Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security smart card using external terminal for verification and verification method thereof

A technology of external terminal and verification method, applied in the field of smart cards, can solve the problem of high risk of being read and stolen, and achieve the effect of improving security and ensuring the safety of funds

Active Publication Date: 2016-05-18
CHINA UNIONPAY
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Risk of card duplication: At present, for magnetic stripe cards, the technology for reading magnetic stripe cards on the market is no longer a secret; for IC cards, although the encryption level is higher than that of magnetic stripe cards, there is also a risk of being read
And after being read, under normal circumstances, the user does not know, and the risk of being stolen is still high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security smart card using external terminal for verification and verification method thereof
  • Security smart card using external terminal for verification and verification method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Introduced below are some of the various embodiments of the invention, intended to provide a basic understanding of the invention. It is not intended to identify key or critical elements of the invention or to delineate the scope of protection.

[0033] figure 1 It is a schematic diagram showing the structure of the secure smart card authenticated by an external terminal of the present invention.

[0034] like figure 1 As shown, the secure smart card authenticated by an external terminal of the present invention includes a security chip 100 , a card verification submodule 200 , a Token submodule, an I / O communication submodule, and a power supply submodule 500 . The security smart card authenticated by the external terminal of the present invention performs communication authentication with the external terminal 700 through communication interaction.

[0035] Next, each constituent unit of the secure smart card will be described.

[0036] The security chip module 10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security smart card using an external terminal for verification. The security smart card comprises a security chip module, a card verification sub module, a Token sub module, an I / O communication sub module, a power supply sub module, and a timing sub module. The security chip module is used for storing card information of a smart card. The card verification sub module is used for triggering a verification function of the smart card and sending a working request of turning on or off to the security chip module according to a verification result; and the timing sub module is not triggered until a working request of turning on is sent to the security chip module. The Token sub module is used for generating a verification code for verification under the circumstance that the card needs verification. The I / O communication sub module is used for carrying out data transmission with an external terminal. The power supply sub module is used for providing a power supply for the security smart card. And the timing sub module is used for carrying out timing on available time of the smart card based on triggering of the card verification sub module. According to the invention, security of the smart card can be further improved.

Description

[0001] technical field [0002] The invention relates to a smart card, in particular to a safe smart card which can be used after verification by means of an external terminal and a verification method thereof. [0003] Background technique [0004] At present, bank cards, as a commonly used payment tool for consumers, are becoming more and more practical. Therefore, there are also more and more types of risks due to cards, as follows: [0005] Risk of card loss: At present, most users put their cards in their wallets. If the wallet is lost, the user’s password is stolen through other channels due to the personal information such as ID card and work card in the wallet, or for other reasons. , The capital risk caused by the loss of the card is relatively large. [0006] Risk of card duplication: At present, for magnetic stripe cards, the technology to read magnetic stripe cards on the market is no longer a secret; for IC cards, although the encryption level is higher than ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/07G06F21/77H04L9/32
CPCG06K19/07
Inventor 冯晓郑建宾吕旭峰褚红梅
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products