Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device processing commands

A technology for processing instructions and instructions, applied in the field of information security, can solve problems such as the security of the message transmission system, and achieve the effect of improving security and confidentiality

Active Publication Date: 2013-06-19
FEITIAN TECHNOLOGIES
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The invention provides a method and device for processing instructions to solve the security problem existing in the message transmission system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device processing commands
  • Method and device processing commands
  • Method and device processing commands

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] After the receiving device receives the PIN verification instruction from the host computer, the operations performed are as follows: figure 1 shown, including the following steps:

[0051] Step 101, retrieve the private key according to preset parameters.

[0052] Wherein, the preset parameters may be KID (Key Identity, key identifier) ​​and Usage (usage).

[0053] Step 102, judge whether the private key is retrieved, if the private key is retrieved, execute step 103; otherwise, send an error code to the upper computer.

[0054] Step 103, check whether the length of the data in the data field of the PIN (Personal Identification Number, personal identification password) command matches the bit length of the private key, and if so, execute step 104; otherwise, send an error code to the host computer.

[0055] Step 104, use the retrieved private key to decrypt the data in the data field of the verification PIN instruction.

[0056] Specifically, the RSA algorithm can be ...

Embodiment 2

[0078] After the receiving device receives the PIN verification instruction from the host computer, the operations performed are as follows: figure 2 shown, including the following steps:

[0079] Step 201: Decrypt the data in the data field of the verification PIN command using the internally stored private key, delete the supplementary information in the decrypted data, and obtain a decryption result.

[0080] Among them, the RSA algorithm can be used to decrypt the private key. Correspondingly, the supplementary information can be data starting with "0001FF" and ending with "FF00", or starting with "0002" and ending with "00". end, and fill the data of one or more random numbers between "0002" and "00".

[0081] Step 202, check whether there is a random number stored inside itself, if yes, execute step 203; otherwise, send an error code to the host computer.

[0082] Step 203, use the internally stored random number to descramble the decrypted result to obtain the descra...

Embodiment 3

[0090] After the receiving device receives the modification PIN command from the host computer, the operations performed are as follows: image 3 shown, including the following steps:

[0091] In step 301, the private key is retrieved according to preset parameters.

[0092] Wherein, the preset parameters may be KID and Usage.

[0093] Step 302, judge whether the private key is retrieved, if the private key is retrieved, then execute step 303; otherwise, send an error code to the upper computer.

[0094] Step 303, using the retrieved private key to decrypt the data in the data field of the PIN modification instruction.

[0095] Specifically, the RSA algorithm can be used to decrypt the private key.

[0096] Step 304, judge whether the decryption is successful, if successful, execute step 305; otherwise, send an error code to the upper computer.

[0097] Step 305, check whether there is a random number stored inside itself, if yes, execute step 306; otherwise, send an error...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device processing commands. The method comprises the following steps of: utilizing an internally stored private key and / or user personal identification number (PIN) to decipher data in a data domain of commands to be processed, obtaining deciphered results, checking if random numbers are stored inside in self, if yes, then performing descrambling on deciphered results by using the random numbers, obtaining descrambling results, and checking the PIN or managing the PIN according to the descrambling results. By means of the technical scheme, operations of modifying the PIN, resetting the PIN and checking the PIN are performed according to the internally stored random number, the private key and the user PIN; and safety and security of a message transmission system are improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and device for processing instructions. Background technique [0002] With the development of information security, information security devices such as smart key devices and smart cards have been widely used in the information field, and people have stricter requirements on the security of message transmission functions of information security devices. [0003] In the prior art, most receiving devices in the message transmission system have built-in keys, which are the data negotiated between the information sender and the receiving device before the message transmission, and the information sender uses it before sending the message. The key encrypts the message to form ciphertext before sending it, and the receiving device uses the key to decrypt it to obtain the plaintext after receiving it. The above method can ensure the confidentiality of message transmi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More