Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal working method and device

A terminal and data recovery technology, applied in the field of information security, can solve the problems of reduced terminal transaction security, inability to prevent information theft and IC card duplication, and inability to discover duplicated cards, etc., so as to prevent duplication, prevent tampering, and improve security. Effect

Inactive Publication Date: 2018-03-13
FEITIAN TECHNOLOGIES
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, although the static data authentication can confirm the legitimacy of the key static data stored in the IC card, and can effectively detect the authenticity of the key static data in the IC card, if the criminals copy the IC card, but cannot Modifying the data in the IC card, using static data alone to authenticate the terminal cannot find out whether it is a copied card or a card issued by the card issuing bank. It cannot prevent information from being stolen or the IC card is copied, and the security of terminal transactions is greatly reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal working method and device
  • Terminal working method and device
  • Terminal working method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] In this embodiment, a method for terminal work is provided, such as Figure 1-2 Shown, described method, steps are as follows:

[0045] Step 101, the IC card is powered on and initialized;

[0046] Before this step, it also includes: the terminal performs transaction preprocessing and obtains the authorized amount.

[0047] Step 102, the terminal sends an instruction to select the proximity payment system environment to the IC card;

[0048] In this embodiment, the proximity payment system environment is a list consisting of application identifiers, application labels and application priority indicators supported by the IC card, that is, a non-contact application list, which can be accessed through a non-contact interface. This list includes the entries of all directories, and is returned by the IC card in the file control information of the selection proximity payment system environment response.

[0049] Step 103, the IC card returns the contactless application lis...

Embodiment 2

[0103] In this embodiment, a method for terminal work is provided, such as image 3 As shown, the steps are as follows:

[0104] Step 201: the terminal sends a command to select an application to the IC card, and after receiving the response data of the selection command, generates a command to acquire processing options;

[0105] Specifically, the terminal sends an instruction to select the proximity payment system environment to the IC card, receives the contactless application list supported by the IC card returned by the IC card, and selects an application from the contactless application list as the current application. The identifier generates a select application command, and sends the select application command to the IC card.

[0106] In this embodiment, the proximity payment system environment is a list consisting of application identifiers, application labels and application priority indicators supported by the IC card, that is, a non-contact application list, whic...

Embodiment 3

[0200]In this embodiment, a terminal working method is provided, and the steps are as follows:

[0201] Step S1: After obtaining the authorized amount, the terminal sends an application selection command to the IC card, and after receiving the response data of the application selection command returned by the IC card, generates an acquisition processing option command according to the response data of the application selection instruction;

[0202] Step S2: The terminal sends the command to obtain the processing option to the IC card, and obtains the signed dynamic application data and the dynamic data of the IC card from the response to the command to obtain the processing option returned by the IC card; the command to obtain the processing option includes the authorized amount;

[0203] Step S3: The terminal determines the location information of the IC card record to be read according to the command response of the acquisition processing option, and reads the IC card record ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal working method and device and relates to the field of information safety. The method comprises the steps of a terminal obtaining first recovery data according to anauthentication center public key and a card issuing bank public key certificate in IC card data, obtaining the card issuing bank public key from the first recovery data, obtaining second recovery dataaccording to the card issuing bank public key, calculating a first hash value, judging whether the first hash value is the same as the hash value contained in the second recovery data or not, otherwise, refusing the transaction by the terminal, obtaining an IC card public key from the second recovery data, obtaining third recovery data according to the IC card public key, the terminal obtaining asecond hash value after dynamic data by the terminal, determining whether the second hash value is the same as the hash value contained in the third recovery data, if yes, the dynamic data authentication being successful, the terminal authorizing the transaction, otherwise, the terminal rejecting the transaction. According to the technical scheme, the technical scheme is adopted, the IC card datacan be prevented from being tampered or the IC card is prevented from being copied, and the safety of terminal transaction is improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and device for terminal operation. Background technique [0002] Static data refers to data that will not change after the IC card is made, such as card number, card validity period, card application restrictions, etc. The purpose of static data authentication is mainly to verify whether the important static application data (such as the card number) in the IC card has been illegally modified by the terminal, so as to ensure that the issuing bank data in the IC card has not been illegally tampered with after personalization. [0003] In the prior art, although the static data authentication can confirm the legitimacy of the key static data stored in the IC card, and can effectively detect the authenticity of the key static data in the IC card, if the criminals copy the IC card, but cannot Modifying the data in the IC card, using static data alone to authentic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q20/34G06F21/60
CPCG06F21/602G06Q20/34G06Q20/4018
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES