Method for identifying communication object of smart card

A technology of communication object and smart card, which is applied in the direction of cooperative devices, instruments, electrical components, etc., and can solve the problems of smart card security and other issues

Inactive Publication Date: 2010-12-29
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] To sum up, in view of the above-mentioned defects existing in the existing smart card security system, a method for identifying the communication object of the smart card is particularly needed to solve the above-mentioned security problem of the smart card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying communication object of smart card
  • Method for identifying communication object of smart card
  • Method for identifying communication object of smart card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] Such as figure 2 , image 3 As shown, a method for identifying a smart card communication object of the present invention comprises the following steps:

[0043] (1) The terminal application initiates a secure session and generates a random number as a secure session identifier;

[0044] (2) Mapping the generated security session ID, and then returning the security session ID to the terminal application;

[0045] (3) When the terminal application program accesses the smart card, it is necessary to send the command and the security session identifier to the smart card, and the smart card parses the command to obtain the command;

[0046] (4) The smart card decides whether to allow the terminal application to access according to the received information.

[0047] In the present invention, the smart card 100 is composed of a secure session manager 110, a transmission manager 120 and a command parser 130, and the secure session manager 110, the transport manager 120 and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at disclosing a method for identifying a communication object of a smart card. By introducing a concept of secure conversation in the existing smart card security system, the invention associates application programs with requests transmitted thereby by using a semi-permanent and interactive communication object identification mode which is established between the smart card and terminal application programs within a certain time and has a self-recovery mechanism, thereby realizing that the smart card can simultaneously and securely communicate with multiple communication objects (such as the terminal application programs). In addition, once a secure conversation is established, the secure conversation exists all the time until the operation of the terminal application programs is completed or other conditions terminating the secure conversation appear; and the security of the conversation is protected by a secure conversation symmetric key and a secure conversation public / private key pair.

Description

technical field [0001] The invention relates to a method for identifying a communication object, in particular to a method for identifying a communication object of a smart card in the field of computer security and smart card application security, which is applied to the safe communication between a terminal and a smart card. Background technique [0002] As a means to ensure the security of e-government and e-commerce, smart cards are widely used; the US ROCKVILLE market research group recently released the RNCOS report on smart cards, which indicated that the smart card market will grow by 13% in 2012, The following question is how to ensure the security of the smart card itself, such as how to take into account the reliability and flexibility of the smart card, how to take into account the convenience and data security of the smart card during use, and so on. [0003] The security of the smart card is guaranteed by its security system. The research on the security system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00H04L29/06
Inventor 胡永涛姚静晶杭强伟赵宏伟
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products