Data safety storing method suitable for IC cards and two-dimension codes

A technology of data security storage and two-dimensional code, applied in the field of data security storage, can solve the problem of low data security and achieve the effect of enhancing security

Active Publication Date: 2015-03-25
XIAMEN UNIV
View PDF9 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to solve the problem that the existing IC card encryption method depends on the internal implementation of the IC card and the encryption method applied to the two-dimensional code is too s...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data safety storing method suitable for IC cards and two-dimension codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the purpose, technical solution and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described below in conjunction with the accompanying drawings.

[0065] The overall module composition and interaction of the present invention are as follows: figure 1 shown.

[0066] The key center 110 is the core server of the system and also the security center of the entire system, and is composed of an authentication module 111 , a key management module 112 and an authorization module 113 . The card making / code making device 101 and the card reading / code reading device 131 are called the terminals of the system, and the key center 110 assigns a unique number to all terminals, then generates a pair of RSA public and private keys, and distributes the private keys to the terminals as Its unique identity key, while saving the public key in the database of the key center. This pair of RSA public...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to IC cards and two-dimension codes and discloses a data safety storing method suitable for IC cards and two-dimension codes. The method comprises the steps of (1) terminal registering, (2) authentication, (3) card/code generating and (4) card/code reading. A symmetric key and an asymmetrical key are combined for use, only the data storing function of the IC cards and the two-dimension codes is used, a data encryption function is completely completed by an upper layer software system, accordingly, limiting from the types and inner achieving of the IC cards is avoided, and limiting from the types of the two-dimension codes is avoided. Each card/code generator and each card/code reader are provided with unique identity keys, a key center is used for distributing different encryption keys during each-time encryption, and the key center carries out decryption authorization on the card/code reader. The forward safety of the keys can be well guaranteed, right control particle size is well refined, and accordingly data safety is enhanced.

Description

technical field [0001] The invention relates to an IC card and a two-dimensional code, in particular to a data safe storage method suitable for the IC card and the two-dimensional code. Background technique [0002] IC card is an integrated circuit card (Integrated Circuit Card), also known as a smart card (Smart card), a smart card (Intelligent card), a microcircuit card (Microcircuit card) or a microchip card, etc. It is a microelectronic chip embedded in a In the ISO7816 standard card base, it is made into a card form, and the information is stored through the integrated circuit in the card. The communication method between the IC card and the reader can be contact or non-contact. According to the communication interface, the IC card is divided into Contact IC Card, Non-Contact IC and Dual Interface Card (1. Luan Jiahui, Yang Fang, Zhou Xiu. Present Situation and Application of IC Card Technology [J]. Agricultural Mechanization Research, 2003, 03:189-190; 2. Yang Zhaomin ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06K7/00G06K19/06
CPCG06F21/6209G06K17/0003G06K19/06037G06F2221/2107
Inventor 郭东辉姜林美
Owner XIAMEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products