Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing safe remote inhibition processing for intelligent chip card

A technology of smart chip, chip card, applied in secure communication device, key distribution

Active Publication Date: 2019-09-24
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing smart chip card identity authentication usually includes two methods: online authentication and offline authentication. The online authentication method realizes the identity authentication of the smart chip card through the authentication service system of the server, while the offline authentication method realizes the authentication of the smart chip card through the special equipment of the client. Identity authentication; the smart chip card cancellation method is usually to cancel the business application data in the smart chip card in the authentication system and publish the cancellation status information. Due to the cancellation of the smart chip card without a card, the business application data of the smart chip card is still Stored in the card, there is a problem that the smart chip card is actually canceled but the offline authentication is still valid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing safe remote inhibition processing for intelligent chip card
  • Method for realizing safe remote inhibition processing for intelligent chip card
  • Method for realizing safe remote inhibition processing for intelligent chip card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0097] The method for realizing safe remote kill processing for smart chip cards of the present invention includes the following steps:

[0098] The method includes the steps of realizing the identity authentication of the smart chip card and the establishment of the remote-killing safe channel under the condition of special equipment, specifically including the following steps:

[0099] (1-1) The special equipment and the smart chip card complete the two-way reading authentication, and verify that the client reads the unique code of the smart chip card and the first 255 bytes of business application data;

[0100] (1-1.1) Special equipment and smart chip cards complete two-way reading authentication through the reading authentication mechanism;

[0101] (1-1.2) Verify that the client reads the unique code...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing the safe remote inhibition processing for an intelligent chip card. The method comprises a reading authentication mechanism between a special machine tool and the intelligent chip card, a reading authentication mechanism between an authentication system and the special machine tool, a writing authentication mechanism between the intelligent chip card and the authentication system and a data resetting and verification mechanism of the intelligent chip card. According to the method for realizing the safe remote inhibition processing for the intelligent chip card, the identity authentication of the intelligent chip card can be realized under the condition of no special machine tool, the cancelled intelligent chip card is identified, and a remote inhibition security channel is established, so that the remote inhibition of the cancelled intelligent chip card with high security and high reliability is realized, and the security risk of the offline authentication inaccuracy of the intelligent chip card is effectively reduced.

Description

technical field [0001] The invention relates to the field of identity authentication, in particular to the technical field of identity authentication of smart chip cards, in particular to a method for realizing safe remote kill processing for smart chip cards. Background technique [0002] At present, smart chip cards are widely used in many fields such as finance, social security, transportation, public security, etc., such as financial IC cards, social security cards, transportation cards, resident identity cards, chip seals and other business applications. Existing smart chip card identity authentication usually includes two methods: online authentication and offline authentication. The online authentication method realizes the identity authentication of the smart chip card through the authentication service system of the server, while the offline authentication method realizes the authentication of the smart chip card through the special equipment of the client. Identity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08G06K17/00
CPCG06K17/0022H04L9/0866H04L9/0869H04L9/3213H04L63/0807H04L63/0869H04L63/0876
Inventor 邹翔陈兵梁皓倪力舜代乾坤杨明慧
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY