CN103780376B - Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches - Google Patents
Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches Download PDFInfo
- Publication number
- CN103780376B CN103780376B CN201210415975.1A CN201210415975A CN103780376B CN 103780376 B CN103780376 B CN 103780376B CN 201210415975 A CN201210415975 A CN 201210415975A CN 103780376 B CN103780376 B CN 103780376B
- Authority
- CN
- China
- Prior art keywords
- algorithm
- safety barrier
- indicator
- applications
- cryptographic algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Method, terminal and safety barrier the invention discloses the switching of cryptographic algorithm system self adaptation.In one embodiment of the invention, the method for cryptographic algorithm system self adaptation switching includes applying select command to the safety barrier transmission interacted with the applications;The response to the application select command, response bag algorithm containing the safety barrier indicator are received from the safety barrier;It is compared by by the algorithm list that the safety barrier algorithm indicator is supported with the applications, it is determined that preparing the cryptographic algorithm system for using;And apply initialization command, the application initialization command to include the trading algorithms indicator for identifying the cryptographic algorithm system for preparing and using to safety barrier transmission.
Description
Technical field
The present invention relates to finance data process field, and systems self adaptation switches various cryptographic algorithms
The method of system, terminal and safety barrier.
Background technology
Current China's Financial industry is carrying forward vigorously cryptographic algorithm production domesticization work, after the several years, the finance of new issue
IC-card and mobile payment IC-card will all support the close algorithm of state, and finance accepts network and will also complete the close algorithm transformation of state.On the one hand,
Support that the finance of the close algorithm of state accepts network and stills need to accept storage, support International Algorithmic IC-card, while card sender overseas
The IC-card of structure distribution also only supports International Algorithmic, and this is accomplished by accepting network while also supporting International Algorithmic.On the other hand, within the border
What the IC-card of the close algorithm of support state of authority releases was also required to overseas only to support International Algorithmic accepts Web vector graphic, and this is also required to
IC-card supports International Algorithmic simultaneously.
But, in existing PBOC specifications, applications(Such as POS terminal or mobile phone client software)Carried with safety
Body(Such as financial IC card or mobile payment IC-card)Between payment process only support a kind of cryptographic algorithm system.That is, concluding the business
Cheng Zhong, data encryption and legitimate verification between applications and safety barrier are completed using unique cryptographic algorithm system, interior
Selection mechanism of the portion without many algorithms.When certain country, area or industry need internally to use new key according to own situation
During system, incompatible problem between new, old key code system can be produced.
The content of the invention
For the problem, according to an aspect of the invention, there is provided one kind is soft in such as POS terminal or cell-phone customer terminal
The method that various cryptographic algorithm system self adaptation switchings are realized in the applications of part etc., including:Enter to the applications
The safety barrier of row interaction(Such as financial IC card or mobile payment IC-card)Transmission application select command;Connect from the safety barrier
Receive the response to the application select command, response bag algorithm containing the safety barrier indicator;Calculated by by the safety barrier
The algorithm list that method indicator is supported with the applications is compared, it is determined that preparing the cryptographic algorithm system for using;And
Sent to the safety barrier and apply initialization command, the application initialization command include identify it is described prepare to use it is close
The trading algorithms indicator of code algorithm system.
In the above-mentioned methods, the safety barrier algorithm indicator have recorded all passwords calculation that the safety barrier is supported
Law system, and identify the priority of every kind of algorithm system.
In the above-mentioned methods, it is described prepare the cryptographic algorithm system that uses be the applications and the safety barrier all
Support and the algorithm of highest priority.
The above-mentioned method for realizing various cryptographic algorithm system self adaptation switchings may also include:According to safety barrier correspondence
With the response of initialization command, corresponding application and key data are read to complete payment transaction.
