[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106686001A - Service security processing method and service security processing device - Google Patents

Service security processing method and service security processing device Download PDF

Info

Publication number
CN106686001A
CN106686001A CN201710109611.3A CN201710109611A CN106686001A CN 106686001 A CN106686001 A CN 106686001A CN 201710109611 A CN201710109611 A CN 201710109611A CN 106686001 A CN106686001 A CN 106686001A
Authority
CN
China
Prior art keywords
terminal
terminal traffic
certificate
account
traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710109611.3A
Other languages
Chinese (zh)
Inventor
陈平
苏永彬
彭京
张如昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN SINOSUN TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN SINOSUN TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN SINOSUN TECHNOLOGY Co Ltd filed Critical SHENZHEN SINOSUN TECHNOLOGY Co Ltd
Priority to CN201710109611.3A priority Critical patent/CN106686001A/en
Publication of CN106686001A publication Critical patent/CN106686001A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a service security processing method and a service security processing device. The service security processing method includes receiving a terminal service account number sent by a terminal and service data signed by a private key of terminal service; querying a terminal service certificate correlated with the terminal service account number; verifying service data through the terminal service certificate; when the service data are verified successfully, processing according to the service data to obtain a first processing result, and signing the first processing result through a server private key; sending the signed first processing result to the terminal. The service security processing method and the service security processing device have the advantages that the terminal service account number is correlated to the terminal service certificate, and a server cannot pass verification of the terminal service data and the terminal service account number cannot be used on another terminal when a terminal service account number password of one terminal is illegally stolen and used on another terminal which is not encrypted by the private key of the terminal service corresponding to the terminal service account number, so that security of the service data is guaranteed.

Description

Service security treating method and apparatus
Technical field
The present invention relates to data processing field, more particularly to a kind of service security treating method and apparatus.
Background technology
With the development of technology, the business operation that user can be carried out in terminal is also more and more, for example, pay, buy Etc. business.Following user is for the safety requirements also more and more higher of terminal and business.
Traditionally, typically in terminal business datum is signed by general private key, in server by corresponding Public key is verified to the business datum signed, such that it is able to improve the safety of business datum.But under this kind of mode, once The accounts information of user is stolen, then can realize corresponding business in any terminal, so as to cause the leakage of business datum.
The content of the invention
Based on this, it is necessary to for the leakage problem of business datum, there is provided a kind of service security treating method and apparatus.
A kind of service security processing method, methods described includes:
Terminal traffic account and the business datum through terminal traffic private key signature that receiving terminal sends;
The terminal traffic certificate that inquiry is associated with the terminal traffic account;
The business datum is verified by the terminal traffic certificate;
When the business datum is proved to be successful, then processed according to the business datum, obtained the first result;
First result is signed by privacy key;
First result after by signature is sent to the terminal.
Wherein in one embodiment, methods described also includes:
Termination ID and the terminal traffic account through terminal traffic private key signature that receiving terminal sends;
The terminal traffic certificate that inquiry is associated with the Termination ID;
The terminal traffic account is verified by the terminal traffic certificate;
When the terminal traffic account is proved to be successful, the terminal traffic account and the terminal traffic certificate are closed Connection storage.
Wherein in one embodiment, terminal traffic account that the receiving terminal sends and through terminal traffic private key label The step of business datum of name, including:
The first encryption data that receiving terminal sends;
First encryption data is decrypted by privacy key to obtain terminal traffic account and private through terminal traffic The business datum of key signature;
It is described the step of signed to first result by privacy key, including:
First result is signed by privacy key;
First result after the terminal traffic certificate is to signature is encrypted;
It is described by signature after first result the step of send to the terminal, including:
First result after by encryption is sent to the terminal.
Wherein in one embodiment, Termination ID and the end through terminal traffic private key signature that the receiving terminal sends The step of end business account, including:
The second encryption data that receiving terminal sends;
Second encryption data is decrypted by privacy key to obtain Termination ID and through terminal traffic private key signature Terminal traffic account.
Wherein in one embodiment, methods described also includes:
The terminal traffic certificate is verified by root certificate;
When terminal traffic certification authentication success, then the terminal traffic certificate is continued through to the business datum The step of being verified;
When the terminal traffic certification authentication is unsuccessful, then the information of the terminal traffic certificate error is exported.
A kind of service security processing meanss, including:
Receiver module, the terminal traffic account sent for receiving terminal and the business number through terminal traffic private key signature According to;
Enquiry module, for inquiring about the terminal traffic certificate being associated with the terminal traffic account;
First authentication module, for being verified to the business datum by the terminal traffic certificate;
Processing module, for when the business datum is proved to be successful, then being processed according to the business datum, obtains First result;
Encrypting module, for being signed to first result by privacy key;
Sending module, sends to the terminal for first result after by signature.
Wherein in one embodiment, receiver module is additionally operable to the Termination ID of receiving terminal transmission and through terminal traffic private The terminal traffic account of key signature;
The enquiry module is additionally operable to inquire about the terminal traffic certificate being associated with the Termination ID;
First authentication module is additionally operable to verify the terminal traffic account by the terminal traffic certificate;
Described device also includes:
Relating module, for when the terminal traffic account is proved to be successful, by the terminal traffic account and described Terminal traffic certificate associated storage.
Wherein in one embodiment, the receiver module includes:
Receiving unit, for the first encryption data that receiving terminal sends;
Decryption unit, for decrypting first encryption data to obtain terminal traffic account and Jing by privacy key Cross the business datum of terminal traffic private key signature;
The encrypting module includes:
Signature unit, for being signed to first result by privacy key;
Ciphering unit, for by the terminal traffic certificate to signature after first result be encrypted;
First result after the sending module is additionally operable to encryption is sent to the terminal.
Wherein in one embodiment, the receiving unit is additionally operable to the second encryption data of receiving terminal transmission;
The decryption unit is additionally operable to decrypt second encryption data to obtain Termination ID and Jing by privacy key Cross the terminal traffic account of terminal traffic private key signature.
Wherein in one embodiment, also include:
Second authentication module, for being verified to the terminal traffic certificate by root certificate, and when the terminal industry During business certification authentication success, then the business datum is verified by the terminal traffic certificate, when the terminal traffic When certification authentication is unsuccessful, then the information of the terminal traffic certificate error is exported.
Above-mentioned service security treating method and apparatus, terminal traffic account and terminal traffic certificate are associated, so Because terminal and terminal traffic certificate are one-to-one relations, so as to terminal traffic account and terminal traffic certificate are also one by one Corresponding relation, and then when using in another terminal after the terminal traffic account number cipher of a station terminal is by unauthorized theft, it adds Close carried out using other terminal secret key, rather than the terminal traffic private key corresponding with the terminal traffic account is carried out, from And server can not be by the checking to terminal traffic data, therefore the terminal traffic account can not be used in another station terminal, So as to ensure that the safety of business datum.
Description of the drawings
Fig. 1 is the application scenario diagram of the service security processing method in an embodiment;
Fig. 2 is the flow chart of the service security processing method in an embodiment;
Fig. 3 is the flow chart of associated steps in an embodiment;
Fig. 4 is the flow chart of the receiving step in embodiment illustrated in fig. 1;
Fig. 5 is the flow chart of the signature step in embodiment illustrated in fig. 1;
Fig. 6 is the flow chart of the receiving step in embodiment illustrated in fig. 2;
Fig. 7 is the flow chart of verification step in an embodiment;
Fig. 8 is the structural representation of service security processing meanss in an embodiment.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that specific embodiment described herein is used only for explaining the present invention, and It is not used in the restriction present invention.
Describe in detail embodiments in accordance with the present invention before, it should be noted that, described embodiment essentially consist in The combination of the related step of service security treating method and apparatus and system component.Therefore, said system component and method and step Showed in position by ordinary symbol in the accompanying drawings, and merely illustrate and understand the enforcement of the present invention The relevant details of example, in order to avoid because of obvious those details for those of ordinary skill in the art of the present invention are had benefited from The disclosure is obscured.
Herein, such as left and right, upper and lower, front and rear, and first and second etc relational terms are used merely to area Divide an entity or action and another entity or action, and not necessarily require or imply any between this entity or action This relation or order of reality.Term " including ", "comprising" or any other variant are intended to including for nonexcludability, by This causes the process, method, article or the equipment that include a series of key elements not only comprising these key elements, but also comprising not bright Other key elements really listed, the either key element intrinsic for this process, method, article or equipment.
Refer to shown in Fig. 1, Fig. 1 is the application scenario diagram of the service security processing method in an embodiment, in the enforcement In example, terminal and server can be communicated, and user carries out service request in end, and performs corresponding business, service Device can be verified etc. to user in the business datum handled by terminal, to ensure the safety of terminal traffic.
Refer to shown in Fig. 2, Fig. 2 is the flow chart of the service security processing method in an embodiment, in this embodiment, The method can include:
S202:Terminal traffic account and the business datum through terminal traffic private key signature that receiving terminal sends.
Wherein, terminal traffic account is that user is applied for the registration of by terminal, and for example, terminal shows account application interface, The terminal traffic account can be sent to server, Jing by user by the interface input terminal business account and password, terminal Cross after server authentication and realize the registration of terminal traffic account.
Terminal traffic private key is generated when terminal is dispatched from the factory, and it is corresponding with terminal traffic certificate, i.e. terminal traffic Private key and terminal traffic certificate form an encrypting and decrypting pair, when terminal is dispatched from the factory, are given birth in every station terminal by specific root certificate Into random terminal traffic private key and terminal traffic certificate, the terminal traffic certificate of each business of each terminal and terminal Business private key is differed.And due to terminal when dispatching from the factory the i.e. Termination ID (abbreviation of Identity) of existence anduniquess, the terminal ID and terminal traffic private key are one-to-one relations, so as to Termination ID and terminal traffic certificate are also one-to-one relationship, and Due to terminal traffic account and terminal traffic certificate it is associated, so as to terminal traffic account and terminal traffic certificate are also one a pair Should be related to.
S204:The terminal traffic certificate that inquiry is associated with terminal traffic account.
Specifically, the corresponding relation of terminal traffic account and terminal traffic certificate can be previously stored with server, So when the terminal traffic account that terminal is sent is received, the correspondence pass prestored in traversal server can be passed through System is inquiring corresponding terminal traffic certificate.
S206:Business datum is verified by terminal traffic certificate.
