WO2014173280A1 - 一种ic卡脱机pin验证方法以及ic卡脱机验证*** - Google Patents

一种ic卡脱机pin验证方法以及ic卡脱机验证*** Download PDF

Info

Publication number
WO2014173280A1
WO2014173280A1 PCT/CN2014/075903 CN2014075903W WO2014173280A1 WO 2014173280 A1 WO2014173280 A1 WO 2014173280A1 CN 2014075903 W CN2014075903 W CN 2014075903W WO 2014173280 A1 WO2014173280 A1 WO 2014173280A1
Authority
WO
WIPO (PCT)
Prior art keywords
offline
card
pos terminal
verification
pin1
Prior art date
Application number
PCT/CN2014/075903
Other languages
English (en)
French (fr)
Inventor
郑建宾
周钰
Original Assignee
***股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ***股份有限公司 filed Critical ***股份有限公司
Priority to JP2016508002A priority Critical patent/JP6200068B2/ja
Priority to KR1020157032359A priority patent/KR20150145238A/ko
Priority to US14/785,193 priority patent/US10839362B2/en
Priority to EP14787517.3A priority patent/EP2991263B1/en
Publication of WO2014173280A1 publication Critical patent/WO2014173280A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/204Point-of-sale [POS] network systems comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • the present invention relates to information security technologies, and in particular, to a verification method and a verification system for improving the security of an IC card offline transaction.
  • FIG. 1 is a flow chart showing offline PIN authentication in the prior art. As shown in Figure 1, the current offline PIN authentication process includes the following steps:
  • Step 1 The cardholder enters a PIN on the POS terminal
  • Step 2 The POS terminal organizes the authentication PIN command and sends it to the IC card payment application for verification.
  • Step 3 After the IC card is verified, the verification status code is returned to the POS terminal to inform whether the verification is passed, wherein if the verification status code is 9000 , indicating success, if the verification status is non-9000, it means that the verification is wrong;
  • Step 4 The POS terminal judges the legality of the cardholder identity by judging whether the returned verification status code is 9000, and executes a subsequent transaction process.
  • the POS terminal judges the legality of the cardholder identity only by whether the status code is 9000 or not, and is plaintext. This can easily lead to an incorrect return status code being modified to a mid-person attack of 9000, which causes the POS terminal to consider that the cardholder currently entering the PIN is a legitimate illusion.
  • a typical process for attacking an offline cardholder authentication process is as follows.
  • contact electronic cash is taken as an example.
  • 2 is a flow chart showing contact electronic cash authentication in the prior art.
  • the terminal initiates card authentication to the contact PBOC electronic cash, and obtains the number of PIN attempts.
  • the terminal arbitrarily inputs a PIN code, and the middleman who maliciously attacks returns the status code "9000" to the terminal according to the status code. 9000" judged that the authentication was successful and agreed to the follow-up transaction process.
  • the present invention is directed to a secure and reliable IC card offline PIN verification method and verification system capable of effectively preventing an attack against an offline PIN authentication process.
  • the IC card offline PIN verification method of the present invention includes the following steps: Step a: The POS terminal obtains a first offline PIN1, and the POS terminal generates a dynamic challenge code, and the dynamic challenge code and The first offline PIN1 performs an exclusive OR operation to obtain a card value application in which the first XOR value and the dynamic challenge code are sent to the IC card, wherein the first offline PIN1 is a password input by the cardholder to the POS terminal. ;
  • Step b The card application performs an exclusive-OR operation on the dynamic challenge code and the second offline PIN2 to obtain a second exclusive OR value, and verifies whether the first exclusive value and the second exclusive value are consistent, where
  • the second offline PIN2 is a real password of the IC card pre-stored in the IC card;
  • Step c In the case that the determination in step b is consistent, the card application signs the second exclusive OR value, and returns the signature data of the second exclusive value and the success status code to the POS terminal: When the judgment of b is inconsistent, an error status code is returned to the POS terminal;
  • Step d The POS terminal checks the signature data of the second XOR value when the success status code is received. And, in the case where the verification of the signature data of the second exclusive value is successful, the subsequent transaction processing is started, and in the case where the verification of the signature data of the second exclusive OR value fails, the exception processing is performed; on the other hand, the POS terminal receives In the case of an error status code, exception handling is performed.
  • the POS terminal Preferably, in the step a, the POS terminal generates a random number as a dynamic challenge code and generates a first exclusive OR value.
  • the second XOR value is data-signed with a private key to generate a signature data of a second XOR value
  • the POS terminal receives
  • the signature data of the second XOR value is verified as follows: signature verification of the signature data of the second XOR value is performed by using the public key; comparing whether the first XOR value and the second XOR value are compared Consistent.
  • the IC card offline authentication method of the present invention by using the digital signature technology and the dynamic challenge code, not only the verification of the offline PIN by the IC card but also the verification of the offline PIN by the terminal can be realized.
  • the clear PIN of the plaintext does not occur during the interaction between the card and the terminal, so that the security can be further improved.
  • An IC card offline PIN verification method includes the following steps:
  • Step a The POS terminal obtains the first offline PIN1, and the POS terminal generates a dynamic challenge code, and sends the dynamic challenge code and the offline PIN1 to the card application of the IC card, where the first offline PIN1 is a password that the cardholder inputs to the POS terminal;
  • Step b The card application verifies whether the first offline PIN1 and the second offline PIN2 are consistent, wherein the second offline PIN2 is pre-stored in the IC card The real password of the IC card;
  • Step c In the case that the determination of the step b is consistent, the card application performs a prescribed calculation on the first offline PIN1 and the second offline PIN2 to obtain the first signature data, and Returning the first signature data and the success status code to the POS terminal; if the determination in step b is inconsistent, returning an error status code to the POS terminal;
  • Step d the POS terminal receives the success status code A signature data is verified, and the subsequent transaction processing is started in the case where the first signature data verification
  • the POS terminal Preferably, in the step a, the POS terminal generates a random number as a dynamic challenge code. [0017] Preferably, in the step a, the POS terminal sends the first offline PIN1 and the dynamic challenge code composition verification instruction together to the card application.
  • the POS terminal first sends the dynamic challenge code to the card application, and then sends the first offline PIN1 to the card application.
  • the POS terminal Preferably, in the step a, the POS terminal generates a dynamic challenge code and stores it in the POS terminal together with the first offline PIN1.
  • the card application performs the following calculation on the dynamic challenge code and the second offline PIN to obtain first signature data: calculating a dynamic challenge code and a second offline PI The first difference or value of 2; the first XOR value is data-signed with the private key to generate the first signature data, and in the step d, the POS terminal receives the success status code to the first signature data.
  • the card application performs the following verification: calculating a dynamic challenge code and a second exclusive OR value of the first offline PIN1; performing data signature on the second exclusive OR value with the public key to generate second signature data; comparing the first signature data with Whether the second signature data is consistent.
  • the IC card offline PIN verification system of the present invention is characterized in that it comprises a card application module of a POS terminal and an IC card, wherein the POS terminal comprises: a password acquisition module, configured to acquire a password input by the cardholder a first offline PIN1; a dynamic challenge code generating module, configured to randomly generate a dynamic challenge code; a first storage module, configured to store the first offline PIN1 and the dynamic challenge code; a first receiving/transmitting module, a data transmission and reception between a card application module for executing a POS terminal and an IC card; a dynamic challenge code verification module, configured to: when receiving the following success status code from the first receiving/transmitting module, to the first signature The data is verified, and in the case where the first signature data verification is successful, the subsequent transaction processing is started and the exception processing is performed in the case where the first signature data verification fails; the first receiving/transmitting module is configured to execute the POS terminal and the IC card Card application module sends and receives data between modules
  • the card application module of the IC card includes: a password verification module, configured to verify whether the first offline PIN1 received from the POS terminal and the second offline PIN2 pre-stored in the IC card are consistent and inspected Outputting an error status code in case of inconsistency, wherein the second offline PIN2 is a 3 ⁇ 4 password of the IC card; a digital signature module, configured to verify the first offline PIN1 and the first in the password verification module In the case where the offline ⁇ 2 is consistent, the first offline PIN 1 and the second offline ⁇ 2 are subjected to a prescribed calculation to obtain first signature data; and the second receiving/transmitting module is configured to execute the POS terminal and the IC card's Data transmission and reception between the card application modules, and returning the first signature data and the success status code to the first receiving/transmitting module if the password verification module is successfully verified, and if the password verification module fails to verify An error status code is sent to the first receiving/transmitting module.
  • a password verification module configured to verify whether the
  • the first receiving/transmitting module sends the generated dynamic challenge code generated by the dynamic challenge code generating module and stored in the first storage module, the first offline PIN1 to the The second receiving/transmitting module.
  • the first receiving/transmitting module sends the generated dynamic challenge code generated by the dynamic challenge code generating module and stored in the first storage module to the second receiving/transmitting module, and then The first offline PIN1 is sent to the second receiving/transmitting module.
  • the digital signature module is configured to calculate a first XOR value of the dynamic challenge code and the second offline PIN2, and perform data signature on the first XOR value with a private key to generate first signature data.
  • the dynamic challenge code verification module is configured to calculate a second XOR value of the dynamic challenge code and the first offline PIN1, and perform data signature on the second XOR value with the public key to generate second signature data. Comparing whether the first signature data and the second signature data are consistent.
  • the IC card offline authentication method and the authentication system of the present invention by using the digital signature technology and the dynamic challenge code, not only the verification of the offline PIN by the IC card but also the offline PI of the terminal can be realized. verification.
  • the method is simple, practical, safe and reliable, and can effectively prevent attacks against the offline PIN authentication process and ensure the security in the IC card payment process.
  • 1 is a flow chart showing offline PIN authentication in the prior art.
  • FIG. 3 is a flow chart showing offline PIN authentication of the present invention.
  • FIG. 4 is a flow diagram of applying the offline PIN authentication method of the present invention to contact PBOC electronic cash.
  • FIG. 5 is a block diagram showing the configuration of an offline PIN authentication system of the present invention.
  • the offline PIN authentication method of the present invention includes the following steps:
  • Step 1 The cardholder enters the offline PINI to the POS terminal.
  • Step 2 The POS terminal generates a random number Rnd as a dynamic challenge code, and stores the dynamic challenge code and the offline PIN1 together in the encryption chip in the POS.
  • a random number Rnd is generated by the hardware of the terminal in the POS, and the random number can be any number of bits, for example, an 8-bit random number.
  • Step 3 The POS terminal attaches the dynamic challenge code Rnd to the offline PIN1 and sends a composition verification command to the card application.
  • card application specifically refers to an application that is loaded and runs on an ic card chip.
  • Step 4 The card application verifies whether the offline PIN1 and the real password PIN2 of the IC card stored in the IC card are consistent. If they are inconsistent, return the error status code directly to the POS terminal. If - cause the following steps:
  • Step 5 After receiving the response from the card application, the POS terminal determines whether the returned status code is a success status code or an error status code, and if it is an error status code, performs a corresponding exception processing logic. If the status code is 9000, the following verification action is performed:
  • the POS terminals together with the dynamic challenges sent to the application after the card is attached to the offline Rnd PIN1 code may be dynamically Rnd and offline PIN1 ⁇ ⁇
  • the POS terminal should first send the combat code to the card application, and then send the offline PIN1 to the card application.
  • a pair of private key Sk and a public key Pk are used for verification, that is, in the present invention, such an asymmetric key system can be used for authentication, for example, an RSA algorithm or the like can be specifically used.
  • an asymmetric key system can be used for authentication, for example, an RSA algorithm or the like can be specifically used.
  • the advantages of an asymmetric key system are mainly reflected in better security and scalability. In addition to this, it is of course also possible to perform authentication using the symmetric key system in the above steps 4 and 5 in the present invention.
  • the IC card offline authentication method of the present invention by using the digital signature technology and the dynamic challenge code, not only the verification of the offline PIN by the IC card but also the verification of the offline PIN by the terminal can be realized.
  • the method is simple, practical, safe and reliable, and can effectively prevent attacks against the offline PIN authentication process and ensure the security in the IC card payment process.
  • FIG. 4 is a flow chart showing the application of the offline PIN authentication method of the present invention to contact PBOC electronic cash.
  • the authentication process includes the following steps:
  • Step 1 Launch card authentication from the terminal to the contact PBOC electronic cash (not in the scope of the present invention).
  • Step 2 The terminal obtains the number of PIN attempts (not in the scope of the present invention).
  • Step 3 The terminal generates a random number
  • Step 4 The terminal sends the random number and PIN code to the contact PBOC electronic cash.
  • Step 5 The contact PBOC electronic cash authenticates the input PIN code, and performs data signature on the PIN code and the random number.
  • Step 6 The contact PBOC electronic cash returns a status code and a digital signature to the terminal, and then, in the case that the PIN code authentication is successful, the success status code and the digital signature are returned, and the PIN code authentication fails. Only the error status code is returned.
  • Step 7 The terminal verifies the digital code signature in the case of obtaining the success status code by verifying the status code and the digital signature, and performing exception processing in the case of obtaining the error status code;
  • Step 8 In the case where the terminal successfully verifies both the status code and the digital signature, the subsequent transaction is started. Process flow.
  • the dynamic challenge code and the second offline PIN2 are XORed to generate a second exclusive OR value, and then the first exclusive OR value and the second exclusive OR value are compared to determine whether the card PIN verification is passed, and then privately
