Security management method and system for smart card chip operating system files

A smart card chip, operating system technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., to achieve the effect of improving security

Active Publication Date: 2020-08-11
GIESECKE & DEVRIENT (CHINA) INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in such a situation, COS files will encounter various people in different environments from development, testing to production, and there are many potential leaks and security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management method and system for smart card chip operating system files
  • Security management method and system for smart card chip operating system files
  • Security management method and system for smart card chip operating system files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0031] For the convenience of description, AES stands for symmetric key algorithm and RSA stands for asymmetric encryption algorithm as examples for description below, but this is not limited thereto. It should be understood that other symmetric encryption methods such as DES, 3DES and asymmetric encryption methods such as Elgamal, Rabin may also be used.

[0032] The smart card COS file mainly involves three links in the process of development, testing and production: 1) In the development environment, COS developers can use a symmetric encryption algorithm such as the advanced encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security management method and system for a smart card COS (Chip Card Operation System) file. The security management method comprises the steps of: generating and exporting asecret key file comprising one or more encrypted system secret keys by utilizing a first-type smart card; and carrying out decryption on one system secret key of the secret key file by utilizing a second-type smart card, carrying out encryption on the chip operation system file by utilizing the system secret key obtained after decryption, and exporting the chip operation system file in a ciphertext format. In the scheme, generation and use on the secret keys encrypted by the COS file and encryption of the COS file are all carried out in the special smart cards, invisibility and non-reproducibility of the encrypted secret keys of the COS file and randomness of use of the secret keys are ensured, and security of transmitting and downloading the COS file in an external environment is improved.

Description

technical field [0001] The invention relates to the security of smart cards, in particular to the security management of chip operating system files on smart cards. Background technique [0002] Smart card is an information security product, which is characterized by small size, easy to carry, good security, and the stored information is difficult to read illegally. The information stored in the smart card can only be read out through the security control of the chip operating system (Chip Card Operation, COS), and some information is not even allowed to be read out at any time. Smart card security is closely related to COS security. COS has created a security system that transfers the control of this system to customers in a safe manner without leaving any backdoors. Customers will use this security system to protect user data. Once the security control is handed over, COS developers, like everyone else, can only operate with legal authority on the data on the smart card,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0631H04L9/0825H04L9/0877H04L9/0897
Inventor 邓学博方瑜
Owner GIESECKE & DEVRIENT (CHINA) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products