Specifically, because terminal to server when terminal traffic data are sent, terminal traffic private key pair is first passed through The terminal traffic data are encrypted, then by the business datum after terminal traffic private key signature and corresponding terminal traffic Account is sent to server, and server can inquire corresponding terminal traffic certificate according to terminal traffic account, i.e., with terminal The corresponding terminal traffic certificate of business private key, such that it is able to pass through the terminal traffic certificate to through terminal traffic private key encryption Business datum verified.
When the terminal traffic account and password of user are illegally stolen, illegal stealer is logged in other-end, Corresponding business is carried out, for example, is transferred accounts or is done shopping, the business datum for being formed can be using the terminal prestored in the other-end Business private key is encrypted, and corresponding terminal traffic account and the terminal traffic private key prestored in the other-end are entered The business datum of row encryption is sent to server, and server receives terminal traffic account and prestores in the other-end During the business datum that terminal traffic private key is encrypted, first pass through terminal traffic account and inquire corresponding terminal traffic card Book, i.e., corresponding with former terminal terminal traffic certificate, and because business datum is the terminal by prestoring in the other-end Business private key is encrypted, therefore server to business datum with the terminal traffic certificate of former terminal when being verified, is nothing What method was proved to be successful, so as to ensure that the safety of terminal traffic.
S207:When business datum is proved to be successful, then process is carried out according to business datum and obtain the first result.
Specifically, when business datum is proved to be successful, then server can be processed according to business datum, be tied Really, for example, when business datum is query statement, then server can obtain corresponding result according to the query statement inquiry, And the corresponding result is back to into terminal.
S208:The first result is signed by privacy key.
Specifically, server is obtained after the first result to business data processing, needs to send the first result To terminal, so that terminal can carry out subsequent treatment, for example, receive the operation of user, or prompting user's lack of competence is operated Deng.Simultaneously in order to protect the first result not to be tampered, server can be entered by privacy key to the first result Row signature, so as to the terminal of the corresponding server public key that is only stored with, just can correctly identify the first result, enter one Ensure that to step the safety of business.
So, when end receives above-mentioned signed data, it is necessary to carry out sign test using corresponding server public key, from And can ensure that the first result of the signature received by terminal is that the server trusted of terminal sends, and can be with Before using server certificate, by root certificate come authentication server public key, so as to ensure the effectiveness of server public key, enter one Step improves the safety of business.
S210:The first result after by signature is sent to terminal.
Above-mentioned service security processing method, terminal traffic account and terminal traffic certificate is associated, so due to end End and terminal traffic certificate are one-to-one relations, so as to terminal traffic account is also one-to-one with terminal traffic certificate Relation, and then when using in another terminal after the terminal traffic account number cipher of a station terminal is by unauthorized theft, its encryption is to adopt Carried out with other terminal secret key, rather than the terminal traffic private key corresponding with the terminal traffic account is carried out, so as to service Device can not be by the checking to terminal traffic data, therefore the terminal traffic account can not be used in another station terminal, so as to protect The safety of business datum is demonstrate,proved.
Wherein in one embodiment, service security processing method also includes associated steps, and the associated steps can be in Fig. 1 Carry out before shown method, as shown in figure 3, the associated steps can include:
S302:Termination ID and the terminal traffic account through terminal traffic private key signature that receiving terminal sends.
In actual applications, server may not be stored with advance the correspondence pass of terminal traffic account and terminal traffic certificate System, for example, when a terminal is to use first, the terminal may not apply for the registration of any terminal traffic account, because This, user may need first to file terminal traffic account, and when data are sent to server, first whether detection terminal is terminal Terminal traffic account is first logged into, if first logging into terminal traffic account, then Termination ID is sent and through eventually to server The terminal traffic account of end business private key signature, it can also simultaneously send Termination ID and the end through terminal traffic private key signature End business account, account number cipher etc..
S304:The terminal traffic certificate that inquiry is associated with Termination ID.
Specifically, because before terminal is dispatched from the factory, the corresponding relation of terminal traffic certificate and Termination ID has been saved in service Device, i.e., can be that corresponding Termination ID and terminal traffic certificate are configured by server in practical operation, in other words, Termination ID and terminal traffic certificate are one-to-one relations, and because Termination ID and terminal traffic account have carried out phase in terminal Often the binding answered, can set up the one-to-one relationship of terminal traffic certificate and terminal traffic account, i.e., so as to pass through Termination ID One terminal traffic account has a unique terminal traffic certificate to correspond to therewith.
So, Termination ID and terminal traffic certificate carried out into one-to-one storage before dispatching from the factory due to terminal, and The storage relation is stored in into server.Terminal, can be by the ID of terminal by terminal traffic account and terminal when account is added Service certificate is bound, and so this terminal traffic account just can only be used in this station terminal, it is ensured that safety, even and if eventually End ID and terminal traffic account are all stolen, and because terminal traffic private key is not stolen, it can not normally use the terminal Business account.
S306:Terminal traffic account is verified by terminal traffic certificate.
Specifically, because terminal traffic account is signed in terminal by terminal traffic private key, terminal traffic private key It is again corresponding with terminal traffic certificate, therefore can be by corresponding terminal traffic certificate to through terminal traffic in server end The terminal traffic account that private key is signed is verified.
S308:When terminal traffic account is proved to be successful, by terminal traffic account and terminal traffic certificate associated storage.
Terminal traffic account also needs to whether the terminal traffic account number in server lookup has been registered after being proved to be successful, account Whether number name form is correct etc., if all by succeeding in registration at last.And herein, describe for convenience, account Number password all for sky, also need in actual use verify password.After terminal traffic account succeeds in registration, server is then straight Connect the corresponding relation of storage terminal traffic account and terminal traffic certificate.When terminal traffic account is not proved to be successful, service Device then can return the information of registration failure to terminal.
In the above-described embodiments, terminal traffic account and terminal traffic certificate are associated by Termination ID, so as to protect One terminal traffic account of card just can only be used in a terminal, even if terminal traffic account and password are illegally stolen, Can not be operated in other-end, it is ensured that the safety of terminal traffic, and due to being demonstrate,proved according to the root of feature before terminal is dispatched from the factory Book generates at random corresponding terminal traffic private key and terminal traffic certificate in every station terminal, it is ensured that only particular vendor is issued Terminal could use the business safely.
Wherein in one embodiment, the stream of Fig. 4 and Fig. 5, Fig. 4 for the receiving step in embodiment illustrated in fig. 1 is referred to Cheng Tu, Fig. 5 are the flow chart of the signature step in embodiment illustrated in fig. 1, and in this embodiment, receiving step is that receiving terminal is sent out The step of terminal traffic account sent and the business datum through terminal traffic private key signature, can include:
S402:The first encryption data that receiving terminal sends.
Specifically, terminal can pass through terminal when terminal traffic account and business datum are sent to into server, first Business private key is signed to business datum, then by through the business datum and terminal traffic account server public key of signature It is encrypted to obtain the first encryption data, first encryption data can be sent to server by terminal.
S404:The first encryption data is decrypted by privacy key to obtain terminal traffic account and private through terminal traffic The business datum of key signature.
Specifically, after server receives above-mentioned first encryption data, can first by relative with server public key The privacy key answered is decrypted, to obtain terminal traffic account and the business datum through terminal traffic private key encryption, clothes Business device inquires corresponding terminal traffic certificate by terminal traffic account again, finally by the terminal traffic certificate to through eventually The business datum of end business private key encryption is verified.
Correspondingly, in this embodiment, signature step is signed by privacy key to the first result Step, can include:
S502:The first result is signed by privacy key.
Specifically, when server needs to send data to terminal, such as the first result can first pass through server Private key is signed to the first result.
S504:The first result after terminal traffic certificate is to signature is encrypted.
Specifically, after signing to the first result by privacy key, end can also be further advanced by The first result after service certificate is held to signature is encrypted, to improve the safety of data transfer between server and terminal Property.
And correspondingly, S210 the step of shown in Fig. 1, by signature after the first result the step of send to terminal, Including:The first result after by encryption is sent to terminal.
In above-described embodiment, when either terminal to server sends data, or server to terminal transmission data, Encrypted by two steps, the safety of business datum can be greatly improved, such that it is able to improve the safety of business.
Wherein in one embodiment, Fig. 6 is referred to, Fig. 6 is the flow chart of the receiving step in embodiment illustrated in fig. 2, In this embodiment, receiving step is the Termination ID and the terminal traffic account through terminal traffic private key signature that receiving terminal sends Number the step of, can include:
S602:The second encryption data that receiving terminal sends.
Specifically, terminal can pass through terminal industry when terminal traffic account and Termination ID are sent to into server, first Business private key is signed to terminal traffic account, then by through the terminal traffic account and Termination ID server public key of signature It is encrypted to obtain the second encryption data, second encryption data can be sent to server by terminal.
S604:Decrypt the second encryption data to obtain Termination ID and through terminal traffic private key signature by privacy key Terminal traffic account.
Specifically, after server receives above-mentioned second encryption data, can first by relative with server public key The privacy key answered is decrypted, to obtain Termination ID and the terminal traffic account through terminal traffic private key encryption, service Device inquires corresponding terminal traffic certificate by Termination ID again, finally by the terminal traffic certificate to private through terminal traffic The terminal traffic account of key encryption is verified.
