Unlock instant, AI-driven research and patent intelligence for your innovation.

Security equipment, encryption machine, security equipment operating system and operation method

A technology of security device and encryption machine, applied in the field of security device operating system, can solve problems such as loss of security device, and achieve the effect of high security

Active Publication Date: 2017-01-18
GOLDPAC GRP LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above situation will cause loss to the holder of the security equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security equipment, encryption machine, security equipment operating system and operation method
  • Security equipment, encryption machine, security equipment operating system and operation method
  • Security equipment, encryption machine, security equipment operating system and operation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0058] As an aspect of the present invention, such as figure 1 and figure 2 As shown, a security device 10 is provided. The security device 10 includes a chip 11, wherein the chip 11 is provided with a first computing unit, and the chip 11 also stores the annual ring data or initial annual ring data of the last operation. , the first operation unit can perform the first operation without reverse operation to generate the first verification data, and the data involved in the first operation include the current operation data and the annual ring data of the last operation or all The initial annual ring data, the security device 10 can send the first verificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides security equipment, which comprises a chip. A first arithmetic unit is arranged in the chip. Annual ring data of previous-time operation or initial annual ring operation is stored in the chip. The first arithmetic unit can perform first-time arithmetic operation to generate first authentication data. Data participating in the first-time arithmetic operation comprise operating data of this time and the annual ring data of the previous-time operation or the initial annual ring data. The security equipment can transmit the first authentication data and the operating data of this time to an encryptor corresponding to the security equipment for authentication. When the first authentication data passes the authentication of the encryptor, the first arithmetic unit can perform second-time arithmetic operation to generate annual ring data of operation of this time. Data participating in the second-time arithmetic operation comprise counter data of operation of this time and the annual ring data of the previous-time operation or the initial annual ring data. The invention additionally provides the encryptor, a security equipment operating system and an operating method. The security equipment provided by the invention has very high security and is not apt to clone.

Description

technical field [0001] The present invention relates to the field of security devices, in particular, to a security device, an encryption machine corresponding to the security device, a security device operating system including the security device and the encryption machine, and an operating system for operating the security device. How to operate the security appliance operating system. Background technique [0002] Current security devices (for example, bank cards or shopping cards, etc.) mostly store personal information such as personal identification numbers, keys, and digital signatures. This personal information is used to authenticate the security device holder, or said personal information may be used to calculate certain check figures when performing operations. [0003] After the security device is issued, the personal information written into the security device cannot be changed. However, since the personal information appears in the link during the operation,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 李军杨宁于鸽
Owner GOLDPAC GRP LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More