Application encipherment protection method of card reader

A technology for application programs and card readers, which can be used in program/content distribution protection, instruments, inductive record carriers, etc., and can solve the problem of high equipment cost

Active Publication Date: 2013-10-23
广东岭南通股份有限公司
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to propose an application encryption protection m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application encipherment protection method of card reader
  • Application encipherment protection method of card reader
  • Application encipherment protection method of card reader

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In the following, the present invention will be further described in conjunction with the drawings and specific embodiments.

[0067] Such as figure 1 As shown, the logical partition of the FLASH memory of the card reader is the same as that of the prior art, including a boot area, a system parameter area and an application program area. Bootloader is stored in the boot area, M, random numbers, Ca, Cb, and Cc are stored in the system parameter area, and App is stored in the application program area.

[0068] In order to describe the aspect, the nouns involved in the present invention are firstly explained.

[0069] Bootloader: start the bootloader;

[0070] App: Application, application program;

[0071] CID: ChipIndentify, the unique identification number of the chip, which is a unique read-only serial number of 96 bits;

[0072] M: Startup code, which is a variable and is used to identify the program operation mode. There are three operation modes, namely App oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an application encipherment protection method of a card reader. The method adopts a three verification techniques: (1) the verification of an App (Application) to Bootloader is used for verifying the validity of the bootloader; the App is executed if the verification passes, or else, the App performs self-destruction; and the situation that the App is acquired illegally and used for other illegal test or production is avoided; (2) the verification of the App to unique CID (Chip Identification) of a singlechip is used for binding the App with a corresponding chip; and even if chip contents are illegally copied to another chip, the App cannot run normally; and (3) the verification of the Bootloader to the App is used for verifying the validity of the App; and an illegal App is prevented from being downloaded and upgraded.

Description

[0001] technical field [0002] The invention relates to software encryption and protection technology, in particular to an application program encryption protection method of a card reader. [0003] Background technique [0004] With the development of electronic technology, IC cards are widely used in bus cards, bank cards, electronic tags, work permits, etc. [0005] The current card reader is composed of single-chip microcomputer, antenna, RFID module, external FLASH memory and encryption chip. For the convenience of explanation, the internal FLASH memory and external FLASH memory of the single-chip microcomputer are collectively referred to as FLASH memory. When the card reader leaves the factory, the manufacturer burns the application program (App, Application) into the FLASH memory. [0006] The card reader is a device used to read the data of the IC card. The electronic wallet in the IC card can be deducted or recharged by using the built-in application program of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06K7/00
Inventor 谢振东刘强何建兵方晓洪
Owner 广东岭南通股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products