Method for enhancing security of card
A security and card issuing technology, applied in the field of information security, can solve problems such as no provision, system crash, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0020] [Example 1] Card signature
[0021] In the first embodiment of the present invention, in order to identify the card, an application system generally uses an identification in the card, for example, the Mifare S50 card has a globally unique serial number. Of course, the card issuance of the application system also needs to write personal information, card issuer information, card issue time and other information. These information can also be used as identification data, called ID, that is, the data that distinguishes the card from other cards.
[0022] The system selects the asymmetric encryption algorithm RSA and the key pair (S1, S2); sign the ID with RSA S1 (ID) and stored in the data area of the card. When the terminal is used, first read out the ID of the card and the ID signature RSA stored in the card S1 (ID), the terminal calculates RSA S2 (RSA S1 (ID)) to get the ID and compare it with the read identification data ID. When they match, the terminal can c...
Embodiment 2
[0026] The core of the present invention is to adopt the method of storing the depreciation key (consumption key) in the electronic wallet, and further providing protection to the depreciation (consumption key). When using an electronic wallet, different operations are performed according to credit collection and non-credit collection. According to the second embodiment of the present invention, a method for enhancing the security of an electronic wallet, we can use the Mifare S50 card for illustration.
[0027] Each Mifare S50 card has a globally unique ID number and 16 storage areas, numbered from 0 to 15. Each storage area has two passwords: a value-added password and a value-decreased password. When the devaluation password authentication is passed, the data in the storage area can be devalued, and when the value-added password is verified, the data in the storage area can be value-added.
[0028] The electronic wallet system using Mifare card includes value-added functi...
Embodiment 3
[0033] [Example 3] Signature+PSAM
[0034] According to the third embodiment of the present invention, a system associated with a method for enhancing card security such as figure 1 shown. This is a preferred embodiment that the inventors consider. The issuer of the card system determines the increment function HX, decrement function HZ, enhancement function ZQ142, asymmetric encryption algorithm RSA141, key pair (S1, S2), and user PIN code. Select area 31 as the storage area for the balance in the electronic wallet. Area 32 is an area for storing decrement keys.
[0035] In the card issuing stage, the card is personalized according to the consumer's application, and other necessary information is stored on the card; and the area 31 is determined as the balance storage area of the electronic wallet. Read the identification ID of the card, calculate the value-added password HZ (ID), the devalued password HX (ID) is the protection key of the area 31, and store it in the w...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com