Security smart card using external terminal for verification and verification method thereof

A technology of external terminal and verification method, applied in the field of smart cards, can solve the problem of high risk of being read and stolen, and achieve the effect of improving security and ensuring the safety of funds

Active Publication Date: 2016-05-18
CHINA UNIONPAY
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Risk of card duplication: At present, for magnetic stripe cards, the technology for reading magnetic stripe cards on the market is no longer a secret; for IC cards, although the encryption le

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security smart card using external terminal for verification and verification method thereof
  • Security smart card using external terminal for verification and verification method thereof

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0032] Introduced below are some of the multiple embodiments of the present invention, intended to provide a basic understanding of the present invention. It is not intended to confirm the key or decisive elements of the present invention or limit the scope of protection.

[0033] figure 1 It is a schematic diagram showing the structure of a secure smart card verified by an external terminal according to the present invention.

[0034] Such as figure 1 As shown, the secure smart card verified by an external terminal of the present invention includes a secure chip 100, a card verification sub-module 200, a Token sub-module, an I / O communication sub-module, and a power sub-module 500. The secure smart card verified by the external terminal of the present invention performs communication verification with the external terminal 700 through communication interaction.

[0035] In the following, the components of the secure smart card will be described.

[0036] The security chip module 100...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security smart card using an external terminal for verification. The security smart card comprises a security chip module, a card verification sub module, a Token sub module, an I/O communication sub module, a power supply sub module, and a timing sub module. The security chip module is used for storing card information of a smart card. The card verification sub module is used for triggering a verification function of the smart card and sending a working request of turning on or off to the security chip module according to a verification result; and the timing sub module is not triggered until a working request of turning on is sent to the security chip module. The Token sub module is used for generating a verification code for verification under the circumstance that the card needs verification. The I/O communication sub module is used for carrying out data transmission with an external terminal. The power supply sub module is used for providing a power supply for the security smart card. And the timing sub module is used for carrying out timing on available time of the smart card based on triggering of the card verification sub module. According to the invention, security of the smart card can be further improved.

Description

[0001] technical field [0002] The invention relates to a smart card, in particular to a safe smart card which can be used after verification by means of an external terminal and a verification method thereof. [0003] Background technique [0004] At present, bank cards, as a commonly used payment tool for consumers, are becoming more and more practical. Therefore, there are also more and more types of risks due to cards, as follows: [0005] Risk of card loss: At present, most users put their cards in their wallets. If the wallet is lost, the user’s password is stolen through other channels due to the personal information such as ID card and work card in the wallet, or for other reasons. , The capital risk caused by the loss of the card is relatively large. [0006] Risk of card duplication: At present, for magnetic stripe cards, the technology to read magnetic stripe cards on the market is no longer a secret; for IC cards, although the encryption level is higher than ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K19/07G06F21/77H04L9/32
CPCG06K19/07
Inventor 冯晓郑建宾吕旭峰褚红梅
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products