[go: up one dir, main page]

CN103780376B - Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches - Google Patents

Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches Download PDF

Info

Publication number
CN103780376B
CN103780376B CN201210415975.1A CN201210415975A CN103780376B CN 103780376 B CN103780376 B CN 103780376B CN 201210415975 A CN201210415975 A CN 201210415975A CN 103780376 B CN103780376 B CN 103780376B
Authority
CN
China
Prior art keywords
algorithm
safety barrier
indicator
applications
cryptographic algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210415975.1A
Other languages
Chinese (zh)
Other versions
CN103780376A (en
Inventor
谭颖
徐燕军
徐志忠
李伟
李洁
吴水炯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201210415975.1A priority Critical patent/CN103780376B/en
Publication of CN103780376A publication Critical patent/CN103780376A/en
Application granted granted Critical
Publication of CN103780376B publication Critical patent/CN103780376B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Method, terminal and safety barrier the invention discloses the switching of cryptographic algorithm system self adaptation.In one embodiment of the invention, the method for cryptographic algorithm system self adaptation switching includes applying select command to the safety barrier transmission interacted with the applications;The response to the application select command, response bag algorithm containing the safety barrier indicator are received from the safety barrier;It is compared by by the algorithm list that the safety barrier algorithm indicator is supported with the applications, it is determined that preparing the cryptographic algorithm system for using;And apply initialization command, the application initialization command to include the trading algorithms indicator for identifying the cryptographic algorithm system for preparing and using to safety barrier transmission.

Description

Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches
Technical field
The present invention relates to finance data process field, and systems self adaptation switches various cryptographic algorithms The method of system, terminal and safety barrier.
Background technology
Current China's Financial industry is carrying forward vigorously cryptographic algorithm production domesticization work, after the several years, the finance of new issue IC-card and mobile payment IC-card will all support the close algorithm of state, and finance accepts network and will also complete the close algorithm transformation of state.On the one hand, Support that the finance of the close algorithm of state accepts network and stills need to accept storage, support International Algorithmic IC-card, while card sender overseas The IC-card of structure distribution also only supports International Algorithmic, and this is accomplished by accepting network while also supporting International Algorithmic.On the other hand, within the border What the IC-card of the close algorithm of support state of authority releases was also required to overseas only to support International Algorithmic accepts Web vector graphic, and this is also required to IC-card supports International Algorithmic simultaneously.
But, in existing PBOC specifications, applications(Such as POS terminal or mobile phone client software)Carried with safety Body(Such as financial IC card or mobile payment IC-card)Between payment process only support a kind of cryptographic algorithm system.That is, concluding the business Cheng Zhong, data encryption and legitimate verification between applications and safety barrier are completed using unique cryptographic algorithm system, interior Selection mechanism of the portion without many algorithms.When certain country, area or industry need internally to use new key according to own situation During system, incompatible problem between new, old key code system can be produced.
The content of the invention
For the problem, according to an aspect of the invention, there is provided one kind is soft in such as POS terminal or cell-phone customer terminal The method that various cryptographic algorithm system self adaptation switchings are realized in the applications of part etc., including:Enter to the applications The safety barrier of row interaction(Such as financial IC card or mobile payment IC-card)Transmission application select command;Connect from the safety barrier Receive the response to the application select command, response bag algorithm containing the safety barrier indicator;Calculated by by the safety barrier The algorithm list that method indicator is supported with the applications is compared, it is determined that preparing the cryptographic algorithm system for using;And Sent to the safety barrier and apply initialization command, the application initialization command include identify it is described prepare to use it is close The trading algorithms indicator of code algorithm system.
In the above-mentioned methods, the safety barrier algorithm indicator have recorded all passwords calculation that the safety barrier is supported Law system, and identify the priority of every kind of algorithm system.
In the above-mentioned methods, it is described prepare the cryptographic algorithm system that uses be the applications and the safety barrier all Support and the algorithm of highest priority.
The above-mentioned method for realizing various cryptographic algorithm system self adaptation switchings may also include:According to safety barrier correspondence With the response of initialization command, corresponding application and key data are read to complete payment transaction.
According to another aspect of the present invention, there is provided one kind realizes various cryptographic algorithm system self adaptations in safety barrier The method of switching, including:Received from the applications interacted with the safety barrier and apply select command;To the outside Using the response sent to application select command, response bag algorithm containing the safety barrier indicator;Received from the applications Using initialization command, the application initialization command refers to comprising the trading algorithms for identifying the cryptographic algorithm system for preparing to use Show device, wherein the cryptographic algorithm for preparing to use is supported by by the safety barrier algorithm indicator and the applications Algorithm list be compared and obtain.Wherein, the applications can be POS or Mobile phone payment client software, institute It can be financial IC card or mobile payment IC-card to state safety barrier.
In the above-mentioned methods, the safety barrier algorithm indicator have recorded all passwords calculation that the safety barrier is supported Law system, and identify the priority of every kind of algorithm system.
In the above-mentioned methods, it is described prepare the cryptographic algorithm system that uses be the applications and the safety barrier all Support and the algorithm of highest priority.
The above-mentioned method for realizing various cryptographic algorithm system self adaptation switchings may also include:Judge that the trading algorithms are indicated Whether device meets the algorithms selection strategy of the safety barrier.And further, if the trading algorithms indicator meets The algorithms selection strategy of the safety barrier, then return to what the preparation was used in the response of the application initialization command The corresponding application file locator of cryptographic algorithm system.
According to a further aspect of the invention, there is provided a kind of end for realizing various cryptographic algorithm system self adaptation switchings End, including:Sending module, select command is applied for being sent to the safety barrier interacted with the terminal;Receiver module, For receiving the response to the application select command, response bag algorithm containing the safety barrier indicator from the safety barrier; And algorithms selection policy module, for the algorithm list by the way that the safety barrier algorithm indicator is supported with the terminal It is compared, it is determined that preparing the cryptographic algorithm system for using;Wherein, the sending module is additionally operable to be sent to the safety barrier Using initialization command, the application initialization command includes the transaction calculation for identifying the cryptographic algorithm system for preparing and using Method indicator.
The above-mentioned terminal for realizing various cryptographic algorithm system self adaptation switchings may also include:Read module, for according to institute Response of the safety barrier to application initialization command is stated, corresponding application and key data is read to complete payment transaction.
According to a further aspect of the invention, there is provided a kind of safety for realizing various cryptographic algorithm system self adaptation switchings Carrier, including:Receiver module, select command is applied for being received from the applications interacted with the safety barrier;With And sending module, for sending the response to application select command, the response bag algorithm containing safety barrier to the applications Indicator;Wherein, the receiver module is also received from the applications and applies initialization command, the application initialization command Comprising the trading algorithms indicator for identifying the cryptographic algorithm system for preparing to use, wherein the cryptographic algorithm for preparing to use leads to Cross and the algorithm list that the safety barrier algorithm indicator is supported with the applications is compared and obtained.
The above-mentioned safety barrier for realizing various cryptographic algorithm system self adaptation switchings may also include:Algorithms selection strategy mould Block, for judging whether the trading algorithms indicator meets the algorithms selection strategy of the safety barrier, if wherein described Trading algorithms indicator meets the algorithms selection strategy of the safety barrier, then in the response of the application initialization command Return to the corresponding application file locator of cryptographic algorithm system for preparing and using.Wherein, the algorithms selection policy module When the applications do not return to trading algorithms indicator, selection continues executing with subsequent operation or interrupts transaction.
Technical scheme disclosed by the invention can realize applications in payment process(POS terminal, Mobile phone payment client Software)With safety barrier(Financial IC card, mobile payment IC-card)Between various different cryptographic algorithm systems self adaptation switching, So as to find the cryptographic algorithm that applications and safety barrier are all supported, payment transaction is completed.
Brief description of the drawings
After specific embodiment of the invention has been read referring to the drawings, those skilled in the art will be more clearly Solution various aspects of the invention.Skilled person would appreciate that:These accompanying drawings are used only for coordinating specific embodiment party Formula illustrates technical scheme, and is not intended to be construed as limiting protection scope of the present invention.
Fig. 1 is according to an embodiment of the invention to realize that various cryptographic algorithm system self adaptations are cut in applications The method flow diagram for changing.
Fig. 2 is according to an embodiment of the invention to realize that various cryptographic algorithm system self adaptations are cut in safety barrier The method flow diagram for changing.
Fig. 3 is that the cryptographic algorithm self adaptation between safety barrier according to an embodiment of the invention and applications is cut Change the flow chart of process.
Fig. 4 is showing for the terminal for realizing various cryptographic algorithm system self adaptation switchings according to an embodiment of the invention It is intended to.
Fig. 5 is the safety barrier for realizing various cryptographic algorithm system self adaptation switchings according to an embodiment of the invention Schematic diagram.
Specific embodiment
What is be described below is multiple some that may be in embodiment of the invention, it is desirable to provide to of the invention basic Solution, it is no intended to confirm of the invention crucial or conclusive key element or limit scope of the claimed.It is readily appreciated that, according to this The technical scheme of invention, in the case where connotation of the invention is not changed, those of ordinary skill in the art can be proposed can be mutual Other implementations replaced.Therefore, detailed description below and accompanying drawing are only the examples to technical scheme Property explanation, and be not to be construed as whole of the invention or be considered as to define or limit technical solution of the present invention.
With reference to Fig. 1, it show according to one embodiment of present invention, various cryptographic algorithm bodies are realized in applications It is the method flow diagram of self adaptation switching.Applications can be herein POS terminal or mobile phone client software.
In step 110, applications can send to the safety barrier for interacting and apply select command.It is of the invention On one side, safety barrier is financial IC card or mobile payment IC-card.
Then, in step 120, applications receive response from safety barrier, refer to comprising safety barrier algorithm in response Show device.Preferably, safety barrier algorithm indicator have recorded all cryptographic algorithm systems of safety barrier support, and identify every Plant the priority of algorithm system.
For example, safety barrier algorithm indicator can be with as shown in the table:
Algorithm is identified Asymmetric arithmetic Symmetry algorithm Digest algorithm Cipher key index Priority
00(State is close) SM2 SM3 SM4 00 00
01(Shang Mi) RSA DES HASH 00 01
In upper table, algorithm mark be every kind of algorithm system distribution unique mark, asymmetric arithmetic, symmetry algorithm, Digest algorithm is respectively the corresponding cryptographic algorithm of every kind of algorithm system, and cipher key index is used to distinguish props up under same algorithm system The many group keys held, priority is used for identifying the priority of every kind of algorithm system, wherein " 00 " is limit priority.
In the close algorithm system of state, asymmetric arithmetic is SM2, and symmetry algorithm is SM3, and digest algorithm is SM4.And In the close algorithm system of business, asymmetric arithmetic is RSA, and symmetry algorithm is DES, and digest algorithm is HASH.Certainly, it is illustrated above these Citing is only used for, those skilled in the art are easily found out using various other AESs.
If applications do not receive algorithm indicator after being sent using select command to safety barrier, show this Safety barrier does not support that new cryptosystem, i.e. safety barrier are former storage cards, and it may only support original unique Plant cryptographic algorithm.In this case, applications can be determined according to algorithms selection strategy be by original algorithm process also It is to return to algorithm to applications not support.
Then, in step 130, applications are carried out by by the algorithm list that safety barrier algorithm indicator is supported with it Compare, it is determined that preparing the cryptographic algorithm system for using.Applications can pre-save the algorithm system row of its support inside it Table or dynamic download its algorithm system list for supporting.In one embodiment, the algorithm system list that applications are supported Can be with as follows:
Algorithm is identified Asymmetric arithmetic Symmetry algorithm Digest algorithm Cipher key index Priority
00(State is close) SM2 SM3 SM4 00 00
01(Shang Mi) RSA DES HASH 00 01
It is compared by by the algorithm list that safety barrier algorithm indicator is supported with applications, applications can be with Find algorithm that both it support with safety barrier and highest priority.
In the present embodiment, because applications and safety barrier all support the close algorithm of state and the close algorithm of business, so outside Using can determine that the close algorithm of the use priority state higher.
Then, in step 140, applications send to safety barrier and apply initialization command, and this applies initialization command Comprising the trading algorithms indicator for identifying the cryptographic algorithm system for preparing to use.
For example, trading algorithms indicator can be with as shown in the table:
Algorithm is identified Asymmetric arithmetic Symmetry algorithm Digest algorithm Cipher key index
00(State is close) SM2 SM3 SM4 00
This trading algorithms indicator specifies this transaction algorithm system to be used determined after applications matching It is the close algorithm of state.
With reference to Fig. 2, show according to one embodiment of present invention, various cryptographic algorithm systems are realized in safety barrier The method flow diagram of self adaptation switching.Safety barrier can be herein financial IC card or mobile payment IC-card.
In step 210, safety barrier is received from the applications for interacting and applies select command.According to this hair Bright one side, applications are POS terminal or Mobile phone payment client software.
Then, in step 220, safety barrier sends the response to application select command to applications, and the response bag contains Safety barrier algorithm indicator.Preferably, safety barrier algorithm indicator have recorded all cryptographic algorithms of safety barrier support System, and identify the priority of every kind of algorithm system.
For example, safety barrier algorithm indicator can be with as shown in the table:
Algorithm is identified Asymmetric arithmetic Symmetry algorithm Digest algorithm Cipher key index Priority
00(State is close) SM2 SM3 SM4 00 00
01(Shang Mi) RSA DES HASH 00 01
In upper table, algorithm mark be every kind of algorithm system distribution unique mark, asymmetric arithmetic, symmetry algorithm, Digest algorithm is respectively the corresponding cryptographic algorithm of every kind of algorithm system, and cipher key index is used to distinguish props up under same algorithm system The many group keys held, priority is used for identifying the priority of every kind of algorithm system, wherein " 00 " is limit priority.
In the close algorithm system of state, asymmetric arithmetic is SM2, and symmetry algorithm is SM3, and digest algorithm is SM4.And In the close algorithm system of business, asymmetric arithmetic is RSA, and symmetry algorithm is DES, and digest algorithm is HASH.Certainly, it is illustrated above these Citing is only used for, those skilled in the art are easily found out using various other AESs.
Then, in step 230, safety barrier is received from applications and applies initialization command, and this applies initialization command Comprising the trading algorithms indicator for identifying the cryptographic algorithm system for preparing to use.Wherein, the cryptographic algorithm for preparing to use is outer Apply and obtained by the way that the algorithm list that safety barrier algorithm indicator is supported with applications is compared in portion.
For example, trading algorithms indicator can be with as shown in the table:
Algorithm is identified Asymmetric arithmetic Symmetry algorithm Digest algorithm Cipher key index
00(State is close) SM2 SM3 SM4 00
This trading algorithms indicator specifies this transaction algorithm system to be used determined after applications matching It is the close algorithm of state.
After safety barrier receives trading algorithms indicator, whether it can determine whether the trading algorithms indicator Meet the algorithms selection strategy of itself.If met, safety barrier can then return to choosing in the response of application initialization command In the corresponding AFL of cryptographic algorithm(Application File Locator, application file locator), otherwise can return to algorithm Do not support.
If safety barrier is not received by the trading algorithms indicator of applications return, show the applications not Various cryptographic algorithm systems are supported, i.e., former storage product only supports original unique kind of cryptographic algorithm.In such case Under, safety barrier can be determined according to algorithms selection strategy by original algorithm process or returning to algorithm to applications does not prop up Hold.
Fig. 3 shows the interaction between safety barrier according to an embodiment of the invention and applications.Specifically For, the process mainly contains following steps:
First, applications send the application select command of such as SELECT orders to safety barrier.
Second, safety barrier is in command response PDOL(Processing Options Data Object List, treatment Selection data object list)Middle return safety barrier algorithm indicator, the safety barrier algorithm indicator have recorded safety barrier The all cryptographic algorithm systems supported, and identify the priority of every kind of algorithm system.If applications do not receive algorithm referred to Show device, be then shown to be former storage card, only support original unique kind of cryptographic algorithm.At this moment, applications can be according to calculation Method selection strategy selects to determine not supported by original algorithm process or to applications return algorithm.
3rd, be compared for the algorithm list that the algorithm indicator of safety barrier is supported with it by applications, finds two Person supports, the algorithm of highest priority.
4th, applications send the application initialization command of such as GPO command to safety barrier, wherein containing transaction Algorithm indicator, this transaction that the trading algorithms indicator is identified after adaptively selected, applications determine should make Cryptographic algorithm system.
5th, safety barrier judges whether the trading algorithms indicator for receiving meets the algorithms selection strategy of safety barrier, If met, the corresponding AFL of the cryptographic algorithm chosen is returned in the response of GPO command, otherwise return to algorithm and do not support;Such as Fruit safety barrier does not receive the trading algorithms indicator of applications return, then show that the applications are that former storage is produced Product, only support original unique kind of cryptographic algorithm, and safety barrier can be by original algorithm process according to algorithms selection policy selection Or to applications algorithm is returned to not support.
6th, the AFL that applications are returned according to safety barrier reads corresponding application and key data, completes to pay and hands over Easily.
From preceding method, the present invention does not change the interaction flow and interface of existing PBOC specifications definition, makes completely With the command format and data element of existing PBOC specifications, the extension bits for having used specification reserved, so as to safety barrier and outward The transformation of portion's application is reduced to minimum.
Fig. 4 shows the terminal for realizing various cryptographic algorithm system self adaptation switchings according to an embodiment of the invention 400.Terminal 400 may include sending module 410, receiver module 420 and algorithms selection policy module 430.Sending module 410 is used Select command is applied in being sent to the safety barrier interacted with terminal 400.Sending module 410 is additionally operable to be sent out to safety barrier Send and apply initialization command, this refers to using initialization command comprising the trading algorithms for identifying the cryptographic algorithm system for preparing to use Show device.Receiver module 420 is used to receive the response to application select command from safety barrier(Such as PDOL), the response bag is containing peace Full carrier algorithm indicator.Algorithms selection policy module 430 is used for by the way that safety barrier algorithm indicator and terminal supported Algorithm list is compared, it is determined that preparing the cryptographic algorithm system for using.Preferably, safety barrier is not sent in safety barrier During algorithm indicator, algorithms selection policy module 430 can determine that being to continue with execution subsequent operation still interrupts transaction, and this can be by example Such as acquirer's self-defining.
Alternatively, terminal 400 may also include read module 440.Read module 440 is used for first to application according to safety barrier The response of beginningization order, reads corresponding application and key data to complete payment transaction.
Fig. 5 shows the safety for realizing various cryptographic algorithm system self adaptation switchings according to an embodiment of the invention Carrier 500.Safety barrier 500 may include receiver module 510 and sending module 520.Receiver module 510 is used to be carried from safety The applications that body 500 is interacted are received and apply select command.It is initial that receiver module 510 can also receive application from applications Change order, the application initialization command includes the trading algorithms indicator for identifying the cryptographic algorithm system for preparing to use.Hair Module 510 is sent for sending response to application select command to applications, response bag algorithm containing the safety barrier indicator, It is important to point out that, the cryptographic algorithm that preparation is used is that applications are supported by by safety barrier algorithm indicator with it Algorithm list is compared and obtains.
Preferably, safety barrier 500 may also include algorithms selection policy module 530.Algorithms selection policy module 530 can use If in judging whether trading algorithms indicator meets the algorithms selection strategy of safety barrier 500, meeting, initial to application The corresponding application file locator of cryptographic algorithm system for preparing to use is returned in the response of change order.It is highly preferred that algorithm is selected Policy module 530 is selected when applications do not return to trading algorithms indicator, selection continue executing with subsequent operation or in break off a friendship Easily, this can be by such as card issuer's self-defining.
Current China's Financial industry is carrying forward vigorously cryptographic algorithm production domesticization work, after the several years, the finance of new issue IC-card and mobile payment IC-card will all support the close algorithm of state, and finance accepts network and will also complete the close algorithm transformation of state.And and this Meanwhile, existing IC-card generally only supports International Algorithmic, and the IC-card of card sending mechanism distribution overseas also only supports International Algorithmic.This Invent method, terminal and the safety barrier for proposing and solve the IC-card and POS for supporting the close algorithm of state or International Algorithmic well Between the compatibling problem that interacts.
To sum up, the mechanism and system can realize inspection, judgement and the selection to terminal and safety barrier key code system, together When support two or more checking of the different cryptographic algorithm systems in same process of exchange, to different cryptographic algorithm systems Safety barrier it is compatible, on existing financial payment transaction overall flow without influence.
Above, specific embodiment of the invention is described with reference to the accompanying drawings.But, those skilled in the art It is understood that without departing from the spirit and scope of the present invention, can also make each to specific embodiment of the invention Plant change and replace.These changes and replacement all fall in claims of the present invention limited range.

Claims (14)

1. a kind of method that the switching of various cryptographic algorithm system self adaptations is realized in applications, including:
Sent to the safety barrier interacted with the applications and apply select command;
The response to the application select command, response bag algorithm containing the safety barrier indicator are received from the safety barrier;
It is compared by by the algorithm list that the safety barrier algorithm indicator is supported with the applications, it is determined that preparing The cryptographic algorithm system for using;
Sent to the safety barrier and apply initialization command, the application initialization command is used comprising the preparation is identified Cryptographic algorithm system trading algorithms indicator;And
After the safety barrier receives the trading algorithms indicator, judge whether the trading algorithms indicator meets described The algorithm policy of safety barrier, if met, the preparation is returned in the response of the correspondence applications initialization command The corresponding file retainer of cryptographic algorithm system for using;
Wherein, the safety barrier algorithm indicator have recorded all cryptographic algorithm systems that the safety barrier is supported, and mark The priority of every kind of algorithm system is known;The cryptographic algorithm system for preparing to use is that the applications and the safety are carried Body all support and highest priority algorithm.
2. the method for claim 1, wherein the applications are POS terminal or Mobile phone payment client software.
3. the method for claim 1, wherein the safety barrier is financial IC card or mobile payment IC-card.
4. the method for claim 1, also includes:
Response according to the safety barrier to application initialization command, reads corresponding application and key data to complete to pay Transaction.
5. the method for claim 1, wherein various cryptographic algorithm systems are included comprising SM2, SM3, SM4 algorithm The close algorithm system of state and the close algorithm system of the business comprising RSA, DES, HASH algorithm.
6. a kind of method that the switching of various cryptographic algorithm system self adaptations is realized in safety barrier, including:
Received from the applications interacted with the safety barrier and apply select command;
The response to application select command, response bag algorithm containing the safety barrier indicator are sent to the applications;
Received from the applications and apply initialization command, the application initialization command is included and identifies prepare to use close The trading algorithms indicator of code algorithm system, wherein the cryptographic algorithm for preparing to use refers to by by the safety barrier algorithm Show that the algorithm list that device is supported with the applications is compared and obtains;And
After the trading algorithms indicator is received, judge whether the trading algorithms indicator meets the calculation of the safety barrier Method strategy, if met, the password for preparing to use is returned in the response of the correspondence applications initialization command and is calculated The corresponding file retainer of law system;
Wherein, the safety barrier algorithm indicator have recorded all cryptographic algorithm systems that the safety barrier is supported, and mark The priority of every kind of algorithm system is known;The cryptographic algorithm system for preparing to use is that the applications and the safety are carried Body all support and highest priority algorithm.
7. method as claimed in claim 6, wherein, the applications are POS terminal or Mobile phone payment client software.
8. method as claimed in claim 6, wherein, the safety barrier is financial IC card or mobile payment IC-card.
9. method as claimed in claim 6, also includes:
Judge whether the trading algorithms indicator meets the algorithms selection strategy of the safety barrier.
10. method as claimed in claim 6, wherein, various cryptographic algorithm systems are included comprising SM2, SM3, SM4 algorithm The close algorithm system of state and the close algorithm system of the business comprising RSA, DES, HASH algorithm.
A kind of 11. terminals for realizing various cryptographic algorithm system self adaptation switchings, including:
Sending module, select command is applied for being sent to the safety barrier interacted with the terminal;
Receiver module, for receiving the response to the application select command from the safety barrier, the response bag is carried containing safety Body algorithm indicator;And
Algorithms selection policy module, for the algorithm list by the way that the safety barrier algorithm indicator is supported with the terminal It is compared, it is determined that prepare the cryptographic algorithm system for using, and for judging whether trading algorithms indicator meets the peace The algorithms selection strategy of full carrier, if wherein the trading algorithms indicator meets the algorithms selection plan of the safety barrier Slightly, then the corresponding practical writing of cryptographic algorithm system for preparing and using is returned in the response of the application initialization command Part locator;
Wherein, the sending module is additionally operable to be sent to the safety barrier and applies initialization command, the application initialization life Order includes the trading algorithms indicator for identifying the cryptographic algorithm system for preparing and using;
Wherein, the safety barrier algorithm indicator have recorded all cryptographic algorithm systems that the safety barrier is supported, and mark The priority of every kind of algorithm system is known;It is described prepare the cryptographic algorithm system that uses be applications and the safety barrier all Support and the algorithm of highest priority.
12. terminals as claimed in claim 11, also include:
Read module, for the response according to the safety barrier to application initialization command, reads corresponding application and key Data are completing payment transaction.
A kind of 13. safety barriers for realizing various cryptographic algorithm system self adaptation switchings, including:
Receiver module, select command is applied for being received from the applications interacted with the safety barrier;And
Sending module, for sending the response to application select command to the applications, the response bag is calculated containing safety barrier Method indicator;
Algorithms selection policy module, for judging whether trading algorithms indicator meets the algorithms selection plan of the safety barrier Slightly, if wherein the trading algorithms indicator meets the algorithms selection strategy of the safety barrier, at the beginning of the application The corresponding application file locator of cryptographic algorithm system for preparing to use is returned in the response of beginningization order;
Wherein, the receiver module is also received from the applications and applies initialization command, the application initialization command bag Containing the trading algorithms indicator for identifying the cryptographic algorithm system for preparing to use, wherein the cryptographic algorithm for preparing to use passes through The algorithm list that the safety barrier algorithm indicator is supported with the applications is compared and is obtained;
Wherein, the safety barrier algorithm indicator have recorded all cryptographic algorithm systems that the safety barrier is supported, and mark The priority of every kind of algorithm system is known;The cryptographic algorithm system for preparing to use is that the applications and the safety are carried Body all support and highest priority algorithm.
14. safety barriers as claimed in claim 13, wherein, the algorithms selection policy module does not have in the applications When returning to trading algorithms indicator, selection continues executing with subsequent operation or interrupts transaction.
CN201210415975.1A 2012-10-26 2012-10-26 Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches Active CN103780376B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210415975.1A CN103780376B (en) 2012-10-26 2012-10-26 Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210415975.1A CN103780376B (en) 2012-10-26 2012-10-26 Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches

Publications (2)

Publication Number Publication Date
CN103780376A CN103780376A (en) 2014-05-07
CN103780376B true CN103780376B (en) 2017-06-23

Family

ID=50572251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210415975.1A Active CN103780376B (en) 2012-10-26 2012-10-26 Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches

Country Status (1)

Country Link
CN (1) CN103780376B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104539429B (en) * 2014-12-30 2017-09-22 飞天诚信科技股份有限公司 A kind of method and apparatus and system for positioning the close certificate of state
CN105530090A (en) * 2015-12-31 2016-04-27 中国建设银行股份有限公司 Key negotiation method and device
CN106980972B (en) * 2016-12-29 2021-02-02 中国银联股份有限公司 TEE-based offline payment method, payment system and mobile terminal
CN112448811A (en) * 2019-09-03 2021-03-05 上海云从汇临人工智能科技有限公司 Data security management method, data security management device and data security management system
CN114329499A (en) * 2022-01-06 2022-04-12 新开普电子股份有限公司 A kind of application method of CPU smart card

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1479480A (en) * 2002-08-26 2004-03-03 华为技术有限公司 Method of consulted encryption algorithm
CN102081821A (en) * 2009-11-27 2011-06-01 中国银联股份有限公司 IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal
CN102637274A (en) * 2012-03-22 2012-08-15 瑞达信息安全产业股份有限公司 Mobile payment method compatible with international and domestic cryptographic algorithm
CN102710412A (en) * 2012-05-07 2012-10-03 北京握奇数据系统有限公司 Method and device for compatible management of encryption algorithm

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4631935B2 (en) * 2008-06-06 2011-02-16 ソニー株式会社 Information processing apparatus, information processing method, program, and communication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1479480A (en) * 2002-08-26 2004-03-03 华为技术有限公司 Method of consulted encryption algorithm
CN102081821A (en) * 2009-11-27 2011-06-01 中国银联股份有限公司 IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal
CN102637274A (en) * 2012-03-22 2012-08-15 瑞达信息安全产业股份有限公司 Mobile payment method compatible with international and domestic cryptographic algorithm
CN102710412A (en) * 2012-05-07 2012-10-03 北京握奇数据系统有限公司 Method and device for compatible management of encryption algorithm

Also Published As

Publication number Publication date
CN103780376A (en) 2014-05-07

Similar Documents

Publication Publication Date Title
CN103780376B (en) Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches
CN101958025B (en) Mobile phone payment method using barcode technology, and on-site payment terminal and system
CN101159008A (en) Mutual authentication method between a communication interface and a host processor of an nfc chipset
CN106255974A (en) Authentication code input system and method
US20140289129A1 (en) Method for secure contactless communication of a smart card and a point of sale terminal
CN102710412B (en) Method and device for compatible management of encryption algorithm
CN110428036A (en) A kind of generation method of dynamic two-dimension code, system and terminal device
CN103002435A (en) Remote subscriber identity module activating system
WO2017092654A1 (en) Pos machine transaction processing method and system
CN107657441A (en) Self-service dealing method, system, server and mobile terminal
CN103544114B (en) Based on many M1 card control system and the control method thereof of single CPU card
CN102982449A (en) Mobile terminal and transaction system and method
US20140089169A1 (en) System and Method of Processing Payment Transactions via Mobile Devices
CN107038824A (en) A kind of POS terminal processing method and POS
CN105635164B (en) The method and apparatus of safety certification
CN108550043A (en) The method for anti-counterfeit of commodity sign, the verification method of device and commodity true and false, device
CN113169867A (en) Information receiving and transmitting method, device and system using QR (quick response) code
CN107318103B (en) Machine switching prevention method and system based on Internet of things SIM card
Bernardi et al. An anti-counterfeit mechanism for the application layer in low-cost RFID devices
CN103077457B (en) A kind of intelligent RFID payment terminal and method
CN102542696B (en) Security information interaction system and method
CN102110334A (en) Device, system and method for processing information
CN105103180B (en) Method for handling the distribution of mobile credit card
CN107294724A (en) A kind of up verification method of short message and device
TWM618366U (en) Online transaction system and bank server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant