CN104243162B - A kind of information interacting method, system and intelligent cipher key equipment - Google Patents
A kind of information interacting method, system and intelligent cipher key equipment Download PDFInfo
- Publication number
- CN104243162B CN104243162B CN201410409471.8A CN201410409471A CN104243162B CN 104243162 B CN104243162 B CN 104243162B CN 201410409471 A CN201410409471 A CN 201410409471A CN 104243162 B CN104243162 B CN 104243162B
- Authority
- CN
- China
- Prior art keywords
- key
- intelligent cipher
- data
- server
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention provides a kind of information interacting method, system and intelligent cipher key equipment, wherein, information interacting method includes:Server and intelligent cipher key equipment conversate key agreement operation, if success, server generates the first session key, and intelligent cipher key equipment generates the second session key, and the first session key and the second session key are key pair;Server by utilizing the first session key transaction data, encrypting transactions data is generated, encrypting transactions data is sent to terminal;Terminal receives encrypting transactions data, and encrypting transactions data is sent to intelligent cipher key equipment;Intelligent cipher key equipment receives encrypting transactions data, and encrypting transactions data is decrypted operation using the second session key, obtains transaction data, processing transaction data obtains transaction key message, and transaction key message is sent to terminal;Terminal receives and shows transaction key message, obtains after confirming instruction, generates confirmation, and will confirm that information is sent to intelligent cipher key equipment.
Description
Technical field
The present invention relates to a kind of electronic technology field, more particularly to a kind of information interacting method, system and intelligent key to set
It is standby.
Background technology
In recent years, with the fast development of internet and finance informationalizing, Web bank with its facility, it is efficient the advantages that
Rapid while obtain the generally high praise of user and bank's industry, transaction security problem also becomes increasingly conspicuous, and therefore, ensures transaction peace
Full preferred mode is to use electronic key equipment while using Web bank, and at present, electronic key equipment can be intelligence
Energy key devices, such as USB-KEY, audio KEY or bluetooth KEY or smart card, such as IC-card.Come from technical standpoint
See, intelligent cipher key equipment be for sign electronically and data authentication instrument, its built-in miniature safety chip, using key algorithm
Transaction data is encrypted, decrypted and digital signature, it is ensured that the confidentiality of online transaction, authenticity, integrality and could not
Recognizing property.In intelligent cipher key equipment, private key that safety chip memory storage is generated by asymmetric key algorithm, the private key has can not
Derived characteristic, the uniqueness and security of private key are ensured, the public key generated based on same algorithm, be then stored in bank's clothes
It is engaged in device, the transaction data to be signed to intelligent cipher key equipment carries out sign test operation, and sign test is by then meaning transaction data
It is authentic and valid, and then complete transaction.
In order to further ensure that the transaction data that user is signed using electronic key instrument is real not tampered number
According to existing intelligent cipher key equipment typically can further set display screen and acknowledgement key, and transaction data is shown by display screen, use
Read transaction data in family, it is believed that transaction data it is true it is errorless after, acknowledgement key can be pressed, indicating intelligent key devices are believed the transaction
Breath carries out signature operation.But now, it is with increasingly raising of the user to the attention degree of transaction security, it is necessary to close using intelligence
The transaction of key equipment is more and more, and the requirement of portability and property easy to use to intelligent cipher key equipment also improves therewith,
The factor for influenceing the portability of intelligent cipher key equipment is the volume of the equipment, influences the principal element of the volume of intelligent cipher key equipment
As display screen and acknowledgement key, and the factor for influenceing the property easy to use of intelligent cipher key equipment is needed at end to complete once transaction
Dual operation is carried out on end and intelligent cipher key equipment.If removing display screen and acknowledgement key, it can effectively reduce intelligent key and set
Standby volume, but intelligent cipher key equipment can not show transaction data, and terminal obtains transaction data in plain text and shown, if terminal is hacked
Visitor's attack is infected and has distorted transaction data, then user can not know that transaction data is tampered, and can not also obtain true
Real transaction data, user based on terminal show be tampered after transaction data carry out confirming to operate when, intelligent cipher key equipment
The signature substantially carried out to illegal transaction data, causes the loss of user's property.Therefore, how one kind side is provided
Method or system, terminal can not distort to transaction data in process of exchange, Transaction Safety, while simplify user and handing over
Easily in operating process and reduce the volume of intelligent cipher key equipment, be this area technical problem urgently to be resolved hurrily.
The content of the invention
Present invention seek to address that one of above mentioned problem.
It is a primary object of the present invention to provide a kind of information interacting method, it is characterised in that:
Server and intelligent cipher key equipment conversate key agreement operation, if success, the server generation first
Session key, the intelligent cipher key equipment generate the second session key, first session key and second session key
For key pair;
First session key transaction data described in the server by utilizing, encrypting transactions data is generated, described will added
Close transaction data is sent to terminal;
The terminal receives the encrypting transactions data, and the encrypting transactions data is sent to the intelligent key and set
It is standby;
The intelligent cipher key equipment receives the encrypting transactions data, and using second session key to the encryption
Operation is decrypted in transaction data, obtains the transaction data, handles the transaction data and obtains transaction key message, and by institute
Transaction key message is stated to send to the terminal;
The terminal receives and shows the transaction key message, obtains after confirming instruction, generates confirmation, and by institute
Confirmation is stated to send to the intelligent cipher key equipment.
In addition, the server and intelligent cipher key equipment conversate before key agreement operation, in addition to:The terminal
The transaction prompt information that the server is sent is received, display input password prompt information, password is received and sends out the password
Deliver to the intelligent cipher key equipment;The intelligent cipher key equipment receives the password and verifies whether the password is correct, if
Correctly, then the intelligent cipher key equipment and the server conversate key agreement operation.
In addition, described send the confirmation to the intelligent cipher key equipment, in addition to:The intelligent key
After equipment receives the confirmation, ciphering signature data are sent to the terminal, wherein, the ciphering signature data are intelligence
Energy key devices are obtained using the second session key signed data, and the signed data is that the intelligent key is set
It is standby that what is obtained is signed to the transaction data.
The key agreement operation in addition, the server and intelligent cipher key equipment conversate, including:The intelligent key is set
The first random number of standby generation, and first random number and the first preset algorithm identification information are sent to the terminal;It is described
Terminal receives first random number and the first preset algorithm identification information, and by first random number and described first
Preset algorithm identification information is sent to the server;The server receives first random number and the described first pre- imputation
Method identification information, whether supported and the described first pre- imputation according to server described in the first preset algorithm identification information judgment
First preset algorithm corresponding to method identification information, if it is, the server generate the second random number, and by described second with
Machine number is sent to the terminal with server certificate;The terminal receives second random number and the server certificate, and
Second random number and the server certificate are sent to the intelligent cipher key equipment;The intelligent cipher key equipment receives institute
The second random number and the server certificate are stated, verifies the server certificate, if random by checking, generation the 3rd
Number, the server public key in the server certificate is extracted, and using the server public key according to first preset algorithm
Encrypt the first encryption information of the 3rd generating random number, using the intelligent cipher key equipment private key to first random number with
Second random number is signed to obtain the first signed data, and the intelligent cipher key equipment certificate, described first are encrypted
Information is sent to the terminal with first signed data;The terminal receives the intelligent cipher key equipment certificate, described the
One encryption information and first signed data, and by the intelligent cipher key equipment certificate, first encryption information with it is described
First signed data is sent to the server;The server receives the intelligent cipher key equipment certificate, first encryption
Information and first signed data, verify the intelligent cipher key equipment certificate, if be proved to be successful, it is close to extract the intelligence
Intelligent cipher key equipment public key in key device certificate, first signed data is carried out using the intelligent cipher key equipment public key
Sign test operates, and after sign test success, is believed using the privacy key according to first preset algorithm decryption, first encryption
Breath obtains the 3rd random number, generates the first handshaking information, and first handshaking information is sent to the terminal;It is described
Terminal receives first handshaking information, and first handshaking information is sent to the intelligent cipher key equipment;The intelligence
Key devices receive first handshaking information, and verification operation is carried out to first handshaking information, and the is generated after being proved to be successful
Two handshaking informations, second handshaking information is sent to the terminal, and it is random to described first according to the second preset algorithm
Several, described second random number carries out computing with the 3rd random number and generates second session key;The terminal receives institute
The second handshaking information is stated, and second handshaking information is sent to the server;The server receives described second and held
Hand information, verification operation is carried out to second handshaking information, after being proved to be successful, according to second preset algorithm to described the
One random number, second random number carry out computing with the 3rd random number and generate first session key.
Another aspect of the present invention also provides a kind of information interaction system, it is characterised in that including intelligent cipher key equipment, terminal
And server,
The intelligent cipher key equipment, for being conversated key agreement operation with the server, if success, generate the
Two session keys, the encrypting transactions data that receiving terminal is sent, and using second session key to the encryption number of deals
According to operation is decrypted, the transaction data is obtained, the transaction data is handled and obtains transaction key message, and by the transaction
Key message sends and to the terminal, receives the confirmation that the terminal is sent;
The terminal, the encrypting transactions data sent for receiving the server, the encrypting transactions data is sent
To the intelligent cipher key equipment, receive and show the transaction key message, obtain after confirming instruction, generate the confirmation letter
Breath, and the confirmation is sent to the intelligent cipher key equipment;
The server, for being conversated key agreement operation with the intelligent cipher key equipment, if success, generate the
One session key, using the first session key transaction data, encrypting transactions data is generated, by the encryption number of deals
According to transmission to terminal.
In addition, the terminal, is additionally operable to, the transaction prompt information that the server is sent is received, display input password carries
Show information, receive password and send the password to the intelligent cipher key equipment;The intelligent cipher key equipment, is additionally operable to, and connects
Receive the password and verify whether the password correct, if correctly, with the server conversate key agreement operation.
In addition, the intelligent cipher key equipment, is additionally operable to after receiving the confirmation, ciphering signature data are sent to institute
Terminal is stated, wherein, the ciphering signature data are that intelligent cipher key equipment is obtained using the second session key signed data
Arrive, the signed data intelligent cipher key equipment is signed to obtain to the transaction data;The terminal, is also used
In the reception ciphering signature data.
In addition, the intelligent cipher key equipment, is additionally operable to, the first random number is generated, and by first random number and first
Preset algorithm identification information is sent to the terminal, is received the second random number and server certificate, is verified the server certificate,
If by checking, the 3rd random number is generated, extracts the server public key in the server certificate, and utilize the service
Device public key encrypts the first encryption information of the 3rd generating random number according to the first preset algorithm, utilizes the intelligent cipher key equipment
Private key is signed to obtain the first signed data to first random number and second random number, and by the intelligent key
Device certificate, first encryption information and first signed data are sent to the terminal, receive the first handshaking information, right
First handshaking information carries out verification operation, and the second handshaking information is generated after being proved to be successful, and second handshaking information is sent out
The terminal is delivered to, and it is random to first random number, second random number and the described 3rd according to the second preset algorithm
Number carries out computing and generates second session key;The terminal, is additionally operable to, and receives first random number and described first pre-
Imputation method identification information, and first random number and the first preset algorithm identification information are sent to the server,
Second random number and the server certificate are received, and second random number and the server certificate are sent to institute
Intelligent cipher key equipment is stated, receives the intelligent cipher key equipment certificate, first encryption information and first signed data, and
The intelligent cipher key equipment certificate, first encryption information and first signed data are sent to the server, connect
First handshaking information is received, and first handshaking information is sent to the intelligent cipher key equipment, described second is received and holds
Hand information, and second handshaking information is sent to the server;The server, is additionally operable to, receive described first with
Machine number and the first preset algorithm identification information, according to server described in the first preset algorithm identification information judgment whether
First preset algorithm corresponding with the first preset algorithm identification information is supported, if it is, the server generates
Second random number, and second random number and the server certificate are sent to the terminal;Receive the intelligence
Key devices certificate, first encryption information and first signed data, verify the intelligent cipher key equipment certificate, if
It is proved to be successful, then extracts the intelligent cipher key equipment public key in the intelligent cipher key equipment certificate, utilize the intelligent cipher key equipment
Public key carries out sign test operation to first signed data, after sign test success, using the privacy key according to described first
Preset algorithm decrypts first encryption information and obtains the 3rd random number, generates first handshaking information, and by described in
First handshaking information is sent to the terminal, receives second handshaking information, checking behaviour is carried out to second handshaking information
Make, after being proved to be successful, according to second preset algorithm to first random number, second random number with the described 3rd with
Machine number carries out computing and generates first session key.
The present invention provides a kind of intelligent cipher key equipment again, it is characterised in that the equipment is given birth to including at least the second session key
Into module, the first receiving module, parsing module, the first sending module, the second receiving module and security module, wherein,
First receiving module, the encrypting transactions data sent for receiving terminal, sends to the security module, its
In, the encrypting transactions data is server to conversate after key agreement operates successfully with the intelligent cipher key equipment, institute
State server and generate the first session key, the encryption number of deals is generated using the first session key transaction data
According to, and the encrypting transactions data is sent to the terminal;
Second session secret key generating module, it is close for being conversated in the intelligent cipher key equipment with the server
After the success of key negotiation, the second session key is generated, second session key is sent to the security module, wherein,
First session key and second session key are key pair;
The security module, for receiving the encrypting transactions data and second session key, utilize described second
Session key decrypts the encrypting transactions data, obtains transaction data, the transaction data is sent to the parsing module, connect
Receive the confirmation;
The parsing module, for parsing the transaction data, obtain transaction critical data and send to the described first hair
Send module;
First sending module, for by it is described transaction critical data outgoing;
Second receiving module, for receiving the confirmation and sending to the security module.
In addition, the equipment also includes the second sending module, the security module, it is additionally operable to receive the confirmation
Afterwards, ciphering signature data are sent to the second sending module, wherein, the ciphering signature data utilize institute for the security module
State what the second session key signed data obtained, the signed data is that the security module is carried out to the transaction data
What signature obtained;Second sending module, for receiving the ciphering signature data and outgoing.
As seen from the above technical solution provided by the invention, a kind of information interacting method provided by the invention and it is
System, session key signed data is used using session key transaction data and intelligent cipher key equipment by server,
Ensure that transaction data and signed data can only be obtained by server and intelligent cipher key equipment, terminal can only transmit encryption number of deals
According to ciphering signature data, transaction data and signed data can not be distorted, ensure transaction security, in transaction flow
In, transaction also need to be only confirmed in terminal, without carrying out secondary-confirmation on intelligent cipher key equipment, improves transaction flow just
Victory, the intelligent cipher key equipment in this method and system need not set display screen and acknowledgement key, improve intelligent cipher key equipment
Portability.Session key decryption encrypting transactions data can be used in intelligent cipher key equipment provided by the invention, obtains transaction data, and
And send transaction critical data to terminal, transaction critical data is shown by terminal, user is participated in using the intelligent cipher key equipment
During online transaction, it is only necessary to operated in terminal, improve the convenience of transaction, and the intelligent cipher key equipment is without set key
Disk and display, the volume of intelligent cipher key equipment is reduced, improve the portability of equipment.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment
Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill in field, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is the flow chart for the information interacting method that the embodiment of the present invention 1 provides;
Fig. 2 is the structural representation for the information interaction system that the embodiment of the present invention 2 provides;
Fig. 3 is the intelligent cipher key equipment structural representation that the embodiment of the present invention 3 provides.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this
The embodiment of invention, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to protection scope of the present invention.
In the description of the invention, it is to be understood that term " " center ", " longitudinal direction ", " transverse direction ", " on ", " under ",
The orientation or position relationship of the instruction such as "front", "rear", "left", "right", " vertical ", " level ", " top ", " bottom ", " interior ", " outer " are
Based on orientation shown in the drawings or position relationship, it is for only for ease of the description present invention and simplifies description, rather than instruction or dark
Show that the device of meaning or element there must be specific orientation, with specific azimuth configuration and operation, thus it is it is not intended that right
The limitation of the present invention.In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint are relative
Importance or quantity or position.
In the description of the invention, it is necessary to illustrate, unless otherwise clearly defined and limited, term " installation ", " phase
Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;Can
To be mechanical connection or electrical connection;Can be joined directly together, can also be indirectly connected by intermediary, Ke Yishi
The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this
Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with accompanying drawing.
Embodiment 1
In the present embodiment, intelligent cipher key equipment can be USB-KEY, audio KEY, bluetooth KEY or have signature function
Smart card etc..Terminal can be that mobile phone or PC etc. can be with the equipment of server communication.Server can be bank's background service
Device.The connection of intelligent cipher key equipment and terminal can be that contact (is such as connected, USB interface connects or DOCK by COBBAIF
Interface connects) can also be contactless (such as being connected by way of infrared, bluetooth, WIFI or NFC), terminal and server
Information exchange can also be wirelessly by wired mode.
Fig. 1 is a kind of schematic flow sheet of the embodiment of information interacting method provided by the invention.Method shown in Fig. 1 is real
Example is applied, is comprised the following steps:
Step S101, server and intelligent cipher key equipment conversate key agreement operation, if success, the server
The first session key is generated, the intelligent cipher key equipment generates the second session key, first session key and described second
Session key is key pair;
Further, before this step, the terminal can receive the transaction prompt information that the server is sent, display
Password prompt information is inputted, password is received and sends the password to the intelligent cipher key equipment;The intelligent cipher key equipment
Receive the password and verify whether the password is correct, if correctly, the intelligent cipher key equipment enters with the server
Row session key agreement operates.
Further, in this step, the server and intelligent cipher key equipment conversate key agreement operation, including:
The intelligent cipher key equipment generates the first random number, and by first random number and the first preset algorithm identification information send to
The terminal;The terminal receives first random number and the first preset algorithm identification information, and by described first with
Machine number is sent to the server with the first preset algorithm identification information;The server receive first random number with
The first preset algorithm identification information, according to server described in the first preset algorithm identification information judgment whether support with
First preset algorithm corresponding to the first preset algorithm identification information, if it is, the server generates the second random number,
And second random number and server certificate are sent to the terminal;The terminal receive second random number with it is described
Server certificate, and second random number and the server certificate are sent to the intelligent cipher key equipment;The intelligence
Key devices receive second random number and the server certificate, verify the server certificate, if by verifying,
The 3rd random number is generated, extracts the server public key in the server certificate, and using the server public key according to
First preset algorithm encrypts the first encryption information of the 3rd generating random number, using the intelligent cipher key equipment private key to described
First random number and second random number are signed to obtain the first signed data, and by the intelligent cipher key equipment certificate,
First encryption information is sent to the terminal with first signed data;The terminal receives the intelligent cipher key equipment
Certificate, first encryption information and first signed data, and the intelligent cipher key equipment certificate, described first are encrypted
Information is sent to the server with first signed data;The server receives the intelligent cipher key equipment certificate, institute
The first encryption information and first signed data are stated, the intelligent cipher key equipment certificate is verified, if be proved to be successful, extracts
Intelligent cipher key equipment public key in the intelligent cipher key equipment certificate, signed using the intelligent cipher key equipment public key to described first
Name data carry out sign test operation, after sign test success, using the privacy key according to first preset algorithm decryption
First encryption information obtains the 3rd random number, generates the first handshaking information, and first handshaking information is sent to institute
State terminal;The terminal receives first handshaking information, and first handshaking information is sent to the intelligent key and set
It is standby;The intelligent cipher key equipment receives first handshaking information, carries out verification operation to first handshaking information, verifies into
The second handshaking information is generated after work(, second handshaking information is sent to the terminal, and according to the second preset algorithm to institute
State the first random number, second random number carries out computing with the 3rd random number and generates second session key;It is described
Terminal receives second handshaking information, and second handshaking information is sent to the server;The server receives
Second handshaking information, verification operation is carried out to second handshaking information, after being proved to be successful, according to the described second pre- imputation
It is close that method carries out computing generation first session to first random number, second random number with the 3rd random number
Key.
In this step, server and intelligent cipher key equipment are conversated key agreement operation, and session is used by server
Key encrypting transactions data and intelligent cipher key equipment use session key signed data, have ensured transaction data and number of signature
According to can only be obtained by server and intelligent cipher key equipment, terminal can only transmit encrypting transactions data and ciphering signature data, can not
Transaction data and signed data are obtained, i.e., transaction data and signed data can not be distorted, ensure transaction security.
Step S102, the first session key transaction data described in the server by utilizing, encrypting transactions data is generated,
The encrypting transactions data is sent to terminal;
In this step, transaction data can be server send include user profile, spending amount and/or transaction bank
The information of the contents such as title.
Step S103, the terminal receives the encrypting transactions data, and the encrypting transactions data is sent to described
Intelligent cipher key equipment;
In this step, terminal can not be done due to that can not know the decruption key of encrypting transactions data to encrypting transactions data
Any processing, intelligent cipher key equipment is directly sent it to after receiving encrypting transactions data, it is ensured that encrypting transactions data without
Method is infected or distorted by terminal virus that may be present or trojan horse program, and then has ensured the safety of encrypting transactions data, improves
The security of transaction.
Step S104, the intelligent cipher key equipment receives the encrypting transactions data, and utilizes second session key
Operation is decrypted to the encrypting transactions data, obtains the transaction data, the transaction data is handled and obtains transaction key
Information, and the transaction key message is sent to the terminal;
In this step, transaction key message can be the information such as dealing money, collecting account or transaction bank.
Step S105, the terminal receive and show the transaction key message, obtain after confirming instruction, generate confirmation letter
Breath, and the confirmation is sent to the intelligent cipher key equipment.
In this step, terminal display transaction key message, so that user is confirmed, user compares the transaction that terminal is shown
Whether key message and this transaction are consistent, if unanimously, user can be confirmed by modes such as button, voices, terminal
After being confirmed information, then it will confirm that information is sent to intelligent cipher key equipment, so that intelligent cipher key equipment carries out the behaviour of next step
Make, if user does not accept the content of transaction key message, can be operated without trade confirmation, or pass through button, voice etc.
Mode Cancels Transaction, and has ensured transaction security.
Further, after this step, after the intelligent cipher key equipment receives the confirmation, by ciphering signature data
Send to the terminal, wherein, the ciphering signature data are that intelligent cipher key equipment utilizes the second session key label
Name data are obtained, and the signed data intelligent cipher key equipment is signed to obtain to the transaction data.Wherein,
The key used the signature operation of transaction data is the private key for user in the safety chip of intelligent cipher key equipment, and private key for user has
Can not derived characteristic, signature operation is techniques known, and idiographic flow will not be repeated here.In this step, by
It is merely stored in the second session key in intelligent cipher key equipment, terminal can not obtain the second session key, ensured and used the
Ciphering signature data obtained from two session key signed datas can not can not distort number of signature by terminal deciphering, terminal
According to, ensured transaction security.
The information interacting method that the present embodiment provides, it is close using session key transaction data and intelligence by server
Key equipment uses session key signed data, has ensured that transaction data and signed data can only be by servers and intelligent key
Equipment obtains, and terminal can only transmit encrypting transactions data and ciphering signature data, can not obtain transaction data and signed data, i.e.,
Transaction data and signed data can not be distorted, ensure transaction security, also only need to be in terminal really in transaction flow
Recognize transaction, without carrying out secondary-confirmation on intelligent cipher key equipment, improve the convenience of transaction flow, and critical data of merchandising
Shown in terminal, intelligent cipher key equipment need not set display screen and acknowledgement key, improve the portable of intelligent cipher key equipment
Property.
The present embodiment also provides a kind of information interaction system using above- mentioned information exchange method, and the system is and this method
Correspondingly, it will not be repeated here, be only briefly described as follows:
Fig. 2 illustrates the structural representation of the information interaction system, referring to Fig. 2, information interaction system of the invention, and bag
Include:Intelligent cipher key equipment 201, terminal 202 and server 203.
The intelligent cipher key equipment 201, for the server 203 conversate key agreement operation, if success,
The second session key, the encrypting transactions data that receiving terminal 202 is sent are generated, and is added using second session key to described
Operation is decrypted in close transaction data, obtains the transaction data, handles the transaction data and obtains transaction key message, and will
The transaction key message, which is sent, to the terminal 202, receives the confirmation that the terminal 202 is sent;
Further, in the system, the intelligent cipher key equipment 201, it is additionally operable to after receiving the confirmation, will adds
Close signed data is sent to the terminal 202, wherein, the ciphering signature data are that intelligent cipher key equipment 201 utilizes described the
What two session key signed datas obtained, the signed data is the intelligent cipher key equipment 201 to the transaction data
Signed what is obtained;The terminal 202, it is additionally operable to receive the ciphering signature data.
The terminal 202, the encrypting transactions data sent for receiving the server 203, by the encryption number of deals
According to sending to the intelligent cipher key equipment 201, receive and show the transaction key message, obtain after confirming instruction, generate institute
Confirmation is stated, and the confirmation is sent to the intelligent cipher key equipment 201;
Further, in the system, the terminal 202, it is additionally operable to receive the transaction prompt letter that the server 203 is sent
Breath, display input password prompt information, receives password and sends the password to the intelligent cipher key equipment 201;The intelligence
Energy key devices 201, are additionally operable to, receive the password and verify whether the password is correct, if correctly, with the service
Device 203 conversate key agreement operation.
The server 203, for the intelligent cipher key equipment 201 conversate key agreement operation, if success,
The first session key is generated, using the first session key transaction data, encrypting transactions data is generated, by the encryption
Transaction data is sent to terminal 202.
Further, in the system, the intelligent cipher key equipment 201, it is additionally operable to, generates the first random number, and by described in
First random number is sent to the terminal 202 with the first preset algorithm identification information, receives the second random number and server certificate,
The server certificate is verified, if by checking, the 3rd random number is generated, extracts the server in the server certificate
Public key, and the first encryption information of the 3rd generating random number is encrypted according to the first preset algorithm using the server public key,
First random number and second random number are signed to obtain the first signature using the intelligent cipher key equipment private key
Data, and the intelligent cipher key equipment certificate, first encryption information and first signed data were sent to the end
End 202, the first handshaking information is received, verification operation is carried out to first handshaking information, second is generated after being proved to be successful and is shaken hands
Information, second handshaking information is sent to the terminal 202, and according to the second preset algorithm to first random number,
Second random number carries out computing with the 3rd random number and generates second session key;The terminal 202, is also used
In, receive first random number and the first preset algorithm identification information, and by first random number and described first
Preset algorithm identification information is sent to the server 203, receives second random number and the server certificate, and by institute
State the second random number to send to the intelligent cipher key equipment 201 with the server certificate, receive the intelligent cipher key equipment card
Book, first encryption information and first signed data, and the intelligent cipher key equipment certificate, first encryption are believed
Breath is sent to the server 203 with first signed data, receives first handshaking information, and described first is shaken hands
Information is sent to the intelligent cipher key equipment 201, receives second handshaking information, and by second handshaking information send to
The server 203;The server 203, is additionally operable to, and receives first random number and believes with first preset algorithm mark
Breath, believe according to whether server described in the first preset algorithm identification information judgment is supported to identify with first preset algorithm
First preset algorithm corresponding to breath, if it is, the server generates second random number, and by described second with
Machine number is sent to the terminal with the server certificate;Receive the intelligent cipher key equipment certificate, first encryption information
With first signed data, the intelligent cipher key equipment certificate is verified, if be proved to be successful, the intelligent key is extracted and sets
Intelligent cipher key equipment public key in standby certificate, sign test is carried out to first signed data using the intelligent cipher key equipment public key
Operation, after sign test success, first encryption information is decrypted according to first preset algorithm using the privacy key and obtained
The 3rd random number is obtained, generates first handshaking information, and first handshaking information is sent to the terminal, is received
Second handshaking information, verification operation is carried out to second handshaking information, after being proved to be successful, according to the described second pre- imputation
It is close that method carries out computing generation first session to first random number, second random number with the 3rd random number
Key.The information interaction system that the present embodiment provides, session key transaction data and intelligent key are used by server 203
Equipment 201 uses session key signed data, has ensured that transaction data and signed data can only be by servers 203 and intelligence
Key devices 201 obtain, and terminal 202 can only transmit encrypting transactions data and ciphering signature data, can not obtain transaction data and
Signed data, i.e., transaction data and signed data can not be distorted, ensure transaction security, in transaction flow, also only
Transaction need to be confirmed in terminal, without carrying out secondary-confirmation on intelligent cipher key equipment 201, improves the convenient of transaction flow
Property, and critical data of merchandising is shown that intelligent cipher key equipment 201 need not set display screen and acknowledgement key in terminal 202, is carried
The high portability of intelligent cipher key equipment 201.
