Terminal security module and its management method, vehicle charging management method and system
A technology of terminal security module and management method, which is applied in the field of terminal security module and its management, vehicle charging management method and system, can solve the problems of hidden safety hazards of PSAM management, and achieve the effect of eliminating hidden safety hazards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] figure 1 It is a flow chart of Embodiment 1 of the management method of the terminal security module of the present invention. In this embodiment, it is first explained that keys and files can be stored in the terminal security module. For keys, the COS (ChipOperating System) of the terminal security module , COS chip operating system) in addition to specifying the purpose, version, algorithm identification, key value and other attributes of the key, it will also specify the use authority of the key. The use authority of the key is a value, for example, it can be between 0-15 a number in between.
[0058] In this embodiment, the key attribute field structure and description of the terminal security module are shown in Table 1:
[0059] data field
key usage
key version
Algorithm ID
access rights
key value
length (byte)
1
1
1
1
8 / 16
[0060] Table 1
[0061] In addition, when the terminal security module uses the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


