticates the terminal device based on the authentication key;
    终端设备基于所述鉴权密钥,对所述服务器进行鉴权。The terminal device authenticates the server based on the authentication key.
  28. 如权利要求27所述的方法,在对所述终端设备进行鉴权的步骤中包括:The method according to claim 27, wherein the step of authenticating the terminal device comprises:
    服务器将计算得到的鉴权密钥与预置的鉴权密钥进行比较;若相同,确定所述终端设备的鉴权结果为成功;若不相同,确定所述终端设备的鉴权结果为失败。The server compares the calculated authentication key with the preset authentication key; if they are the same, it determines that the authentication result of the terminal device is a success; if they are not the same, it determines that the authentication result of the terminal device is a failure .
  29. 如权利要求27所述的方法,在对所述服务器进行鉴权的步骤中包括:The method according to claim 27, wherein the step of authenticating the server comprises:
    终端设备将计算得到的鉴权密钥与预置的鉴权密钥进行比较;若相同,确定所述服务器的鉴权结果为成功;若不相同,确定所述服务器的鉴权结果为失败。The terminal device compares the calculated authentication key with the preset authentication key; if they are the same, it is determined that the authentication result of the server is successful; if they are not the same, it is determined that the authentication result of the server is a failure.
  30. 一种数据处理方法,包括:A data processing method, including:
    服务器基于持有的服务器私钥,终端设备基于持有的设备私钥和智能卡的卡私钥,共同执行多方安全计算,得到鉴权密钥;Based on the server private key held by the server, and the terminal device based on the held device private key and the card private key of the smart card, perform multi-party security calculations together to obtain the authentication key;
    服务器基于所述鉴权密钥,对所述终端设备进行鉴权;The server authenticates the terminal device based on the authentication key;
    终端设备基于所述鉴权密钥,对所述服务器进行鉴权。The terminal device authenticates the server based on the authentication key.
  31. 一种数据处理方法,应用于服务器,包括:A data processing method applied to a server, including:
    基于服务器私钥执行多方安全计算,得到鉴权密钥;Perform multi-party security calculations based on the server's private key to obtain the authentication key;
    基于所述鉴权密钥,对终端设备进行鉴权。Based on the authentication key, the terminal device is authenticated.
  32. 如权利要求31所述的方法,在对所述终端设备进行鉴权的步骤中包括:The method according to claim 31, wherein the step of authenticating the terminal device comprises:
    将计算得到的鉴权密钥与预置的鉴权密钥进行比较;Compare the calculated authentication key with the preset authentication key;
    若相同,确定所述终端设备的鉴权结果为成功。If they are the same, it is determined that the authentication result of the terminal device is successful.
  33. 如权利要求31所述的方法,在对所述终端设备进行鉴权的步骤中包括:The method according to claim 31, wherein the step of authenticating the terminal device comprises:
    将计算得到的鉴权密钥与预置的鉴权密钥进行比较;Compare the calculated authentication key with the preset authentication key;
    若不相同,确定所述终端设备的鉴权结果为失败。If they are not the same, it is determined that the authentication result of the terminal device is a failure.
  34. 一种数据处理装置,应用于服务器,包括:A data processing device applied to a server, including:
    计算单元,用于基于服务器私钥执行多方安全计算,得到鉴权密钥;The calculation unit is used to perform multi-party security calculations based on the server private key to obtain the authentication key;
    鉴权单元,用于基于所述鉴权密钥,对终端设备进行鉴权。The authentication unit is used to authenticate the terminal device based on the authentication key.
  35. 一种服务器,包括:A server that includes:
    存储器,用于存储计算机指令;Memory, used to store computer instructions;
    处理器,用于执行所述计算机指令以实现如权利要求31至33任一项所述的方法步骤。The processor is configured to execute the computer instructions to implement the method steps according to any one of claims 31 to 33.
  36. 一种数据处理方法,应用于终端设备,包括:A data processing method applied to terminal equipment, including:
    基于设备私钥执行多方安全计算,得到鉴权密钥;Perform multi-party security calculations based on the device private key to obtain the authentication key;
    基于所述鉴权密钥,对服务器进行鉴权。Based on the authentication key, the server is authenticated.
  37. 如权利要求36所述的方法,在对所述服务器进行鉴权的步骤中包括:The method according to claim 36, wherein the step of authenticating the server includes:
    将计算得到的鉴权密钥与预置的鉴权密钥进行比较;Compare the calculated authentication key with the preset authentication key;
    若相同,确定所述服务器的鉴权结果为成功。If they are the same, it is determined that the authentication result of the server is successful.
  38. 如权利要求36所述的方法,在对所述服务器进行鉴权的步骤中包括:The method according to claim 36, wherein the step of authenticating the server includes:
    将计算得到的鉴权密钥与预置的鉴权密钥进行比较;Compare the calculated authentication key with the preset authentication key;
    若不相同,确定所述服务器的鉴权结果为失败。If they are not the same, it is determined that the authentication result of the server is a failure.
  39. 一种数据处理装置,应用于终端设备,包括:A data processing device applied to terminal equipment, including:
    计算单元,用于基于设备私钥执行多方安全计算,得到鉴权密钥;The calculation unit is used to perform multi-party security calculations based on the device private key to obtain the authentication key;
    鉴权单元,用于基于所述鉴权密钥,对服务器进行鉴权。The authentication unit is used to authenticate the server based on the authentication key.
  40. 一种终端设备,包括:A terminal device, including:
    存储器,用于存储计算机指令;Memory, used to store computer instructions;
    处理器,用于执行所述计算机指令以实现如权利要求36至38任一项所述的方法步骤。The processor is configured to execute the computer instructions to implement the method steps according to any one of claims 36 to 38.
PCT/CN2019/076583 2019-02-28 2019-02-28 Data processing method, apparatus, smart card, terminal device, and server WO2020172887A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/076583 WO2020172887A1 (en) 2019-02-28 2019-02-28 Data processing method, apparatus, smart card, terminal device, and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/076583 WO2020172887A1 (en) 2019-02-28 2019-02-28 Data processing method, apparatus, smart card, terminal device, and server

Publications (1)

Publication Number Publication Date
WO2020172887A1 true WO2020172887A1 (en) 2020-09-03

Family

ID=72238744

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/076583 WO2020172887A1 (en) 2019-02-28 2019-02-28 Data processing method, apparatus, smart card, terminal device, and server

Country Status (1)

Country Link
WO (1) WO2020172887A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112232639A (en) * 2020-09-22 2021-01-15 支付宝(杭州)信息技术有限公司 Statistical method and device and electronic equipment
CN113051623A (en) * 2021-03-11 2021-06-29 华控清交信息科技(北京)有限公司 Data processing method and device and electronic equipment
CN113434891A (en) * 2021-07-07 2021-09-24 建信金融科技有限责任公司 Data fusion method, device, equipment and system
CN113795022A (en) * 2021-09-14 2021-12-14 浙江海高思通信科技有限公司 Public network interphone encrypted communication method and public network interphone system
CN115086072A (en) * 2022-07-20 2022-09-20 紫光同芯微电子有限公司 Smart card attack testing method and device
CN115941336A (en) * 2022-12-12 2023-04-07 支付宝(杭州)信息技术有限公司 Data processing method, device and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103906052A (en) * 2012-12-26 2014-07-02 中国移动通信集团公司 Mobile terminal authentication method, service access method and equipment
CN104811303A (en) * 2014-01-24 2015-07-29 北京中传数广技术有限公司 Two-way authentication method, two-way authentication device and two-way authentication system
US20160086159A1 (en) * 2014-09-24 2016-03-24 Stmicroelectronics, Inc. Application identifier (aid) prioritization of security module applications
CN108366069A (en) * 2018-02-26 2018-08-03 北京赛博兴安科技有限公司 A kind of mutual authentication method and system
CN108512846A (en) * 2018-03-30 2018-09-07 北京邮电大学 Mutual authentication method and device between a kind of terminal and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103906052A (en) * 2012-12-26 2014-07-02 中国移动通信集团公司 Mobile terminal authentication method, service access method and equipment
CN104811303A (en) * 2014-01-24 2015-07-29 北京中传数广技术有限公司 Two-way authentication method, two-way authentication device and two-way authentication system
US20160086159A1 (en) * 2014-09-24 2016-03-24 Stmicroelectronics, Inc. Application identifier (aid) prioritization of security module applications
CN108366069A (en) * 2018-02-26 2018-08-03 北京赛博兴安科技有限公司 A kind of mutual authentication method and system
CN108512846A (en) * 2018-03-30 2018-09-07 北京邮电大学 Mutual authentication method and device between a kind of terminal and server

