Intelligent card safety communication method

A smart card and security technology, applied in the field of information security, can solve problems such as inability to prevent communication data from being monitored or intercepted, and imperfections

Active Publication Date: 2013-05-08
FEITIAN TECHNOLOGIES
View PDF3 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the security level involved in the field of information security communication, the currently used technology is not perfect, and it cannot avoid the problem of communication data being monitored or intercepted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent card safety communication method
  • Intelligent card safety communication method
  • Intelligent card safety communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] see Picture 1-1 , 1-2 and 1-3, Embodiment 1 provides a method for secure communication of a smart card, specifically including:

[0064] Step 101: power on the smart card;

[0065] Step 102: setting security identifiers and security variables;

[0066] In this embodiment, setting the security identifier specifically includes setting the security environment management identifier as an incomplete identifier, setting the initial state of the session security identifier as no security level, setting the certificate verification completion identifier as an incomplete identifier, and obtaining the random number Set ID to incomplete ID, set session key ID to not established ID, set external authentication ID to incomplete ID, set mutual authentication ID to incomplete ID;

[0067] In this embodiment, setting the security variable specifically includes, setting the RSA public key reference as PKV1, PKI1; setting the RSA private key reference as SKV1, SKI1; setting the first...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent card safety communication method and relates to the field of information safety. The intelligent card safety communication method is capable of resolving the problem that communication data is monitored or intercepted. The intelligent card safety communication method is adopted and a safety communication mechanism capable of protecting an intelligent card to some extent can be provided. By launching a conversation, both communication sides are identified mutually, legality of identity of an opposite side and integrity of the communication data are confirmed, security constraint for follow-up communication is provided, and accordingly safety of communication is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for secure communication of a smart card. Background technique [0002] With the rapid development of communication technology, information network has been widely used, and at the same time, computer network crimes are also emerging. People use identification and encryption technology to protect data in the information network, and widely use smart card products as identification tools for user identification. Safe and effective use of smart cards to realize real-time encryption and decryption processing of data transmitted in the network, so as to ensure that users can enjoy the services provided by the information network under the premise of safety, speed and convenience. [0003] For the security level involved in the field of information security communication, the currently used technology is not perfect, and it cannot avoid the problem of communication data b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0869H04L9/3263H04L63/04H04L63/0823H04L63/12
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products