Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for defending against relay attacks

A card and counting data technology, applied in the field of communication security, can solve the problems of cardholder loss, communication data leakage, and reduce the security of data communication between cards and terminals, and achieve the effect of preventing relay attacks and increasing security.

Active Publication Date: 2020-11-24
FEITIAN TECHNOLOGIES
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The "relay" attack can form a two-way, wireless communication data exchange channel between the card and the terminal through the relay attack terminal; when the cardholder does not know, the card has already communicated with the terminal to complete the card. use, causing loss to the cardholder; that is, the relay attack will steal the communication data to leak the communication data, and also tamper with the communication data between the card and the terminal, reducing the security of the data communication between the card and the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for defending against relay attacks
  • A method and system for defending against relay attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] This embodiment provides a method for defending against relay attacks, which is applicable to a system including two execution subjects of a terminal and a card, such as figure 1As shown, the method includes the following steps:

[0047] Step 101: When the terminal receives the selection response sent by the card, the terminal sets the terminal counting data; sends a processing option command to the card;

[0048] Step 102: the card sets the card counting data; obtains the first dynamic data; sends a processing option response to the terminal;

[0049] Step 103: the terminal generates terminal random data; records the current time as the first current time; sends an interactive defense data instruction including terminal random data to the card;

[0050] Step 104: The card determines whether the card count data and the third preset data meet the first preset condition, if it is determined to be yes, then the second dynamic data is obtained according to the card count d...

Embodiment 2

[0114] This embodiment provides a method for defending against relay attacks, which is applicable to a system including two execution subjects of a terminal and a card, and includes the following steps:

[0115] Step 201: the terminal sends a selection instruction to the card;

[0116] For example, the terminal sends the selection command 0x00A4040007A000000004101000 to the card;

[0117] Step 202: the card receives a selection instruction; executes a selection operation according to the selection instruction to obtain a selection response, and sends a selection response to the terminal;

[0118] 例如,卡片接收选择指令0x00A4040007A000000004101000;根据选择指令执行选择操作得到选择响应0x6F258407A0000000041010A51A500A4D6173746572436172649F38039F4005BF0C059F4D020B0A9000,向终端发送选择响应0x6F258407A0000000041010A51A500A4D6173746572436172649F38039F4005BF0C059F4D020B0A9000;

[0119] Step 203: the terminal receives a selection response; sets the terminal count data; sends a processing option command to the card;

[0120...

Embodiment 3

[0280] This embodiment provides a system for defending against relay attacks, such as figure 2 As shown, the system includes two execution bodies, the terminal 30 and the card 40;

[0281] The terminal 30 includes a first receiving module 301, a setting module 302, a first sending module 303, a generation record module 304, an analysis record determination module 305, a verification determination update module 306, a verification update organization module 307 and a signature verification module 308;

[0282] The card 40 includes a second receiving module 401, a setting acquisition module 402, a second sending module 403, a confirmation update organization module 404 and a confirmation check signature module 405;

[0283] The first receiving module 301 is configured to receive the selection response sent by the card 40;

[0284] The setting module 302 is used to set the terminal counting data if the first receiving module 301 receives the selection response;

[0285] The fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for defending a relay attack, and relates to the field of communication security. The terminal comprises a first receiving module, a setting module, a first sending module, a record generation module, an analysis record determination module, a verification determination updating module, a verification updating organization module and a signature verification module. The card comprises a second receiving module, a setting acquisition module, a second sending module, an update organization determining module and a check signature determining module.According to the method and the system, the new interactive defense data instruction is defined and combined with the terminal counting data and the card counting data to limit the time of the communication instruction and the communication response between the terminal and the card so as to prevent the relay attack, and the safety of data communication between the terminal and the card is improved.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a method and system for defending against relay attacks. Background technique [0002] In the process of contactless data communication, the card is vulnerable to "relay" attack; the so-called relay attack is an attack between two legal participants A and B, and the middleman C tampers with A's message and sends it to B Or send B's message tampering to A. The purpose of C doing this is to obtain the privilege of A or B, so that C can steal A's communication data through B's relay attack terminal. The "relay" attack can form a two-way, wireless communication data exchange channel between the card and the terminal through the relay attack terminal; when the cardholder does not know, the card has already communicated with the terminal to complete the card Using it will cause losses to the cardholder; that is, the relay attack will steal the communication data to leak the comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/77H04L29/06
CPCG06F21/77H04L63/1441
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES