Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application method of CPU intelligent card

An application method and smart card technology, applied in digital data authentication, platform integrity maintenance, etc., can solve problems such as inability to upgrade, unusable national secret CPU smart card, etc.

Pending Publication Date: 2022-04-12
NEWCAPEC ELECTRONICS CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide an application method of a CPU smart card to solve the problem that the national secret CPU smart card cannot be used due to the inability to upgrade the hardware of the current terminal security consumption module

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application method of CPU intelligent card
  • Application method of CPU intelligent card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0024] With the application of the national secret algorithm on the CPU smart card, in order to use the CPU smart card supporting the national secret algorithm on the terminal supporting the standard algorithm, the present invention improves the CPU smart card supporting the national secret algorithm through the key system, so that it can be It can be applied on terminals that support national secret algorithms, and can also be applied on terminals that support standard algorithms. At the same time, the software of terminals that support standard algorithms can be upgraded so that it can adapt to the improved CPU smart card. The CPU smart card of the present invention is designed according to the dual-key application (standard key+national secret key), and part of the key can also be designed as a dual-key mode; wherein, the file access autho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an application method of a CPU intelligent card, and belongs to the technical field of CPU intelligent card application. In order to solve the problem that hardware of a secure consumption security module in a current terminal cannot be transformed, a state secret key and part or all standard keys are filled in a CPU intelligent card, so that a newly issued CPU intelligent card supporting the state secret key can also be used on an old terminal supporting the standard keys, and in order to adapt to double keys in the CPU intelligent card, the state secret key and part or all standard keys are added into the CPU intelligent card. The software part of the consumption security module in the terminal is upgraded, so that the standard key index number in the application directory of the consumption security module is matched with the standard key index in the CPU intelligent card in the double keys, the CPU intelligent card can be conveniently used on the terminal, the standard key in the CPU intelligent card can be authenticated, and the transaction of the CPU intelligent card on the terminal is realized.

Description

technical field [0001] The invention relates to an application method of a CPU smart card, belonging to the technical field of CPU smart card applications. Background technique [0002] The same key algorithm is set on the CPU smart card and its application terminal, and the standard international algorithm (3DES) is generally installed on the traditional smart card and the application terminal, referred to as the standard algorithm. With the development of national secret technology, more and more smart cards and application terminals adopt the national secret algorithm. The standard algorithm terminal can only support the standard algorithm user card; the national secret algorithm terminal can only support the national secret algorithm user card; the standard algorithm terminal cannot support the national secret algorithm user card. Therefore, in view of this situation, it is necessary to upgrade the standard algorithm terminal so that it can support the old card as well ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/44
Inventor 焦征海卢涛李冰崔永刚黄鹤飞
Owner NEWCAPEC ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products