According to another aspect of the present invention, there is provided one kind realizes various cryptographic algorithm system self adaptations in safety barrier
The method of switching, including:Received from the applications interacted with the safety barrier and apply select command;To the outside
Using the response sent to application select command, response bag algorithm containing the safety barrier indicator;Received from the applications
Using initialization command, the application initialization command refers to comprising the trading algorithms for identifying the cryptographic algorithm system for preparing to use
Show device, wherein the cryptographic algorithm for preparing to use is supported by by the safety barrier algorithm indicator and the applications
Algorithm list be compared and obtain.Wherein, the applications can be POS or Mobile phone payment client software, institute
It can be financial IC card or mobile payment IC-card to state safety barrier.
In the above-mentioned methods, the safety barrier algorithm indicator have recorded all passwords calculation that the safety barrier is supported
Law system, and identify the priority of every kind of algorithm system.
In the above-mentioned methods, it is described prepare the cryptographic algorithm system that uses be the applications and the safety barrier all
Support and the algorithm of highest priority.
The above-mentioned method for realizing various cryptographic algorithm system self adaptation switchings may also include:Judge that the trading algorithms are indicated
Whether device meets the algorithms selection strategy of the safety barrier.And further, if the trading algorithms indicator meets
The algorithms selection strategy of the safety barrier, then return to what the preparation was used in the response of the application initialization command
The corresponding application file locator of cryptographic algorithm system.
According to a further aspect of the invention, there is provided a kind of end for realizing various cryptographic algorithm system self adaptation switchings
End, including:Sending module, select command is applied for being sent to the safety barrier interacted with the terminal;Receiver module,
For receiving the response to the application select command, response bag algorithm containing the safety barrier indicator from the safety barrier;
And algorithms selection policy module, for the algorithm list by the way that the safety barrier algorithm indicator is supported with the terminal
It is compared, it is determined that preparing the cryptographic algorithm system for using;Wherein, the sending module is additionally operable to be sent to the safety barrier
Using initialization command, the application initialization command includes the transaction calculation for identifying the cryptographic algorithm system for preparing and using
Method indicator.
The above-mentioned terminal for realizing various cryptographic algorithm system self adaptation switchings may also include:Read module, for according to institute
Response of the safety barrier to application initialization command is stated, corresponding application and key data is read to complete payment transaction.
According to a further aspect of the invention, there is provided a kind of safety for realizing various cryptographic algorithm system self adaptation switchings
Carrier, including:Receiver module, select command is applied for being received from the applications interacted with the safety barrier;With
And sending module, for sending the response to application select command, the response bag algorithm containing safety barrier to the applications
Indicator;Wherein, the receiver module is also received from the applications and applies initialization command, the application initialization command
Comprising the trading algorithms indicator for identifying the cryptographic algorithm system for preparing to use, wherein the cryptographic algorithm for preparing to use leads to
Cross and the algorithm list that the safety barrier algorithm indicator is supported with the applications is compared and obtained.
The above-mentioned safety barrier for realizing various cryptographic algorithm system self adaptation switchings may also include:Algorithms selection strategy mould
Block, for judging whether the trading algorithms indicator meets the algorithms selection strategy of the safety barrier, if wherein described
Trading algorithms indicator meets the algorithms selection strategy of the safety barrier, then in the response of the application initialization command
Return to the corresponding application file locator of cryptographic algorithm system for preparing and using.Wherein, the algorithms selection policy module
When the applications do not return to trading algorithms indicator, selection continues executing with subsequent operation or interrupts transaction.
Technical scheme disclosed by the invention can realize applications in payment process(POS terminal, Mobile phone payment client
Software)With safety barrier(Financial IC card, mobile payment IC-card)Between various different cryptographic algorithm systems self adaptation switching,
So as to find the cryptographic algorithm that applications and safety barrier are all supported, payment transaction is completed.
Brief description of the drawings
After specific embodiment of the invention has been read referring to the drawings, those skilled in the art will be more clearly
Solution various aspects of the invention.Skilled person would appreciate that:These accompanying drawings are used only for coordinating specific embodiment party
Formula illustrates technical scheme, and is not intended to be construed as limiting protection scope of the present invention.
Fig. 1 is according to an embodiment of the invention to realize that various cryptographic algorithm system self adaptations are cut in applications
The method flow diagram for changing.
Fig. 2 is according to an embodiment of the invention to realize that various cryptographic algorithm system self adaptations are cut in safety barrier
The method flow diagram for changing.
Fig. 3 is that the cryptographic algorithm self adaptation between safety barrier according to an embodiment of the invention and applications is cut
Change the flow chart of process.
Fig. 4 is showing for the terminal for realizing various cryptographic algorithm system self adaptation switchings according to an embodiment of the invention
It is intended to.
Fig. 5 is the safety barrier for realizing various cryptographic algorithm system self adaptation switchings according to an embodiment of the invention
Schematic diagram.
Specific embodiment
What is be described below is multiple some that may be in embodiment of the invention, it is desirable to provide to of the invention basic
Solution, it is no intended to confirm of the invention crucial or conclusive key element or limit scope of the claimed.It is readily appreciated that, according to this
The technical scheme of invention, in the case where connotation of the invention is not changed, those of ordinary skill in the art can be proposed can be mutual
Other implementations replaced.Therefore, detailed description below and accompanying drawing are only the examples to technical scheme
Property explanation, and be not to be construed as whole of the invention or be considered as to define or limit technical solution of the present invention.
With reference to Fig. 1, it show according to one embodiment of present invention, various cryptographic algorithm bodies are realized in applications
It is the method flow diagram of self adaptation switching.Applications can be herein POS terminal or mobile phone client software.
In step 110, applications can send to the safety barrier for interacting and apply select command.It is of the invention
On one side, safety barrier is financial IC card or mobile payment IC-card.
Then, in step 120, applications receive response from safety barrier, refer to comprising safety barrier algorithm in response
Show device.Preferably, safety barrier algorithm indicator have recorded all cryptographic algorithm systems of safety barrier support, and identify every
Plant the priority of algorithm system.
For example, safety barrier algorithm indicator can be with as shown in the table:
Algorithm is identified | Asymmetric arithmetic | Symmetry algorithm | Digest algorithm | Cipher key index | Priority |
00(State is close) | SM2 | SM3 | SM4 | 00 | 00 |
01(Shang Mi) | RSA | DES | HASH | 00 | 01 |
In upper table, algorithm mark be every kind of algorithm system distribution unique mark, asymmetric arithmetic, symmetry algorithm,
Digest algorithm is respectively the corresponding cryptographic algorithm of every kind of algorithm system, and cipher key index is used to distinguish props up under same algorithm system
The many group keys held, priority is used for identifying the priority of every kind of algorithm system, wherein " 00 " is limit priority.
In the close algorithm system of state, asymmetric arithmetic is SM2, and symmetry algorithm is SM3, and digest algorithm is SM4.And
In the close algorithm system of business, asymmetric arithmetic is RSA, and symmetry algorithm is DES, and digest algorithm is HASH.Certainly, it is illustrated above these
Citing is only used for, those skilled in the art are easily found out using various other AESs.
If applications do not receive algorithm indicator after being sent using select command to safety barrier, show this
Safety barrier does not support that new cryptosystem, i.e. safety barrier are former storage cards, and it may only support original unique
Plant cryptographic algorithm.In this case, applications can be determined according to algorithms selection strategy be by original algorithm process also
It is to return to algorithm to applications not support.
Then, in step 130, applications are carried out by by the algorithm list that safety barrier algorithm indicator is supported with it
Compare, it is determined that preparing the cryptographic algorithm system for using.Applications can pre-save the algorithm system row of its support inside it
Table or dynamic download its algorithm system list for supporting.In one embodiment, the algorithm system list that applications are supported
Can be with as follows:
Algorithm is identified | Asymmetric arithmetic | Symmetry algorithm | Digest algorithm | Cipher key index | Priority |
00(State is close) | SM2 | SM3 | SM4 | 00 | 00 |
01(Shang Mi) | RSA | DES | HASH | 00 | 01 |
It is compared by by the algorithm list that safety barrier algorithm indicator is supported with applications, applications can be with
Find algorithm that both it support with safety barrier and highest priority.
In the present embodiment, because applications and safety barrier all support the close algorithm of state and the close algorithm of business, so outside
Using can determine that the close algorithm of the use priority state higher.
Then, in step 140, applications send to safety barrier and apply initialization command, and this applies initialization command
Comprising the trading algorithms indicator for identifying the cryptographic algorithm system for preparing to use.
For example, trading algorithms indicator can be with as shown in the table:
Algorithm is identified | Asymmetric arithmetic | Symmetry algorithm | Digest algorithm | Cipher key index |
00(State is close) | SM2 | SM3 | SM4 | 00 |
This trading algorithms indicator specifies this transaction algorithm system to be used determined after applications matching
It is the close algorithm of state.
With reference to Fig. 2, show according to one embodiment of present invention, various cryptographic algorithm systems are realized in safety barrier
The method flow diagram of self adaptation switching.Safety barrier can be herein financial IC card or mobile payment IC-card.
In step 210, safety barrier is received from the applications for interacting and applies select command.According to this hair
Bright one side, applications are POS terminal or Mobile phone payment client software.
Then, in step 220, safety barrier sends the response to application select command to applications, and the response bag contains
Safety barrier algorithm indicator.Preferably, safety barrier algorithm indicator have recorded all cryptographic algorithms of safety barrier support
System, and identify the priority of every kind of algorithm system.
For example, safety barrier algorithm indicator can be with as shown in the table:
Algorithm is identified | Asymmetric arithmetic | Symmetry algorithm | Digest algorithm | Cipher key index | Priority |
00(State is close) | SM2 | SM3 | SM4 | 00 | 00 |
01(Shang Mi) | RSA | DES | HASH | 00 | 01 |
In upper table, algorithm mark be every kind of algorithm system distribution unique mark, asymmetric arithmetic, symmetry algorithm,
Digest algorithm is respectively the corresponding cryptographic algorithm of every kind of algorithm system, and cipher key index is used to distinguish props up under same algorithm system
The many group keys held, priority is used for identifying the priority of every kind of algorithm system, wherein " 00 " is limit priority.
In the close algorithm system of state, asymmetric arithmetic is SM2, and symmetry algorithm is SM3, and digest algorithm is SM4.And
In the close algorithm system of business, asymmetric arithmetic is RSA, and symmetry algorithm is DES, and digest algorithm is HASH.Certainly, it is illustrated above these
Citing is only used for, those skilled in the art are easily found out using various other AESs.
Then, in step 230, safety barrier is received from applications and applies initialization command, and this applies initialization command
Comprising the trading algorithms indicator for identifying the cryptographic algorithm system for preparing to use.Wherein, the cryptographic algorithm for preparing to use is outer
Apply and obtained by the way that the algorithm list that safety barrier algorithm indicator is supported with applications is compared in portion.
For example, trading algorithms indicator can be with as shown in the table:
Algorithm is identified | Asymmetric arithmetic | Symmetry algorithm | Digest algorithm | Cipher key index |
00(State is close) | SM2 | SM3 | SM4 | 00 |
This trading algorithms indicator specifies this transaction algorithm system to be used determined after applications matching
It is the close algorithm of state.
After safety barrier receives trading algorithms indicator, whether it can determine whether the trading algorithms indicator
Meet the algorithms selection strategy of itself.If met, safety barrier can then return to choosing in the response of application initialization command
In the corresponding AFL of cryptographic algorithm(Application File Locator, application file locator), otherwise can return to algorithm
Do not support.
If safety barrier is not received by the trading algorithms indicator of applications return, show the applications not
Various cryptographic algorithm systems are supported, i.e., former storage product only supports original unique kind of cryptographic algorithm.In such case
Under, safety barrier can be determined according to algorithms selection strategy by original algorithm process or returning to algorithm to applications does not prop up
Hold.
Fig. 3 shows the interaction between safety barrier according to an embodiment of the invention and applications.Specifically
For, the process mainly contains following steps:
First, applications send the application select command of such as SELECT orders to safety barrier.
Second, safety barrier is in command response PDOL(Processing Options Data Object List, treatment
Selection data object list)Middle return safety barrier algorithm indicator, the safety barrier algorithm indicator have recorded safety barrier
The all cryptographic algorithm systems supported, and identify the priority of every kind of algorithm system.If applications do not receive algorithm referred to
Show device, be then shown to be former storage card, only support original unique kind of cryptographic algorithm.At this moment, applications can be according to calculation
Method selection strategy selects to determine not supported by original algorithm process or to applications return algorithm.
3rd, be compared for the algorithm list that the algorithm indicator of safety barrier is supported with it by applications, finds two
Person supports, the algorithm of highest priority.
4th, applications send the application initialization command of such as GPO command to safety barrier, wherein containing transaction
Algorithm indicator, this transaction that the trading algorithms indicator is identified after adaptively selected, applications determine should make
Cryptographic algorithm system.
5th, safety barrier judges whether the trading algorithms indicator for receiving meets the algorithms selection strategy of safety barrier,
If met, the corresponding AFL of the cryptographic algorithm chosen is returned in the response of GPO command, otherwise return to algorithm and do not support;Such as
Fruit safety barrier does not receive the trading algorithms indicator of applications return, then show that the applications are that former storage is produced
Product, only support original unique kind of cryptographic algorithm, and safety barrier can be by original algorithm process according to algorithms selection policy selection
Or to applications algorithm is returned to not support.
6th, the AFL that applications are returned according to safety barrier reads corresponding application and key data, completes to pay and hands over
Easily.
From preceding method, the present invention does not change the interaction flow and interface of existing PBOC specifications definition, makes completely
With the command format and data element of existing PBOC specifications, the extension bits for having used specification reserved, so as to safety barrier and outward
The transformation of portion's application is reduced to minimum.
Fig. 4 shows the terminal for realizing various cryptographic algorithm system self adaptation switchings according to an embodiment of the invention
400.Terminal 400 may include sending module 410, receiver module 420 and algorithms selection policy module 430.Sending module 410 is used
Select command is applied in being sent to the safety barrier interacted with terminal 400.Sending module 410 is additionally operable to be sent out to safety barrier
Send and apply initialization command, this refers to using initialization command comprising the trading algorithms for identifying the cryptographic algorithm system for preparing to use
Show device.Receiver module 420 is used to receive the response to application select command from safety barrier(Such as PDOL), the response bag is containing peace
Full carrier algorithm indicator.Algorithms selection policy module 430 is used for by the way that safety barrier algorithm indicator and terminal supported
Algorithm list is compared, it is determined that preparing the cryptographic algorithm system for using.Preferably, safety barrier is not sent in safety barrier
During algorithm indicator, algorithms selection policy module 430 can determine that being to continue with execution subsequent operation still interrupts transaction, and this can be by example
Such as acquirer's self-defining.
Alternatively, terminal 400 may also include read module 440.Read module 440 is used for first to application according to safety barrier
The response of beginningization order, reads corresponding application and key data to complete payment transaction.
Fig. 5 shows the safety for realizing various cryptographic algorithm system self adaptation switchings according to an embodiment of the invention
Carrier 500.Safety barrier 500 may include receiver module 510 and sending module 520.Receiver module 510 is used to be carried from safety
The applications that body 500 is interacted are received and apply select command.It is initial that receiver module 510 can also receive application from applications
Change order, the application initialization command includes the trading algorithms indicator for identifying the cryptographic algorithm system for preparing to use.Hair
Module 510 is sent for sending response to application select command to applications, response bag algorithm containing the safety barrier indicator,
It is important to point out that, the cryptographic algorithm that preparation is used is that applications are supported by by safety barrier algorithm indicator with it
Algorithm list is compared and obtains.
Preferably, safety barrier 500 may also include algorithms selection policy module 530.Algorithms selection policy module 530 can use
If in judging whether trading algorithms indicator meets the algorithms selection strategy of safety barrier 500, meeting, initial to application
The corresponding application file locator of cryptographic algorithm system for preparing to use is returned in the response of change order.It is highly preferred that algorithm is selected
Policy module 530 is selected when applications do not return to trading algorithms indicator, selection continue executing with subsequent operation or in break off a friendship
Easily, this can be by such as card issuer's self-defining.
Current China's Financial industry is carrying forward vigorously cryptographic algorithm production domesticization work, after the several years, the finance of new issue
IC-card and mobile payment IC-card will all support the close algorithm of state, and finance accepts network and will also complete the close algorithm transformation of state.And and this
Meanwhile, existing IC-card generally only supports International Algorithmic, and the IC-card of card sending mechanism distribution overseas also only supports International Algorithmic.This
Invent method, terminal and the safety barrier for proposing and solve the IC-card and POS for supporting the close algorithm of state or International Algorithmic well
Between the compatibling problem that interacts.
To sum up, the mechanism and system can realize inspection, judgement and the selection to terminal and safety barrier key code system, together
When support two or more checking of the different cryptographic algorithm systems in same process of exchange, to different cryptographic algorithm systems
Safety barrier it is compatible, on existing financial payment transaction overall flow without influence.
Above, specific embodiment of the invention is described with reference to the accompanying drawings.But, those skilled in the art
It is understood that without departing from the spirit and scope of the present invention, can also make each to specific embodiment of the invention
Plant change and replace.These changes and replacement all fall in claims of the present invention limited range.
Claims (14)
1. a kind of method that the switching of various cryptographic algorithm system self adaptations is realized in applications, including:
Sent to the safety barrier interacted with the applications and apply select command;
The response to the application select command, response bag algorithm containing the safety barrier indicator are received from the safety barrier;
It is compared by by the algorithm list that the safety barrier algorithm indicator is supported with the applications, it is determined that preparing
The cryptographic algorithm system for using;
Sent to the safety barrier and apply initialization command, the application initialization command is used comprising the preparation is identified
Cryptographic algorithm system trading algorithms indicator;And
After the safety barrier receives the trading algorithms indicator, judge whether the trading algorithms indicator meets described
The algorithm policy of safety barrier, if met, the preparation is returned in the response of the correspondence applications initialization command
The corresponding file retainer of cryptographic algorithm system for using;
Wherein, the safety barrier algorithm indicator have recorded all cryptographic algorithm systems that the safety barrier is supported, and mark
The priority of every kind of algorithm system is known;The cryptographic algorithm system for preparing to use is that the applications and the safety are carried
Body all support and highest priority algorithm.
2. the method for claim 1, wherein the applications are POS terminal or Mobile phone payment client software.
3. the method for claim 1, wherein the safety barrier is financial IC card or mobile payment IC-card.
4. the method for claim 1, also includes:
Response according to the safety barrier to application initialization command, reads corresponding application and key data to complete to pay
Transaction.
5. the method for claim 1, wherein various cryptographic algorithm systems are included comprising SM2, SM3, SM4 algorithm
The close algorithm system of state and the close algorithm system of the business comprising RSA, DES, HASH algorithm.
6. a kind of method that the switching of various cryptographic algorithm system self adaptations is realized in safety barrier, including:
Received from the applications interacted with the safety barrier and apply select command;
The response to application select command, response bag algorithm containing the safety barrier indicator are sent to the applications;
Received from the applications and apply initialization command, the application initialization command is included and identifies prepare to use close
The trading algorithms indicator of code algorithm system, wherein the cryptographic algorithm for preparing to use refers to by by the safety barrier algorithm
Show that the algorithm list that device is supported with the applications is compared and obtains;And
After the trading algorithms indicator is received, judge whether the trading algorithms indicator meets the calculation of the safety barrier
Method strategy, if met, the password for preparing to use is returned in the response of the correspondence applications initialization command and is calculated
The corresponding file retainer of law system;
Wherein, the safety barrier algorithm indicator have recorded all cryptographic algorithm systems that the safety barrier is supported, and mark
The priority of every kind of algorithm system is known;The cryptographic algorithm system for preparing to use is that the applications and the safety are carried
Body all support and highest priority algorithm.
7. method as claimed in claim 6, wherein, the applications are POS terminal or Mobile phone payment client software.
8. method as claimed in claim 6, wherein, the safety barrier is financial IC card or mobile payment IC-card.
9. method as claimed in claim 6, also includes:
Judge whether the trading algorithms indicator meets the algorithms selection strategy of the safety barrier.
10. method as claimed in claim 6, wherein, various cryptographic algorithm systems are included comprising SM2, SM3, SM4 algorithm
The close algorithm system of state and the close algorithm system of the business comprising RSA, DES, HASH algorithm.
A kind of 11. terminals for realizing various cryptographic algorithm system self adaptation switchings, including:
Sending module, select command is applied for being sent to the safety barrier interacted with the terminal;
Receiver module, for receiving the response to the application select command from the safety barrier, the response bag is carried containing safety
Body algorithm indicator;And
Algorithms selection policy module, for the algorithm list by the way that the safety barrier algorithm indicator is supported with the terminal
It is compared, it is determined that prepare the cryptographic algorithm system for using, and for judging whether trading algorithms indicator meets the peace
The algorithms selection strategy of full carrier, if wherein the trading algorithms indicator meets the algorithms selection plan of the safety barrier
Slightly, then the corresponding practical writing of cryptographic algorithm system for preparing and using is returned in the response of the application initialization command
Part locator;
Wherein, the sending module is additionally operable to be sent to the safety barrier and applies initialization command, the application initialization life
Order includes the trading algorithms indicator for identifying the cryptographic algorithm system for preparing and using;
Wherein, the safety barrier algorithm indicator have recorded all cryptographic algorithm systems that the safety barrier is supported, and mark
The priority of every kind of algorithm system is known;It is described prepare the cryptographic algorithm system that uses be applications and the safety barrier all
Support and the algorithm of highest priority.
12. terminals as claimed in claim 11, also include:
Read module, for the response according to the safety barrier to application initialization command, reads corresponding application and key
Data are completing payment transaction.
A kind of 13. safety barriers for realizing various cryptographic algorithm system self adaptation switchings, including:
Receiver module, select command is applied for being received from the applications interacted with the safety barrier;And
Sending module, for sending the response to application select command to the applications, the response bag is calculated containing safety barrier
Method indicator;
Algorithms selection policy module, for judging whether trading algorithms indicator meets the algorithms selection plan of the safety barrier
Slightly, if wherein the trading algorithms indicator meets the algorithms selection strategy of the safety barrier, at the beginning of the application
The corresponding application file locator of cryptographic algorithm system for preparing to use is returned in the response of beginningization order;
Wherein, the receiver module is also received from the applications and applies initialization command, the application initialization command bag
Containing the trading algorithms indicator for identifying the cryptographic algorithm system for preparing to use, wherein the cryptographic algorithm for preparing to use passes through
The algorithm list that the safety barrier algorithm indicator is supported with the applications is compared and is obtained;
Wherein, the safety barrier algorithm indicator have recorded all cryptographic algorithm systems that the safety barrier is supported, and mark
The priority of every kind of algorithm system is known;The cryptographic algorithm system for preparing to use is that the applications and the safety are carried
Body all support and highest priority algorithm.
