Security certification and encryption method and system of multi-application noncontact-type CPU card

A security authentication and non-contact technology, applied in the field of CPU cards, can solve the problem of easy interception of user data or key information, and achieve the effect of enhancing security and ensuring high security

Inactive Publication Date: 2010-10-20
深圳市数智国兴信息科技有限公司
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to solve the shortcoming that user data or key information is easily intercepted when the CPU card is used in the prior art, the present invention proposes a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security certification and encryption method and system of multi-application noncontact-type CPU card
  • Security certification and encryption method and system of multi-application noncontact-type CPU card
  • Security certification and encryption method and system of multi-application noncontact-type CPU card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Such as figure 1 As shown, a non-contact CPU card one-card multi-application security authentication and encryption system is shown, which includes a CPU card 11, a card reading device 12 and a control device 13, and the card reading device 12 includes a front-end information reading module 14 and a rear Terminal information decryption module 15, front-end information reading module 14 is used for radio frequency receiving the encrypted user identity information of CPU card 11, wherein, CPU card 11 radio frequency sends encrypted user identity information, the front-end information reading module in card reading device 12 14 receives the encrypted user identity information, and sends it to the back-end information decryption module 15 in a serial communication manner, which decrypts the user identity information, and sends it to the control device 13 in a Wiegand manner, and the control device 13 receives the decrypted user identity information. Identity information and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides security certification and encryption method and system of a multi-application noncontact-type CPU card according with the ISO 14443 standard. The security certification encryption system comprises a CPU card, a card-reading device and a control device, wherein the CPU card is used for the radio frequency transmission of encrypted user ID information, the card-reading device is used for receiving and decrypting the encrypted user ID information to acquire and transmit original user ID information, and the control device is used for receiving the original user ID information and executing corresponding operation according to a right thereof. Because a front-end information reading module and a back-end information decryption module can be remotely communicated, the back-end information decryption module and the control device can be arranged in hidden positions to only transmit the encrypted user ID information in the link so that the difficulty of illegally acquiring the user ID information is upgraded. The CPU card is provided with a COS (Cooperative Office System) system for implanting an encryption algorithm and overlaying a random number so that the encrypted user ID information generated by encryption every time is also random correspondingly.

Description

technical field [0001] The invention relates to a CPU card, in particular to a non-contact CPU card one card multi-application security authentication encryption method and system. Background technique [0002] IC cards (Integrated Cards) appearing on the market can be divided into non-encrypted memory cards, encrypted memory cards and CPU cards in terms of device technology. Non-encrypted cards have no security, and the data in the card can be rewritten arbitrarily. The encryption memory card adds a logic encryption circuit on the basis of the ordinary memory card, and becomes a logic encryption memory card. Because the logical encryption memory card uses password control logic to control the access and rewriting of EEPROM, the password needs to be verified before the write operation can be performed, so it is safe for the chip itself, but it is not safe for the application. Most of the existing one-card products are developed based on the Mifare 1 produced by Philips, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K7/00G06K19/07H04L29/06
Inventor 邓欣张燕刘汉扬
Owner 深圳市数智国兴信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products