  • the key returns to the POS terminal, and the POS terminal verifies the signature data of the second XOR value with the public key, and then compares the first XOR value with the second XOR value. Consistently determine whether the cardholder PIN verification is passed.
  • the IC card offline PI verification method of this embodiment specifically includes the following steps: Step a: The POS terminal obtains the first offline PIN1, and the POS terminal generates a dynamic challenge code, and the dynamic challenge code and The first offline PIN1 performs an exclusive OR operation to obtain a first exclusive value and a card application sent by the dynamic challenge code to the IC card, wherein the first offline PIN1 is a password input by the cardholder to the POS terminal. ;
  • Step b the card application performs an exclusive-OR operation on the dynamic challenge code and the second offline PIN2 to obtain a second exclusive OR value, and verifies whether the first exclusive value and the second exclusive value are consistent, where
  • the second offline PIN2 is a real password of the IC card pre-stored in the IC card;
  • Step c In the case that the determination in step b is consistent, the card application signs the second XOR value, and returns the signature data of the second XOR value and the success status code to the POS terminal; When the judgment of step b is inconsistent, an error status code is returned to the POS terminal;
  • Step d The POS terminal verifies the signature data of the second XOR value when the success status code is received, and starts the subsequent transaction processing if the verification of the signature data of the second XOR value is successful. If the verification of the signature data of the second XOR value fails, the exception processing is performed; on the other hand, the POS terminal is receiving In the case of an error status code, exception handling is performed.
  • the POS terminal In the step a, the POS terminal generates a random number as a dynamic challenge code and generates an exclusive OR value.
  • the second XOR value is data-signed with a private key to generate signature data of the second XOR value.
  • the POS terminal receives the success status code.
  • the signature data of the second XOR value is verified as follows: signature verification of the signature data of the second XOR value is performed by using the public key; and whether the first XOR value and the second XOR value are consistent.
  • the IC card offline authentication method of the embodiment by using the digital signature technology and the dynamic challenge code, not only the verification of the offline PI by the IC card but also the verification of the offline PIN by the terminal can be realized.
  • the clear PIN of the plaintext does not occur during the interaction between the card and the terminal, so that the security can be further improved.
  • the IC card offline PIN verification system of the present invention includes a POS terminal 100 and a card application module 200 of an IC card.
  • the POS terminal 100 includes: a password acquisition module 101, a dynamic challenge code generation module 102, a first storage module 103, a first reception/transmission module 104, and a dynamic challenge code verification module 105.
  • the card application module 200 of the IC card includes: a password verification module 201, a digital signature module 202, and a second receiving/transmitting module 203.
  • the password acquisition module 101 is configured to acquire the password input by the cardholder as the first offline PIN1.
  • the dynamic challenge code generating module 102 is configured to randomly generate a dynamic challenge code, and the randomly generated dynamic challenge code may be any byte of data, for example, a random number of 8 bits.
  • the first storage module 103 is configured to store the first offline PIN1 and the dynamic challenge code.
  • the first receiving/transmitting module 104 is configured to perform data transmission and reception of the I'HJ of the card application module of the POS terminal and the IC card.
  • the dynamic challenge code verification module 105 is configured to verify the first signature data in the case that the following success status code is received from the first receiving/transmitting module, and in the case that the first signature data verification is successful, The subsequent transaction processing is started and the exception processing is executed in the case where the first signature data verification fails.
  • the first receiving/transmitting module 104 is configured to execute the I'nJ of the POS terminal and the card application module of the IC card. Data transmission and reception, that is, the dynamic challenge code stored in the first storage module 103, the first offline PIN1 is transmitted to the second receiving/transmitting module 203 of the card application module 200 of the following IC card, and correspondingly also from the following The second receiving/transmitting module 203 of the card application module 200 of the IC card receives the data. The first receiving/transmitting module 104 sends the generated dynamic challenge code and the first offline PIN1 generated by the dynamic challenge code generating module 102 and stored in the first storage module 103 to the second receiving/transmitting module 203.
  • the first receiving/transmitting module 104 first sends the generated dynamic challenge code generated by the dynamic challenge code generating module 102 and stored in the first storage module 103 to the second receiving/transmitting module 203, and then the first The offline PIN1 is sent to the second receiving/transmitting module 203.
  • the password verification module 201 is configured to verify the first offline PIN1 received from the POS terminal and the second offline PIN2 pre-stored in the IC card (the second offline PIN2 is the real password of the IC card) Whether it is consistent and outputs an error status code if the verification is inconsistent, and outputs a success status code 9000 if the verification is successful.
  • the digital signature module 202 is configured to perform a prescribed calculation on the first offline PIN1 and the second offline PIN2 when the password verification module 201 verifies that the first offline PIN 1 and the second offline PIN2 are consistent. A signature data.
  • the second receiving/transmitting module 203 is configured to perform data transmission and reception between the POS terminal 100 and the card application module 200 of the IC card, and the first signature data and the success status in the case that the password verification module 201 is successfully verified.
  • the code returns to the first receiving/transmitting module 105 and transmits an error status code to the first receiving/transmitting module 104 in the event that the verification by the password verification module 201 fails.
  • the digital signature module 202 is configured to calculate a first XOR value of the dynamic challenge code and the second offline PIN2, and perform data signature on the first XOR value with a private key to generate a first Signature data.
  • the dynamic challenge code verification module 105 calculates the second XOR value of the dynamic challenge code and the first offline PIN1, performs data signature on the second XOR value with the public key, generates second signature data, and compares Whether the first signature data and the second signature data are consistent, and if the comparison result is the same, the card application acknowledges that the PIN1 verification command sent by the POS terminal is executed; The middleman attacked.
  • the IC card offline authentication system of the present invention by utilizing digital signature technology and dynamic challenge code, Not only can the IC card verify the offline PIN, but also the terminal can verify the offline PI.
  • the method is simple, practical, safe and reliable, and can effectively prevent attacks against the offline PIN authentication process and ensure the security in the IC card payment process.
  • the offline PIN authentication and offline PIN authentication system of the present invention have the following features: not only the card is authenticated to the cardholder, but also the terminal authenticates the cardholder. Further improving the security of the handover; the terminal no longer knows whether the cardholder authentication is successful only by the returned status code, but further validates whether the card actually performs the offline PIN authentication on the basis of the above idea; Improve the security of the acceptance environment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明涉及脱机PIN认证以及脱机PIN认证***。该方法包括:向POS终端输入脱机PIN1,POS终端生成动态挑战码,并且动态挑战码和脱机PIN1发送给卡片应用:卡片应用验证第一脱机PIN1和第二脱机PIN2是否一致;在一致的情况下,对第一脱机PIN1和第二脱机PIN2进行数字签名将签名数据和成功状态码返回到POS终端;POS终端在收到成功状态码的情况下对签名数据进行验证,并且在签名数据验证成功的情况下开始后续交易处理。根据本发明,不仅能够实现IC卡对脱机PIN的验证,同时也能够实现了终端对脱机PIN的验证。该方法实现简单、实用且安全可靠。

Description

一种 IC卡脱机 PIN验证方法以及 IC卡脱机验证*** 技术领域
[0001] 本发明涉及信息安全技术, 具体地涉及一种提髙 IC卡脱机交易安全性的 验证方法以及验证***。
背景技术
[0002] 目前, 在 IC卡脱机 PIN验证过程中, 在输入向终端输入 PIN之后, 如果 PIN正确的话, 终端返回成功状态码 "9000" , 也就是说, 终端仅通过返回状态 码是否为 "9000"来判断 IC卡是否通过了对持卡人的身份合法性认证。 在整个 认证过程中, 终端只能被动的被通知, 而不能主动的进行验证, 从而使整个认证 过程很容易遭受中间人攻击。
【0003】 下面, 对于现有技术的这种 IC卡脱机 PIN验证过程进行说明。
[0004] 图 1是表示现有技术中脱机 PIN认证的流程图。 如图 1所示, 目前脱机 PIN认证的流程包括下述步骤:
步骤 1 : 持卡人在 POS终端上输入 PIN;
步骤 2: POS终端组织认证 PIN指令并发送给 IC卡支付应用进行验证; 步骤 3 : IC卡验证通过后, 返回验证状态码给 POS终端, 告知其验证是否通过, 其中, 若是验证状态码为 9000, 则表示成功, 若是验证状态为非 9000, 则表示 验证出错;
步骤 4: POS终端通过判断返回的验证状态码是否为 9000, 从而判断持卡人身份 的合法性, 并执行后续的交易流程。
[0005] 从上述流程可以看出, POS终端仅凭状态码是否为 9000来判断持卡人身 份的合法性, 且为明文。 这就很容易导致错误的返回状态码被修改为 9000的中 间人攻击, 从而导致 POS终端认为当前输入 PIN的持卡人是合法的假象。
[0006] 典型的针对脱机持卡人认证过程进行攻击的流程如下, 此处以接触式电子 现金为例描述。 图 2是表示现有技术中接触式电子现金认证的流程图。 如图 2所 示, 首先终端向接触式 PBOC电子现金发起卡片认证、 并且获取 PIN尝试次数, 接着, 在终端任意输入一个 PIN码, 通过恶意攻击的中间人向终端返回状态码 "9000", 终端根据该状态码" 9000"判断为认证成功并同意进行后续交易流程。
[0007] 从上述图 2的描述和 PBOC借代记标准的描述可知,不管在终端上输入什 么值的 PIN码, 通过恶意攻击的中间人都能返回验证成功的 "9000 "码并继续完 成后续脱机扣款交易, 因此, 会给持卡人造成财产损失。
[0008] 进一步拓展后, 可知只要后续的在线操作以智能卡的脱机 PIN认证为前 提, 则会存在同样的安全隐患, 如以智能卡脱机 PIN为要素的客户端登陆操作。 在此条件下, 当不法分子捡到一带支付功能的客户端后, 一旦通过中间人攻击的 方式骗取客户端的信任后, 则客户端的所有功能都会暴露给不法分子, 说不定就 可以通过验证码的方式修改用户的相关信息、 甚至重置支付密码。
[0009]
发明内容
[0010] 鉴于上述问题,本发明旨在提供一种能有效防止针对脱机 PIN认证流程的 攻击的安全可靠的 IC卡脱机 PIN验证方法和验证***。
[0011] 本发明的 IC卡脱机 PIN验证方法, 其特征在于, 包括下述步骤: 步骤 a: POS终端获得第一脱机 PIN1 , 并且 POS终端生成动态挑战码, 将所述 动态挑战码和所述第一脱机 PIN1进行异或运算得到第一异或值和所述动态挑战 码发送给 IC卡的卡片应用,其中,所述第一脱机 PIN1是持卡人输入到 POS终端 的密码;
步骤 b:卡片应用对所述动态挑战码和第二脱机 PIN2进行异或运算得到第二异或 值, 并验证所述第一异或值和第二异或值是否一致, 其中, 所述第二脱机 PIN2 是在 IC卡预先储存的、 该 IC卡的真实密码;
歩骤 c: 在步骤 b的判断为一致的情况下, 卡片应用对所述第二异或值进行签名, 并且将该第二异或值的签名数据以及成功状态码返回到 POS终端:在步骤 b的判 断为不一致的情况下, 向 POS终端返回错误状态码;
步骤 d: POS终端在收到成功状态码的情况下对该第二异或值的签名数据进行验 证, 并且在该第二异或值的签名数据验证成功的情况下开始后续交易处理而在 ¾ 第二异或值的签名数据验证失败的情况下执行异常处理;另一方面 POS终端在收 到错误状态码的情况下, 执行异常处理。
[0012] 优选地, 在所述步骤 a中, POS终端生成随机数作为动态挑战码, 并产生 第一异或值。
[0013] 优选地, 在所述步骤 c中, 用私钥对该第二异或值进行数据签名, 生成 ¾ 第二异或值的签名数据, 在所述步骤 d中, POS终端在收到成功状态码的情况下 对该第二异或值的签名数据进行如下验证: 用公钥对该第二异或值的签名数据进 行签名验证; 比较第一异或值和第二异或值是否一致。
[0014] 根据本发明的 IC卡脱机认证方法,通过利用数字签名技术和动态挑战码, 不仅能够实现 IC卡对脱机 PIN的验证, 同时也能够实现了终端对脱机 PIN的验 证。 尤其是, 在卡片和终端的交互过程中不会出现明文的脱机 PIN , 因此, 能够 进一步提高安全性。
[0015] 本发明的另一方面的 IC卡脱机 PIN验证方法, 其特征在于, 包括下述歩 骤:
歩骤 a: POS终端获得第一脱机 PIN1 , 并且 POS终端生成动态挑战码, 将所述 该动态挑战码、所述脱机 PIN1发送给 IC卡的卡片应用,其中,所述第一脱机 PIN1 是持卡人输入到 POS终端的密码; 步骤 b: 卡片应用验证所述第一脱机 PIN1和 第二脱机 PIN2是否一致, 其中, 所述第二脱机 PIN2是在 IC卡预先储存的、 该 IC卡的真实密码; 步骤 c: 在步骤 b的判断为一致的情况下, 卡片应用对所述第 一脱机 PIN1和所述第二脱机 PIN2进行规定计算获得第一签名数据,并且将该第 一签名数据和成功状态码返回到 POS终端; 在步骤 b的判断为不一致的情况下, 向 POS终端返回错误状态码; 步骤 d: POS终端在收到成功状态码的情况下对第 一签名数据进行验证, 并且在第一签名数据验证成功的情况下开始后续交易处理 而在第一签名数据验证失败的情况下执行异常处理;另一方 P0S终端在收到铅误 状态码的情况下, 执行异常处理。
[0016] 优选地, 在所述歩骤 a中, P0S终端生成随机数作为动态挑战码。 [0017] 优选地, 在所述步骤 a中, POS终端将所述第一脱机 PIN1和所述动态挑 战码组成验证指令一起发送给卡片应用。
[0018] 优选地,在所述步骤 a中, POS终端先将所述动态挑战码发送给卡片应用, 然后再将第一脱机 PIN1发送给卡片应用。
[0019] 优选地, 在所述步骤 a中, POS终端生成动态挑战码并且和所述第一脱机 PIN1一起储存在 POS终端中。
[0020] 优选地,在所述步骤 c中,卡片应用对所述动态挑战码和所述第二脱机 PIN 进行下述计算算获得第一签名数据: 计算动态挑战码和第二脱机 PI 2的第 异 或值; 用私钥对该第一异或值进行数据签名, 生成第一签名数据, 在所述步骤 d 中, POS终端在收到成功状态码的情况下对第一签名数据进行如下验证: †算动 态挑战码和第一脱机 PIN1的第二异或值; 用公钥对该第二异或值进行数据签名, 生成第二签名数据; 比较所述第一签名数据和所述第二签名数据是否一致。
