A method and system for defending against relay attacks
A card and counting data technology, applied in the field of communication security, can solve the problems of cardholder loss, communication data leakage, and reduce the security of data communication between cards and terminals, and achieve the effect of preventing relay attacks and increasing security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] This embodiment provides a method for defending against relay attacks, which is applicable to a system including two execution subjects of a terminal and a card, such as figure 1As shown, the method includes the following steps:
[0047] Step 101: When the terminal receives the selection response sent by the card, the terminal sets the terminal counting data; sends a processing option command to the card;
[0048] Step 102: the card sets the card counting data; obtains the first dynamic data; sends a processing option response to the terminal;
[0049] Step 103: the terminal generates terminal random data; records the current time as the first current time; sends an interactive defense data instruction including terminal random data to the card;
[0050] Step 104: The card determines whether the card count data and the third preset data meet the first preset condition, if it is determined to be yes, then the second dynamic data is obtained according to the card count d...
Embodiment 2
[0114] This embodiment provides a method for defending against relay attacks, which is applicable to a system including two execution subjects of a terminal and a card, and includes the following steps:
[0115] Step 201: the terminal sends a selection instruction to the card;
[0116] For example, the terminal sends the selection command 0x00A4040007A000000004101000 to the card;
[0117] Step 202: the card receives a selection instruction; executes a selection operation according to the selection instruction to obtain a selection response, and sends a selection response to the terminal;
[0118] 例如,卡片接收选择指令0x00A4040007A000000004101000;根据选择指令执行选择操作得到选择响应0x6F258407A0000000041010A51A500A4D6173746572436172649F38039F4005BF0C059F4D020B0A9000,向终端发送选择响应0x6F258407A0000000041010A51A500A4D6173746572436172649F38039F4005BF0C059F4D020B0A9000;
[0119] Step 203: the terminal receives a selection response; sets the terminal count data; sends a processing option command to the card;
[0120...
Embodiment 3
[0280] This embodiment provides a system for defending against relay attacks, such as figure 2 As shown, the system includes two execution bodies, the terminal 30 and the card 40;
[0281] The terminal 30 includes a first receiving module 301, a setting module 302, a first sending module 303, a generation record module 304, an analysis record determination module 305, a verification determination update module 306, a verification update organization module 307 and a signature verification module 308;
[0282] The card 40 includes a second receiving module 401, a setting acquisition module 402, a second sending module 403, a confirmation update organization module 404 and a confirmation check signature module 405;
[0283] The first receiving module 301 is configured to receive the selection response sent by the card 40;
[0284] The setting module 302 is used to set the terminal counting data if the first receiving module 301 receives the selection response;
[0285] The fi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

