A method and system for implementing data security protection in application communication
A technology for protecting data and implementing methods, applied in the field of information security, can solve problems such as replay attacks, potential safety hazards, and easy leakage of sensitive information, and achieve the effects of strengthening security, increasing security, and preventing sensitive information from leaking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0063] Embodiment 1 of the present invention provides a method for implementing data security protection in application communication, such as figure 1 shown, including:
[0064] Step S1: The terminal selects the corresponding application by sending an application selection instruction to the Bluetooth card;
[0065] In this embodiment, step S1 includes:
[0066] Step S1-0: the terminal sends a selection application command to the Bluetooth chip in the Bluetooth card;
[0067] Step S1-1: The Bluetooth chip judges whether the sending sequence counter in the selection application command is abnormal, and if so, returns the third encapsulation result including an error status code to the terminal, and executes step S1-4; otherwise, parses the selection application command and converts the first 3. The analysis result is sent to the security chip in the Bluetooth card;
[0068] Specifically, the parsing of the selection application command in step S1-1 is specifically: the Blue...
Embodiment 2
[0121] Embodiment 2 of the present invention provides a method for implementing data security protection in application communication, such as figure 2 shown, including:
[0122] Step 200: the terminal sends an application selection instruction to the Bluetooth chip in the Bluetooth card;
[0123] In this embodiment, the terminal sends the selection application instruction to the Bluetooth chip by calling the writeCharacteristic interface of the BluetoothGatt class; specifically, the selection application instruction includes the working mode, the sending sequence counter, the command code, the command length, the command data field, the byte checksum;
[0124] For example, the selection application command in this embodiment is 01 00 0B 01 01 04 00 0C 00A4 04 0007A0 00 00 03 33 01 01 0E; wherein, 01 is the working mode, indicating that the Bluetooth card is a contact smart card operation mode; 0B 01 is The value of the sending sequence counter, the initial value of the sen...
Embodiment 3
[0204] Embodiment 3 of the present invention provides a system for implementing data security protection in application communication, including a terminal 3 and a Bluetooth card 4; the Bluetooth card 4 includes a Bluetooth chip 40 and a security chip 41;
[0205] Terminal 3 includes:
[0206] The sending selection module 301 is used to provide the bluetooth card 4 to send the selection application instruction to select the corresponding application;
[0207] The first obtaining module 302 is used to obtain the terminal random number from the background server;
[0208] The first encapsulation module 303 is configured to encapsulate the updated sending sequence counter and the APDU instruction containing the terminal random number into a secure channel initialization instruction, and the initial value of the sending sequence counter is a random number;
[0209] The first sending module 304 is used to send the security channel initialization instruction of the first packaging ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


