Smart card and terminal capable of realizing machine card security authentication

A security authentication and smart card technology, applied in the field of smart cards and terminals, can solve the problems of inability to determine the party responsible for leakage, key leakage, damage to user terminals, etc., to improve the difficulty and cost of cracking, prevent key leakage, and ensure security. Effect

Active Publication Date: 2011-02-09
DATANG MICROELECTRONICS TECH CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) If an irregular random number PIN is used, the user terminal will be damaged, and the card will not be able to use the new terminal
[0007] (4) It cannot meet the business needs of separate sales of terminals and cards, and cannot be used for agent channel sales
[0009] The random number authentication method is used: the random number authentication method has more parties who know the key, and it is easy to leak the key, and after the key leak occurs, it is impossible to determine the party responsible for the leak, the operator cannot identify the illegal patch user, and cannot prohibit illegal continued use of the card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart card and terminal capable of realizing machine card security authentication
  • Smart card and terminal capable of realizing machine card security authentication
  • Smart card and terminal capable of realizing machine card security authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] Embodiment 1, a kind of special-purpose smart card that can realize machine-card safety authentication, such as figure 1 As shown, in addition to supporting basic smart card COS and functional modules such as 2G or 3G authentication, SMS or GPRS BIP (these are not shown in the figure 1 Middle) and outside, there is a first interaction module 110 for interacting with the terminal; in order to support machine-card security authentication, an authentication key acquisition module 120, a card-terminal interaction authentication module 130, an algorithm encapsulation module 140, and a data packet processing module 150 are added , card locking module 160 and other new functional modules.

[0058] The first interaction module 110 is the main channel for data interaction between other modules in the card and the terminal. It can use SMS interaction mode or GPRS BIP to exchange data with the server through the terminal, and is also used to communicate with the terminal through S...

Embodiment 2

[0095] Embodiment 2, a terminal capable of implementing machine card security authentication, such as image 3 As shown, in addition to the commonly used wireless communication module 310 and the second interaction module 320 (such as the STK function processing module) for interacting with the card, a security authentication module 330 related to machine-card authentication is added.

[0096] The security authentication module 330 includes: a terminal-card interaction authentication submodule 331 , a terminal locking submodule 332 , an authentication algorithm packaging submodule 333 and an authentication key issuing and reading submodule 334 .

[0097] The wireless communication module 310 is used to enable the terminal to exchange data with the server through wireless communication methods such as SMS and GPRS.

[0098] The second interaction module 320 is a processing module for the terminal to support the STK command interaction function with the card. The incoming key u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A smart card and a terminal capable of realizing machine card security authentication are disclosed; the card comprises a first interaction module which is used for being interacted with the terminal,a card-terminal interaction authentication module, a card locking module, an authentication key acquisition module, an algorithm package module and a data packet processing module; the authenticationkey acquisition module is used for instructing the card-terminal interaction authentication module to conduct machine card authorization when a received terminal mark after each startup is consistentwith a formally stored terminal mark; when not consistent, the received terminal mark is temporarily stored, and the content of a key updating request message which is transmitted to a server is generated and then transmitted to the data packet processing module for package; when the decrypted key updating message content is received, an authentication key in the content is acquired and then usedfor updating the authentication key data which is stored in the card-terminal interaction authentication module, later the temporarily stored terminal mark is used for updating the terminal mark which is formally stored in the card, and finally the terminal is instructed to be restarted when the updating is successful. The invention can achieve security authentication.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a smart card and a terminal capable of realizing machine-card security authentication. Background technique [0002] With the development of diversified competition in mobile services, operators need to launch low-rate services in which dedicated terminals and dedicated cards are used in conjunction with each other. They need to sell terminals at extremely low prices or give terminals away for free or return them through mobile phone numbers through the use of dedicated cards. This requires technical means to achieve mutual authentication and binding between dedicated terminals and dedicated cards, to ensure that dedicated subscriber identification modules can only be used for dedicated terminals, not for ordinary mobile terminals, and / or dedicated terminals can only be used for dedicated users The identification module cannot use ordinary user identification. [0003] Exis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06
Inventor 王京阳穆肇骊焦华清郑辉
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products