Encryption and decryption method and encryption and decryption device of multi-data security module

A security module and data security technology, applied in the field of information security, can solve the problems of low security, limited application of RFID technology, poor security of passive RFID cards, etc.

Active Publication Date: 2011-12-21
重庆市城投金卡信息产业(集团)股份有限公司
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Due to the passive characteristics of the 900MHz RFID (Radio Frequency Identification, radio frequency identification) card, it solves the problem of battery life in RFID applications, and the cost is relatively low, but at the same time, due to its inaccessible characteristics, the security is low. As long as you have Access Password ( Access key) can fully control the RFID card, and the existing equipment cannot be widely used in projects such as intelligent transportation, vehicle management, non-parking charges, etc.
[0003] The prior art has the following defects. The security of the passive RFID card is poor, and the PSAM (Purchase Secure Access Module, point-of-sale terminal security access module) card cannot be used to control the use authority of each bit of the RFID, and it cannot Through the separation of password access and authority control, the self-management of the storage space in RFID is realized, thereby limiting the application of RFID technology in the fields of intelligent transportation, vehicle management, non-stop charging, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and encryption and decryption device of multi-data security module
  • Encryption and decryption method and encryption and decryption device of multi-data security module
  • Encryption and decryption method and encryption and decryption device of multi-data security module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The flow chart of the encryption method of the multi-data security module of a preferred embodiment of the present invention can be found in figure 1 , including the following steps,

[0035] Step 101: Initialize the RFID (Radio Frequency Identification, radio frequency identification) card, including, check the key index number of the RFID card, query the access key of the RFID card,

[0036] Step 102: Obtain the first-level authority and the second-level authority of the RFID card application space control information, including, after multiple encryption checks, obtain the first-level authority of the RFID card application space control information, and also include the RFID card application space control The second-level authority of the information assigns the read-write authority of each bit of the RFID card application space.

[0037] Step 103: Encrypt the RFID card by using the first-level authority and the second-level authority of the space control informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and decryption method and device for a multi-data security module, which are invented to overcome the defects of poor security and unavailability of controlling the permission of every bit of an RFID (Radio Frequency Identification Device) by using a PSAM (Pilot Symbol Assisted Modulation) card existing in the conventional passive RFID card. The encryption and decryption method comprises the following steps of: initializing the RFID card to obtain a first right and a second right of application space control information of the RFID card; and encrypting the RFID card through the first right and the second right of the application space control information. The security problem of a passive RFID can be solved; and the permission of every bit of the RFID is controlled by using the PASM card, and password access is separated from right control, so that the effects of distributing and autonomously managing the internal storage space of the RFID are achieved flexibly.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an encryption and decryption method and an encryption and decryption device of a multi-data security module. Background technique [0002] Due to the passive characteristics of the 900MHz RFID (Radio Frequency Identification, radio frequency identification) card, it solves the problem of battery life in RFID applications, and the cost is relatively low, but at the same time, due to its inaccessible characteristics, the security is low. As long as you have Access Password ( Access key) can fully control the RFID card, and the existing equipment cannot be widely used in projects such as intelligent transportation, vehicle management, and non-stop charging. [0003] The prior art has the following defects. The security of the passive RFID card is poor, and the PSAM (Purchase Secure Access Module, point-of-sale terminal security access module) card cannot be used to con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06F21/00G06F21/77
Inventor 赵明
Owner 重庆市城投金卡信息产业(集团)股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products