[0021] 本发明的 IC卡脱机 PIN验证***, 其特征在于, 包括 POS终端和 IC卡 的卡片应用模块, 其中, 所述 POS终端包括: 密码获取模块, 用于获取持卡人输 入的密码作为第一脱机 PIN1 ; 动态挑战码生成模块, 用于随机生成动态挑战码; 第一储存模块, 用于储存所述第一脱机 PIN1和所述动态挑战码; 第一接收 /发送 模块, 用于执行 POS终端和 IC卡的卡片应用模块之间的数据发送接收; 动态挑 战码验证模块,用于在从第一接收 /发送模块收到下述的成功状态码的情况下对第 一签名数据进行验证, 并且在第一签名数据验证成功的情况下使得开始后续交易 处理而在第一签名数据验证失败的情况下执行异常处理; 第一接收 /发送模块, 用 于执行 POS终端和 IC卡的卡片应用模块之间的数据发送接收,
所述 IC卡的卡片应用模块包括: 密码验证模块, 用于验证从所述 POS终端收到 的所述第一脱机 PIN1和 IC卡中预先储存的第二脱机 PIN2是否一致并且在验 i正 为不一致的情况下输出错误状态码, 其中, 所述第二脱机 PIN2是该 IC卡的 ¾ 密码; 数字签名模块, 用于在所述密码验证模块验证所述第一脱机 PIN1和第二 脱机 ΡΙΝ2是为一致的情况下, 对所述第一脱机 PIN1和所述第二脱机 ΡΙΝ2进行 规定计算获得第一签名数据; 第二接收 /发送模块, 用于执行 POS终端和 IC卡的 卡片应用模块之间的数据发送接收, 在密码验证模块验证成功的情况下将 ¾第一 签名数据和成功状态码返回到所述第一接收 /发送模块而在密码验证模块验证失 败的情况下将错误状态码发送到所述第一接收 /发送模块。
[0022] 优选地,所述第一接收 /发送模块将由所述动态挑战码生成模块生成并且储 存在第一储存模块中的生成动态挑战码、 所述第一脱机 PIN1—起发送给所述第 二接收 /发送模块。
[0023] 优选地,所述第一接收 /发送模块将由所述动态挑战码生成模块生成并且储 存在第一储存模块中的生成动态挑战码先发送给第二接收 /发送模块,然后再将所 述第一脱机 PIN1发送给所述第二接收 /发送模块。
[0024] 优选地, 所述数字签名模块用于计算动态挑战码和第二脱机 PIN2的第一 异或值, 用私钥对该第一异或值进行数据签名, 生成第一签名数据, 所述动态挑 战码验证模块用于计算动态挑战码和第一脱机 PIN1的第二异或值, 用公钥对该 第二异或值进行数据签名, 生成第二签名数据。 比较所述第一签名数据和所述第 二签名数据是否一致。
[0025] 根据本发明的 IC卡脱机认证方法以及认证***, 通过利用数字签名技术 和动态挑战码, 不仅能够实现 IC卡对脱机 PIN的验证, 同时也能够实现了终端 对脱机 PI 的验证。该方法实现简单、实用且安全可靠,能有效防止针对脱机 PIN 认证流程的攻击, 保证 IC卡支付过程中的安全性。
[0026]
附图说明
[0027] 图 1是表示现有技术中脱机 PIN认证的流程图。
[0028] 图 2是表示现有技术中接触式电子现金认证的流程图。
[0029] 图 3是表示本发明的脱机 PIN认证的流程图。
[0030] 图 4是将本发明的脱机 PIN认证方法应用于接触式 PBOC电子现金的流 图。
[0031] 图 5是表示本发明的脱机 PIN认证***的构造框图。
[0032] . 具体实施方式
[0033] 下面介绍的是本发明的多个实施例中的一些, 旨在提供对本发明的基本了 解。 并不旨在确认本发明的关键或决定性的要素或限定所要保护的范 ffi。
[0034] 图 3是表示本发明的脱机 PIN认证的流程图。如图 3所示, 本发明的脱机 PIN认证方法包括下述步骤:
步骤 1 : 持卡人向 POS终端输入脱机 PINI。
[0035] 步骤 2: POS终端产生一随机数 Rnd作为动态挑战码, 并且将该动态挑战 码和脱机 PIN1—起存储到 POS中的加密芯片中。这里, 由 POS中终端的硬件产 生一随机数 Rnd, 随机数可以为任意位数, 例如, 8位字节的随机数。
[0036] 步骤 3 : POS终端将该动态挑战码 Rnd附在脱机 PIN1之后并且组成验证 指令发送给卡片应用。 这里 "卡片应用"具体指装载并运行在 ic卡芯片中的应 用程序。
[0037] 步骤 4: 卡片应用验证该脱机 PIN1和预先存储在 IC卡内的、 IC卡的真实 密码 PIN2是否一致。 如果不一致, 则向 POS终端直接返回错误状态码, 如果 - 致则进行下述步骤:
( 1 )计算随机数 Rnd和脱机 PIN2的异或值 Tdatal , 即 Tdatal =Rnd异或 PIN2;
(2) 用私钥 SkTdatal进行数字签名, 得到数字签名数据 Sigl ;
(3 ) 向 POS终端返回 Sigl +9000 (成功状态码) 。
[0038] 歩骤 5: POS终端在收到来自卡片应用的响应后, 判断返回的状态码足为 成功状态码还是错误状态码,若为错误状态码的话,则执行相应的异常处理逻^, 若为成功状态码 9000的话, 则执行如下的验证动作:
( 1 )计算随机数 Rnd和脱机 PIN1的异或值 Tdata2, 即 Tdata2 = Rnd异或 PIN 1;
(2)用存储在 POS终端的公钥 Pk验证数字签名 Sigl并且比较 Tdata2和 Tdatal 是否一致。 如果两者一致, 则说明卡片应用确收执行了 POS终端所发送的 PIN1 验证指令; 如果不一致则说明受到中间人攻击。
[0039] 另一方面, 在上述的步骤 3中, POS终端将该动态挑战码 Rnd附在脱机 PIN1之后一起发送给卡片应用, 当然也可以将动态挑战码 Rnd和脱机 PIN1 Ί\ 一后发送给卡片应用, 这种方式的情况下, POS终端应当先将动战码发送给卡片 应用, 然后再将脱机 PIN1发送给卡片应用。
[0040] 在上述的步骤 4、 5中采用了一对私钥 Sk和公钥 Pk进行验证, 即在本发 明中能够利用这样的非对称密钥体系进行认证, 例如具体地可以采用 RSA算法 等。 非对称密钥体系的优势主要体现在安全性和可扩展性更好。 除此之外, 在本 发明中的上述步骤 4、 5中当然也能够采用对称密钥体系进行认证。
[0041] 根据本发明的 IC卡脱机认证方法,通过利用数字签名技术和动态挑战码, 不仅能够实现 IC卡对脱机 PIN的验证, 同时也能够实现了终端对脱机 PIN的验 证。 该方法实现简单、 实用且安全可靠, 能有效防止针对脱机 PIN认证流程的攻 击, 保证 IC卡支付过程中的安全性。
[0042] 下面,对于将本发明的脱机认证方法应用于接触式 PBOC电子现金的认证 过程进行说明。
[0043] 图 4是将本发明的脱机 PIN认证方法应用于接触式 PBOC电子现金的流程 图。
[0044] 如图 4所示, 该认证过程包括下述步骤:
步骤 1 : 从终端向接触式 PBOC电子现金发起卡片认证(不属于本发明的范畴) 。
[0045] 歩骤 2: 终端获取 PIN尝试次数 (不属于本发明的范畴) 。
[0046] 步骤 3 : 终端产生随机数,
步骤 4: 终端将该随机数和 PIN码发送到接触式 PBOC电子现金。
[0047] 步骤 5 : 接触式 PBOC电子现金对该输入 PIN码进行认证, 并且对该 PIN 码和随机数进行数据签名。
[0048] 步骤 6: 接触式 PBOC电子现金向终端返回状态码和数字签名, 其屮, , 其中, 在 PIN码认证成功的情况下返回成功状态码和数字签名, 而在 PIN码认证 失败的情况下仅返回错误状态码。
[0049] 步骤 7: 终端对验证状态码和数字签名, 在获得成功状态码的情况下对数 字签名进行验证, 而在获得错误状态码的情况下, 执行异常处理;
步骤 8 : 在终端通过对状态码和数字签名验证都成功的情况下, 幵始后续的夂易 处理流程。
[0050] 通过将上述本发明的脱机 PIN认证方法应用于接触式 PBOC电子现金,也 能够有效防止针对脱机 PIN认证流程的攻击,保证接触式 PBOC电子现金的安全 性。
