Non-contact processor card based on combined public key authentication and use method

A combined public key, non-contact technology, applied in the direction of digital data authentication, user identity/authority verification, digital transmission system, etc. The effect of the ability to attack

Active Publication Date: 2014-10-01
上海象形通讯科技股份有限公司
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] When the symmetric encryption system is used, the encryption key and the decryption key are the same or related, so the security requirements for its storage and transmission are very high. Although the security of the key system can be greatly improved, the hardware used The device performs encryption processing, and special hardware de

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-contact processor card based on combined public key authentication and use method
  • Non-contact processor card based on combined public key authentication and use method
  • Non-contact processor card based on combined public key authentication and use method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] figure 2 It is a flow chart of the present invention applied to a tap water meter with an automatic meter reading function.

[0074] like figure 2 As shown, the CPU card based on combined public key identification proposed by this patent invention is built in the water meter with automatic meter reading function, which can uniquely identify the automatic water meter, and has encryption and decryption functions. Because the information is encrypted, It is impossible to modify and decipher these water consumption information, so as to prevent water stealing; at the same time, users can obtain water consumption in real time through the Internet and recharge in real time. The specific steps are as follows:

[0075] Step 1: The user recharges the water fee through the Internet;

[0076] Step 2: After obtaining the recharge fee, the management platform of the water company notifies the built-in CPU card based on combined public key identification through the wireless netw...

Embodiment 2

[0081] image 3 It is a flowchart of the application of the present invention on the Midtown Smart Card, such as image 3 , the Midtown smart card adopts the CPU card based on combined public key identification proposed by the present invention, through the new and old card number mapping and the new and old card key conversion, to realize the interaction and connection of information. The social security card, medical insurance card, and bus card in the figure are shown as For example, multiple cards in one are realized.

[0082] The current traditional method is that different departments issue different cards, such as social security cards, medical insurance cards, bus cards, etc., which are troublesome to carry, inconvenient to use, and easy to lose. In case of loss, you need to go to different departments to report the loss. The original intention of issuing cards has not been achieved.

[0083] The available resources of the present invention are very huge, and the sam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of CPU cards and provides a non-contact processor card based on combined public key authentication and a use method. The non-contact processor card comprises a chip, a safe serial port, a radio frequency unit, a micro processor, an RAM, an ROM, an EEPROM, a safe logic unit and a self-destruction unit, wherein the safe serial port, the radio frequency unit, the micro processor, the RAM, the ROM, the EEPROM, the safe logic unit and the self-destruction unit are installed on the chip and are connected with the chip through circuits. The use method of the combined public key authentication is achieved, collusion attack prevention capacity is improved by means of a chaotic random sequence generated by means of chaotic mapping, a puzzling secret key of a reversion prevention project is additionally arranged in a secrete key unit, meanwhile, a self-destruction logic unit for preventing temptation attacks is additionally arranged, transmission secrete keys are not needed, requirements for safety in the communication process are not high, use safety is high, large-scale popularization and use are facilitated, and the CPU card and the use method are suitable for meeting service requirements on the basis of mobile communication.

Description

technical field [0001] The invention belongs to the technical field of microprocessor CPU cards, in particular to a non-contact processor card based on combined public key authentication in the fields of insurance, traffic police, government industry, finance, transportation, commerce, aviation and the like and its usage method. Background technique [0002] The non-contact microprocessor card is also the CPU card. Generally speaking, it means that the chip contains a microprocessor. Its function is equivalent to a microcomputer. The metal sheet on the integrated circuit IC card that people often use is the CPU card chip. . The CPU card can be used in many fields such as finance, insurance, traffic police, and government industries. It has the characteristics of large user space, fast reading speed, and supports one card for multiple purposes, and has passed the certification of the People's Bank of China and the State Commercial Secret Committee. The appearance of the CPU ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31H04L9/32
CPCG06F21/31H04L9/3263
Inventor 聂明曹喆佶
Owner 上海象形通讯科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products