Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal security module and its management method, vehicle charging management method and system

A technology of terminal security module and management method, which is applied in the field of terminal security module and its management, vehicle charging management method and system, can solve the problems of hidden safety hazards of PSAM management, and achieve the effect of eliminating hidden safety hazards

Active Publication Date: 2018-07-20
SHENZHEN GENVICT TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is to provide a terminal security module and its management method, vehicle charging management method and system, which can eliminate the safety hazard

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal security module and its management method, vehicle charging management method and system
  • Terminal security module and its management method, vehicle charging management method and system
  • Terminal security module and its management method, vehicle charging management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] figure 1 It is a flow chart of Embodiment 1 of the management method of the terminal security module of the present invention. In this embodiment, it is first explained that keys and files can be stored in the terminal security module. For keys, the COS (ChipOperating System) of the terminal security module , COS chip operating system) in addition to specifying the purpose, version, algorithm identification, key value and other attributes of the key, it will also specify the use authority of the key. The use authority of the key is a value, for example, it can be between 0-15 a number in between.

[0058] In this embodiment, the key attribute field structure and description of the terminal security module are shown in Table 1:

[0059] data field

key usage

key version

Algorithm ID

access rights

key value

length (byte)

1

1

1

1

8 / 16

[0060] Table 1

[0061] In addition, when the terminal security module uses the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal security module, and a management method thereof, and a vehicle charge management method and a system thereof. The management method of terminal security module comprises the following steps: when secret keys are used for declassifying data, judging whether the authentication of a manager or PIN verification is passed or not; when the authentication of the manager or the PIN verification is passed, modifying the state value of the usage permissions of a current application catalogue; judging whether the state value of the usage permissions of the current application catalogue is greater than or equal to a preset threshold of the usage permissions, wherein the threshold of the usage permissions is set during the creating of the secret keys; when the threshold is greater than or equal to the preset threshold of the usage permissions, using the secret keys to declassify the data. Through the implementation of the technical scheme, the potential safety hazards can be eliminated.

Description

technical field [0001] The invention relates to the field of intelligent safety management, in particular to a terminal safety module and its management method, a vehicle charging management method and system. Background technique [0002] PSAM (Purchase Secure Access Module, terminal security module) is widely used in commercial POS machines, network point terminals, direct connection terminals and other equipment. It has security control and management functions and is suitable for multiple application environments. [0003] For example, the parking lots currently used in government agencies, shopping malls, office buildings, residential quarters, etc. are usually operated by the property management independent parking lot system, which charges the vehicles entering and leaving the parking lot. The parking lot generally uses the smart card held by the user and the lane The data communication between the transaction terminals at the entrance and exit is charged. In order to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 王政甘志刚张恩泉
Owner SHENZHEN GENVICT TECH