Identify authorization method between storage card and terminal equipment at off-line state

A technology for identity authentication and terminal equipment, applied in the field of identity authentication, it can solve problems such as cumbersomeness and large delay, and achieve the effect of improving response speed, saving overhead and simplifying the identity authentication process.

Inactive Publication Date: 2007-12-19
POTEVIO INFORMATION TECH
View PDF1 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The entire authentication process is too cumbersome, and if it is not handled properly, it will cause a large delay, which also puts forward higher performance requirements for the memory card and terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identify authorization method between storage card and terminal equipment at off-line state
  • Identify authorization method between storage card and terminal equipment at off-line state
  • Identify authorization method between storage card and terminal equipment at off-line state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to better understand the essence of the present invention, several concepts related to the present invention are briefly introduced before describing the specific implementation process of the present invention in detail.

[0029] Public cryptographic algorithm: also known as asymmetric cryptographic algorithm. There are two different keys used for encryption and decryption, one of which is made public and called the public key; the other is kept strictly secret and called the private key. Both the public key and the private key can be used for data encryption and decryption, and the public key can be placed in a digital certificate and published in the form of a certificate. Public cryptographic algorithms are mainly used for key distribution and digital signatures.

[0030] Symmetric cryptographic algorithm: The same key is used for data encryption and decryption.

[0031] PKI system: It is a collection of hardware, software, personnel and application progr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses an identity authentication method between storage cards and a terminal device at the off-line state including: a storage card sends an authentication request to a terminal device including the identity number of the card and the card certificate, the terminal processes the request and sends a response to the card including the identity number of the terminal, a certificate, a list for certificate revoking and a random number of the card ciphered public key, the storage card sends a request for stopping the authentication to the terminal with the random number of the ciphered terminal public key, the terminal sends a stopping request response to the card with the session secret key encryption random number generated by the card, which processes the response request to verify the exclusiveness of the session key.

Description

technical field [0001] The invention relates to a communication method between a memory card and a terminal device, in particular to an identity authentication method between a memory card and a terminal device in an offline state. Background technique [0002] US Patent Document US20050210241 discloses a method for identity authentication between a memory card and a terminal device. The memory card stores the certificate of the digital certificate authority (Certificate Authority, referred to as CA), the certificate of the memory card itself, and the certificate revocation list (Certificate Revocation List, referred to as CRL), etc.; the terminal device stores the certificate of the CA, the terminal's own Certificates and CRLs etc. When performing identity authentication between the memory card and the terminal device, each sends its own certificate to the other party, and each party first verifies the validity of the other party's certificate. If the certificates of both ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
Inventor 刘道斌
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products