Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety processing system and method for intelligent card (IC) card application

A security processing and card application technology, applied in electronic digital data processing, computer security devices, and key distribution, can solve the problems that smart IC cards cannot meet the security needs of partners, and achieve the effect of solving the problem of security independence

Active Publication Date: 2012-05-02
WUHAN TIANYU INFORMATION IND
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the existing smart IC card with only one application master control key cannot meet the security requirements of independent management keys and data of partners

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety processing system and method for intelligent card (IC) card application
  • Safety processing system and method for intelligent card (IC) card application
  • Safety processing system and method for intelligent card (IC) card application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The key in the smart IC card is divided into three types: master control key, maintenance key and work key. The master key is used to control the installation and modification of other types of keys; the maintenance key is used to control the update of the data files associated with it; the working key is used to control the execution of application instructions. Wherein, the control refers to related security processing such as encryption / decryption.

[0043] The keys in the smart IC card all have attribute bytes, generally including version, identification, type and purpose. The chip operating system (Chip Operating System, COS) in the smart IC card looks up the key according to the combination of version, identification and type bytes, and checks that the key must be used according to its purpose.

[0044] The data files in the smart IC card all have attribute bytes, generally including access rights and associated maintenance key identifiers. The COS in the smart ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety processing system for an intelligent card (IC) card application, which comprises a main control key configuration unit, a key attribute expansion unit and a write key writing unit, wherein the main control key configuration unit is used for configuring and recording the quantity of main control keys and attribute of each main control key in an chip operation system, and the attribute of the main control key comprises a main control key value, a main control key identifier and a key purpose list controlled by the main control key; the key attribute expansion unit is used for expanding a main control key identifier byte in the attribute of each key, and the byte is used for indicating the main control key identifier of the key; and the write key writing unit is connected with the main control key configuration unit and the key attribute expansion unit and is used for utilizing a write key writing order withcarrying the main control key identifier and for writing the key into a card. The invention also discloses a corresponding safety processing method of the intelligent IC card application. Due to the adoption of the system and the method, multiple main control keys can be realized under one application, and the safety independence problem of each party when a card is issued by multiple parties.

Description

technical field [0001] The invention relates to the application field of smart IC cards, in particular to a security processing system and method for smart IC card applications. Background technique [0002] With its security and portability, smart IC cards have penetrated into every corner of people's daily life. In many industries such as finance, telecommunications, public transportation, public utilities (water, electricity and gas), social security, health, education, taxation, road and bridge charges, parking charges, digital TV, transportation logistics, access control security, port management, etc., smart IC Various applications of cards can be seen everywhere. [0003] An application in a smart IC card is composed of a certain number of keys and data files, one of which is called the application master key, and mastering the application master key can control other keys in the application. keys and data files, which control the entire application. Therefore, in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08G06F21/00
Inventor 朱文玄沈恺程桂琴
Owner WUHAN TIANYU INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products