CN1981475A - Method of choosing one of a multitude of data sets being registered with a device and corresponding device - Google Patents
Method of choosing one of a multitude of data sets being registered with a device and corresponding device Download PDFInfo
- Publication number
- CN1981475A CN1981475A CN 200580022218 CN200580022218A CN1981475A CN 1981475 A CN1981475 A CN 1981475A CN 200580022218 CN200580022218 CN 200580022218 CN 200580022218 A CN200580022218 A CN 200580022218A CN 1981475 A CN1981475 A CN 1981475A
- Authority
- CN
- China
- Prior art keywords
- dev
- key
- encrypted
- exchange information
- remote device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域technical field
本发明涉及一种选择在设备中登记(register)的多个数据集之一的方法。The invention relates to a method of selecting one of a plurality of data sets registered in a device.
本发明还涉及一种设备,用于向远程设备呈现(present)在该设备中登记的多个数据集之一,以及涉及一种远程设备本身。The invention also relates to a device for presenting to a remote device one of a plurality of data sets registered in the device, and to a remote device itself.
背景技术Background technique
诸如智能卡和RFID(“射频识别”)标签之类的识别产品被广泛用于多种领域,例如交通(检票、收过路费、行李标记)、金融(借记卡和信用卡、电子钱包、商业卡)、通信(GSM电话的SIM卡)、以及跟踪(访问控制、库存管理、资产跟踪)。国际标准ISO14443A是非接触智能卡的工业标准。服从ISO14443A的产品比如MIFARETM提供了用于在卡或标签与读取器设备之间传送数据的RF通信技术。例如,在公共交通的电子检票中,旅行者仅仅在旋转式栅门或入口点处的读取器上挥动他们的卡,从而受益于在检票过程中改善的便利性和速度。这种产品被设定为在未来支持多应用的个体流动性的关键,所述应用包括收过路费、机票、访问控制和更多。Identification products such as smart cards and RFID (“Radio Frequency Identification”) tags are used in a wide variety of fields such as transportation (ticket checking, toll collection, luggage tagging), finance (debit and credit cards, e-wallets, business cards ), communication (SIM cards for GSM phones), and tracking (access control, inventory management, asset tracking). The international standard ISO14443A is an industry standard for contactless smart cards. ISO14443A compliant products such as MIFARE ™ provide RF communication technology for transferring data between a card or tag and a reader device. For example, in electronic ticketing for public transportation, travelers simply wave their cards at turnstiles or readers at entry points, thereby benefiting from improved convenience and speed during the ticketing process. This product is set to be key to supporting individual mobility for multiple applications in the future, including toll collection, airline tickets, access control and more.
从非接触识别和连网技术的组合发展而来的近场通信(NFC)是非常短距离的无线技术,例如以厘米为单位进行测量,并且被优化用于没有用户配置的各种设备之间的直观、容易和安全的通信。为了使两个设备通信,用户使它们靠近在一起或者甚至使它们接触。设备的NFC接口将自动连接并配置它们自己以形成对等网络。NFC还可以通过交换配置和会话数据来引导类似于BluetoothTM或无线以太网(WiFi)的其它协议。NFC与非接触智能卡平台兼容。这使得NFC设备能够从这些卡中读取信息,从而使非接触智能卡成为把信息和凭证带入NFC世界中的理想解决方案。NFC接口现在被广泛用于移动电话和其它移动设备。Near Field Communication (NFC), developed from a combination of contactless identification and networking technologies, is a very short-range wireless technology, such as measured in centimeters, and is optimized for use between various devices without user configuration intuitive, easy and secure communication. In order for two devices to communicate, the user brings them close together or even touches them. The NFC interfaces of the devices will automatically connect and configure themselves to form a peer-to-peer network. NFC can also bootstrap other protocols like Bluetooth ™ or Wireless Ethernet (WiFi) by exchanging configuration and session data. NFC is compatible with contactless smart card platforms. This enables NFC devices to read information from these cards, making contactless smart cards the ideal solution for bringing information and credentials into the NFC world. NFC interfaces are now widely used in mobile phones and other mobile devices.
从WO 01/93212和WO 04/57890得知这种设备还能够模拟若干智能卡。当特定应用需要被使用时,例如地铁检票,该设备可以把该应用呈现给相应读取器。所以,例如移动电话可以被用户用来替代所有他们的非接触智能卡,从而使移动电话变成通用钥匙和钱包。然而,为了选择应用,设备的用户必须在设备上对必须模拟哪个卡进行选择。这不是用户友好的,并且被看成是在接受能够模拟若干智能卡的设备时的主要障碍。Such devices are also known from WO 01/93212 and WO 04/57890 to be able to emulate several smart cards. When a specific application needs to be used, such as subway ticket checking, the device can present the application to the corresponding reader. So, for example, a mobile phone could be used by users to replace all their contactless smart cards, thus making the mobile phone a universal key and wallet. However, in order to select an application, the user of the device has to choose on the device which card has to be emulated. This is not user friendly and is seen as a major obstacle in accepting devices capable of emulating several smart cards.
发明内容Contents of the invention
本发明的目的是提供一种在开头段落中限定的类型的方法、以及在第二段中限定的类型的设备和远程设备,其允许把应用自动地呈现给诸如读取器之类的远程设备而不需要用户干预。It is an object of the present invention to provide a method of the type defined in the opening paragraph, and a device and a remote device of the type defined in the second paragraph, which allow the automatic presentation of an application to a remote device such as a reader without requiring user intervention.
为了实现上面限定的目的,利用根据本发明的方法提供了特有特征,以使根据本发明的方法可以以下面限定的方式来表征,也就是:In order to achieve the above-defined purpose, with the method according to the invention special features are provided, so that the method according to the invention can be characterized in the manner defined below, namely:
一种选择在设备中登记的多个数据集之一的方法,其中在选择之后,由该设备把所述一个数据集呈现给远程设备,以及其中每个数据集与一个特定密钥相关联,A method of selecting one of a plurality of data sets registered in a device, wherein after selection, said one data set is presented by the device to a remote device, and wherein each data set is associated with a specific key,
该方法包括以下步骤:The method includes the following steps:
a)加密交换信息a) Encrypted exchange information
a1)在所述设备中使用与数据集关联的多个密钥中的一个密钥,并且向远程设备发送加密的交换信息,或a1) using in said device one of the plurality of keys associated with the data set and sending an encrypted exchange message to the remote device, or
a2)在所述远程设备中使用在远程设备中存储的密钥,并且向所述设备发送加密的交换信息,a2) using in said remote device a key stored in the remote device and sending an encrypted exchange message to said device,
b)解密加密的交换信息b) Decrypt the encrypted exchange message
b1)在步骤a1)之后,在所述远程设备中使用在远程设备中存储的一个密钥,或b1) after step a1), using in said remote device a key stored in the remote device, or
b2)在步骤a2)之后,在所述设备中使用与数据集关联的多个密钥中的一个密钥,b2) after step a2), using in said device one of the plurality of keys associated with the data set,
c)将交换信息与根据步骤b)解密的交换信息进行比较,以及c) comparing the exchanged information with the exchanged information decrypted according to step b), and
d)如果比较的结果为真,则所述设备把数据集呈现给远程设备,或者如果所述比较为假,则使用与步骤a1)或步骤b2)中的另一数据集关联的密钥来执行步骤a)-d)。d) if the result of the comparison is true, the device presents the data set to the remote device, or if the comparison is false, uses the key associated with the other data set in step a1) or step b2) to Perform steps a)-d).
为了实现上面限定的目的,利用根据本发明的设备提供了特有特征,以使根据本发明的设备可以以下面限定的方式来表征,也就是:In order to achieve the objects defined above, with the device according to the invention special features are provided so that the device according to the invention can be characterized in the manner defined below, namely:
一种用于把利用设备记录的多个数据集之一呈现给远程设备的设备,其中每个数据集与一个特定密钥相关联,以及其中所述设备包括:利用与数据集关联的密钥之一加密交换信息的装置;向远程设备传送加密的交换信息的装置;从所述远程设备接收解密的交换信息的装置;将交换信息与解密的交换信息进行比较的装置;以及与比较装置交互来选择一个数据集的装置。A device for presenting to a remote device one of a plurality of data sets recorded with the device, wherein each data set is associated with a particular key, and wherein the device comprises: using the key associated with the data set means for encrypting exchanged information; means for transmitting encrypted exchanged information to a remote device; means for receiving decrypted exchanged information from said remote device; means for comparing exchanged information with decrypted exchanged information; and interacting with comparing means to select a dataset device.
此外,为了实现上面限定的目的,利用根据本发明的设备提供了特有特征,以使根据本发明的设备可以以下面限定的方式来表征,也就是:Furthermore, in order to achieve the objects defined above, with the device according to the invention special features are provided, so that the device according to the invention can be characterized in the manner defined below, namely:
一种用于把在设备中登记的多个数据集之一呈现给远程设备的设备,其中每个数据集与一个特定密钥相关联,以及其中所述设备包括:生成交换信息的装置;把交换信息传送给远程设备的装置;从所述远程设备接收加密数据的装置;利用与数据集关联的密钥之一解密所述加密的信息的装置;将交换信息与解密的交换信息进行比较的装置;以及与比较装置交互来选择一个数据集的装置。A device for presenting to a remote device one of a plurality of data sets registered in the device, wherein each data set is associated with a specific key, and wherein the device comprises: means for generating exchange information; means for transmitting exchanged information to a remote device; means for receiving encrypted data from said remote device; means for decrypting said encrypted information using one of the keys associated with a data set; comparing the exchanged information with the decrypted exchanged information means; and means for interacting with the comparison means to select a data set.
为了实现上面限定的目的,利用根据本发明的远程设备提供了特有特征,以使根据本发明的远程设备可以以下面限定的方式来表征,也就是:In order to achieve the objects defined above, with the remote device according to the present invention special features are provided such that the remote device according to the present invention can be characterized in the manner defined below, namely:
一种被提供用来与一个设备通信的远程设备,该设备被安排成用于把在该设备中登记的多个数据集之一呈现给所述远程设备,包括:生成交换信息的装置;把交换信息传送给所述设备的装置;从所述设备接收加密数据的装置;利用在远程设备中存储的密钥解密所述加密的信息的装置;将交换信息与解密的交换信息进行比较的装置;以及向所述设备发送比较装置的结果的装置。A remote device provided for communicating with a device arranged to present to said remote device one of a plurality of data sets registered in the device, comprising: means for generating exchanged information; means for transmitting exchange information to said device; means for receiving encrypted data from said device; means for decrypting said encrypted information using a key stored in a remote device; means for comparing exchange information with decrypted exchange information ; and means for sending the result of the comparing means to said device.
此外,为了实现上面限定的目的,利用根据本发明的远程设备提供了特有特征,以使根据本发明的远程设备可以以下面限定的方式来表征,也就是:Furthermore, in order to achieve the objects defined above, with the remote device according to the present invention special features are provided such that the remote device according to the present invention can be characterized in the manner defined below, namely:
一种被提供用来与一个设备通信的远程设备,所述设备被安排成把在该设备中登记的多个数据集之一呈现给所述远程设备,包括:利用在远程设备中存储的密钥加密交换信息的装置;向所述设备传送加密的交换信息的装置;从所述设备接收解密的交换信息的装置;将交换信息与解密的交换信息进行比较的装置;以及向所述设备发送比较装置的结果的装置。A remote device provided for communication with a device, the device being arranged to present to the remote device one of a plurality of data sets registered with the device, comprising: using a password stored in the remote device means for encrypting exchanged information with a key; means for transmitting encrypted exchanged information to said device; means for receiving decrypted exchanged information from said device; means for comparing exchanged information with decrypted exchanged information; and sending to said device A means to compare the results of means.
根据本发明的特有特征提供了不再需要用户必须手动选择设备上的应用的优点,因为由于所提出的设备与远程设备之间的通信,所述设备自动地确定哪个应用或对应于某个应用的哪个数据必须被呈现给远程设备。The characteristic features according to the invention provide the advantage that it is no longer necessary for the user to have to manually select an application on the device, since the device automatically determines which application or corresponds to a certain application thanks to the communication between the proposed device and the remote device of which data must be presented to the remote device.
所提出的方法以及设备的重要优点在于,密钥从不出现在理论上可以被探出的无线通信中。An important advantage of the proposed method and device is that the key is never present in the wireless communication, which could theoretically be probed.
在根据本发明的方法的第一实施例中,提供了由所述设备执行以下步骤:In a first embodiment of the method according to the invention, it is provided that the following steps are carried out by the device:
-生成交换信息;- generate exchange messages;
-根据步骤a1)加密所述交换信息;- encrypting said exchanged information according to step a1);
-从所述远程设备接收解密的交换信息;- receiving decrypted exchange information from said remote device;
-根据步骤c)比较交换信息;以及- comparing the exchanged information according to step c); and
-如果比较的结果为真,则把数据集呈现给远程设备;或者如果所述比较为假,则从使用与步骤a1)中另一数据集关联的密钥的生成或加密的步骤重新开始。- presenting the data set to the remote device if the result of the comparison is true; or restarting from the step of generation or encryption using a key associated with another data set in step al) if said comparison is false.
这些措施提供了以下优点:由于在设备中生成交换信息的事实,可以减少设备与远程设备之间的通信,这有助于节省时间和增加安全性。然而应当注意,在远程设备上创建交换信息原则上是可能的。These measures offer the advantage that due to the fact that exchanged information is generated in the device, the communication between the device and the remote device can be reduced, which contributes to saving time and increasing security. It should however be noted that it is in principle possible to create exchanged information on remote devices.
在根据本发明的方法的甚至更有利的实施例中,提供了由所述设备执行以下步骤:In an even more advantageous embodiment of the method according to the invention, it is provided that said device performs the following steps:
-生成交换信息并将其传送给远程设备;- Generate exchanged information and transmit it to the remote device;
-从所述远程设备接收加密的交换信息;- receiving encrypted exchange information from said remote device;
-根据步骤b2)解密所述加密的交换信息;- decrypting said encrypted exchange information according to step b2);
-根据步骤c)比较交换信息;以及- comparing the exchanged information according to step c); and
-如果比较的结果为真,则把数据集呈现给远程设备;或者如果所述比较为假,则从使用与步骤b2)中另一数据集关联的密钥的生成或解密的步骤重新开始。- presenting the data set to the remote device if the result of the comparison is true; or restarting from the step of generation or decryption using the key associated with the other data set in step b2) if said comparison is false.
本发明的该实施例提供了所述设备与远程设备之间的通信(由所述设备发送交换信息和由远程设备发送加密的信息)必须进行仅一次的进一步优点,因为利用不同密钥的后续解密仅仅在所述设备中进行。This embodiment of the invention provides the further advantage that the communication between the device and the remote device (sending of exchanged information by the device and encrypted information by the remote device) has to be done only once, since subsequent Decryption takes place only in the device.
当交换信息是随机数时,可以改善所述设备与远程设备之间通信的安全性。把随机数用作交换信息提供了使所谓的“重放攻击”不可能的优点。When the information exchanged is a random number, the security of the communication between the device and the remote device can be improved. Using nonces as exchanged information offers the advantage of making so-called "replay attacks" impossible.
根据特定应用的不同数据集在所述设备中被“登记”。术语“登记”是指数据集不必被直接存储在所述设备中,而是还可以例如被存储在(另一)远程设备比如远程服务器中,其中在被选择之后从该远程服务器中检索必需的数据集。此外,还可以想象得到,与数据集关联的密钥没有被存储在设备中,而是在需要时进行下载。Different data sets according to the specific application are "registered" in the device. The term "registered" means that the data set does not have to be stored directly in said device, but can also be stored, for example, in (another) remote device such as a remote server, from which the necessary data sets are retrieved after being selected. data set. Furthermore, it is also conceivable that the keys associated with the data sets are not stored on the device, but downloaded when needed.
然而,在本发明的有利实施例中,提供了把多个数据集和/或关联密钥存储在设备中。However, in an advantageous embodiment of the invention it is provided that a plurality of data sets and/or associated keys are stored in the device.
利用这些措施实现了下述优点:当两个设备接触时,可以立即开始该设备与远程设备之间的所提出的交互。然后建立与远程服务器的可能慢的和不稳定的连接是不必要的。此外,应当注意,在某些情形下(地铁、飞机等),因为网络是不可用的,所以可能发生不能建立与远程服务器的连接。因此,当数据集和相应密钥被存储在设备中时,这是特别有利的。With these measures, the advantage is achieved that the proposed interaction between the device and the remote device can start immediately when the two devices come into contact. Then establishing a possibly slow and unstable connection to the remote server is unnecessary. Furthermore, it should be noted that in some situations (metro, airplane, etc.) it may happen that a connection to the remote server cannot be established because the network is not available. This is therefore particularly advantageous when the data sets and corresponding keys are stored in the device.
如上所述,所提出的方法以及设备的优点是,密钥从不出现在与理论上可以被探出的远程设备的无线通信中。然而,为了进一步改善安全性,以安全方式把数据存储在设备中是有利的,例如以避免用户或他人对数据的未经授权的访问。As mentioned above, an advantage of the proposed method and device is that the key is never present in the wireless communication with the remote device which could theoretically be probed. However, in order to further improve security, it is advantageous to store the data in the device in a secure manner, eg to avoid unauthorized access to the data by the user or others.
尤其是特定解决方案的措施,即数据集以加密形式被存储在设备的第一存储器中,利用关联密钥来解密根据步骤d)所选的加密数据集,把解密的数据集存储在设备的更抗篡改的第二存储器中,这提供了以下优点:一方面有可能使用大的便宜的第一存储器来永久地存储加密数据,以及使用小的昂贵的第二存储器来在要使用解密的数据时临时地存储该解密的数据。该第二存储器可以由几个应用来共享,这降低了技术工作量和成本。In particular a solution-specific measure, i.e. the data set is stored in encrypted form in a first memory of the device, the encrypted data set selected according to step d) is decrypted using the associated key, the decrypted data set is stored in the device's In a more tamper-resistant second memory, this offers the advantage that on the one hand it is possible to use a large, cheap first memory to permanently store encrypted data, and a small, expensive second memory to use decrypted data later. Temporarily store the decrypted data from time to time. This second memory can be shared by several applications, which reduces technical effort and costs.
根据本发明,表示智能卡应用的加密数据现在被解密,并且被有利地装载到第二存储器中。According to the invention, the encrypted data representing the smart card application is now decrypted and advantageously loaded into the second memory.
对于上述加密过程,可以使用非对称加密,这意味着必须使用私有密钥和公用密钥。因而,交换信息可以利用私有密钥加密并利用公用密钥解密,反之亦然。对称加密也是适用的。For the encryption process described above, asymmetric encryption can be used, which means that a private key and a public key must be used. Thus, exchanged information can be encrypted with the private key and decrypted with the public key, and vice versa. Symmetric encryption is also applicable.
然而,在远程设备中存储的密钥与在设备中存储的密钥之一是相同的,此措施提供了以下优点:读取器与标签之间的公知通信可以用于本发明的目的,这意味着只须实施比非对称加密情况更少的变化,并且现有技术的读取器通常可以用于本发明的目的。However, the key stored in the remote device is the same as one of the keys stored in the device, which provides the advantage that the well-known communication between the reader and the tag can be used for the purpose of the present invention, which This means that fewer changes have to be implemented than in the case of asymmetric encryption, and that prior art readers can generally be used for the purposes of the present invention.
有利的是,上述第二存储器和/或所述解密装置是NFC接口的一部分。如上所述,NFC技术是从非接触识别即RFID技术和互连技术的组合发展而来的。NFC在通常为几厘米的距离上工作于13.56MHz频率范围,但是工程师还研制工作于高达1m的更大距离的系统。NFC技术在ISO 18092、ECMA 340和ETSI TS 102 190中被标准化。NFC还兼容基于ISO 14443广泛建立的非接触智能卡基础设施。NFC接口通常已经包括抗篡改存储器以及加密/解密模块。因此,使用这些模块来用于本发明是有利的。Advantageously, said second memory and/or said decryption means are part of the NFC interface. As mentioned above, NFC technology is developed from the combination of non-contact identification, that is, RFID technology and interconnection technology. NFC operates in the 13.56MHz frequency range over distances typically of a few centimeters, but engineers are also developing systems that work at greater distances up to 1m. NFC technology is standardized in ISO 18092, ECMA 340 and ETSI TS 102 190. NFC is also compatible with the widely established contactless smart card infrastructure based on ISO 14443. NFC interfaces usually already include tamper-resistant memory and encryption/decryption modules. Therefore, it is advantageous to use these modules for the present invention.
进一步有利的是,第一存储器被另外安排成存储用于操作所述设备的功能。设备通常包括非保密的主存储器,用于存储设备的操作系统。在该实施例中,加密数据以及用于操作系统的功能被存储在第一存储器中。因此,以协同方式使用第一存储器。It is further advantageous that the first memory is additionally arranged to store functions for operating the device. Devices typically include non-secure main memory for storing the device's operating system. In this embodiment, encrypted data and functions for the operating system are stored in the first memory. Therefore, the first memory is used in a cooperative manner.
最后有利的是,所述第二存储器被安排成存储所述密钥。对于一些应用,当把用于解密加密的数据的密钥存储在设备本身中时是有益的。在此情况下,所述密钥应当被存储在抗篡改第二存储器中以避免对加密数据的滥用。Finally advantageously, said second memory is arranged to store said key. For some applications it is beneficial when the key used to decrypt encrypted data is stored in the device itself. In this case, the key should be stored in a tamper-resistant second memory to avoid misuse of encrypted data.
附图说明Description of drawings
根据下文将要描述的实施例的例子,本发明的上面限定的方面和更多方面是显而易见的,并将参考实施例的这些例子对其进行解释。现在借助于示出本发明的有利实施例的附图来更详细地解释本发明。注意,这些例子不会是用来使本发明的宽范围变窄。The aspects defined above and further aspects of the invention are apparent from and are elucidated with reference to the examples of embodiment to be described hereinafter. The invention is now explained in more detail with the aid of the drawings showing an advantageous embodiment of the invention. Note that these examples are not intended to narrow the broad scope of the invention.
图1示出服务初始化以及加密数据的使用。Figure 1 illustrates service initialization and use of encrypted data.
图2示出用于建立服务的替代实施例。Figure 2 shows an alternative embodiment for establishing a service.
图3示出根据本发明选择多个加密数据集之一的方法的第一实施例。Fig. 3 shows a first embodiment of a method of selecting one of a plurality of encrypted data sets according to the invention.
图4示出根据本发明选择多个加密数据集之一的方法的第二实施例。Fig. 4 shows a second embodiment of a method of selecting one of a plurality of encrypted data sets according to the invention.
图5示出RFID标签与读取器之间的标准识别过程。Figure 5 shows the standard identification process between an RFID tag and a reader.
图6基于根据图5的RFID标签的标准识别再次示出如图4所示的方法的第二实施例。FIG. 6 shows again a second embodiment of the method shown in FIG. 4 based on the standard identification of the RFID tag according to FIG. 5 .
图7-10示出根据本发明的方法的不同变形的概观。7-10 show overviews of different variants of the method according to the invention.
具体实施方式Detailed ways
图1和图2示出一种设备和方法,其中可以以解密的格式使用在设备DEV中存储的加密数据DATenc,而不向设备DEV的所有者提供对所述解密数据DAT的访问。这种设备DEV可以有利地供本发明使用。特别地,图1示出一种安排,包括设备DEV以及由服务器SER和读取器RD构成的两个远程设备。所述设备DEV在该实例中是移动电话或者PDA,它包括第一存储器MEM1和更抗篡改的第二存储器MEM2以及加密/解密模块ENC/DEC。该实例中的所述第一存储器MEM1假定是用于操作系统和供设备DEV使用所需的其它数据的存储器。由于通常没有或者仅有较小程序来保护设备DEV的主存储器被滥用,因此改变在这种存储器中存储的数据通常是非常容易的。因此,敏感数据,例如在移动电话情况下的IMSI(国际移动用户标识),被存储在抗篡改存储器中,例如被存储在SIM(用户识别模块)中。另一实例是越来越成为移动电话的一部分或者被移动电话分别模拟的智能卡。在该情况下,还必须提及根据用于近场通信(NFC)的标准来操作的接口。该接口实现与读取器RD的短距离通信,并且通常还包括抗篡改存储器以及用于加密和解密的装置。因此,该实例假定第二存储器MEM2和加密/解密模块ENC/DEC是NFC(近场通信)接口INT的一部分。Figures 1 and 2 show a device and a method in which encrypted data DATenc stored in a device DEV can be used in a decrypted format without providing the owner of the device DEV with access to said decrypted data DAT. Such a device DEV can advantageously be used with the present invention. In particular, Figure 1 shows an arrangement comprising a device DEV and two remote devices consisting of a server SER and a reader RD. Said device DEV is in this example a mobile phone or a PDA comprising a first memory MEM1 and a second, more tamper-resistant memory MEM2 as well as an encryption/decryption module ENC/DEC. Said first memory MEM1 in this example is assumed to be the memory for the operating system and other data required for use by the device DEV. Since there is usually no or only a small program to protect the main memory of the device DEV from misuse, it is usually very easy to change the data stored in such memory. Sensitive data, such as the IMSI (International Mobile Subscriber Identity) in the case of a mobile phone, is therefore stored in a tamper-resistant memory, such as a SIM (Subscriber Identity Module). Another example is smart cards that are increasingly becoming part of mobile phones or emulated separately by mobile phones. In this case, mention must also be made of an interface operating according to a standard for Near Field Communication (NFC). This interface enables short-range communication with the reader RD and usually also includes tamper-resistant memory and means for encryption and decryption. Therefore, the example assumes that the second memory MEM2 and the encryption/decryption modules ENC/DEC are part of the NFC (Near Field Communication) interface INT.
该安排的功能如下:在第一步骤中,也能够根据NFC标准通信的读取器RD向设备DEV发送加密数据DATenc(实线)。在本情况下,加密数据DATenc表示用于公共交通中检票的应用,该应用在可以使用前被安装在设备DEV中。一旦接收到加密数据DATenc,因此就把所述加密数据DATenc存储在第一存储器MEM1中。The function of this arrangement is as follows: In a first step, the reader RD, also capable of communicating according to the NFC standard, sends encrypted data DATenc (solid line) to the device DEV. In the present case, the encrypted data DATenc represent an application for ticket checking in public transport, which application is installed in the device DEV before it can be used. Once received, the encrypted data DATenc are thus stored in the first memory MEM1.
可选择地,服务器SER还可以提供加密数据DATenc。这由图中从服务器SER到设备DEV的虚线来指示。在此情况下,假设服务器SER是因特网的一部分,并且保持上述的应用。根据请求,可以经由比较快(和非保密)的因特网连接来下载加密数据DATenc。所述请求可以由设备DEV直接发送给服务器SER或者通过读取器RD发送给服务器SER。Optionally, the server SER can also provide encrypted data DATenc. This is indicated by the dotted line in the figure from the server SER to the device DEV. In this case, it is assumed that the server SER is part of the Internet and holds the above-mentioned applications. On request, the encrypted data DATenc can be downloaded via a relatively fast (and unsecured) Internet connection. Said request can be sent by the device DEV directly to the server SER or by the reader RD to the server SER.
原则上,设备DEV现在随时可以被使用。因此,当设备DEV在读取器RD的附近时,在第二步骤,密钥K从读取器RD被发送给设备DEV(实线)。在第三步骤中,从第一存储器MEM1读取加密数据DATenc,并且借助于加密/解密模块ENC/DEC和从读取器RD接收的密钥K对其进行解密。在第四步骤中,该解密结果,即数据DAT被存储在第二存储器MEM2中。现在设备DEV与读取器RD之间的通信可以进行,因为它可以从现有技术系统中得知。数据DAT也可以包括变量和代码。In principle, the device DEV is now ready to be used. Thus, when the device DEV is in the vicinity of the reader RD, in a second step the key K is sent from the reader RD to the device DEV (solid line). In a third step, the encrypted data DATenc is read from the first memory MEM1 and decrypted by means of the encryption/decryption module ENC/DEC and the key K received from the reader RD. In a fourth step, the decryption result, ie the data DAT, is stored in the second memory MEM2. Now the communication between the device DEV and the reader RD can take place, as it is known from prior art systems. Data DAT can also include variables and codes.
在一个替代实施例中,密钥K在服务初始化期间被存储在设备DEV中,这意味着从读取器RD或服务器SER接收到加密数据DATAenc。加密数据DATAenc可以经由如上所述的非保密通信信道进行发送。唯一的限制是把密钥k保密。因此,小密钥K经由慢但安全的近场通信(点划线)进行发送并被存储在第二存储器MEM2中。In an alternative embodiment, the key K is stored in the device DEV during service initialization, which means that the encrypted data DATAenc is received from the reader RD or the server SER. The encrypted data DATAenc may be sent via an unsecured communication channel as described above. The only restriction is to keep the key k secret. Therefore, the small key K is sent via slow but secure near field communication (dashed line) and stored in the second memory MEM2.
原则上,设备DEV现在随时可以被再次使用,其中例如可以人工启动过程,而不是由读取器RD远程启动过程。此外,与上述的方法相反,密钥k不是从读取器RD接收,而是从第二存储器MEM2被发送到加密/解密模块ENC/DEC。加密数据DATenc再次被解密,并且此解密的结果即数据DAT被存储在第二存储器MEM2。设备DEV与读取器RD之间的通信可以如前所述那样进行。In principle, the device DEV can now be used again at any time, wherein for example the process can be started manually instead of remotely by the reader RD. Furthermore, contrary to the method described above, the key k is not received from the reader RD but sent from the second memory MEM2 to the encryption/decryption module ENC/DEC. The encrypted data DATenc is decrypted again, and the result of this decryption, data DAT, is stored in the second memory MEM2. Communication between the device DEV and the reader RD can take place as previously described.
设备DEV与读取器RD之间的通信信道假设是安全的。而且,第二存储器MEM2如前所述是抗篡改的。因此,误用密钥k来滥用地改变加密数据DATAenc以及例如买票而不付款是不可能的。该方法的优点在于,通常使用大存储空间的应用可以被存储在便宜的标准存储器中,并且被临时装载到昂贵的抗篡改第二存储器MEM2中,如后面更详细解释的那样,可以以这种方式在若干服务之间共享第二存储器MEM2。The communication channel between the device DEV and the reader RD is assumed to be secure. Furthermore, the second memory MEM2 is tamper-resistant as described above. It is therefore not possible to misuse the key k to abusively alter the encrypted data DATAenc and, for example, to buy a ticket without paying for it. The advantage of this method is that applications, which usually use a large memory space, can be stored in an inexpensive standard memory and temporarily loaded into an expensive tamper-resistant second memory MEM2, as explained in more detail later, in this way The mode shares the second memory MEM2 between several services.
图2示出本发明设备DEV的替代实施例。设备DEV被再次示出为与由服务器SER和读取器RD构成的两个远程设备相结合。除了图1外,设备DEV还包括随机数发生器RAND,它是NFC的接口INT的一部分。FIG. 2 shows an alternative embodiment of the inventive device DEV. The device DEV is again shown in combination with two remote devices consisting of a server SER and a reader RD. In addition to FIG. 1 , the device DEV also includes a random number generator RAND which is part of the interface INT of the NFC.
图2的安排的功能如下:首先,未加密数据DAT经由短距离通信从读取器RD被发送给设备DEV,并在那里被存储在第二存储器MEM2中(实线)。在第二步骤中,随机密钥K通过随机数发生器RAND生成,并且被存储在第二存储器MEM2中,以及被发送给加密/解密模块ENC/DEC。在第三步骤中,数据DAT借助于加密/解密模块ENC/DEC利用所述密钥K加密。最后,作为该步骤的结果,即加密数据DATenc在第四步骤中被存储在第一存储器MEM1中。The function of the arrangement of Fig. 2 is as follows: Firstly, unencrypted data DAT is sent via short-range communication from the reader RD to the device DEV and stored there in the second memory MEM2 (solid line). In a second step, the random key K is generated by the random number generator RAND, stored in the second memory MEM2, and sent to the encryption/decryption module ENC/DEC. In a third step, the data DAT are encrypted with said key K by means of an encryption/decryption module ENC/DEC. Finally, as a result of this step, the encrypted data DATenc is stored in the first memory MEM1 in a fourth step.
此外,还可以由服务器SER发送数据DAT(虚线)。与图1的实施例相反,这里,安全通信信道应当存在于服务器SER与设备DEV之间,因为数据DAT未被加密。还可以想象得到,数据DAT经由抗篡改通信信道(例如借助于公司内部网络)从服务器SER被发送给读取器RD(点划线),然后经由短距离无线通信链路被发送给设备DEV。Furthermore, data DAT (dotted line) can also be sent by the server SER. Contrary to the embodiment of Fig. 1, here a secure communication channel should exist between the server SER and the device DEV, since the data DAT is not encrypted. It is also conceivable that the data DAT is sent from the server SER to the reader RD (dot-dash line) via a tamper-resistant communication channel (for example by means of a company internal network) and then to the device DEV via a short-range wireless communication link.
下面的图3-10描述了把已经登记的、特别是在设备DEV中存储的多个应用之一呈现给读取器RD的方法的不同实施例。Figures 3-10 below describe different embodiments of a method of presenting to a reader RD one of a plurality of applications already registered, in particular stored in the device DEV.
图1和图2示出这样一种设备DEV,它能够用于把多个应用之一呈现给读取器RD的方法。此外,图1和图2解释了加密数据DATenc能够如何以解密格式被存储在这样的设备DEV中,而不向设备DEV的所有者(或其他人)提供对所述解密数据DAT的访问。由于这个原因,使用这种发明的设备DEV来用于如所要求和如在下文中(图3-6)所述的根据本发明的方法是有利的。Figures 1 and 2 show a device DEV which can be used for a method of presenting one of a plurality of applications to a reader RD. Furthermore, Figures 1 and 2 explain how encrypted data DATenc can be stored in such a device DEV in a decrypted format without providing the owner of the device DEV (or others) with access to said decrypted data DAT. For this reason, it is advantageous to use such an inventive device DEV for the method according to the invention as claimed and as described below ( FIGS. 3-6 ).
然而应当注意,使用不包括第一存储器MEM1和第二存储器MEM2的设备(类似于如上面在图1和图2中所述的设备DEV),如在下文中所述的根据本发明的方法原则上也是适用的。It should however be noted that using a device (similar to the device DEV as described above in FIGS. 1 and 2 ) which does not comprise the first memory MEM1 and the second memory MEM2, the method according to the invention as described hereinafter in principle is also applicable.
此外,原则上不必使用如在下文中所述的加密数据DATenc或数据集DS1enc...DSnenc,以及根据本发明的方法也适用于在设备DEV中存储的未加密的数据(集)。然而,由于涉及加密数据DATenc的安全存储的上述原因,因此供该方法使用的数据(集)采用加密形式是有利的。因此,在下文中将使用加密数据DATenc来描述如在权利要求书中所要求的根据本发明的方法。然而,本发明的范围不限于加密数据集DS1enc...DSnenc的使用。Furthermore, in principle it is not necessary to use encrypted data DATenc or data sets DS1enc . However, it is advantageous for the data (sets) used by the method to be in encrypted form for the reasons mentioned above concerning the secure storage of the encrypted data DATenc. Therefore, the encrypted data DATenc will be used in the following to describe the method according to the invention as claimed in the claims. However, the scope of the invention is not limited to the use of encrypted data sets DS1enc...DSnenc.
图3示出可以如何把某个应用呈现给远程设备(这里是以读取器RD的形式)的根据本发明的方法的第一实现。对于该实例,假设加密数据DATenc被划分成若干加密数据集DS1enc...DSnenc,它们表示不同的智能卡应用,一个用于公共交通,一个用于电影院检票,一个用于公司身份卡,等等。在图1或图2所示的初始化例程期间之前已经存储这些加密数据集DS1enc...DSnenc。以不同方式存储应用也是可能的,例如由设备DEV(例如移动电话)的供应商直接存储。每个加密数据集DS1enc...DSnenc具有存储在第二存储器MEM2中的关联密钥K1...Kn。与图2对比,设备DEV另外包括比较器COMP,以及读取器RD另外包括加密/解密模块ENC/DEC’。Figure 3 shows how a first implementation of the method according to the invention can present a certain application to a remote device, here in the form of a reader RD. For this example, it is assumed that the encrypted data DATenc is divided into several encrypted data sets DS1enc...DSnenc, which represent different smart card applications, one for public transport, one for cinema ticket checking, one for company identity cards, and so on. These encrypted data sets DS1enc . . . DSnenc have been previously stored during the initialization routine shown in FIG. 1 or FIG. 2 . It is also possible to store the application in a different way, eg directly by the supplier of the device DEV (eg mobile phone). Each encrypted data set DS1enc...DSnenc has an associated key K1...Kn stored in the second memory MEM2. In contrast to Fig. 2, the device DEV additionally comprises a comparator COMP, and the reader RD additionally comprises an encryption/decryption module ENC/DEC'.
图3的安排的功能如下:当设备DEV在读取器RD附近时,它必须确定由加密数据集DS1enc...DSnenc表示的应用中的哪个应用必须被选择。The function of the arrangement of Fig. 3 is as follows: When the device DEV is in the vicinity of the reader RD, it has to determine which of the applications represented by the encrypted data sets DS1enc...DSnenc has to be selected.
在第一步骤中,由设备DEV生成交换信息。当交换信息是由随机数发生器RAND生成的随机数时,这是有利的。In a first step, exchange information is generated by the device DEV. This is advantageous when the exchange information is a random number generated by the random number generator RAND.
在第二步骤中,设备DEV利用多个密钥K1...Kn中的一个密钥Kx加密该随机数R。所述密钥Kx还用于解密关联的加密数据集DSx。接着,在第三步骤中,把加密随机数Renc发送给读取器RD。在第四步骤中,加密随机数Renc借助于读取器RD的加密/解密模块ENC/DEC’利用读取器密钥Krd解密。该操作的结果即读取器随机数Rrd随后被回送给设备DEV,并且在第五步骤中借助于比较器COMP将其与原始随机数R进行比较。In a second step, the device DEV encrypts the random number R with a key Kx of a plurality of keys K1 . . . Kn. Said key Kx is also used to decrypt the associated encrypted data set DSx. Next, in a third step, the encrypted random number Renc is sent to the reader RD. In a fourth step, the encrypted random number Renc is decrypted with the reader key Krd by means of the encryption/decryption module ENC/DEC' of the reader RD. The result of this operation, the reader random number Rrd, is then sent back to the device DEV and compared with the original random number R in a fifth step by means of the comparator COMP.
如果所述比较的结果为真,意味着随机数R和读取器随机数Rrd是相同的,则正确密钥Kx被找到(假设用于对称加密的正确操作)。然后,在第六步骤中,与所述密钥Kx关联的加密数据集Dsxenc借助于加密/解密模块ENC/DEC利用密钥Kx解密。在第七步骤中,解密的结果即数据DSx被存储在第二存储器MEM2中(虚线)。现在,设备DEV随时可供例如公共交通使用。If the result of said comparison is true, meaning that the nonce R and the reader nonce Rrd are identical, the correct key Kx has been found (assuming correct operation for symmetric encryption). Then, in a sixth step, the encrypted data set Dsxenc associated with said key Kx is decrypted with the key Kx by means of an encryption/decryption module ENC/DEC. In a seventh step, the result of the decryption, the data DSx, is stored in the second memory MEM2 (dotted line). Now, the device DEV is readily available for eg public transport.
在随机数的比较为真的情况下,与设备DEV中加密数据集DSxenc关联的用来加密随机数R的密钥Kx和在读取器RD上用来解密加密的随机数R的密钥Krd是相同的,即Kx=Krd。这意味着正确的应用或数据集DSxenc被找到。The key Kx used to encrypt the random number R associated with the encrypted data set DSxenc in the device DEV and the key Krd used to decrypt the encrypted random number R on the reader RD if the comparison of the random number is true are the same, ie Kx=Krd. This means that the correct application or dataset DSxenc was found.
如果所述比较的结果为假,即如果随机数R和读取器随机数Rrd不相同,则设备DEV上使用的密钥Kx和读取器RD上使用的密钥Krd是不相同的,这意味着正确的数据集/正确的应用还未被找到。新的循环开始,随之使用生成的新随机数或者与已在第一循环中生成的相同的随机数R,用设备DEV上的新密钥来加密该随机数R。该加密的随机数被发送给远程读取器RD等。所述循环被递归地执行,直至上述比较的结果为真。If the result of the comparison is false, i.e. if the random number R and the reader random number Rrd are different, then the key Kx used on the device DEV and the key Krd used on the reader RD are not the same, which means Means the correct data set/correct application has not been found yet. A new cycle starts, whereupon the random number R is encrypted with a new key on the device DEV using a new generated random number or the same random number R as already generated in the first cycle. This encrypted random number is sent to the remote reader RD or the like. The loop is executed recursively until the result of the above comparison is true.
图4示出可以如何把某个应用呈现给读取器RD的根据本发明的方法的另一实现。再次假定加密数据DATenc被划分为若干加密数据集DS1enc...DSnenc,它们表示不同的智能卡应用,一个用于公共交通,一个用于电影院检票,一个用于公司身份卡,等等。在图1或图2所示的初始化例程期间之前已经存储这些加密数据集DS1enc...DSnenc。以不同方式存储应用也是可能的,例如如上所述,应用由设备DEV(例如移动电话)的供应商直接存储。Fig. 4 shows another implementation of the method according to the invention how a certain application may be presented to the reader RD. Assume again that the encrypted data DATenc is divided into several encrypted data sets DS1enc...DSnenc, which represent different smart card applications, one for public transport, one for cinema ticket checking, one for corporate identity cards, and so on. These encrypted data sets DS1enc . . . DSnenc have been previously stored during the initialization routine shown in FIG. 1 or FIG. 2 . It is also possible to store the application in a different way, eg directly by the supplier of the device DEV (eg mobile phone) as mentioned above.
再次,每个加密数据集DS1enc...DSnenc具有在第二存储器MEM2中存储的关联密钥K1...Kn。与图2对比,设备DEV另外包括比较器COMP,以及读取器RD另外包括加密/解密模块ENC/DEC’。Again, each encrypted data set DS1enc...DSnenc has an associated key K1...Kn stored in the second memory MEM2. In contrast to Fig. 2, the device DEV additionally comprises a comparator COMP, and the reader RD additionally comprises an encryption/decryption module ENC/DEC'.
图4的安排的功能如下:当设备DEV在读取器RD附近时,它必须确定由加密数据集DS1enc...DSnenc表示的应用中的哪个应用必须被选择。The function of the arrangement of Fig. 4 is as follows: When the device DEV is in the vicinity of the reader RD, it has to determine which of the applications represented by the encrypted data sets DS1enc...DSnenc has to be selected.
在第一步骤中,交换信息由设备DEV生成。当交换信息是由随机数发生器RAND生成的随机数R时,这再次是有利的。在第二步骤中,设备DEV把该随机数R传送给读取器RD。在第三步骤中,读取器RD利用在读取器RD中存储的密钥Krd加密该随机数R。在第四步骤中,读取器RD把加密随机数Renc’回送给设备DEV。在第五步骤中,借助于设备DEV的加密/解密模块ENC/DEC利用在设备DEV中存储的密钥K1...Kn中的一个密钥Kx解密该加密随机数Renc’,以及在第六步骤中,所得到的随机数R’在比较器COMP中与原始随机数R进行比较。In a first step, exchange messages are generated by the device DEV. This is again advantageous when the exchanged information is a random number R generated by the random number generator RAND. In a second step, the device DEV transmits this random number R to the reader RD. In a third step, the reader RD encrypts this random number R with the key Krd stored in the reader RD. In a fourth step, the reader RD sends back the encrypted random number Renc' to the device DEV. In the fifth step, the encrypted random number Renc' is decrypted by means of the encryption/decryption module ENC/DEC of the device DEV using one of the keys Kx stored in the device DEV, and in the sixth step In step, the obtained random number R' is compared with the original random number R in the comparator COMP.
如果所述比较的结果为真,即原始随机数R和通过加密随机数Renc’的解密而接收的随机数R’是相同的,则用于设备DEV中解密的密钥Kx和用于读取器RD中加密的密钥Krd是相同的。这意味着要呈现给读取器RD的正确应用或数据集DSxenc被找到。然后在第七步骤中,与所述密钥Kx关联的加密数据集DSxenc借助于加密/解密模块ENC/DEC利用在设备DEV中的密钥Kx解密。在第八步骤中,解密的结果,即数据DSx被存储在第二存储器MEM2中(虚线)。设备DEV现在随时可以供例如公共交通使用。If the result of the comparison is true, that is, the original random number R and the random number R' received by decrypting the encrypted random number Renc' are the same, then the key Kx used for decryption in the device DEV and the key Kx used to read The encrypted key Krd in the device RD is the same. This means that the correct application or data set DSxenc to be presented to the reader RD is found. Then in a seventh step, the encrypted data set DSxenc associated with said key Kx is decrypted with the key Kx in the device DEV by means of the encryption/decryption module ENC/DEC. In an eighth step, the result of the decryption, the data DSx is stored in the second memory MEM2 (dotted line). The device DEV is now ready for use eg by public transport.
正如上面已经提到的那样,在随机数的比较为真的情况下,在设备DEV中使用的用来解密加密的随机数Renc’的密钥Kx和在读取器RD中使用的用来加密原始随机数R的密钥Krd是相同的,即Kx=Krd。这意味着正确的应用或加密数据集DSxenc被找到。As already mentioned above, the key Kx used in the device DEV to decrypt the encrypted random number Renc' and the key Kx used in the reader RD to encrypt The key Krd of the original random number R is the same, ie Kx=Krd. This means that the correct application or encrypted dataset DSxenc was found.
如果所述比较的结果为假,即随机数R和R’不相同,则在设备DEV中使用的密钥Kx和在读取器RD上使用的密钥Krd是不相同的,这意味着正确的数据集/正确的应用还未被找到。在此情况下,在设备DEV中存储的另一密钥用来解密加密的随机数Renc’,并且所得到的随机数与原始随机数R进行比较。该过程进行重复,直至随机数R和R’相同,并且找到正确的应用。If the result of said comparison is false, that is, the random numbers R and R' are not the same, then the key Kx used in the device DEV and the key Krd used on the reader RD are not the same, which means correct The dataset/proper application has not been found. In this case, another key stored in the device DEV is used to decrypt the encrypted random number Renc', and the resulting random number is compared with the original random number R. This process is repeated until the random numbers R and R' are the same and the correct application is found.
如结合图4所述的方法提供了以下优点:将随机数R加密成加密的随机数Renc’以及设备DEV与读取器RD之间的通信(发送随机数R和加密的随机数Renc’)必须进行仅一次,因为利用不同密钥的后续解密仅仅在设备DEV中进行。与此相反,如图3所述的方法使下述成为必需的,即如果在第一循环中不能找到正确的应用,则设备DEV与读取器RD之间的双向通信必须再次进行。The method as described in connection with FIG. 4 provides the advantages of encrypting the random number R into an encrypted random number Renc' and the communication between the device DEV and the reader RD (sending the random number R and the encrypted random number Renc') This has to be done only once, since subsequent decryption with a different key is only done in the device DEV. In contrast, the method described in FIG. 3 necessitates that, if the correct application cannot be found in the first cycle, the two-way communication between the device DEV and the reader RD has to be performed again.
将参考图5和图6进一步描述如图4所述的方法。图5示出在应答器例如RFID标签TRA(它存储用于一个应用的数据和相应密钥K)与读取器RD之间的公知通信。通常,在任何通信可能发生之前RFID标签需要验证。图5示出这种交互。相互验证过程从读取器RD向标签TRA发送GET_CHALLENGE命令开始。然后在标签TRA中生成随机数R,并将其回送给读取器RD。读取器RD使用在读取器RD中存储的其秘密密钥Krd和公共算法来计算包含加密随机数Renc’和附加控制数据的加密数据块TK1,并把它回送给标签TRA。接收的加密数据块TK1在标签TRA中被解密,并且将在数据块TK1中包含的随机数R’与先前发送的随机数R进行比较。如果两个一致,则标签TRA检测到相同的密钥K=Krd在使用。标签TRA然后加密由读取器RD发送的控制数据,并且利用第二加密数据块TK2对其进行回送,从而允许读取器RD也证实相同的密钥K=Krd以类似的方式在使用。假设读取器RD还检测到相同的密钥K=Krd在使用,则最终在标签TRA与读取器RD之间的数据交换可以进行。The method as described in FIG. 4 will be further described with reference to FIGS. 5 and 6 . Fig. 5 shows the known communication between a transponder such as an RFID tag TRA (which stores data for one application and a corresponding key K) and a reader RD. Typically, RFID tags require authentication before any communication can occur. Figure 5 illustrates this interaction. The mutual authentication process starts with the reader RD sending a GET_CHALLENGE command to the tag TRA. A random number R is then generated in the tag TRA and sent back to the reader RD. The reader RD uses its secret key Krd and the public algorithm stored in the reader RD to calculate an encrypted data block TK1 containing the encrypted random number Renc' and additional control data and sends it back to the tag TRA. The received encrypted data block TK1 is decrypted in the tag TRA and the random number R' contained in the data block TK1 is compared with the previously transmitted random number R. If the two agree, the tag TRA detects that the same key K=Krd is in use. The tag TRA then encrypts the control data sent by the reader RD and sends it back with a second encrypted data block TK2, allowing the reader RD to also verify that the same key K=Krd is being used in a similar manner. Assuming that the reader RD also detects that the same key K=Krd is in use, finally the data exchange between the tag TRA and the reader RD can take place.
读取器RD与标签TRA之间的这种验证过程还用于如图4所述的根据本发明的方法。在图6中,图5的标签TRA由如图4所述的设备DEV比如移动电话或PDA来替代。不同的标签,例如地铁票、电影票等,在设备DEV中被登记。该登记包含加密数据集DS1enc...DSnec以及供验证使用的密钥K1...Kn。加密数据集DS1enc...DSnec被存储在安全存储器MEM1的数据库CDB中,如上面在图4中所述。密钥K1...Kn被存储在设备DEV的安全的更抗篡改的存储器MEM2中的密钥数据库KDB中。This authentication process between the reader RD and the tag TRA is also used for the method according to the invention as described in FIG. 4 . In FIG. 6, the label TRA of FIG. 5 is replaced by a device DEV as described in FIG. 4, such as a mobile phone or a PDA. Different tags, such as subway tickets, movie tickets, etc., are registered in the device DEV. The registry contains encrypted data sets DS1enc...DSnec and keys K1...Kn for authentication. The encrypted data sets DS1enc...DSnec are stored in the database CDB of the secure memory MEM1, as described above in FIG. 4 . The keys K1 . . . Kn are stored in a key database KDB in a secure, more tamper-resistant memory MEM2 of the device DEV.
当设备DEV被呈现给读取器设备DEV时,最初使用如参考图5所述的基本交互。在接收到加密数据块TK1之后,该交互分支成如图6所述的方案。When the device DEV is presented to the reader device DEV, the basic interaction as described with reference to Figure 5 is initially used. After the encrypted data block TK1 is received, the interaction branches into the scheme described in FIG. 6 .
一旦读取器RD利用如图5所示的加密数据块TK1进行响应,则设备DEV从密钥数据库KDB中检索密钥Kx,并使用该密钥来解密加密的数据块TK1。设备DEV尝试一个接一个的密钥,直至找到正确的密钥,并且设备DEV把正确的数据集DSxenc(DSx)呈现给读取器,如在图4中更详细地所述。Once the reader RD responds with the encrypted data block TK1 as shown in Fig. 5, the device DEV retrieves the key Kx from the key database KDB and uses this key to decrypt the encrypted data block TK1. The device DEV tries one key after another until the correct key is found, and the device DEV presents the correct data set DSxenc (DSx) to the reader, as described in more detail in FIG. 4 .
在图3-6的说明中,假设了不同的应用即加密数据集DS1enc...DSnenc和相应密钥K1...Kn已经被存储在设备DEV中。然而,还可能出现应用仅仅在设备DEV中进行登记的情况。在此情况下,(加密)数据集DS1enc...DSnenc未被直接存储在设备DEV中,而是例如被存储在服务器SER中,如果设备DEV需要数据集,则可以从该服务器SER下载加密数据集DS1enc...DSnenc之一,例如如在图1和2中所述。在下载之后,下载的数据集DSxenc被存储在设备DEV中,然后由设备DEV呈现给远程设备RD。In the illustrations of Figs. 3-6 it was assumed that different applications, namely encrypted data sets DS1enc...DSnenc and corresponding keys K1...Kn have been stored in the device DEV. However, it may also happen that the application is only registered in the device DEV. In this case the (encrypted) data sets DS1enc...DSnenc are not stored directly in the device DEV, but e.g. in a server SER from which encrypted data can be downloaded if the device DEV requires the data set Set one of DS1enc . . . DSnenc, eg as described in FIGS. 1 and 2 . After downloading, the downloaded dataset DSxenc is stored in the device DEV and then presented by the device DEV to the remote device RD.
在设备DEV是(移动)电话的情况下,有可能的是,设备DEV从登记的应用(标签)的远程数据库CDB中检索与特定应用关联的数据集。该数据集然后被装载到NFC硬件的工作存储器中。现在,该交互可以以操作的标准模式继续,因为设备DEV正在模拟仅仅一个标签TRA。In case the device DEV is a (mobile) phone, it is possible that the device DEV retrieves a data set associated with a specific application from a remote database CDB of registered applications (tags). This data set is then loaded into the working memory of the NFC hardware. Now, the interaction can continue in the standard mode of operation, since the device DEV is simulating only one tag TRA.
以密钥被存储在第二存储器MEM2中的顺序来尝试密钥K1..Kn不是必须的。还有可能的是,密钥K1...Kn具有不同的权重,这取决于每隔多久使用它们,由此降低搜索时间。这里,搜索从具有是正确密钥的最大可能性的密钥Kx开始。It is not necessary to try the keys K1..Kn in the order in which they are stored in the second memory MEM2. It is also possible that the keys K1...Kn have different weights depending on how often they are used, thereby reducing the search time. Here, the search starts with the key Kx that has the greatest likelihood of being the correct key.
还可以想象得到,不同于用于解密关联加密数据集DSx的密钥Kx的密钥被用来选择适当的应用。所以,每个加密数据集DSx与两个密钥关联。一个用于解密,一个与读取器密钥Krd相同。It is also conceivable that a key different from the key Kx used to decrypt the associated encrypted data set DSx is used to select the appropriate application. Therefore, each encrypted data set DSx is associated with two keys. One for decryption and one same as the reader key Krd.
使用对称加密也不是必须的。使用利用公用和私有密钥的不对称加密也是可以想象得到的。It is also not necessary to use symmetric encryption. It is also conceivable to use asymmetric encryption using public and private keys.
应当注意,加密/解密模块ENC/DEC、随机数发生器RAND以及比较器COMP未必是NFC接口INT的一部分。然而,所示的安排是优选的,因为NFC接口INF总体上被认为是抗篡改的,或者至少比设备DEV的剩余部分更抗篡改。It should be noted that the encryption/decryption module ENC/DEC, the random number generator RAND and the comparator COMP are not necessarily part of the NFC interface INT. However, the arrangement shown is preferred because the NFC interface INF is generally considered to be tamper-resistant, or at least more tamper-resistant than the rest of the device DEV.
应当进一步提及,本发明不限于智能卡应用。而是,加密数据必须被解密的任何设备都是合适的,特别是具有安全第二存储器的适配PC。设备DEV与读取器RD通信也不是必须的。在两个类似设备DEV(例如两个NFC兼容移动电话)之间进行通信是可以想象得到的。一个应用可以是在两个电话(每个具有加密账户)之间(数字)货币的交换。It should be further mentioned that the invention is not limited to smart card applications. Rather, any device where encrypted data must be decrypted is suitable, in particular an adapted PC with a secure second memory. It is also not necessary for the device DEV to communicate with the reader RD. It is conceivable to communicate between two similar devices DEV, eg two NFC compatible mobile phones. One application could be the exchange of (digital) currency between two phones (each with encrypted accounts).
如参考图4和6所述的方法是根据本发明的方法的最有利的变形,因为它使用如图5所述的用于RFID标签的标准验证过程。此外,正如已经描述的那样,该实施例仅仅需要远程设备RD与设备DEV之间的少量通信,所以本发明方法的所述变形是快速且可靠的。The method as described with reference to FIGS. 4 and 6 is the most advantageous variant of the method according to the invention, since it uses the standard verification procedure for RFID tags as described in FIG. 5 . Furthermore, as already described, this embodiment requires only a small amount of communication between the remote device RD and the device DEV, so said variant of the inventive method is fast and reliable.
然而,正如已经参考图3所述的那样,本发明的其它实施例原则上也是可能的,并且在某些特定情况下也许是有利的。However, as already described with reference to FIG. 3 , other embodiments of the invention are in principle possible and may be advantageous in certain specific cases.
在下文中给出了根据本发明的方法的可能实施例的简短概述:A short overview of possible embodiments of the method according to the invention is given below:
图7示意性地描绘了如已经在图3中所示的方法:设备DEV生成随机数R,利用在设备DEV中存储的密钥K1...Kn中的一个密钥Kx加密该随机数R,并把加密的随机数Renc发送给读取器RD。读取器RD利用在读取器RD中存储的读取器密钥Krd来解密该数Renc(读取器密钥Krd与在设备DEV中存储的密钥K1...Kn之一相同)。该解密的读取器数Rrd被回送给设备DEV,其中原始随机数R和读取器数Rrd进行比较以识别正确的应用。Fig. 7 schematically depicts the method as already shown in Fig. 3: the device DEV generates a random number R, which is encrypted with one of the keys Kx of the keys K1...Kn stored in the device DEV , and send the encrypted random number Renc to the reader RD. The reader RD decrypts the number Renc with the reader key Krd stored in the reader RD (the reader key Krd is identical to one of the keys K1...Kn stored in the device DEV). This decrypted reader number Rrd is sent back to the device DEV, where the original random number R and the reader number Rrd are compared to identify the correct application.
图8示意性地示出图4和6的方法,其中由设备DEV所生成的随机数R被发送给读取器RD。读取器RD利用读取器密钥Krd把随机数R加密成加密的读取器数Renc’,并且把该数Renc’回送给设备DEV。设备DEV利用在设备DEV中存储的密钥K1...Kn中的一个密钥Kx解密该加密的数Renc’,并且把所得到的数R’与原始随机数R进行比较。利用在设备DEV中存储的密钥K1...Kn解密加密的数Renc’的该过程被重复,直至找到正确的应用。Fig. 8 schematically shows the method of Figs. 4 and 6, wherein the random number R generated by the device DEV is sent to the reader RD. The reader RD encrypts the random number R into an encrypted reader number Renc' using the reader key Krd and sends this number Renc' back to the device DEV. The device DEV decrypts the encrypted number Renc' with one of the keys Kx of the keys K1...Kn stored in the device DEV and compares the resulting number R' with the original random number R. This process of decrypting the encrypted number Renc' with the keys K1...Kn stored in the device DEV is repeated until the correct application is found.
在根据图9的另一实施例中,交换信息,即通常为随机数R,由读取器RD生成。随机数R被送给设备DEV,其中利用密钥K1..Kn中的一个密钥Kx将其加密成加密的数Renc。该数Renc被回送给读取器RD,在那里借助于读取器密钥Krd对其进行解密。所得到的数R’与原始随机数R进行比较。如果原始随机数R和解密随机数R’相同,则找到正确的密钥/正确的应用,如果该比较不为真,则设备DEV利用另一密钥加密随机数R,并将其发送给读取器RD等。在该情况中,读取器RD可以把随机数R发送给设备DEV,以使设备DEV可以检测到另一加密是必须的,或者把某个特定信息发送给设备DEV。In another embodiment according to FIG. 9, the exchange information, typically a random number R, is generated by the reader RD. The random number R is sent to the device DEV, where it is encrypted with one of the keys K1..Kn Kx into an encrypted number Renc. This number Renc is sent back to the reader RD, where it is decrypted by means of the reader key Krd. The resulting number R' is compared with the original random number R. If the original random number R and the decrypted random number R' are the same, the correct key/correct application is found, if the comparison is not true, the device DEV encrypts the random number R with another key and sends it to the reader Taker RD and so on. In this case, the reader RD can send a random number R to the device DEV so that the device DEV can detect that another encryption is necessary, or send some specific information to the device DEV.
如所述,比较将在读取器RD中进行。然而,原则上还能够把数Rrd从读取器RD发送给设备DEV,该设备DEV然后比较这两个随机数R、Rrd。As mentioned, the comparison will be done in the reader RD. In principle, however, it is also possible to send the number Rrd from the reader RD to the device DEV, which then compares the two random numbers R, Rrd.
在图10中示出另一实施例。这里,读取器RD生成随机数R,利用读取器密钥Krd加密随机数R,并且向设备DEV发送加密数Renc’。设备DEV借助于密钥K1...Kn中的一个密钥Kx解密加密的数Renc’。Another embodiment is shown in FIG. 10 . Here, the reader RD generates a random number R, encrypts the random number R with the reader key Krd, and sends the encrypted number Renc' to the device DEV. The device DEV decrypts the encrypted number Renc' by means of one of the keys K1...Kn, Kx.
所得到的随机数R’与原始随机数R进行比较,优选如在读取器RD中所示的那样。然而,还有可能读取器RD把原始随机数R进一步发送给设备DEV,以使比较可以在设备DEV中进行。The resulting random number R' is compared with the original random number R, preferably as shown in the reader RD. However, it is also possible that the reader RD sends the original random number R further to the device DEV so that a comparison can be performed in the device DEV.
最后应当注意,上述实施例是说明而非限制本发明,并且本领域技术人员将能够设计许多替代实施例而不背离如在所附权利要求书中限定的本发明的范围。特别注意,尽管在权利要求书和附图中选择数据集主要涉及加密数据集,但是这不视为本发明必须遵循的。而是本发明还涉及选择多个未加密数据集之一。在权利要求书中,置于括号中的任何参考标记将不解释为限制权利要求。词“包括”和“包含”等并不排除不同于在权利要求书或者整个说明书中列举的元件或步骤的存在。元件的单数引用并不排除这种元件的复数引用,反之亦然。在列举若干装置的设备权利要求中,这些装置中的若干可以由同一项硬件或软件来实现。仅仅在互不相同的从属权利要求中陈述某些措施的事实并不表明:这些措施的组合不能被有利地使用。It should finally be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the invention as defined in the appended claims. Note in particular that although the selection of data sets in the claims and figures primarily relates to encrypted data sets, this is not considered mandatory for the invention. Rather the invention also relates to selecting one of a plurality of unencrypted data sets. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The words "comprising" and "comprising" etc. do not exclude the presence of elements or steps other than those listed in a claim or in the entire specification. The singular reference of an element does not exclude the plural reference of such elements and vice versa. In a device claim enumerating several means, several of these means can be embodied by one and the same item of hardware or software. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Claims (13)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0414648.6 | 2004-06-30 | ||
| GB0414648A GB0414648D0 (en) | 2004-06-30 | 2004-06-30 | Multi-application communication device |
| EP04106893.3 | 2004-12-22 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN1981475A true CN1981475A (en) | 2007-06-13 |
Family
ID=32843314
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN 200580022218 Pending CN1981475A (en) | 2004-06-30 | 2005-06-23 | Method of choosing one of a multitude of data sets being registered with a device and corresponding device |
| CN 200580022349 Pending CN1981474A (en) | 2004-06-30 | 2005-06-23 | Device for using encrypted data and method thereto |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN 200580022349 Pending CN1981474A (en) | 2004-06-30 | 2005-06-23 | Device for using encrypted data and method thereto |
Country Status (2)
| Country | Link |
|---|---|
| CN (2) | CN1981475A (en) |
| GB (1) | GB0414648D0 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103973869A (en) * | 2013-01-29 | 2014-08-06 | 上海易销电子商务有限公司 | Program installing and data updating terminal of mobile equipment |
-
2004
- 2004-06-30 GB GB0414648A patent/GB0414648D0/en not_active Ceased
-
2005
- 2005-06-23 CN CN 200580022218 patent/CN1981475A/en active Pending
- 2005-06-23 CN CN 200580022349 patent/CN1981474A/en active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| GB0414648D0 (en) | 2004-08-04 |
| CN1981474A (en) | 2007-06-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9740847B2 (en) | Method and system for authenticating a user by means of an application | |
| EP2487629B1 (en) | Secure smart poster | |
| CN101180639B (en) | Method of securely reading data from a transponder | |
| KR100951142B1 (en) | Methods, systems, and mobile devices that enable credit card personalization using wireless networks | |
| CN112823335A (en) | System and method for password authentication of contactless cards | |
| EP3017580B1 (en) | Signatures for near field communications | |
| US20130173477A1 (en) | Storing and forwarding credentials securely from one RFID device to another | |
| US20150248668A1 (en) | Secure mobile device transactions | |
| WO2009013700A2 (en) | Method, system and trusted service manager for securely transmitting an application to a mobile phone | |
| KR20060125835A (en) | Emv transactions in mobile terminals | |
| CN112602104A (en) | System and method for password authentication of contactless cards | |
| CN104240074B (en) | The online payment system of prepaid card and its method of payment of identity-based certification | |
| CN113168631A (en) | System and method for password authentication of contactless cards | |
| US11562346B2 (en) | Contactless card with multiple rotating security keys | |
| CN101154281B (en) | Method and mobile device for migrating finance data in smart card | |
| US9325504B2 (en) | Method for secure transfer of an application from a server into a reading device unit | |
| Alimi et al. | Post-distribution provisioning and personalization of a payment application on a UICC-based Secure Element | |
| KR20070030231A (en) | A method of selecting one of a plurality of data sets registered with a device, and a corresponding device | |
| US10810296B2 (en) | Communication apparatus, communication method, and communication system | |
| JP2005064923A (en) | Service system using IC card | |
| CN1981475A (en) | Method of choosing one of a multitude of data sets being registered with a device and corresponding device | |
| CN116097686A (en) | Secure end-to-end pairing of a secure element with a mobile device | |
| KR100589961B1 (en) | RF-ID system | |
| Türk | NFC feature box: An open, NFC enabler independent mobile payment and identification method | |
| KR20070030237A (en) | Devices and methods for using encrypted data |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
| WD01 | Invention patent application deemed withdrawn after publication |