Trusted terminal, double-channel card, anti-cloning chip, chip fingerprint and channel attack resistance method

A dual-channel, terminal technology, applied in the security field, can solve problems such as leaks, chips that do not have anti-cloning capabilities, and side-channel attacks

Inactive Publication Date: 2014-05-07
邹候文
View PDF4 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 2) Side-channel attack: Signals inherently have side-channel leakage during channel transmission and processing, that is to say, chips will be implanted with Trojan horses that leak side-channel information without exception during production.
[0017] The more important problem with bank IC cards is that the chip does not have anti-cloning capabilities, which will make the following two "indistinguishable" situations: i) A's IC card is unintentionally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted terminal, double-channel card, anti-cloning chip, chip fingerprint and channel attack resistance method
  • Trusted terminal, double-channel card, anti-cloning chip, chip fingerprint and channel attack resistance method
  • Trusted terminal, double-channel card, anti-cloning chip, chip fingerprint and channel attack resistance method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0105] Such as Figure 7 As shown, a trusted terminal in this embodiment includes a main control chip, a dual-channel card slot, a channel isolation component and a communication interface;

[0106] The main control chip is directly connected to the first channel connector of the dual-channel card slot, directly or indirectly connected to the channel isolation component, and directly connected to the communication interface, for directly or indirectly controlling the channel isolation component and directly controlling the communication Interface and processing information; the direct connection refers to the connection through the channel connection line, without dual-channel card isolation in the middle; the indirect connection refers to the main control chip as a bridge and channel isolation component through the dual-channel card in the dual-channel card slot connected;

[0107] The dual-channel card slot includes a first channel connector and a second channel connector, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted terminal, a double-channel card, an anti-cloning chip, a chip fingerprint and a channel attack resistance method. The trusted terminal comprises a main control chip, a double-channel card slot, a channel isolation part and a communication interface; the double-channel card slot comprises a first channel connector and a second channel connector; the first channel connector is connected with the main control chip; the second channel connector is connected with the channel isolation part; the double-channel card slot is used for enabling the double-channel card to be inserted in. The trusted terminal and the double-channel card which are disclosed by the invention can replace an existing IC (Integrated Circuit) card to carry out migration and have the advantages of high safety, strong universality, low cost, easiness for implementation and the like. The key points for high safety are as follows: the existing bank IC card is easy to clone so as to easily generate the undistinguishable condition, and a payment password of the existing bank IC card is easy to intercept and capture; the double-channel card cannot be cloned, can avoid the undistinguishable condition and can effectively protect safety of the payment password.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a trusted terminal, a dual-channel card, an anti-cloning chip, a chip fingerprint and an anti-channel attack method. Background technique [0002] Basic definition: channel refers to the signal transmission channel, including the transmission channel between terminals, the transmission channel between the same terminal chip and chip / chip and component / component and component, the data bus between the modules inside the chip, and Various signal paths inside a chip or module. A Trojan horse refers to a malicious program with the functions of eavesdropping, leaking, tampering, inserting, replaying, intercepting and forwarding. Chip fingerprint: similar to human fingerprints, each chip extracted inside the chip is different and unique information. Anti-cloning chip: For chips including chip fingerprint modules, manufacturers cannot produce completely identical anti-cloning chips....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/77G07G1/00
CPCH04L9/3278G09C1/00H04L2209/12G06F21/77G06K19/07309G06Q20/401
Inventor 邹候文唐韶华唐春明彭俊好郑鹤强陈祺邝天朗何文峰黄智洲
Owner 邹候文
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products