Smart card security session system

A technology for secure sessions and smart cards, applied in computer security devices, public keys for secure communications, user identity/authority verification, etc., and can solve problems such as smart card security issues

Inactive Publication Date: 2010-11-24
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] To sum up, in view of the above-mentioned defects in the existing smart card security system, a smart card security session system is particularly needed to solve the above-mentioned smart card security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart card security session system
  • Smart card security session system
  • Smart card security session system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0051] Based on the above smart card system design, the present invention takes asymmetric encryption and decryption RSA algorithm and symmetric encryption 3DES algorithm as examples, assuming that there is a public-private key pair PK for encryption and decryption hosted by CA on the smart card 1 and SK 1 , using this key pair as the public-private key pair of the secure session, the following smart card secure session communication workflow is proposed: (see image 3 )

[0052] 1) The terminal application reads the public key on the smart card as the secure session public key PK 1 ;

[0053] 2) The terminal application generates a random number R and uses the secure session public key PK 1 Encrypt the random number R to get R PK1 and send it to the smart card;

[0054] 3) Secure session private key SK for smart card 1 Decrypt R PK1 Get the random number R, then generate the security session identification ID of the current application program, and the security session...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to disclose a smart card security session system. The system comprises a smart card, wherein the smart card consists of a security session manager, a transmission manager, a command analyzer and an encryption and decryption module; the security session manager, the transmission manager and the command analyzer are connected one another; the encryption and decryption module is connected with the command analyzer; in the conventional smart card security system, the concept of security session is introduced, and the application program is associated with a request initiated per se by adopting a semi-permanent interactive information switching method with automatic recovery mechanism, which is established between the smart card and a terminal application program in a certain period, so as to ensure that the security sessions of different application programs are independent from one another; and in addition, once established, the security session exists all the time until the operation of the application program is finished or other conditions for stopping the security session occur; and the security of the session is protected by security session symmetric keys and a security session public and private key pair.

Description

technical field [0001] The invention relates to a system for safe communication between a terminal application program and a smart card, in particular to a smart card safe conversation system in the field of computer security and smart card application safety. Background technique [0002] As a means to ensure the security of e-government and e-commerce, smart cards are widely used; the US ROCKVILLE market research group recently released the RNCOS report on smart cards, which indicated that the smart card market will grow by 13% in 2012, The following question is how to ensure the security of the smart card itself, such as how to take into account the reliability and flexibility of the smart card, how to take into account the convenience and data security of the smart card during use, and so on. [0003] The security of the smart card is guaranteed by its security system. The research on the security system of the smart card is currently mainly focused on the security acces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L9/32H04L9/30G06F21/79
Inventor 胡永涛姚静晶张勇赵宏伟
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products