Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

78 results about "Smart card security" patented technology

The security of a smart card system consists of the front-end enforcement, front-end and back-end verification, back-end audit and system fraud damage control. Security is addressed at the system level. Technically Mifare cards can be emulated. However if the system security design is correct, fraud is only possible with a collaborating cardholder or merchant. It is improbable that a merchant would accept a payment with the cardholder carrying a big emulator to pay for the transaction.

Smart card security session system

The invention aims to disclose a smart card security session system. The system comprises a smart card, wherein the smart card consists of a security session manager, a transmission manager, a command analyzer and an encryption and decryption module; the security session manager, the transmission manager and the command analyzer are connected one another; the encryption and decryption module is connected with the command analyzer; in the conventional smart card security system, the concept of security session is introduced, and the application program is associated with a request initiated per se by adopting a semi-permanent interactive information switching method with automatic recovery mechanism, which is established between the smart card and a terminal application program in a certain period, so as to ensure that the security sessions of different application programs are independent from one another; and in addition, once established, the security session exists all the time until the operation of the application program is finished or other conditions for stopping the security session occur; and the security of the session is protected by security session symmetric keys and a security session public and private key pair.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

RSA (Ron Rivest, Adi Shamir and Leonard Adleman) algorithm digital signature method

The invention designs an RSA (Ron Rivest, Adi Shamir and Leonard Adleman) algorithm digital signature method which realizes a 1408-bit RSA private key operation technology based on a 1024-bit hardware coprocessor and is mainly applied to the field of safety calculation of smart cards. A parameter in a large-bit-length RSA private key operation is calculated by utilizing a modular multiplier with small bit length, for example, a parameter in 1408-bit or 2048-bit RSA private key operation is calculated by utilizing a modular multiplier of 1024 bits. The RSA private key operation utilizes a Chinese remainder theorem and can be used for reducing the operation length of a main operation-modular exponentiation, but an operation of a key parameter, such as C mod P, C mod Q and a multiply operation, wherein the C represents a plain text, the length of the C is double the lengths of the P and the Q; and the multiply operation is accelerated by utilizing the modular multiplier, and a final result is also over the calculation capability of the modular multiplier. In the technology of the invention, the C is split into two numbers with the small bit lengths to calculate the C mod P by mainly utilizing the algorithm deformation of modular arithmetic; and the multiply operation larger than the length of the modular multiplier is calculated through a quarter multiply operation.
Owner:BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD

Method for realizing secure communication between set-top box and intelligent card

The invention discloses a method for realizing secure communication between a set-top box and an intelligent card. The method comprises the following steps that: both the set-top box and the intelligent card have a pair of asymmetric keys; and the set-top box and the intelligent card are matched with each other in pair. The set-top box and the intelligent card are mutually authenticated before exchanging a control word; after the authentication, the exchanged information is encrypted by using the public keys of the opposite parties and then transmitted; and the receiving parties can decipher the information by using the own private keys. Through the mutual authentication mechanism between the set-top box and the intelligent card, the communication between an illegal set-top box (or an illegal intelligent card) and a legal intelligent card (or a legal set-top box) can be prevented so as not to exchange the keys. By encrypting the information exchanged through the communication between the set-top box and the intelligent card, the connection between the set-top box and the intelligent card can be effectively prevented from being attacked, so that the security of the exchange processis guaranteed.
Owner:中山爱科数字家庭产业孵化基地有限公司

Smart card safety protection circuit and smart card safety protection method

The invention discloses a smart card safety protection method. The method is used for monitoring a running order rule of a CPU (Central Processing Unit) in real time in a time-sharing and distributed manner, and detecting whether the running of the CPU meets the running order rule; once the error of the program running order is detected, the program with error is stopped, and a chip is trigged to deal with the exception so as to ensure the execution of the program according to the correct running order and prevent program fleet; and effective safety protection is provided when the chip of the smart card is influenced by external attacks or the runtime environment is unsteady. The invention also discloses a circuit for realizing the method. The circuit comprises a current instruction code register (20), a jumping destination address register (16), a PC (Personal Computer) register (14), a PC-PRO register (22), an adding device (24), a comparator (15), a comparator (17), a comparator (26), a comparator (21), a monitoring circuit 1 (38) and a monitoring circuit 2 (39). The circuit monitors the running order of the CPU by the monitoring circuit 1 and the monitoring circuit 2, and if the CPU runs exceptionally, the circuit triggers the chip of the smart card at different time to deal with the exception so as to prevent the chip from exception.
Owner:BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD

Method for generating security file system of smart card

ActiveCN104573571AMeet the management needs of different application functionsImprove securityInternal/peripheral component protectionRedundant data error correctionFile systemSmart card security
The invention relates to a method for generating a security file system of a smart card. The method comprises the following steps: 1, after the smart card receives a pre-initializing command, performing initial checking on a smart card data storage unit area, and determining the numbers of to-be-created directory control items and file control items according to parameters of the command; 2, creating the relative numbers of empty directory control items and empty file control items, and constructing independent empty directory control item chain tables and empty file control item chain tables; 3, based on the empty directory control item chain tables and the empty file control item chain tables, creating directories and files, constructing a membership relation between a directory and another directory and a relationship that the files are subordinate to the directories, and constructing specifically applied directory control item chain tables and file control item chain tables; and 4, performing corresponding directory and file selection and cancel. According to the method for generating the security file system of the smart card, the utilization rate of a data storage unit and the access control speed of the file system are increased, and meanwhile, the safety and the robustness of the file system are enhanced.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Intelligent card safety authentication method and intelligent card safety authentication system on basis of data and short message technologies

The invention discloses an intelligent card safety authentication method and an intelligent card safety authentication system on the basis of data and short message technologies. The intelligent cardsafety authentication method includes intercepting and capturing to-be-signed information transmitted by a business platform, encrypting the to-be-signed information to obtain first encrypted information and transmitting the first encrypted information to an SIM (subscriber identification module) card by the aid of the data and short message technologies; decrypting the first encrypted informationby the aid of safety authentication application after the first encrypted information is received by the SIM card, signing the decrypted to-be-signed information and encrypting obtained signed information to obtain second encrypted information; receiving the second encrypted information transmitted by the SIM card and decrypting the second encrypted information; transmitting the decrypted signedinformation to the business platform to allow the business platform to verify signature for the decrypted signed information so as to complete safety authentication. The intelligent card safety authentication method and the intelligent card safety authentication system have the advantages that the transmitted information is encrypted, and the safety authentication can be implemented between the business platform and the SIM card by the aid of signature functions of the safety authentication application and signature verification functions of the business platform.
Owner:EASTCOMPEACE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products