Method and system for deploying application of smart card, and security module

A security module and deployment system technology, applied in the field of financial payment, can solve the problems of smart card application deployment relying on upper computer software upgrades, application deployment security relying on multiple links, etc., to reduce system risks and management complexity, reduce system risks effect of stress

Active Publication Date: 2010-12-15
DATANG MICROELECTRONICS TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The disadvantages of the existing smart card application deployment scheme are: the deployment of smart card applications depends on the upgrade of the upper computer software; the security of application deployment depends on multiple links

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for deploying application of smart card, and security module
  • Method and system for deploying application of smart card, and security module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Embodiment 1. A deployment method for a smart card application, comprising:

[0051] Save the application in the security module;

[0052] The user requests the security module to install the application on the smart card through the terminal;

[0053] The security module establishes a secure connection with the smart card, and installs the application requested by the user to be installed on the smart card through the secure connection.

[0054] In this embodiment, the actual form of the security module can be but not limited to smart card, UKEY or other modules, devices, etc.; the security module is used as the security carrier of the application to realize the end-to-end application security off-line deployment, and the security is controlled by the security module. It does not depend on the upper computer application software or SAM certification.

[0055] In this embodiment, the security module can be reused. For example, when a new application is issued, it can ...

Embodiment 2

[0072] Embodiment 2. A security module, comprising:

[0073] a storage unit for storing applications;

[0074] The installation unit is configured to establish a secure connection with the smart card after receiving a request from the user to install the application on the smart card, and install the application requested by the user to the smart card through the secure connection.

[0075] In this embodiment, the security module may also include:

[0076] A receiving unit, configured to receive a security module-oriented WEB application installation service package;

[0077] A parsing unit, configured to parse out the received WEB application installation service package; optionally parse the WEB application installation service package into a format that is convenient for the application;

[0078] The checking unit is used to check the integrity of the parsed WEB application installation service package; it can also further check other security attributes of the WEB applic...

Embodiment 3

[0083] Embodiment 3. A deployment system for smart card applications, such as figure 1 As shown, including: the terminal and the security module in Embodiment 2;

[0084] The terminal is used for the user to request the security module to install an application on the smart card, and to connect the security module and the smart card.

[0085] In this embodiment, the terminal may specifically include:

[0086] a first interface unit, configured to connect to the security module;

[0087] a second interface unit, configured to connect to the smart card;

[0088] The browser is used to know the applications provided in the WEB application installation service package saved by the security module, and display them to the user in the form of an application list. When the user clicks on an application in the application list, a request for installing the application is generated to all the security module described above.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for deploying the application of a smart card, and a security module. The method comprises that: the application is saved in the security module; a user makes a request for the installation of the application into a smart card to the security module by a terminal; and the security module establishes secure connection with the smart card and installs the application requested for installation by the user to the smart card by the secure connection. The method, the system and the security module can reduce the security risks and management complexity in application deployment.

Description

technical field [0001] The present invention relates to the financial payment field, the communication field and other related fields of smart card applications, and in particular to a smart card application deployment method, system and safety module. Background technique [0002] Currently, there are two types of common smart card application deployment controls: [0003] One is the security control method based on the upper computer application software: the POS or reader application program shakes hands with the security control domain in the smart card to establish a security channel and obtain application deployment permissions. The current GP cards, JAVA cards, and multos cards all belong to this column. [0004] The other is to use the security mechanism of SAM (Security Account Manager): POS or reader to obtain the deployment authority depends on whether the authentication between SAM and smart card is passed or not. [0005] The defects of the existing smart card...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 任强穆肇骊
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products