[0051] 接着, 对于本发明的脱机 PIN认证***进行简单说明。
[0052] 接着, 对于本发明的另一个实施方式进行说明。 该实施方式与上述实施方 式的区别在于, 在 POS终端生成动态挑战码后, 在 POS终端就将该动态挑战码 与第一脱机 PIN1进行异或运算得到第一异或值, 在卡片应用进行验证时, 将动 态挑战码和第二脱机 PIN2进行异或运算生成第二异或值, 然后比较第一异或值 和第二异或值是否一致来判断卡片 PIN验证是否通过, 然后用私钥对该第二异或 值进行签名后返回到 POS终端, 在 POS终端用公钥对该第二异或值的签名数据 进行验证, 然后比较该第一异或值和第二异或值是否一致来判断持卡人 PIN验证 是否通过。
[0053] 该实施方式的 IC卡脱机 PI 验证方法具体地包括下述歩骤- 歩骤 a: POS终端获得第一脱机 PIN1 , 并且 POS终端生成动态挑战码, 将所述 动态挑战码和所述第一脱机 PIN1进行异或运算得到第一异或值和所述动态挑战 码发送给 IC卡的卡片应用,其中,所述第一脱机 PIN1是持卡人输入到 P0S终端 的密码;
歩骤 b:卡片应用对所述动态挑战码和第二脱机 PIN2进行异或运算得到第二异或 值, 并验证所述第一异或值和第二异或值是否一致, 其中, 所述第二脱机 PIN2 是在 IC卡预先储存的、 该 IC卡的真实密码;
歩骤 c: 在步骤 b的判断为一致的情况下, 卡片应用对所述第二异或值进行签名, 并且将该第二异或值的签名数据以及成功状态码返回到 POS终端;在歩骤 b的判 断为不一致的情况下, 向 POS终端返回错误状态码;
歩骤 d: POS终端在收到成功状态码的情况下对该第二异或值的签名数据进行验 证, 并且在该第二异或值的签名数据验证成功的情况下开始后续交易处理而在该 第二异或值的签名数据验证失败的情况下执行异常处理;另一方面 POS终端在收 到错误状态码的情况下, 执行异常处理。
[0054] 在所述步骤 a中, POS终端生成随机数作为动态挑战码, 并产生第 异或 值。
[0055] 在所述步骤 c中, 用私钥对该第二异或值进行数据签名, 生成该第二异或 值的签名数据, 在所述步骤 d中, POS终端在收到成功状态码的情况下对该第二 异或值的签名数据进行如下验证: 用公钥对该第二异或值的签名数据进行签名验 证; 比较第一异或值和第二异或值是否一致。
[0056] 根据该实施方式的 IC卡脱机认证方法, 通过利用数字签名技术和动态挑 战码,不仅能够实现 IC卡对脱机 PI 的验证, 同时也能够实现了终端对脱机 PIN 的验证。 尤其是, 在卡片和终端的交互过程中不会出现明文的脱机 PIN , 因此, 能够进一步提高安全性。
[0057] 图 5是表示本发明的脱机 PIN认证***的构造框图。如图 5所示, 本发明 的 IC卡脱机 PIN验证***, 包括 POS终端 100和 IC卡的卡片应用模块 200。 【0058】 POS终端 100包括: 密码获取模块 101、 动态挑战码生成模块 102、 第 - 储存模块 103、 第一接收 /发送模块 104、 动态挑战码验证模块 105。 所述 IC卡的 卡片应用模块 200包括: 密码验证模块 201、 数字签名模块 202、 第二接收 /发送 模块 203。
[0059] 密码获取模块 101用于作为第一脱机 PIN1获取持卡人输入的密码。 10060] 动态挑战码生成模块 102用于随机生成动态挑战码, 随机生成的动态挑战 码可以是任意字节的数据, 例如, 8位字节的一个随机数。
[0061] 第一储存模块 103用于储存所述第一脱机 PIN1和所述动态挑战码。
[0062] 第一接收 /发送模块 104用于执行 POS终端和 IC卡的卡片应用模块之 I'HJ的 数据发送接收。
[0063] 动态挑战码验证模块 105用于在从第一接收 /发送模块收到下述的成功状 态码的情况下对第一签名数据进行验证, 并且在第一签名数据验证成功的情况下 使得开始后续交易处理而在第一签名数据验证失败的情况下执行异常处理。
[0064] 第一接收 /发送模块 104用于执行 POS终端和 IC卡的卡片应用模块之 I'nJ的 数据发送接收, 即将第一存储模块 103中存储的动态挑战码、 第一脱机 PIN1发 送到下述 IC卡的卡片应用模块 200的第二接收 /发送模块 203, 并且, 对应地也 从下述 IC卡的卡片应用模块 200的第二接收 /发送模块 203接收数据。 其中, 第 一接收 /发送模块 104将由动态挑战码生成模块 102生成且储存在第一储存模块 103中的生成动态挑战码、第一脱机 PIN1—起发送给第二接收 /发送模块 203。或 者也可以是,第一接收 /发送模块 104将由动态挑战码生成模块 102生成并且储存 在第一储存模块 103中的生成动态挑战码先发送给第二接收 /发送模块 203, 然后 再将第一脱机 PIN1发送给第二接收 /发送模块 203。
[0065] 另一方面, 密码验证模块 201用于验证从 POS终端收到的第一脱机 PIN1 和 IC卡中预先储存的第二脱机 PIN2 (第二脱机 PIN2是该 IC卡的真实密码) 是 否一致并且在验证为不一致的情况下输出错误状态码, 而在验证成功的情况下输 出成功状态码 9000。
[0066] 数字签名模块 202用于在密码验证模块 201验证第一脱机 PIN 1和第二脱 机 PIN2为一致的情况下, 对第一脱机 PIN1和第二脱机 PIN2进行规定计算获得 第一签名数据。
[0067] 第二接收 /发送模块 203用于执行 POS终端 100和 IC卡的卡片应用模块 200之间的数据发送接收, 在密码验证模块 201验证成功的情况下将该第一签名 数据和成功状态码返回到第一接收 /发送模块 105而在密码验证模块 201验证失败 的情况下将错误状态码发送到第一接收 /发送模块 104。
[0068] 作为具体地一个实施方式, 数字签名模块 202用于计算动态挑战码和第二 脱机 PIN2的第一异或值, 用私钥对该第一异或值进行数据签名, 生成第一签名 数据。 与此相应地, 动态挑战码验证模块 105计算动态挑战码和第一脱机 PIN1 的第二异或值, 用公钥对该第二异或值进行数据签名, 生成第二签名数据, 并且 比较第一签名数据和所述第二签名数据是否一致, 比较结果为两者一致的情况 下, 则说明卡片应用确收执行了 POS终端所发送的 PIN1验证指令; 比较结果为 两者不一致则说明受到中间人攻击。
[00691 根据本发明的 IC卡脱机认证***,通过利用数字签名技术和动态挑战码, 不仅能够实现 IC卡对脱机 PIN的验证, 同时也能够实现了终端对脱机 PI 的验 证。 该方法实现简单、 实用且安全可靠, 能有效防止针对脱机 PIN认证流程的攻 击, 保证 IC卡支付过程中的安全性。
[0070] 本发明的脱机 PIN认证以及脱机 PIN认证***具有如下特性:不仅实现卡 片对持卡人的认证, 同时也实现终端对持卡人的认证。 进一步提高的交 的安全 性; 终端不再仅仅通过返回的状态码获知持卡人认证是否成功, 而是通过本创意 在上述基础上进一步验证卡片是否真正执行了脱机 PIN的认证; 能够进一歩提卨 受理环境的安全性。
[0071] 以上例子主要说明了本发明的脱机 PIN认证方法以及脱机 PIN认证***。 尽管只对其中一些本发明的具体实施方式进行了描述, 但是本领域普通技术人员 应当了解, 本发明可以在不偏离其主旨与范围内以许多其他的形式实施。 因此, 所展示的例子与实施方式被视为示意性的而非限制性的, 在不脱离如所附各权利 要求所定义的本发明精神及范围的情况下, 本发明可能涵盖各种的修改 替换。

Claims

权利 要求 书
1. 一种 IC卡脱机 PI 验证方法, 其特征在于, 包括下述步骤:
步骤 a: POS终端获得第一脱机 ΡΙΝΙ , 并且 POS终端生成动态挑战码, 将所述 动态挑战码和所述第一脱机 PIN1进行异或运算得到第一异或值和所述动态挑战 码发送给 IC卡的卡片应用,其中,所述第一脱机 PIN1是持卡人输入到 P0S终端 的密码;
歩骤 b:卡片应用对所述动态挑战码和第二脱机 PIN2进行异或运算得到第二异或 值, 并验证所述第一异或值和第二异或值是否一致, 其中, 所述第二脱机 PIN2 是在 IC卡预先储存的、 该 IC卡的真实密码;
歩骤 c: 在步骤 b的判断为一致的情况下, 卡片应用对所述第二异或值进行签名, 并且将该第二异或值的签名数据以及成功状态码返回到 P0S终端;在歩骤 b的判 断为不一致的情况下, 向 P0S终端返回错误状态码;
步骤 d: P0S终端在收到成功状态码的情况下对该第二异或值的签名数据进行验 证, 并且在该第二异或值的签名数据验证成功的情况下开始后续交易处理, 而在 该第二异或值的签名数据验证失败的情况下执行异常处理;另一方面 POS终端在 收到错误状态码的情况下, 执行异常处理。
2. 如权利要求 1所述的 IC卡脱机 PIN验证方法, 其特征在于,
在所述步骤 a中, P0S终端生成随机数作为动态挑战码, 并产生第一异或位。
3. 如权利要求 2所述的 IC卡脱机 PIN验证方法, 其特征在于,
在所述步骤 c中, 用私钥对该第二异或值进行数据签名, 生成该第二异或值的签 名数据,
在所述步骤 d中, P0S终端在收到成功状态码的情况下对该第二异或值的签名数 据迸行如下验证:
用公钥对该第二异或值的签名数据进行签名验证;
比较第一异或值和第二异或值是否一致。
4. 一种 IC卡脱机 PI 验证方法, 其特征在于, 包括下述步骤: 歩骤 a: POS终端获得第一脱机 PINl , 并且 P0S终端生成动态挑战码, 将所述 该动态挑战码、 所述第一脱机 PIN1发送给 IC卡的卡片应用, 其中, 所述第 -脱 机 PIN1是持卡人输入到 P0S终端的密码;
步骤 b: 卡片应用验证所述第一脱机 PINl和第二脱机 PIN2是否一致, 其中, 所 述第二脱机 PIN2是在 IC卡预先储存的、 该 IC卡的真实密码;
歩骤 c: 在步骤 b的判断为一致的情况下, 卡片应用对所述第一脱机 PIN1所述第 二脱机 ΡΓΝ2进行规定计算获得第一签名数据, 并且将该第一签名数据和成功状 态码返回到 P0S终端; 在步骤 b的判断为不一致的情况下, 向 P0S终端返回错 误状态码;
步骤 d: POS终端在收到成功状态码的情况下对第一签名数据进行验证, 并— .在 第一签名数据验证成功的情况下开始后续交易处理而在第一签名数据验证失败 的情况下执行异常处理; 另一方 P0S终端在收到错误状态码的情况下, 执行异常 处理。
5. 如权利要求 4所述的 IC卡脱机 PIN验证方法, 其特征在于,
在所述步骤 a中, P0S终端生成随机数作为动态挑战码。
6. 如权利要求 5所述的 IC卡脱机 PIN验证方法, 其特征在于,
在所述步骤 a中, P0S终端将所述第一脱机 PIN1和所述动态挑战码组成验证指 令一起发送给卡片应用。
7. 如权利要求 6所述的 IC卡脱机 PIN验证方法, 其特征在于,
在所述步骤 a中, P0S终端先将所述动态挑战码发送给卡片应用, 然后再将第一 脱机 PIN1发送给卡片应用。
8. 如权利要求 6或 7所述的 IC卡脱机 PIN验证方法, 其特征在于,
在所述步骤 a中, P0S终端生成动态挑战码并且和所述第一脱机 PIN1—起储存 在 P0S终端中。
9. 如权利要求 8所述的 IC卡脱机 PIN验证方法, 其特征在于,
在所述歩骤 c中, 卡片应用对所述动态挑战码和所述第二脱机 PI 进行下述计 f/: 算获得第一签名数据: 计算动态挑战码和第二脱机 PIN2的第一异或值;
用私钥对该第一异或值进行数据签名, 生成第一签名数据,
在所述步骤 d中, P0S终端在收到成功状态码的情况下对第一签名数据进行如下 验证:
计算动态挑战码和第一脱机 PIN1的第二异或值;
用公钥对第一签名数据进行签名验证;
比较所述第一异或值和所述第二异或值是否一致。
10. 一种 IC卡脱机 PIN验证***, 其特征在于, 包括 POS终端 (100 ) 和 IC卡 的卡片应用模块 (200) ,
其中, 所述 POS终端 (100) 包括:
密码获取模块 (101 ) , 用于获取持卡人输入的密码作为第一脱机 PIN1 ;
动态挑战码生成模块 (102) , 用于随机生成动态挑战码;
第一储存模块 (102) , 用于储存所述第一脱机 PIN1和所述动态挑战码; 第一接收 /发送模块 (103 ) , 用于执行 P0S终端和 IC卡的卡片应用模块之间的 数据发送接收;
动态挑战码验证模块 (104) , 用于在从第一接收 /发送模块收到下述的成功状态 码的情况下对第一签名数据进行验证, 并且在第一签名数据验证成功的情况下使 得开始后续交易处理而在第一签名数据验证失败的情况下执行异常处理; 第一接收 /发送模块 (105 ) , 用于执行 POS终端和 IC卡的卡片应用模块之间的 数据发送接收,
所述 IC卡的卡片应用模块 (200) 包括:
密码验证模块 (201 ) , 用于验证从所述 POS终端收到的所述第一脱机 PIN1和 IC卡中预先储存的第二脱机 PIN2是否一致并且在验证为不一致的情况下输出错 误状态码, 其中, 所述第二脱机 PIN2是该 IC卡的真实密码;
数字签名模块(202) , 用于在所述密码验证模块验证所述第一脱机 PIN1和第二 脱机 PIN2是为一致的情况下, 对所述第一脱机 PIN1和所述第二脱机 ΡΓΝ2进行 规定计算获得第一签名数据; 第二接收 /发送模块 (203 ) , 用于执行 POS终端和 IC卡的卡片应用模块之间的 数据发送接收, 在密码验证模块验证成功的情况下将该第一签名数据和成功状态 码返回到所述第一接收 /发送模块而在密码验证模块验证失败的情况下将错误状 态码发送到所述第一接收 /发送模块。
11. 如权利要求 10所述的 IC卡脱机 PI 验证***, 其特征在于,
所述第一接收 /发送模块将由所述动态挑战码生成模块生成并且储存在第一储存 模块中的生成动态挑战码、 所述第一脱机 PIN1—起发送给所述第二接收 /发送模 块。
12. 如权利要求 10所述的 IC卡脱机 PIN验证***, 其特征在于,
所述第一接收 /发送模块将由所述动态挑战码生成模块生成并且储存在第一储存 模块中的生成动态挑战码先发送给第二接收 /发送模块, 然后再将所述第一脱机 PIN1发送给所述第二接收 /发送模块。
13. 如权利要求 11或 12所述的 IC卡脱机 PIN验证***, 其特征在于, 所述数字签名模块用于计算动态挑战码和第二脱机 PIN2的第一异或值, 用私钥 对该第一异或值进行数据签名, 生成第一签名数据,
所述动态挑战码验证模块用于计算动态挑战码和第一脱机 PIN1的第二异或值, 用公钥对第一签名数据进行验证, 并且比较所述第一异或值和所述第二异或值是 否一致。
PCT/CN2014/075903 2013-04-22 2014-04-22 一种ic卡脱机pin验证方法以及ic卡脱机验证*** WO2014173280A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2016508002A JP6200068B2 (ja) 2013-04-22 2014-04-22 Icカードのオフラインpinの検証方法及びicカードのオフライン検証システム
KR1020157032359A KR20150145238A (ko) 2013-04-22 2014-04-22 Ic 카드의 오프라인 핀 인증 방법 및 ic 카드 오프라인 인증 시스템
US14/785,193 US10839362B2 (en) 2013-04-22 2014-04-22 Offline pin authentication method and system for IC card
EP14787517.3A EP2991263B1 (en) 2013-04-22 2014-04-22 Offline pin authentication method and system for ic card

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310139644.4A CN104113411B (zh) 2013-04-22 2013-04-22 一种ic卡脱机pin验证方法以及ic卡脱机验证***
CN201310139644.4 2013-04-22

Publications (1)

Publication Number Publication Date
WO2014173280A1 true WO2014173280A1 (zh) 2014-10-30

Family

ID=51710050

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/075903 WO2014173280A1 (zh) 2013-04-22 2014-04-22 一种ic卡脱机pin验证方法以及ic卡脱机验证***

Country Status (6)

Country Link
US (1) US10839362B2 (zh)
EP (1) EP2991263B1 (zh)
JP (1) JP6200068B2 (zh)
KR (1) KR20150145238A (zh)
CN (1) CN104113411B (zh)
WO (1) WO2014173280A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2636694C2 (ru) * 2016-01-25 2017-11-27 Акционерное общество "Национальная система платежных карт" Способ организации защищённого обмена сообщениями

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102453705B1 (ko) 2015-09-25 2022-10-11 삼성전자주식회사 호스트의 정당성 여부에 따라 선택적으로 결제 기능을 온(on)하는 결제 장치의 동작 방법
SE540544C2 (sv) * 2015-10-30 2018-09-25 Id Loop Ab Förfarande för betalning med kontantkort
CN105678547B (zh) * 2015-12-28 2019-07-26 飞天诚信科技股份有限公司 一种检查持卡人身份的终端及其工作方法
KR101830339B1 (ko) 2016-05-20 2018-03-29 한국전자통신연구원 양자 네트워크상에서의 양자키 분배 장치 및 방법
US10645577B2 (en) * 2016-07-15 2020-05-05 Avago Technologies International Sales Pte. Limited Enhanced secure provisioning for hotspots
CN106789086B (zh) * 2017-01-25 2019-11-29 中钞***产业发展有限公司杭州区块链技术研究院 一种用于移动终端的数字签名方法及其装置
CN109508995A (zh) * 2018-12-12 2019-03-22 福建新大陆支付技术有限公司 一种基于支付终端的脱机授权方法及支付终端

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8095113B2 (en) * 2007-10-17 2012-01-10 First Data Corporation Onetime passwords for smart chip cards
CN102377570A (zh) * 2011-11-07 2012-03-14 飞天诚信科技股份有限公司 一种生成动态口令的方法和装置
WO2012106757A1 (en) * 2011-02-07 2012-08-16 David Ball A smart card with verification means

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6327578B1 (en) * 1998-12-29 2001-12-04 International Business Machines Corporation Four-party credit/debit payment protocol
EP1225534A4 (en) * 1999-10-07 2006-04-19 Fujitsu Ltd INTEGRATED CIRCUIT EXCHANGE SYSTEM
CA2459726C (en) * 2001-10-05 2013-09-03 Mastercard International Incorporated System and method for integrated circuit card data storage
US7363494B2 (en) * 2001-12-04 2008-04-22 Rsa Security Inc. Method and apparatus for performing enhanced time-based authentication
US7784684B2 (en) * 2002-08-08 2010-08-31 Fujitsu Limited Wireless computer wallet for physical point of sale (POS) transactions
JP2004178338A (ja) 2002-11-28 2004-06-24 Hitachi Ltd 認証システム、および決済システム
KR20030047910A (ko) 2003-03-03 2003-06-18 주식회사 드림시큐리티 무선단말기를 이용한 전자결제방법
US7761374B2 (en) * 2003-08-18 2010-07-20 Visa International Service Association Method and system for generating a dynamic verification value
US8966276B2 (en) * 2003-09-12 2015-02-24 Emc Corporation System and method providing disconnected authentication
JP4616611B2 (ja) * 2004-10-08 2011-01-19 富士通株式会社 生体認証装置
JP2009510955A (ja) * 2005-10-05 2009-03-12 プリヴァスヒア アーゲー ユーザ認証の方法およびデバイス
US8041030B2 (en) * 2007-01-09 2011-10-18 Mastercard International Incorporated Techniques for evaluating live payment terminals in a payment system
US8152074B1 (en) * 2008-03-28 2012-04-10 Oracle America, Inc. Method for preparing by a smart card issuer an anonymous smart card and resulting structure
KR20100043799A (ko) 2008-10-21 2010-04-29 순천향대학교 산학협력단 Mtm 기반 모바일 단말기 간의 비밀 데이터 이전 방법
FR2946445B1 (fr) * 2009-06-05 2015-10-30 Jade I Procede d'acquisition d'une donnee en provenance d'un utilisateur lors d'un paiement par carte avec un terminal de paiement
KR20120053398A (ko) * 2010-11-17 2012-05-25 삼성전자주식회사 컨텐츠를 검증하기 위한 서명 장치와 검증 장치를 포함하는 검증 시스템 및 검증 방법

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8095113B2 (en) * 2007-10-17 2012-01-10 First Data Corporation Onetime passwords for smart chip cards
WO2012106757A1 (en) * 2011-02-07 2012-08-16 David Ball A smart card with verification means
CN102377570A (zh) * 2011-11-07 2012-03-14 飞天诚信科技股份有限公司 一种生成动态口令的方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2991263A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2636694C2 (ru) * 2016-01-25 2017-11-27 Акционерное общество "Национальная система платежных карт" Способ организации защищённого обмена сообщениями

Also Published As

Publication number Publication date
JP6200068B2 (ja) 2017-09-20
KR20150145238A (ko) 2015-12-29
CN104113411B (zh) 2017-09-29
EP2991263A4 (en) 2016-12-14
US20160071081A1 (en) 2016-03-10
CN104113411A (zh) 2014-10-22
EP2991263A1 (en) 2016-03-02
JP2016518661A (ja) 2016-06-23
US10839362B2 (en) 2020-11-17
EP2991263B1 (en) 2020-10-14

Similar Documents

Publication Publication Date Title
AU2021203815B2 (en) Methods for secure cryptogram generation
CN106664208B (zh) 使用安全传输协议建立信任的***和方法
CN106575326B (zh) 利用非对称加密实施一次性密码的***和方法
WO2014173280A1 (zh) 一种ic卡脱机pin验证方法以及ic卡脱机验证***
CN101350723B (zh) 一种USB Key设备及其实现验证的方法
TWI512524B (zh) 身份驗證系統及方法
JP2014524218A (ja) 証明書の検証
CN116629871B (zh) 一种订单线上支付***及支付方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14787517

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2016508002

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 14785193

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2014787517

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20157032359

Country of ref document: KR

Kind code of ref document: A