Fig. 3 illustrates the structural representation of the embodiment of the intelligent cipher key equipment.Structure shown in Fig. 3, the equipment is at least
Including:
First receiving module 301, the second session secret key generating module 302, security module 303, parsing module 304, first
The receiving module 306 of sending module 305 and second, wherein,
First receiving module 301, the encrypting transactions data sent for receiving the terminal, sends to the safety
Module 303, wherein, the encrypting transactions data is server to conversate key agreement behaviour with the intelligent cipher key equipment
After making successfully, the server generates the first session key, using described in the first session key transaction data generation
Encrypting transactions data, and the encrypting transactions data is sent to the terminal;
Second session secret key generating module 302, for entering guild in the intelligent cipher key equipment and the server
After words key agreement operates successfully, the second session key is generated, second session key is sent to the security module
303, wherein, first session key and second session key are key pair;
The security module 303, for receiving the encrypting transactions data and second session key, utilize described
Two session keys decrypt the encrypting transactions data, obtain transaction data, the transaction data is sent to the parsing module
304, receive confirmation;
The parsing module 304, for parsing the transaction data, obtain transaction critical data and send to described first
Sending module 305;
First sending module 305, for by it is described transaction critical data outgoing;
Second receiving module 306, for receiving the confirmation and sending to the security module 303.
Further, in the present embodiment, the equipment also includes the second sending module, wherein, the security module 303
It is additionally operable to after receiving the confirmation, ciphering signature data is sent to the second sending module, wherein, the ciphering signature number
Obtained according to the security module 303 using the second session key signed data, the signed data is described
Security module 303 is signed what is obtained to the transaction data;Second sending module, for receiving the ciphering signature
Data and outgoing.
The intelligent cipher key equipment that the present embodiment provides, it the second session key can be used to decrypt encrypting transactions data, handed over
Easy data, and transaction critical data is sent to terminal, transaction critical data is shown by terminal, and because terminal is without the second meeting
Key is talked about, encrypting transactions data can not be decrypted, transaction data can not be distorted, has ensured transaction security, user uses should
When intelligent cipher key equipment participates in online transaction, it is only necessary to operated in terminal, without being operated on intelligent cipher key equipment,
The convenience of transaction is improved, and the intelligent cipher key equipment need not set keyboard and display, reduce intelligent cipher key equipment
Volume, improve the portability of equipment.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include
Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize specific logical function or process
Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned
In embodiment, software that multiple steps or method can be performed in memory and by suitable instruction execution system with storage
Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware
Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal
Discrete logic, have suitable combinational logic gate circuit application specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries
Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium
In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, can also
That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
Block can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and as independent production marketing or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not
Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any
One or more embodiments or example in combine in an appropriate manner.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art is not departing from the principle and objective of the present invention
In the case of above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention
By appended claims and its equivalent limit.
Claims (10)
- A kind of 1. information interacting method, it is characterised in that:Server and intelligent cipher key equipment conversate key agreement operation, if success, the server generates the first session Key, the intelligent cipher key equipment generate the second session key, and first session key is close with second session key Key pair;First session key transaction data described in the server by utilizing, encrypting transactions data is generated, the encryption is handed over Easy data are sent to terminal;The terminal receives the encrypting transactions data, and the encrypting transactions data is sent to the intelligent cipher key equipment;The intelligent cipher key equipment receives the encrypting transactions data, and the encryption is merchandised using second session key Operation is decrypted in data, obtains the transaction data, handles the transaction data and obtains transaction key message, and by the friendship Easy key message is sent to the terminal;The terminal receives and shows the transaction key message, obtains after confirming instruction, generates confirmation, and will be described true Recognize information to send to the intelligent cipher key equipment.
- 2. according to the method for claim 1, it is characterised in that the server and intelligent cipher key equipment conversate key Before negotiation, in addition to:The terminal receives the transaction prompt information that the server is sent, and display input password prompt information, receives password simultaneously The password is sent to the intelligent cipher key equipment;The intelligent cipher key equipment receives the password and verifies whether the password is correct, if correctly, the intelligence is close Key equipment and the server conversate key agreement operation.
- 3. according to the method for claim 1, it is characterised in that described to send the confirmation to the intelligent key After equipment, in addition to:After the intelligent cipher key equipment receives the confirmation, ciphering signature data are sent to the terminal, wherein, it is described What ciphering signature data were obtained for intelligent cipher key equipment using the second session key signed data, the signed data The intelligent cipher key equipment is signed to obtain to the transaction data.
- 4. according to the method described in claim any one of 1-3, it is characterised in that the server is carried out with intelligent cipher key equipment Session key agreement operates, including:The intelligent cipher key equipment generates the first random number, and first random number and the first preset algorithm identification information are sent out Deliver to the terminal;The terminal receives first random number and the first preset algorithm identification information, and will first random number and The first preset algorithm identification information is sent to the server;The server receives first random number and the first preset algorithm identification information, according to the described first pre- imputation Whether server described in method identification information judgment supports first preset algorithm corresponding with the first preset algorithm identification information, If it is, the server generates the second random number, and second random number and server certificate were sent to the end End;The terminal receives second random number and the server certificate, and by second random number and the server Certificate is sent to the intelligent cipher key equipment;The intelligent cipher key equipment receives second random number and the server certificate, verifies the server certificate, such as Fruit then generates the 3rd random number, extracts the server public key in the server certificate, and utilize the server by checking Public key encrypts the first encryption information of the 3rd generating random number according to first preset algorithm, is set using the intelligent key Standby private key is signed to obtain the first signed data to first random number and second random number, and the intelligence is close Key device certificate, first encryption information and first signed data are sent to the terminal;The terminal receives the intelligent cipher key equipment certificate, first encryption information and first signed data, and will The intelligent cipher key equipment certificate, first encryption information and first signed data are sent to the server;The server receives the intelligent cipher key equipment certificate, first encryption information and first signed data, tests The intelligent cipher key equipment certificate is demonstrate,proved, if be proved to be successful, the intelligent key extracted in the intelligent cipher key equipment certificate is set Standby public key, sign test operation is carried out to first signed data using the intelligent cipher key equipment public key, after sign test success, is utilized The privacy key decrypts first encryption information according to first preset algorithm and obtains the 3rd random number, generation First handshaking information, and first handshaking information is sent to the terminal;The terminal receives first handshaking information, and first handshaking information is sent to the intelligent cipher key equipment;The intelligent cipher key equipment receives first handshaking information, and verification operation, checking are carried out to first handshaking information The second handshaking information is generated after success, second handshaking information is sent to the terminal, and according to the second preset algorithm pair First random number, second random number carry out computing with the 3rd random number and generate second session key;The terminal receives second handshaking information, and second handshaking information is sent to the server;The server receives second handshaking information, and verification operation is carried out to second handshaking information, after being proved to be successful, Computing life is carried out to first random number, second random number and the 3rd random number according to second preset algorithm Into first session key.
- A kind of 5. information interaction system, it is characterised in that including intelligent cipher key equipment, terminal and server,The intelligent cipher key equipment, for the server conversate key agreement operation, if success, generate the second meeting Key, the encrypting transactions data that receiving terminal is sent are talked about, and the encrypting transactions data is entered using second session key Row decryption oprerations, the transaction data is obtained, handle the transaction data and obtain transaction key message, and the transaction is crucial Information sends and to the terminal, receives the confirmation that the terminal is sent;The terminal, the encrypting transactions data sent for receiving the server, the encrypting transactions data is sent to institute Intelligent cipher key equipment is stated, receives and shows the transaction key message, obtains after confirming instruction, generates the confirmation, and The confirmation is sent to the intelligent cipher key equipment;The server, for the intelligent cipher key equipment conversate key agreement operation, if success, generate the first meeting Key is talked about, using the first session key transaction data, encrypting transactions data is generated, the encrypting transactions data is sent out Deliver to terminal.
- 6. system according to claim 5, it is characterised in thatThe terminal, is additionally operable to, and receives the transaction prompt information that the server is sent, display input password prompt information, connects Receive password and send the password to the intelligent cipher key equipment;The intelligent cipher key equipment, is additionally operable to, and receives the password and verifies whether the password is correct, if correctly, with The server conversate key agreement operation.
- 7. system according to claim 5, it is characterised in thatThe intelligent cipher key equipment, it is additionally operable to after receiving the confirmation, ciphering signature data is sent to the terminal, its In, the ciphering signature data are what intelligent cipher key equipment was obtained using the second session key signed data, described The signed data intelligent cipher key equipment is signed to obtain to the transaction data;The terminal, it is additionally operable to receive the ciphering signature data.
- 8. according to the system described in claim any one of 5-7, it is characterised in thatThe intelligent cipher key equipment, is additionally operable to, and generates the first random number, and by first random number and the first preset algorithm mark Know information to send to the terminal, receive the second random number and server certificate, the server certificate is verified, if by testing Card, then generate the 3rd random number, extract the server public key in the server certificate, and using the server public key according to First preset algorithm encrypts the first encryption information of the 3rd generating random number, using the intelligent cipher key equipment private key to described First random number and second random number are signed to obtain the first signed data, and by the intelligent cipher key equipment certificate, First encryption information is sent to the terminal with first signed data, the first handshaking information is received, to described first Handshaking information carries out verification operation, and the second handshaking information is generated after being proved to be successful, second handshaking information is sent to described Terminal, and first random number, second random number and the 3rd random number are transported according to the second preset algorithm Calculate and generate second session key;The terminal, is additionally operable to, and receives first random number and the first preset algorithm identification information, and by described first Random number is sent to the server with the first preset algorithm identification information, receives second random number and the service Device certificate, and second random number and the server certificate are sent to the intelligent cipher key equipment, receive the intelligence Key devices certificate, first encryption information and first signed data, and by the intelligent cipher key equipment certificate, described First encryption information is sent to the server with first signed data, receives first handshaking information, and by described in First handshaking information is sent to the intelligent cipher key equipment, receives second handshaking information, and by second handshaking information Send to the server;The server, is additionally operable to, and receives first random number and the first preset algorithm identification information, according to described the Whether server described in one preset algorithm identification information judgment is supported corresponding with the first preset algorithm identification information described First preset algorithm, if it is, the server generates second random number, and by second random number and the clothes Business device certificate is sent to the terminal;Receive the intelligent cipher key equipment certificate, first encryption information and the described first label Name data, verify the intelligent cipher key equipment certificate, if be proved to be successful, extract the intelligence in the intelligent cipher key equipment certificate Can key devices public key, using the intelligent cipher key equipment public key to first signed data carry out sign test operation, sign test into After work(, using the privacy key according to first preset algorithm decrypt first encryption information obtain the described 3rd with Machine number, first handshaking information is generated, and first handshaking information is sent to the terminal, received described second and shake hands Information, verification operation is carried out to second handshaking information, after being proved to be successful, according to second preset algorithm to described first Random number, second random number carry out computing with the 3rd random number and generate first session key.
- 9. a kind of intelligent cipher key equipment, it is characterised in that the equipment comprises at least the second session secret key generating module, the first reception Module, parsing module, the first sending module, the second receiving module and security module, wherein,First receiving module, the encrypting transactions data sent for receiving terminal, sends to the security module, wherein, The encrypting transactions data is server to conversate after key agreement operates successfully with the intelligent cipher key equipment, described Server generates the first session key, and the encrypting transactions data is generated using the first session key transaction data, And the encrypting transactions data is sent to the terminal;Second session secret key generating module, for being conversated key association in the intelligent cipher key equipment and the server After business operates successfully, the second session key is generated, second session key is sent to the security module, wherein, it is described First session key and second session key are key pair;The security module, for receiving the encrypting transactions data and second session key, utilize second session Encrypting transactions data described in secret key decryption, obtains transaction data, and the transaction data is sent to the parsing module, receives true Recognize information;The parsing module, for parsing the transaction data, obtain transaction critical data and send to described first to send mould Block;First sending module, for by it is described transaction critical data outgoing;Second receiving module, for receiving the confirmation and sending to the security module.
- 10. equipment according to claim 9, it is characterised in that the equipment also includes the second sending module,The security module, it is additionally operable to after receiving the confirmation, ciphering signature data is sent to the second sending module, its In, the ciphering signature data security module is obtained using the second session key signed data, described The signed data security module is signed to obtain to the transaction data;Second sending module, for receiving the ciphering signature data and outgoing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410409471.8A CN104243162B (en) | 2014-08-19 | 2014-08-19 | A kind of information interacting method, system and intelligent cipher key equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410409471.8A CN104243162B (en) | 2014-08-19 | 2014-08-19 | A kind of information interacting method, system and intelligent cipher key equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104243162A CN104243162A (en) | 2014-12-24 |
CN104243162B true CN104243162B (en) | 2018-03-20 |
Family
ID=52230568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410409471.8A Active CN104243162B (en) | 2014-08-19 | 2014-08-19 | A kind of information interacting method, system and intelligent cipher key equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104243162B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105681281B (en) * | 2015-12-30 | 2019-02-12 | 北京金科联信数据科技有限公司 | Encryption device based on embedded OS |
CN107292611B (en) * | 2016-04-05 | 2020-05-15 | 天地融科技股份有限公司 | Transaction method and system |
CN106888206B (en) * | 2017-02-13 | 2020-06-09 | 海信集团有限公司 | Key exchange method, device and system |
CN110945553A (en) * | 2018-06-07 | 2020-03-31 | 北京光合信诚科技有限公司 | Transaction method, hardware wallet and transaction equipment |
CN109639432A (en) * | 2018-11-20 | 2019-04-16 | 中国电力科学研究院有限公司 | A kind of method for being handled communication service data, cipher card and system |
CN113037484B (en) * | 2021-05-19 | 2021-08-24 | 银联商务股份有限公司 | Data transmission method, device, terminal, server and storage medium |
CN114745134B (en) * | 2022-03-30 | 2024-05-31 | 恒玄科技(上海)股份有限公司 | Method, system, device and computer readable medium for streaming media data stream |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101335754A (en) * | 2008-05-14 | 2008-12-31 | 北京深思洛克数据保护中心 | Method for information verification using remote server |
CN101393628A (en) * | 2008-11-12 | 2009-03-25 | 北京飞天诚信科技有限公司 | Novel network safe transaction system and method |
CN101588243A (en) * | 2008-05-21 | 2009-11-25 | 北京飞天诚信科技有限公司 | A kind of electronic transaction historical record querying method and system |
CN101848090A (en) * | 2010-05-11 | 2010-09-29 | 武汉珞珈新世纪信息有限公司 | Authentication device and system and method using same for on-line identity authentication and transaction |
CN102790767A (en) * | 2012-07-03 | 2012-11-21 | 北京神州绿盟信息安全科技股份有限公司 | Information safety control method, information safety display equipment and electronic trading system |
CN103942687A (en) * | 2014-04-25 | 2014-07-23 | 天地融科技股份有限公司 | Data security interactive system |
CN103973455A (en) * | 2014-05-28 | 2014-08-06 | 天地融科技股份有限公司 | Information interaction method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI546748B (en) * | 2013-01-15 | 2016-08-21 | hong-jian Zhou | Portable electronic trading device |
-
2014
- 2014-08-19 CN CN201410409471.8A patent/CN104243162B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101335754A (en) * | 2008-05-14 | 2008-12-31 | 北京深思洛克数据保护中心 | Method for information verification using remote server |
CN101588243A (en) * | 2008-05-21 | 2009-11-25 | 北京飞天诚信科技有限公司 | A kind of electronic transaction historical record querying method and system |
CN101393628A (en) * | 2008-11-12 | 2009-03-25 | 北京飞天诚信科技有限公司 | Novel network safe transaction system and method |
CN101848090A (en) * | 2010-05-11 | 2010-09-29 | 武汉珞珈新世纪信息有限公司 | Authentication device and system and method using same for on-line identity authentication and transaction |
CN102790767A (en) * | 2012-07-03 | 2012-11-21 | 北京神州绿盟信息安全科技股份有限公司 | Information safety control method, information safety display equipment and electronic trading system |
CN103942687A (en) * | 2014-04-25 | 2014-07-23 | 天地融科技股份有限公司 | Data security interactive system |
CN103973455A (en) * | 2014-05-28 | 2014-08-06 | 天地融科技股份有限公司 | Information interaction method |
Also Published As
Publication number | Publication date |
---|---|
CN104243162A (en) | 2014-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104243451B (en) | A kind of information interacting method, system and intelligent cipher key equipment | |
CN104243162B (en) | A kind of information interacting method, system and intelligent cipher key equipment | |
JP6264674B2 (en) | Authentication system and method using QR code | |
CN113344570B (en) | Method for transmitting and processing transaction messages and data processing device | |
CN102801710B (en) | A kind of network trading method and system | |
CN103326862B (en) | Electronically signing method and system | |
CN107784499B (en) | Secure payment system and method of near field communication mobile terminal | |
CN103116847B (en) | Smart card, intelligent card transaction system and method with electronic signature functionality | |
GB2512595A (en) | Integrated contactless mpos implementation | |
CN102789607A (en) | Network transaction method and system | |
CN108234385A (en) | A kind of method for authenticating user identity and device | |
CN103532719A (en) | Dynamic password generation method, dynamic password generation system, as well as processing method and processing system of transaction request | |
CN102710611A (en) | Network security authentication method and system | |
CN106469370A (en) | A kind of method of commerce, system and electronic signature equipment | |
CN106033571A (en) | Trading method of electronic signature devices, electronic signature devices and trading system | |
CN104835038A (en) | Networking payment device and networking payment method | |
CN106100854A (en) | The reverse authentication method of terminal unit based on authority's main body and system | |
CN103136667B (en) | There is the smart card of electronic signature functionality, smart card transaction system and method | |
CN103813333A (en) | Data processing method based on negotiation keys | |
CN103746802A (en) | Data processing method based on coordination secret keys and mobile phone | |
CN103973455B (en) | A kind of information interacting method | |
CN104796266A (en) | Authentication method, device and system | |
CN105989481B (en) | Data interaction method and system | |
CN103984906B (en) | A kind of electronic key equipment of no button | |
Mehr Nezhad et al. | Security Analysis of Mobile Point-of-Sale Terminals |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |