Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key protection method in psam card

A key protection and key technology, which is applied in the field of key management, can solve the problems of CPU running away, not being able to know what instructions the CPU executes, PSAM card random rewriting, etc., and achieve the effect of preventing the key from being rewritten

Active Publication Date: 2016-06-29
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in actual use, due to the harsh environment in which the PSAM card is used, sometimes the CPU runs away. At this time, the CPU is out of control, and it is impossible to know what instructions the CPU executes. Risk of CPU random rewriting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key protection method in psam card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] In order to prevent the key from being rewritten, and at the same time when rewriting occurs, the PSAM card can automatically recover the rewritten key file, and the invention adopts a backup mechanism. As shown in the figure, when issuing a PSAM card to load a key, first write the key into the specified key file, and at the same time use a specified algorithm (such as 3DES algorithm, or SM1 algorithm, etc.) The key value is the data of the specified encryption algorithm, and it is also used as the encryption key of the encryption algorithm to calculate the encryption value. The obtained encrypted value is grouped by 4 bytes, XORed with the packet data, and finally a 4-byte check value is obtained. This checksum is saved with the key file. When using the key, first check the key with the check value. While writing the key, back up the key and the verification value at the designated location of the PSAM card. The storage area of ​​the backup key and the storage area ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key protection method in a PSAM card. The key is written into a specified key file, a specified encryption algorithm is adopted, and the key value is used as the data of the specified encryption algorithm, which is also used as the encryption algorithm. Encryption key, calculate the encryption value; group the obtained encryption value by 4 bytes, and use the packet data to get a 4-byte verification value; save the verification value and the key file together, and back up the key and check value at the specified location on the PSAM card. The invention can effectively prevent the key from being rewritten and effectively protect the key.

Description

technical field [0001] The invention relates to the field of key management, in particular to a key protection method in a PSAM card. Background technique [0002] The key stored in the PSAM (Consumer Security Access Module) card is the most critical data. The calculation of MAC1 (message authentication code 1) and MAC2 (message authentication code 2) in the transaction, as well as internal and external authentication must Use a different key in the PSAM card. If the key in the PSAM card is tampered with during use, the above-mentioned transaction and authentication cannot go on, resulting in transaction and authentication errors. Therefore, the protection of the key in the PSAM card is particularly important. [0003] However, in actual use, due to the harsh environment in which the PSAM card is used, sometimes the CPU runs away. At this time, the CPU is out of control, and it is impossible to know what instructions the CPU executes. Risk of random CPU rewrites. How to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/073
Inventor 田涛夏兵赫松龄贾峻
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products