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112232639A (en) * 2020-09-22 2021-01-15 支付宝(杭州)信息技术有限公司 Statistical method and device and electronic equipment
CN112232639B (en) * 2020-09-22 2023-06-30 支付宝(杭州)信息技术有限公司 Statistical method, statistical device and electronic equipment
CN113051623A (en) * 2021-03-11 2021-06-29 华控清交信息科技(北京)有限公司 Data processing method and device and electronic equipment
CN113434891A (en) * 2021-07-07 2021-09-24 建信金融科技有限责任公司 Data fusion method, device, equipment and system
CN113434891B (en) * 2021-07-07 2022-09-02 建信金融科技有限责任公司 Data fusion method, device, equipment and system
CN113795022A (en) * 2021-09-14 2021-12-14 浙江海高思通信科技有限公司 Public network interphone encrypted communication method and public network interphone system
CN115086072A (en) * 2022-07-20 2022-09-20 紫光同芯微电子有限公司 Smart card attack testing method and device
CN115941336A (en) * 2022-12-12 2023-04-07 支付宝(杭州)信息技术有限公司 Data processing method, device and equipment

Similar Documents

Publication Publication Date Title
WO2020172887A1 (en) Data processing method, apparatus, smart card, terminal device, and server
JP6979420B2 (en) Security configuration for communication between communication devices and network devices
CN107409133B (en) Method and equipment for authentication and key agreement with complete forward secrecy
US8260259B2 (en) Mutual authentication with modified message authentication code
KR102369847B1 (en) Subscriber identification module pooling
US20160119143A1 (en) User identity authenticating method, terminal, and server
CN106922216B (en) Apparatus, method, and storage medium for wireless communication
US10015673B2 (en) Cellular device authentication
US20060206710A1 (en) Network assisted terminal to SIM/UICC key establishment
JP4234718B2 (en) Secure transmission method for mobile subscriber authentication
CN110417797A (en) Authenticate the method and device of user
KR20160078426A (en) Method and apparatus to identity verification using asymmetric keys in wireless direct communication network
JP2008512966A (en) Bootstrap authentication with a distinguished random challenge
CN107454035B (en) Identity authentication method and device
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN104521213A (en) Manipulation and restoration of authentication challenge parameters in network authentication procedures
WO2019214351A1 (en) Message processing method and device
KR20160143333A (en) Method for Double Certification by using Double Channel
CN114189343A (en) Mutual authentication method and device
US20080307234A1 (en) Use of mobile communication network credentials to protect the transfer of posture data
CN110999215A (en) Secure device access token
CN109787998B (en) Data processing method and device, smart card, terminal equipment and server
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device
CN111246464A (en) Identity authentication method, device and system, and computer readable storage medium
KR101298216B1 (en) Authentication system and method using multiple category

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19916607

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19916607

Country of ref document: EP

Kind code of ref document: A1