Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for IC card and security information interaction terminal authentication, IC card and security information interaction terminal

A security information and interactive terminal technology, which is applied to IC cards, security information interactive terminals, and offline authentication fields, can solve problems such as vulnerability to attacks, security risks, and complex key management updates, so as to avoid security risks and enhance safety effect

Inactive Publication Date: 2014-02-12
CHINA UNIONPAY
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The PSAM card is exposed on the terminal and is extremely vulnerable to attacks. At the same time, the key management (such as transmission, distribution, update, recycling, etc.) is complicated, which limits the cross-regional use of the card), resulting in the following potential security risks: counterfeit Unauthorized terminals (such as POS machines) can interact with IC cards (such as traffic cards) for offline security information (such as performing offline recharge operations for traffic cards)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for IC card and security information interaction terminal authentication, IC card and security information interaction terminal
  • Method for IC card and security information interaction terminal authentication, IC card and security information interaction terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] figure 1 It is a schematic structural diagram of a security information interaction system including an IC card and a security information interaction terminal according to an embodiment of the present invention. Such as figure 1 As shown, the IC card 1 disclosed in the present invention includes a main controller 3 , an authentication unit 4 , a memory 5 and a communication interface 6 . Wherein, the communication interface 6 is used to establish a data communication link between the IC card 1 and the security information interaction terminal 2 (for example, bringing the IC card close to or touching the security information interaction terminal). The authentication unit 4 is used to receive and process authentication instructions from the security information interaction terminal 2 after the data communication link has been established between the IC card 1 and the security information interaction terminal 2, and execute the verification of the security information in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for IC card and security information interaction terminal off-line authentication and an IC card and a security information interaction terminal which are capable of using the method. According to the method, after a data communication link is established between the IC card and the security information interaction terminal, the security information interaction terminal sends an authentication instruction to the IC card to execute the authentication of the security information interaction terminal, wherein the authentication is conducted off-line. According to the method for IC card and the security information interaction terminal off-line authentication and the IC card and the security information interaction terminal which are capable of using the method, safety performance is enhanced.

Description

technical field [0001] The present invention relates to an authentication method, an IC card and an information interaction terminal, more specifically, an off-line authentication method for an IC card and a security information interaction terminal, and an IC card and a security information interaction terminal. Background technique [0002] At present, with the increasingly widespread application of IC cards and the increasing variety of services in different fields, through the security information between IC cards (such as traffic cards) and security information interaction terminals (such as POS machines) (that is, security It is becoming more and more common to implement different applications (such as traffic card top-up) by requiring high-level information (such as password) interaction (especially security information interaction in offline situations). [0003] However, in the existing security information interaction system, the IC card and the security informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K19/073
CPCG06Q20/341G07F7/125G06Q20/409G06Q20/3674
Inventor 钟国业吴金坛万高峰
Owner CHINA UNIONPAY