14. safety barriers as claimed in claim 13, wherein, the algorithms selection policy module does not have in the applications
When returning to trading algorithms indicator, selection continues executing with subsequent operation or interrupts transaction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210415975.1A CN103780376B (en) | 2012-10-26 | 2012-10-26 | Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210415975.1A CN103780376B (en) | 2012-10-26 | 2012-10-26 | Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103780376A CN103780376A (en) | 2014-05-07 |
CN103780376B true CN103780376B (en) | 2017-06-23 |
Family
ID=50572251
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210415975.1A Active CN103780376B (en) | 2012-10-26 | 2012-10-26 | Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103780376B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104539429B (en) * | 2014-12-30 | 2017-09-22 | 飞天诚信科技股份有限公司 | A kind of method and apparatus and system for positioning the close certificate of state |
CN105530090A (en) * | 2015-12-31 | 2016-04-27 | 中国建设银行股份有限公司 | Key negotiation method and device |
CN106980972B (en) * | 2016-12-29 | 2021-02-02 | 中国银联股份有限公司 | TEE-based offline payment method, payment system and mobile terminal |
CN112448811A (en) * | 2019-09-03 | 2021-03-05 | 上海云从汇临人工智能科技有限公司 | Data security management method, data security management device and data security management system |
CN114329499A (en) * | 2022-01-06 | 2022-04-12 | 新开普电子股份有限公司 | A kind of application method of CPU smart card |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1479480A (en) * | 2002-08-26 | 2004-03-03 | 华为技术有限公司 | Method of consulted encryption algorithm |
CN102081821A (en) * | 2009-11-27 | 2011-06-01 | 中国银联股份有限公司 | IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal |
CN102637274A (en) * | 2012-03-22 | 2012-08-15 | 瑞达信息安全产业股份有限公司 | Mobile payment method compatible with international and domestic cryptographic algorithm |
CN102710412A (en) * | 2012-05-07 | 2012-10-03 | 北京握奇数据系统有限公司 | Method and device for compatible management of encryption algorithm |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4631935B2 (en) * | 2008-06-06 | 2011-02-16 | ソニー株式会社 | Information processing apparatus, information processing method, program, and communication system |
-
2012
- 2012-10-26 CN CN201210415975.1A patent/CN103780376B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1479480A (en) * | 2002-08-26 | 2004-03-03 | 华为技术有限公司 | Method of consulted encryption algorithm |
CN102081821A (en) * | 2009-11-27 | 2011-06-01 | 中国银联股份有限公司 | IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal |
CN102637274A (en) * | 2012-03-22 | 2012-08-15 | 瑞达信息安全产业股份有限公司 | Mobile payment method compatible with international and domestic cryptographic algorithm |
CN102710412A (en) * | 2012-05-07 | 2012-10-03 | 北京握奇数据系统有限公司 | Method and device for compatible management of encryption algorithm |
Also Published As
Publication number | Publication date |
---|---|
CN103780376A (en) | 2014-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103780376B (en) | Method, terminal and safety barrier that cryptographic algorithm system self adaptation switches | |
CN101958025B (en) | Mobile phone payment method using barcode technology, and on-site payment terminal and system | |
CN101159008A (en) | Mutual authentication method between a communication interface and a host processor of an nfc chipset | |
CN106255974A (en) | Authentication code input system and method | |
US20140289129A1 (en) | Method for secure contactless communication of a smart card and a point of sale terminal | |
CN102710412B (en) | Method and device for compatible management of encryption algorithm | |
CN110428036A (en) | A kind of generation method of dynamic two-dimension code, system and terminal device | |
CN103002435A (en) | Remote subscriber identity module activating system | |
WO2017092654A1 (en) | Pos machine transaction processing method and system | |
CN107657441A (en) | Self-service dealing method, system, server and mobile terminal | |
CN103544114B (en) | Based on many M1 card control system and the control method thereof of single CPU card | |
CN102982449A (en) | Mobile terminal and transaction system and method | |
US20140089169A1 (en) | System and Method of Processing Payment Transactions via Mobile Devices | |
CN107038824A (en) | A kind of POS terminal processing method and POS | |
CN105635164B (en) | The method and apparatus of safety certification | |
CN108550043A (en) | The method for anti-counterfeit of commodity sign, the verification method of device and commodity true and false, device | |
CN113169867A (en) | Information receiving and transmitting method, device and system using QR (quick response) code | |
CN107318103B (en) | Machine switching prevention method and system based on Internet of things SIM card | |
Bernardi et al. | An anti-counterfeit mechanism for the application layer in low-cost RFID devices | |
CN103077457B (en) | A kind of intelligent RFID payment terminal and method | |
CN102542696B (en) | Security information interaction system and method | |
CN102110334A (en) | Device, system and method for processing information | |
CN105103180B (en) | Method for handling the distribution of mobile credit card | |
CN107294724A (en) | A kind of up verification method of short message and device | |
TWM618366U (en) | Online transaction system and bank server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |