Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for improving safety of electronic wallets

An electronic wallet and wallet technology, applied in the field of information security, can solve the problems of no provision, system crash, and no use of public cryptography system security.

Active Publication Date: 2012-07-11
邵通
View PDF13 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] At the same time, the current electronic wallets, including CPU card electronic wallets and the ISO14443 protocol, do not use the idea of ​​public cryptography to improve the security of the system
It does not provide that when the PSAM card and SAM card are completely cracked, that is, after the depreciation function HX and value-added function HZ are leaked, the whole system will face the problem of collapse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for improving safety of electronic wallets
  • Method and system for improving safety of electronic wallets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] [Example 1] Card signature

[0034] In the first embodiment of the present invention, in order to identify the card, generally there will be an identification in the card, for example, the MifareS50 card has a globally unique serial number. Of course, the card issuance of the application system also needs to write personal information, card issuer information, card issue time information, etc. These information can also become identification data, called ID, that is, the data that distinguishes the card from other cards.

[0035] The system selects the asymmetric encryption algorithm RSA and the key pair (S1, S2); sign the ID with RSA S1 (ID) and stored in the data area of ​​the card. When the terminal is used, first read out the ID of the card and the ID signature RSA stored in the card S1 (ID), the terminal calculates RSA S2 (RSA S1 (ID)) to get the ID and compare it with the read ID. When they match, the terminal can confirm the validity of the card.

[0036] ...

Embodiment 2

[0039] [Example 2] No signature

[0040] The core of the present invention is to adopt the method of storing the depreciation key (consumption key) in the electronic wallet, and further providing protection to the depreciation (consumption key). When using an electronic wallet, different operations are performed according to credit collection and non-credit collection. According to the second embodiment of the present invention, a method for enhancing the security of an electronic wallet, we can use the Mifare S50 card for illustration.

[0041] Each Mifare S50 card has a globally unique ID number and 16 storage areas, numbered from 0 to 15. Each storage area has two passwords: a value-added password and a value-decreased password. When the devaluation password authentication is passed, the data in the storage area can be devalued, and when the value-added password is verified, the data in the storage area can be value-added.

[0042] The electronic wallet system using Mifa...

Embodiment 3

[0050] [Example 3] signature

[0051] According to the third embodiment of the present invention, a method for a safe electronic wallet, there are value-added function HX, depreciation function HZ, enhancement function ZQ, electronic wallet identification ID, asymmetric encryption algorithm RSA and key pair (S1, S2) here. ), user PIN code. We choose area 1 as the storage area for the balance in the electronic wallet. Area 2 is an area for storing depreciation keys.

[0052] In this way, the value-added password is HZ(ID); the consumer password is HX(ID); the enhanced password is ZQ(ID); calculate RSA S1 (ID, HX(ID)) and stored together with the PIN code in an area protected by the enhanced password ZQ(ID).

[0053] When used in a credit terminal, the terminal generally has a depreciation function HX; the terminal first reads out the identification ID number of the electronic wallet, and calculates HX(ID), and uses HX(ID) and the consumption key in the electronic wallet for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide the technical scheme, which realizes pin codes in electronic wallets by storing consumption keys into the electronic wallets. Accordingly, the pin codes are not required during credit payment but required during non-credit payment, and the same electronic wallet is used. Besides, uniformity of quick consumption and safety consumption in credit shops such as a public transportation system is achieved. The invention further provides a method for protecting card issue functions.

Description

technical field [0001] The invention belongs to the field of information security. The invention relates to a method and system for enhancing the security of an electronic wallet. Specifically, it relates to a method and system in which an electronic wallet can be used on terminals of trusted payees and non-trusted payees at the same time. Background technique [0002] The application of campus cards and electronic wallets is becoming more and more popular. Generally, electronic wallets use the ISO14443 radio frequency standard and protocol. The radio frequency is just the communication interface between the radio frequency card and the card reader terminal. In the application scheme of the electronic wallet of the campus card, the core problem is to use the symmetric cipher for the mutual authentication of the card and the card reader terminal, that is, the three-time authentication of the symmetric cipher. The purpose of authentication is to verify that both parties hav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07F7/10
Inventor 邵通
Owner 邵通
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products