Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for enhancing security of card

A security and card issuing technology, applied in the field of information security, can solve problems such as no provision, system crash, etc.

Inactive Publication Date: 2012-07-04
邵通
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It does not provide that when the PSAM card and SAM card are completely cracked, that is, after the depreciation function HX and value-added function HZ are leaked, the whole system will face the problem of collapse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing security of card
  • Method for enhancing security of card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] [Example 1] Card signature

[0021] In the first embodiment of the present invention, in order to identify the card, an application system generally uses an identification in the card, for example, the Mifare S50 card has a globally unique serial number. Of course, the card issuance of the application system also needs to write personal information, card issuer information, card issue time and other information. These information can also be used as identification data, called ID, that is, the data that distinguishes the card from other cards.

[0022] The system selects the asymmetric encryption algorithm RSA and the key pair (S1, S2); sign the ID with RSA S1 (ID) and stored in the data area of ​​the card. When the terminal is used, first read out the ID of the card and the ID signature RSA stored in the card S1 (ID), the terminal calculates RSA S2 (RSA S1 (ID)) to get the ID and compare it with the read identification data ID. When they match, the terminal can c...

Embodiment 2

[0026] The core of the present invention is to adopt the method of storing the depreciation key (consumption key) in the electronic wallet, and further providing protection to the depreciation (consumption key). When using an electronic wallet, different operations are performed according to credit collection and non-credit collection. According to the second embodiment of the present invention, a method for enhancing the security of an electronic wallet, we can use the Mifare S50 card for illustration.

[0027] Each Mifare S50 card has a globally unique ID number and 16 storage areas, numbered from 0 to 15. Each storage area has two passwords: a value-added password and a value-decreased password. When the devaluation password authentication is passed, the data in the storage area can be devalued, and when the value-added password is verified, the data in the storage area can be value-added.

[0028] The electronic wallet system using Mifare card includes value-added functi...

Embodiment 3

[0033] [Example 3] Signature+PSAM

[0034] According to the third embodiment of the present invention, a system associated with a method for enhancing card security such as figure 1 shown. This is a preferred embodiment that the inventors consider. The issuer of the card system determines the increment function HX, decrement function HZ, enhancement function ZQ142, asymmetric encryption algorithm RSA141, key pair (S1, S2), and user PIN code. Select area 31 as the storage area for the balance in the electronic wallet. Area 32 is an area for storing decrement keys.

[0035] In the card issuing stage, the card is personalized according to the consumer's application, and other necessary information is stored on the card; and the area 31 is determined as the balance storage area of ​​the electronic wallet. Read the identification ID of the card, calculate the value-added password HZ (ID), the devalued password HX (ID) is the protection key of the area 31, and store it in the w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims at providing a technical scheme for enhancing the security in an electronic purse. The technical scheme is realized through a digital signature storing data of a card identifier in the electronic purse, so that an attacker can not forge a card even getting system key functions HX and HZ.

Description

technical field [0001] The invention belongs to the field of information security. The invention relates to a method for enhancing card security. Specifically, it relates to a method for improving security by using a public password method in a card. Background technique [0002] The application of campus cards and electronic wallet cards is becoming more and more popular. Generally, electronic wallets use the ISO14443 radio frequency standard and protocol. The radio frequency is just the communication interface between the radio frequency card and the card reader terminal. In the application scheme of the electronic wallet of the campus card, the core problem is to use the symmetric cipher for the mutual authentication of the card and the card reader terminal, that is, the three-time authentication of the symmetric cipher. The purpose of authentication is to verify that both parties have the same key. If the key is the same or the authentication is passed, the key shared...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G07F7/08
Inventor 邵通
Owner 邵通
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products