IC (Integrate Circuit) card access terminal adopting commercial cipher and operation method thereof

A commercial cryptographic algorithm and commercial cryptographic technology, applied in the field of IC card access control terminals, can solve the problems of no key and inability to interpret information, and achieve the effects of easy management, removal of security threats, and security benefits

Active Publication Date: 2010-09-22
上海微通电子设备有限公司
View PDF1 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encryption is based on a cryptographic algorithm and at least one key. For encrypted information, even if the algorithm is known, the information cannot be interpreted without the key.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IC (Integrate Circuit) card access terminal adopting commercial cipher and operation method thereof
  • IC (Integrate Circuit) card access terminal adopting commercial cipher and operation method thereof
  • IC (Integrate Circuit) card access terminal adopting commercial cipher and operation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0047] see figure 1 , the present invention is an IC card access control terminal using a commercial SM7 / SM1 cryptographic module (SAM). MCU is its core component, adopts a 32-bit single-chip microcomputer system, has 512KFalsh / 64KRAM, and has a variety of multi-channel communication interfaces built in. The access control terminal program developed by Shanghai Integrated Communication Equipment Co., Ltd. manages each component of the access control terminal under the control of these programs. The memory in the MCU stores the running program and the latest batch of access control events and alarm information.

[0048] The cryptographic module with commercial cryptographic algorithm is the core of security control in the access control terminal. It contains the 128-bit SM7 block cipher algorithm and SM1 block cipher algorithm designated by the State Cryptography Administration, and stores the system root key. Under the management of MCU, it is responsible for completing SM1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an IC (Integrate Circuit) card access terminal which adopts a commercial cipher and is provided with a commercial SM (Smart Media)7 / SM1 cipher module. The IC card access terminal comprises an antenna, an RF (Radio-Frequency) interface, an MCU (Microprogrammed Control Unit), a cipher module with a commercial cipher algorithm, an access executing mechanism and a data interface connected with a background monitoring system, wherein the MCU is respectively connected with the RF interface, the cipher module, the access executing mechanism and the data interface for data interaction, and the RF interface is connected with the antenna and is in charge for RF communication between the MCU and the IC card. An operation method of the invention comprises the following steps of: (1) swiping a card on the induction antenna of the access terminal by a user; (2) carrying out SA (Social Accountability) authentification on the access terminal and the IC card under the matched control of the MCU and the SM7 / SM1 cipher module; (3) carrying out SB authentification; (4) authenticating user release information; (5) controlling access; and (6) reporting a legal access accident to the background monitoring system. The invention has a commercial cipher secured authentification mechanism and effectively ensures the security of important access.

Description

technical field [0001] The invention belongs to an IC card access control terminal, in particular to an IC card access control terminal adopting a commercial SM7 / SM1 password module (SAM) and an operation method thereof. Background technique [0002] In today's society, IC card access control terminals have been widely used and become an important technical means of portal security management. The most used at home and abroad is the MiFare logic card, or M1 card access control terminal. In October 2008, the technical details of M1 card cracking were announced at an international conference, making a large number of IC card access control systems using M1 cards an unsafe system, posing a huge threat to the security and confidentiality of all levels of the country. Therefore, there is an urgent need to provide an IC card access control system that adopts a security technology with my country's independent intellectual property rights. [0003] According to Article 2 of Chapte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 张康明周伟锋付根利周宙吉延彤顾未良
Owner 上海微通电子设备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products