Three-party authentication method and device as well as intelligent card supporting two-way authentication

A two-way authentication and three-party authentication technology, applied in the field of smart cards, can solve the problems of poor binding effect, easy cracking, low security, etc., and achieve the effect of ensuring specificity and security, ensuring security, and ensuring security.

Active Publication Date: 2012-12-19
衣锦浣香电子商务有限公司
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing machine-card binding schemes, third-party legality certification and other means may have poor binding effects, are easy to crack, or have low security, or cannot solve problems in new application environments.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-party authentication method and device as well as intelligent card supporting two-way authentication
  • Three-party authentication method and device as well as intelligent card supporting two-way authentication
  • Three-party authentication method and device as well as intelligent card supporting two-way authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0138] Such as Figure 7 As shown, the terminal, the smart card, and the management platform of this embodiment successfully perform the three-party authentication process, which mainly includes:

[0139] Step 701, the Internet of Things terminal is turned on, and after the smart card is reset, the terminal executes the ProfileDownload process, and the terminal sends a TERMINAL PROFILE command to the smart card, where bit1 in the 40th byte of the TERMINAL PROFILE command is 1, which means that the terminal and the smart card need to perform bidirectional certified.

[0140] Step 702: After receiving the command, the smart card judges that the corresponding bit in the TERMINAL PROFILE command is 1, and executes a two-way authentication process between the mobile terminal and the smart card.

[0141] Specifically, in this embodiment, random numbers and IMSI are used as authentication information. Algorithm 1 and Algorithm 2 are respectively stored in the smart card and the term...

Embodiment 2

[0154] Figure 8 For the terminal, smart card, and management platform in the embodiment of the present invention, the process of three-party authentication failure, such as Figure 8 As shown, the process mainly includes:

[0155] In step 801, the terminal is turned on, and after the smart card is reset, the terminal executes the Profile Download process, and the terminal sends a TERMINAL PROFILE command to the smart card, wherein bit7 in the 50th byte of the TERMINAL PROFILE command is 1, which means that two-way authentication between the terminal and the smart card is required.

[0156] Step 802, after receiving the command, the smart card judges that the corresponding bit in the TERMINAL PROFILE command is 1, and therefore executes a bidirectional authentication process between the mobile terminal and the smart card.

[0157] Specifically, in this embodiment, IMSI is used as the authentication information. Algorithm 1 and Algorithm 2 are respectively stored in the smart ...

Embodiment 3

[0166] Figure 9 For the terminal, smart card, and management platform in the embodiment of the present invention, the process of three-party authentication failure, such as Figure 9 As shown, the process mainly includes:

[0167] In step 901, the terminal is turned on, and after the smart card is reset, the terminal executes the Profile Download process, and the terminal sends a TERMINAL PROFILE command to the smart card, wherein bit1 in the 62nd byte of the TERMINAL PROFILE command is 1, which means that two-way authentication between the terminal and the smart card is required.

[0168] Step 902, after receiving the instruction, the smart card judges that the corresponding bit in the TERMINAL PROFILE instruction is 1, so the two-way authentication process between the mobile terminal and the smart card is executed.

[0169] Specifically, in this embodiment, random numbers and IMSI are used as authentication information. Algorithm 1 and Algorithm 2 are respectively stored i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses three-party authentication method and device as well as an intelligent card supporting two-way authentication. The three-party authentication method comprises the following steps: authentication is performed between a terminal and the intelligent card; after the authentication between the terminal and the intelligent card is passed, the terminal reports a binding relationship between the terminal and the intelligent card to a management platform, and requests authentication of the binding relationship to the management platform; the management platform performs authentication of the binding relationship between the terminal and the intelligent card, if the authentication of the binding relationship is passed, the three-party authentication is judged to be passed, or else, the three-party authentication is judged not to be passed. By adopting the three-party authentication method and device as well as the intelligent card supporting two-way authentication, the safety of the terminal and the intelligent card are both ensured, and meanwhile, the binding relationship between the terminal and the intelligent card can be dynamically authenticated. The management platform side has a control and management right for the terminal and card equipment so that an operator can conveniently develop own business, and the specificity and safety of the terminal and the intelligent card during development of business of Internet of things are ensured.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a three-party authentication method and device and a smart card supporting two-way authentication. Background technique [0002] As an important part of the emerging high-tech industry, the Internet of Things has been regarded as one of the key technologies for coping with the economic crisis and revitalizing the economy by countries all over the world. IoT services can be widely applied to many industries, such as vehicles, electric power, finance, environmental protection, petroleum, personal and corporate security, hydrology, military, fire protection, meteorology, coal, agriculture and forestry, elevators, etc. According to experts' estimates, in the next few years, the Internet of Things business will rapidly enter many industries, and the number of users will also grow rapidly. It is estimated that by the end of 2012, the number of Internet of Things users based on m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/32H04L63/0869H04L63/0853H04L29/06H04L9/321
Inventor 吴传喜
Owner 衣锦浣香电子商务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products