Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure access implementation method applying terminal access intelligent card

A technology for secure access and application terminals, which is applied in the field of secure access implementation of smart cards accessed by application terminals, and can solve problems such as leakage, insufficient security system, and inability to achieve end-to-end security, and achieve the effect of improving security.

Inactive Publication Date: 2012-07-04
EASTCOMPEACE TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, there is still a hidden danger of leakage of sensitive data in the process of safe access such as electronic transactions when it is processed on POS terminals and application terminals such as PCs, and the data security between the smart card and the back-end system cannot be guaranteed, so , the current security system for security device applications is not perfect enough to achieve true end-to-end security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access implementation method applying terminal access intelligent card
  • Secure access implementation method applying terminal access intelligent card
  • Secure access implementation method applying terminal access intelligent card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] At present, the communication between the smart card and the terminal is realized according to the APDU (Application Protocol Data Units, application protocol data unit) interface stipulated in the ISO7816-4 standard. The APDU defines both the command format and the response format. In the current smart card field, the card is always in a "passive" position. It can only wait for the terminal to send APDU to it. After receiving the APDU, the smart card e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure access implementation method applying a terminal access intelligent card, which includes: arranging a security module in the intelligent card; and arranging an intelligent card access program, an input-output device and a communication module at an application terminal, wherein the security module comprises a key, a data encryption and decryption algorithm and a process program, the data encryption and decryption algorithm is used for realizing a security function, the process program is used for processing application logic and data in the process of secure access, the intelligent card access program is used for providing an interface interacting with the security module, the input-output device is used for interacting with the security module, and the communication module is used for realizing data communication of the security module with a background of the application terminal. As the security module capable of realizing secure access process is arranged in the intelligent card, data related to security do not run at the application terminal of a user, and security of secure access is improved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method for implementing secure access for an application terminal to access a smart card. Background technique [0002] A smart card is a chip card with an embedded memory and a microprocessor, which stores and calculates data through the embedded microprocessor. At present, banking, communication, transportation and other systems have obtained the security and flexibility that other systems do not have by using the characteristics of smart cards. Because the smart card has a convenient storage function, can store data in the form of cipher text, and can use the embedded microprocessor to encrypt and decrypt data, the appearance of the smart card has greatly improved the convenience and security of access. Nowadays, some security-critical applications often use the characteristics of smart cards to enhance security and reduce risk factors. [0003] In the prior art, although smar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/00H04L9/00
Inventor 郭伟孙敏
Owner EASTCOMPEACE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products