Method for IC card and security information interaction terminal authentication, IC card and security information interaction terminal
A security information and interactive terminal technology, which is applied to IC cards, security information interactive terminals, and offline authentication fields, can solve problems such as vulnerability to attacks, security risks, and complex key management updates, so as to avoid security risks and enhance safety effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] figure 1 It is a schematic structural diagram of a security information interaction system including an IC card and a security information interaction terminal according to an embodiment of the present invention. Such as figure 1 As shown, the IC card 1 disclosed in the present invention includes a main controller 3 , an authentication unit 4 , a memory 5 and a communication interface 6 . Wherein, the communication interface 6 is used to establish a data communication link between the IC card 1 and the security information interaction terminal 2 (for example, bringing the IC card close to or touching the security information interaction terminal). The authentication unit 4 is used to receive and process authentication instructions from the security information interaction terminal 2 after the data communication link has been established between the IC card 1 and the security information interaction terminal 2, and execute the verification of the security information in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 