Unlock instant, AI-driven research and patent intelligence for your innovation.

Security carrier management and control method, device and equipment and storage medium

A security carrier and equipment technology, which is applied in computer security devices, collaborative operation devices, instruments, etc., can solve problems such as COS script leakage, and achieve the effect of ensuring security

Pending Publication Date: 2021-06-01
上海升途智能系统有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the card writing tools and operators involved in the card writing process at this stage are all uncontrollable third parties, if there is no control over the card writing process and the COS script is presented in plain text, then the security of the COS script will be greatly jeopardized. Issues, eg: COS scripts are leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security carrier management and control method, device and equipment and storage medium
  • Security carrier management and control method, device and equipment and storage medium
  • Security carrier management and control method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059]Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present application, and are not construed as limiting the present application.

[0060] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the specification of the present application refers to the presence of the features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a security carrier management and control method and device, electronic equipment and a storage medium, and relates to the field of security of embedded equipment. The method comprises the following steps: in response to an authentication request message sent by first equipment, determining a first ciphertext; sending an authentication response message to the first device, the authentication response message carrying the first ciphertext, so that the first device performs first identity authentication; receiving a third ciphertext sent by the first device after the first identity authentication is passed, wherein the third ciphertext is determined by the first device based on the authentication response message; performing second identity authentication according to the third ciphertext and the determined fourth ciphertext to obtain a first result; and determining whether to acquire the encrypted data according to the first result. According to the method, the interaction between the security carrier and the first equipment is effectively managed and controlled by adopting a bidirectional authentication operation between the security carrier and the first equipment, and whether encrypted data is acquired or not is determined according to a bidirectional authentication result so as to guarantee the security of important data.

Description

technical field [0001] The present application relates to the security field of embedded devices, and in particular, the present application relates to a management and control method, device, electronic equipment and computer storage medium of a security carrier. Background technique [0002] In the production process of the smart card, writing the COS script data into the chip of the smart card is generally called a card writing operation in the art, and is a key step in the production process. In the mass production stage, the card writing tools and operators involved in the card writing process are all internal. Even if the card writing process is handled by presenting the COS script in plain text, the security of the COS script is still within the scope of control. [0003] However, in the non-mass production stage including joint debugging test and closed-loop demonstration scenarios, it also involves card writing operations on some smart cards. Since the card writing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/77G06K17/00H04L29/06
CPCG06F21/445G06F21/77G06K17/00H04L63/0428H04L63/083H04L63/0869
Inventor 邹德强彭继鲁李文虎叶剑云徐飞甘业
Owner 上海升途智能系统有限公司