High-security intelligent card communication method

A communication method and high-security technology, applied in the field of smart cards, to achieve the effects of improving security, improving efficiency, and reducing the possibility of being attacked

Inactive Publication Date: 2019-03-29
湖北汇盾传媒有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the information exchange between these application systems and users uses public channels, and attackers can obtain the information transmitted by both parties through monitoring and other means. If only plain text is used to transmit data, some private information of users will be completely exposed to attackers. before

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security intelligent card communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described The implementations are only some of the implementations of the present invention, but not all of them. Based on the implementation manners in the present invention, all other implementation manners obtained by those skilled in the art without creative efforts shall fall within the protection scope of the present invention.

[0023] Such as figure 1 as shown, figure 1 It is a flow chart of an embodiment of the high security smart card communication method provided by the present invention.

[0024] In this embodiment, the high-security smart card communication method is applied to a client device on the user side, wherein the clien...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of the online hailing trip, and discloses a high-security intelligent card communication method. The method comprises an input step of receiving an inserted intelligent card and a user name and password input by a user, wherein result data for computing registration information that the user accomplishes the registration on a server is stored in the intelligent card; a verification step of verifying whether the user is an owner of the intelligent card according to the result data and the user name and password input by the user; an output step of operating the user name and password input by the user by utilizing a preset algorithm after verifying that the user is the owner of the intelligent card, and sending an operation result to the server as login information. The technical scheme provided by the invention can effectively improve the security of the data.

Description

technical field [0001] The invention relates to the technical field of smart cards, in particular to a high-security smart card communication method. Background technique [0002] Advances in computer networks and communications have spawned a large number of application systems based on the Internet of Things, such as online banking systems, cloud storage systems, telemedicine systems, and so on. In these applications, users can log in to the system anytime and anywhere to deal with personal matters. However, the information exchange between these application systems and users uses public channels, and attackers can obtain the information transmitted by both parties through monitoring and other means. If only plain text is used to transmit data, some private information of users will be completely exposed to attackers. before. Therefore, how to ensure the reliability and security of communication has always been an urgent goal for the industry to improve. Contents of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0853H04L63/083H04L63/0861H04L63/0876
Inventor 杨庆
Owner 湖北汇盾传媒有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products