Security smart card using external terminal for verification and verification method thereof
A technology of external terminal and verification method, applied in the field of smart cards, can solve the problem of high risk of being read and stolen, and achieve the effect of improving security and ensuring the safety of funds
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0032] Introduced below are some of the multiple embodiments of the present invention, intended to provide a basic understanding of the present invention. It is not intended to confirm the key or decisive elements of the present invention or limit the scope of protection.
[0033] figure 1 It is a schematic diagram showing the structure of a secure smart card verified by an external terminal according to the present invention.
[0034] Such as figure 1 As shown, the secure smart card verified by an external terminal of the present invention includes a secure chip 100, a card verification sub-module 200, a Token sub-module, an I / O communication sub-module, and a power sub-module 500. The secure smart card verified by the external terminal of the present invention performs communication verification with the external terminal 700 through communication interaction.
[0035] In the following, the components of the secure smart card will be described.
[0036] The security chip module 100...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap