Secret key management method of IC card terminal

A technology of key management and terminal management system, which is applied in the direction of code identification card or credit card start-up, electrical components, transmission system, etc., which can solve the problems of unfavorable networking and high cost of update and maintenance, so as to improve versatility and reduce Maintenance update cost, effect of improving security

Active Publication Date: 2012-07-04
SHANGHAI JIEHUIDA NETWORK TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] On the other hand, if a new type of IC card reading and writing is to be added to the IC card terminal, a new PSAM card or ISAM card must be installed in the terminal, and the update and maintenance costs are high, which is not conducive to network universal use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key management method of IC card terminal
  • Secret key management method of IC card terminal
  • Secret key management method of IC card terminal

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0021] refer to figure 2 , is a flowchart of an embodiment of the present invention, specifically including the following steps:

[0022] Step 201: The terminal device reads the public information of the IC card and transmits it to the terminal management system host in an encrypted manner, hereinafter referred to as the management host.

[0023] The encrypted data transmitted between the terminal equipment and the management host in the present invention uses different process keys each time. The specific method is: for each transaction, the built-in security module of the terminal device generates a random number and a transaction sequence number to form a process factor, and uses the public key A agreed with the management host to disperse the process factor to generate a process key, and uses the process key Encrypt the transmission information to obtain the information ciphertext, and then use the public key B agreed with the management host to encrypt the process facto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key management method of an IC card terminal, specifically comprising the following steps: a terminal device reads IC card public information and transmits to a terminal management system host in an encryption mode, wherein the terminal device only serves as a read-write tool which operates the IC card without processing service; the terminal management system host judges and receives a card sending mechanism to which the IC card information belongs and sends the information to a corresponding card sending mechanism host; the card sending mechanism host receives and confirms IC card information and returns the corresponding secret key needed by the operation of the IC card this time; and at last, the terminal device receives the order transmitted from the management host to finish operation to the IC card. In the invention, the IC card secret key is only stored in the card sending mechanism, thus not only improving the safety of secret key management but also lowering the maintaining and updating cost of the terminal, and brining convenience for the networking general purpose of the financial IC cards conforming to the standard.

Description

technical field [0001] The invention relates to the field of network information security certification, in particular to a key management method of an IC card terminal. Background technique [0002] At present, the IC card system used for micropayment generally adopts off-line processing. In the IC card consumption terminal, the PSAM card is used to complete the security authentication of the IC card offline consumption transaction, and in the IC card recharge terminal, the ISAM card is used to complete the security authentication of the IC card offline recharge transaction, that is, the IC card recharge The key is held in the ISAM card. [0003] IC card recharge means to increase the amount data in the IC card, and to modify this data, two-way authentication must be passed first. Two-way authentication is that the IC card generates a random number, combined with other key information to form a data packet, uses the key in the IC card to encrypt and calculate a result, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07F7/10H04L29/06
Inventor 刘中昉黄守政
Owner SHANGHAI JIEHUIDA NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products