Method based on combined public key authentication microprocessor card cloud management system

A technology combining public keys and microprocessors, applied in transmission systems, public keys for secure communications, user identity/authority verification, etc., can solve the problems of wasting resources, reducing efficiency, inconvenient promotion and use, and saving resources Effect

Active Publication Date: 2018-03-30
上海象形通讯科技股份有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] When the symmetric encryption system is used, the encryption key and the decryption key are the same or related, so the security requirements for its storage and transmission are very high. Although the security of the key system can be greatly improved, the hardware used The device performs encryption processing, and special hardware devices are used to store and transmit keys, which is not convenient for large-scale promotion and use
Moreover, the security of the key during transmission is difficult to guarantee, especially for services based on mobile communications, such as mobile payment, etc. Others can easily obtain the key during transmission through wireless technology.
[0008] Among the existing CPU cards, different industries and different fields of use, the CPU cards are independent without any docking, which will lead to overlapping issuance of CPU cards, waste resources, reduce efficiency, and need to transmit keys, which has very high requirements for network security. high
[0009] The key generation process and card issuance process of the existing CPU card need 5 processes. One card issuance needs to go through different leader cards and enter their respective passwords at the same time to obtain the master control key card; multi-function master key card, that is, the master card that saves the function key; then according to the card number of the user card, the master key of the key master card is distributed to the master key of the user card; the key after the distributed function is transmitted and protected Under the control of the CPU card, it is written into the CPU card and the security module, which makes the key generation process and card issuance process of the entire CPU card very complicated and cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method based on combined public key authentication microprocessor card cloud management system
  • Method based on combined public key authentication microprocessor card cloud management system
  • Method based on combined public key authentication microprocessor card cloud management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the measures, creative features, goals and effects achieved by the technology of the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0048] figure 1 It is a flow chart of the method of the present invention based on combined public key authentication microprocessor card cloud management system, as figure 1 As shown, the present invention provides a method based on combined public key authentication microprocessor card cloud management system, comprising the following steps:

[0049] Step 1, the user applies for a microprocessor CPU card, collects the user's identification information, and completes the identification;

[0050] Step 2: Use the user identification information collected in step 1 to further determine whether the user is a legitimate user or an honest user. If it is an illegal user or a dishonest user, enter the blacklist; if it is a legitimate user o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to a microprocessor card cloud management system, and provides a method based on a combined public key authentication microprocessor card cloud management system, comprising the following steps: a user applies for a microprocessor CPU card, collects the user's identification information, and completes the identification identification; to further determine whether the user is a legal user or an honest user; to enter the blacklist, the CPU card will not be issued; to enter the key calculation process, the user will obtain a random matrix coordinate sequence; further obtain the private key matrix, and save it in the secret The key matrix storage center; perform compound operations to obtain the user's identity private key; bind the pseudo-random sequence with the identity private key, and solidify it on the private key carrier; finally, hand over the private key carrier carrying the identity private key to user. The invention has the characteristics of no key transmission, high security, one card with multiple functions, new CPU card and old CPU card can be compatible and docked, use efficiency is improved, and it is beneficial to large-scale popularization and use.

Description

technical field [0001] The invention belongs to the technical field of microprocessor card cloud management system, and in particular relates to a non-contact microprocessor card cloud management system based on combined public key authentication in the fields of insurance, traffic police, government industry, finance, transportation, commerce, aviation, etc. method. Background technique [0002] The CPU card can be used in many fields such as finance, insurance, traffic police, and government industries. It has the characteristics of large user space, fast reading speed, and supports multiple functions of one card. With the continuous expansion of the application of CPU cards, the related services of CPU cards with the help of the Internet are also increasing, such as the use and transmission of information in the card, and the delivery mode of the amount, which is usually provided through the Internet and can be dynamically expanded and may be virtualized. resources to ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/08
Inventor 聂明赵飞
Owner 上海象形通讯科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products