Check patentability & draft patents in minutes with Patsnap Eureka AI!

Equipment authentication method, card equipment and equipment authentication system

A device authentication and device technology, applied in the field of information security, can solve the problem of low security of data interaction and achieve the effect of improving security

Inactive Publication Date: 2017-02-22
深圳市前海胜马科技有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the existing card device and the main device perform data interaction, the session key is fixed data, which makes the data interaction between the card device and the main device less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment authentication method, card equipment and equipment authentication system
  • Equipment authentication method, card equipment and equipment authentication system
  • Equipment authentication method, card equipment and equipment authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] The invention proposes a device authentication method.

[0047] Please refer to figure 1 , in an embodiment of the present invention, the device authentication method includes the following steps:

[0048] Step S10, when the card device establishes a communication connection with the main device, trigger the card device to generate first random data;

[0049] Specifically, the card device establishes a communication connection with the master device, and the establishment of the communication connection between the card device and the master device triggers the card device to generate first random data; wherein, the first random data is the 64-bit a random data.

[0050] Step S20, the card device transmits the first random data and the card device identification code to the master device, and triggers the ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an equipment authentication method, card equipment and an equipment authentication system. The equipment authentication method comprises the following steps: the card equipment is triggered to generate first random data when a communication connection is built between the card equipment and main equipment; the card equipment transmits the first random data and a card equipment identification code to the main equipment, to trigger the main equipment to generate second random data and transmit the second random data to the card equipment, and the main equipment generates first identity authentication data and first session key data by computing; the card equipment generates second identity authentication data and second session key data by computing according to the key data, the first random data and the second random data; the card equipment acquires the first identity authentication data and compares the first identity authentication data with the second identity authentication data to judge whether identity authentication is successful; and when the identity authentication is successful, the card equipment performs data interaction with the main equipment via the second session key data. The method provided by the invention aims at providing security of interaction data between the card equipment and the main equipment.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a device authentication method, a card device and a device authentication system. Background technique [0002] Before exchanging data with the security device, in order to ensure the security of the interactive data, the host and the card device need to recognize each other's identity. After confirming the identity, a session key is further negotiated, and the subsequent interactive data is encrypted and transmitted with the session key. . When exchanging data between the existing card device and the master device, the session key is fixed data, which makes the data interaction between the card device and the master device less secure. Contents of the invention [0003] The main purpose of the present invention is to provide a device authentication method, a card device and a device authentication system, aiming at improving the security of data interaction betwe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/067H04L63/0838
Inventor 廖继盛
Owner 深圳市前海胜马科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More