Supercharge Your Innovation With Domain-Expert AI Agents!

Smart card external authentication method

An external authentication and smart card technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as denial of service attacks, failure of signature verification, and information cannot be restored

Inactive Publication Date: 2013-11-06
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If SK appears 1 If it is overwritten, the legally encrypted information cannot be restored, so that normal encryption and decryption operations cannot be performed
[0020] Similarly, if the attacker bypasses the authority verification and obtains the operation authority to generate the public-private key pair, it will prompt the smart card to generate a new signature public-private key pair, because the SK 2 is used for signing, when SK 2 After being overwritten, it will appear that the signature verification of the other party has been unable to pass, which has caused a de facto denial of service attack
[0021] The risk of replacing the private key, encrypting and decrypting the private key SK 1 The replacement risk is mainly to replace the victim’s private key and certificate with the legitimate private key and certificate applied by the attacker. When SK 1 If it is written in the smart card in plain text and is not associated with personally identifiable information or signed, then the encryption and decryption private key and certificate file will be easily replaced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart card external authentication method
  • Smart card external authentication method
  • Smart card external authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0067] Such as figure 2 Shown, the smart card external authentication method of the present invention, it comprises the steps:

[0068] (1) Production public-private key pair PK generated by CA 0 / SK 0 , and will produce the public key PK 0 Written into the smart card at the factory;

[0069] (2) By producing the private key SK 0 Encryption and decryption public-private key pair PK 1 / SK 1 Encrypted and written into the smart card;

[0070] (3) By encrypting and decrypting the private key SK 1 Signature public-private key pair PK 2 / SK 2 Encrypted writing to the smart card;

[0071] (4) Produce private key SK 0 Managed by CA, the operation of the smart card private key must be produced by the CA using the private key SK 0 sign.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to disclose a smart card external authentication method, which comprises the following steps of: (1) generating a production public / secrete key pair PK0 / SK0 by certification authority (CA), and reading the production public key PK0 into a smart card during delivery; (2) encrypting and reading an encryption-decryption public / secrete key pair PK1 / SK1 into the smart card by the production secrete key SK0; (3) encrypting and reading a signature public / secrete key pair PK2 / SK2 into the smart card by the encryption-decryption secrete key SK1; and (4) managing the production secrete key SK0 by the CA, wherein the CA uses the production secrete key SK0 to sign all operation of the secrete key of the smart card. The method has the advantages that: by signing and verifying the related operation contents of the secrete key, the shortcomings of a secrete key file in the smart card are overcome effectively; the integrality protection of the operation contents of the secrete key is realized by the CA; risks that the secret key file is intercepted, covered and replaced under the conditions of insecure terminals and channel are avoided; and the aim of the invention is fulfilled.

Description

technical field [0001] The invention relates to an internal authentication method of a smart card, in particular to an external authentication method of a smart card based on PKI technology in the field of computer security and smart card application security. Background technique [0002] The trust agency of the PKI system is called CA, and ensuring the security of the private key is the core of the PKI system. That is to say, if the private key is leaked, the entire PKI system will be in danger. In early PKI applications, the private key was stored on the terminal in the form of a soft certificate. Since the terminal is vulnerable to attacks by viruses and Trojan horses, it is easy to leak the private key. In order to solve this problem, smart cards that store private keys and certificates are applied to the PKI system as cryptographic devices independent of terminals, especially smart cards that can generate public-private key pairs themselves, whose private keys cannot b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 胡永涛胡善学杭强伟张勇
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More