In above-described embodiment, when either terminal to server sends data, or server to terminal transmission data, Encrypted by two steps, the safety of business datum can be greatly improved, such that it is able to improve the safety of business.
Wherein in one embodiment, Fig. 7 is referred to, Fig. 7 is the flow chart of verification step in an embodiment, in the enforcement In example, the verification step can include:
S702:Terminal traffic certificate is verified by root certificate.
Specifically, the terminal traffic account that can be stored with corresponding with each terminal in server and terminal traffic certificate, But because server is in networking state, therefore there is the risk being tampered in the terminal traffic certificate, and due to terminal Service certificate is typically stored in hard disk, in the case where server power-off or being subjected to physics bang, terminal traffic card The possible partial loss of the data of book, therefore in order to ensure the effectiveness of terminal traffic certificate, first by the root certificate pair of company It is verified.
S704:When terminal traffic certification authentication success, then continue through terminal traffic certificate and business datum is tested The step of card.
Specifically, when terminal traffic certification authentication success, then the terminal traffic certificate can be used, that is, continues through end Hold service certificate to verify business datum, or continue through terminal traffic certificate and terminal traffic account is verified Deng.
S706:When terminal traffic certification authentication is unsuccessful, then the information of outlet terminal service certificate mistake.
Specifically, when terminal traffic certificate is not verified, i.e., terminal traffic certificate be tampered or data division lose when, Can exporting information by way of point out the user terminal traffic certificate to be tampered or lose, so as to user can download New terminal traffic certificate, or server can network and directly download new terminal traffic certificate, and this download is notified To user.
In above-described embodiment, before using terminal service certificate, terminal traffic certificate is verified by root certificate, The effectiveness of terminal traffic certificate is ensure that, the safety of terminal traffic is further increasing.
Fig. 8 is referred to, Fig. 8 is the structural representation of business processing device in an embodiment, at the business in the embodiment Reason device can include:
Receiver module 100, the terminal traffic account sent for receiving terminal and the industry through terminal traffic private key signature Business data.
Enquiry module 200, for inquiring about the terminal traffic certificate being associated with terminal traffic account.
First authentication module 300, for being verified to business datum by terminal traffic certificate.
Processing module 600, for when business datum is proved to be successful, then being processed according to business datum, obtains first Result.
Encrypting module 400, for being signed to the first result by privacy key.
Sending module 500, sends to terminal for the first result after by signature.
Wherein in one embodiment, receiver module 100 can be also used for the Termination ID of receiving terminal transmission and through eventually The terminal traffic account of end business private key signature.
Enquiry module 200 can be also used for inquiring about the terminal traffic certificate being associated with Termination ID.
First authentication module 300 can be also used for verifying terminal traffic account by terminal traffic certificate
The device can also include:
Relating module, for when terminal traffic account is proved to be successful, by terminal traffic account and terminal traffic certificate Associated storage.
Wherein in one embodiment, receiver module 100 can include:
Receiving unit, for the first encryption data that receiving terminal sends.
Decryption unit, for decrypting the first encryption data by privacy key to obtain terminal traffic account and pass through eventually The business datum of end business private key signature.
Encryption 400 can include:
Signature unit, for being signed to the first result by privacy key.
Ciphering unit, for by terminal traffic certificate to signature after the first result be encrypted.
The first result after sending module 500 is additionally operable to encryption is sent to terminal.
Wherein in one embodiment, receiving unit can be also used for the second encryption data of receiving terminal transmission.
Decryption unit can be also used for decrypting the second encryption data by privacy key to obtain Termination ID and pass through eventually The terminal traffic account of end business private key signature.
Wherein in one embodiment, can also include:
Second authentication module, for being verified to terminal traffic certificate by root certificate, and when terminal traffic certificate is tested When demonstrate,proving successfully, then business datum is verified by terminal traffic certificate, it is when terminal traffic certification authentication is unsuccessful, then defeated Go out the information of terminal traffic certificate error.
Each technical characteristic of embodiment described above can be combined arbitrarily, to make description succinct, not to above-mentioned reality Apply all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, the scope of this specification record is all considered to be.
Embodiment described above only expresses the several embodiments of the present invention, and its description is more concrete and detailed, but and Can not therefore be construed as limiting the scope of the patent.It should be pointed out that for one of ordinary skill in the art comes Say, without departing from the inventive concept of the premise, some deformations and improvement can also be made, these belong to the protection of the present invention Scope.Therefore, the protection domain of patent of the present invention should be defined by claims.

Claims (10)

1. a kind of service security processing method, it is characterised in that methods described includes:
Terminal traffic account and the business datum through terminal traffic private key signature that receiving terminal sends;
The terminal traffic certificate that inquiry is associated with the terminal traffic account;
The business datum is verified by the terminal traffic certificate;
When the business datum is proved to be successful, then processed according to the business datum, obtained the first result;
First result is signed by privacy key;
First result after by signature is sent to the terminal.
2. method according to claim 1, it is characterised in that methods described also includes:
Termination ID and the terminal traffic account through terminal traffic private key signature that receiving terminal sends;
The terminal traffic certificate that inquiry is associated with the Termination ID;
The terminal traffic account is verified by the terminal traffic certificate;
When the terminal traffic account is proved to be successful, the terminal traffic account and terminal traffic certificate association are deposited Storage.
3. method according to claim 1 and 2, it is characterised in that terminal traffic account that the receiving terminal sends and The step of the business datum of terminal traffic private key signature, including:
The first encryption data that receiving terminal sends;
First encryption data is decrypted by privacy key to obtain terminal traffic account and through terminal traffic private key label The business datum of name;
It is described the step of signed to first result by privacy key, including:
First result is signed by privacy key;
First result after the terminal traffic certificate is to signature is encrypted;
It is described by signature after first result the step of send to the terminal, including:
First result after by encryption is sent to the terminal.
4. method according to claim 2, it is characterised in that Termination ID that the receiving terminal sends and through terminal industry The step of terminal traffic account of business private key signature, including:
The second encryption data that receiving terminal sends;
Decrypt second encryption data to obtain Termination ID and the end through terminal traffic private key signature by privacy key End business account.
5. method according to claim 2, it is characterised in that methods described also includes:
The terminal traffic certificate is verified by root certificate;
When terminal traffic certification authentication success, then continue through the terminal traffic certificate is carried out to the business datum The step of checking;
When the terminal traffic certification authentication is unsuccessful, then the information of the terminal traffic certificate error is exported.
6. a kind of service security processing meanss, it is characterised in that include:
Receiver module, the terminal traffic account sent for receiving terminal and the business datum through terminal traffic private key signature;
Enquiry module, for inquiring about the terminal traffic certificate being associated with the terminal traffic account;
First authentication module, for being verified to the business datum by the terminal traffic certificate;
Processing module, for when the business datum is proved to be successful, then being processed according to the business datum, obtains first Result;
Encrypting module, for being signed to first result by privacy key;
Sending module, sends to the terminal for first result after by signature.
7. device according to claim 6, it is characterised in that receiver module be additionally operable to the Termination ID of receiving terminal transmission and Through the terminal traffic account of terminal traffic private key signature;
The enquiry module is additionally operable to inquire about the terminal traffic certificate being associated with the Termination ID;
First authentication module is additionally operable to verify the terminal traffic account by the terminal traffic certificate;
Described device also includes:
Relating module, for when the terminal traffic account is proved to be successful, by the terminal traffic account and the terminal Service certificate associated storage.
8. the device according to claim 6 or 7, it is characterised in that the receiver module includes:
Receiving unit, for the first encryption data that receiving terminal sends;
Decryption unit, for decrypting first encryption data by privacy key to obtain terminal traffic account and pass through eventually The business datum of end business private key signature;
The encrypting module includes:
Signature unit, for being signed to first result by privacy key;
Ciphering unit, for by the terminal traffic certificate to signature after first result be encrypted;
First result after the sending module is additionally operable to encryption is sent to the terminal.
9. device according to claim 8, it is characterised in that the receiving unit is additionally operable to the second of receiving terminal transmission Encryption data;
The decryption unit is additionally operable to decrypt second encryption data by privacy key to obtain Termination ID and pass through eventually The terminal traffic account of end business private key signature.
10. device according to claim 7, it is characterised in that also include:
Second authentication module, for being verified to the terminal traffic certificate by root certificate, and when terminal traffic card When book is proved to be successful, then the business datum is verified by the terminal traffic certificate, when the terminal traffic certificate When verifying unsuccessful, then the information of the terminal traffic certificate error is exported.
CN201710109611.3A 2017-02-27 2017-02-27 Service security processing method and service security processing device Pending CN106686001A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710109611.3A CN106686001A (en) 2017-02-27 2017-02-27 Service security processing method and service security processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710109611.3A CN106686001A (en) 2017-02-27 2017-02-27 Service security processing method and service security processing device

Publications (1)

Publication Number Publication Date
CN106686001A true CN106686001A (en) 2017-05-17

Family

ID=58862647

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710109611.3A Pending CN106686001A (en) 2017-02-27 2017-02-27 Service security processing method and service security processing device

Country Status (1)

Country Link
CN (1) CN106686001A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183932A (en) * 2007-12-03 2008-05-21 宇龙计算机通信科技(深圳)有限公司 Security identification system of wireless application service and login and entry method thereof
CN101242271A (en) * 2008-01-24 2008-08-13 陕西海基业高科技实业有限公司 Trusted remote service method and system
CN105335848A (en) * 2014-08-15 2016-02-17 中国电信股份有限公司 Broadband account number payment method and system, broadband payment platform and security certification platform

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183932A (en) * 2007-12-03 2008-05-21 宇龙计算机通信科技(深圳)有限公司 Security identification system of wireless application service and login and entry method thereof
CN101242271A (en) * 2008-01-24 2008-08-13 陕西海基业高科技实业有限公司 Trusted remote service method and system
CN105335848A (en) * 2014-08-15 2016-02-17 中国电信股份有限公司 Broadband account number payment method and system, broadband payment platform and security certification platform

Similar Documents

Publication Publication Date Title
CN108684041B (en) System and method for login authentication
CN109309565B (en) Security authentication method and device
US6073237A (en) Tamper resistant method and apparatus
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
CN101588245B (en) Method of identity authentication, system and memory device thereof
US10263782B2 (en) Soft-token authentication system
US20170208049A1 (en) Key agreement method and device for verification information
CN110990827A (en) Identity information verification method, server and storage medium
CN101841525A (en) Secure access method, system and client
CN106230784A (en) A kind of device authentication method and device
US8588415B2 (en) Method for securing a telecommunications terminal which is connected to a terminal user identification module
CN109729080A (en) Access attack guarding method and system based on block chain domain name system
CN112396735B (en) Internet automobile digital key safety authentication method and device
EP1081891A2 (en) Autokey initialization of cryptographic devices
CN107204985A (en) Purview certification method based on encryption key, apparatus and system
US10291614B2 (en) Method, device, and system for identity authentication
CN107277017A (en) Purview certification method, apparatus and system based on encryption key and device-fingerprint
CN109495441A (en) Access authentication method, device, relevant device and computer readable storage medium
CN116633530A (en) Quantum key transmission method, device and system
CN111224784A (en) Role separation distributed authentication and authorization method based on hardware trusted root
CN114338091B (en) Data transmission method, device, electronic equipment and storage medium
CN114091009B (en) Method for establishing safety link by using distributed identity mark
CN112769789B (en) Encryption communication method and system
CN105873043B (en) Method and system for generating and applying network private key for mobile terminal
CN104901967A (en) Registration method for trusted device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170517