CPU card reader-writer and system authentication method based on full-dimensional public key authentication

An authentication method and a reader-writer technology, applied in the field of authentication security, can solve problems such as difficulty in guaranteeing key security, inconvenient promotion and use, etc., and achieve the effect of security, safety and reliability

Active Publication Date: 2017-07-11
上海象形通讯科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] When the symmetric encryption system is used, the encryption key and the decryption key are the same or related, so the security requirements for its storage and transmission are very high. Although the security of the key system can be greatly improved, the hardware used The device performs encryption processing, and special hardware devices are used to store and transmit keys, which is not convenient for large-scale promotion and use
Moreover, the security of the key during transmission is difficult to guarantee, especially for services based on mobile communications, such as mobile payment, etc. Others can easily obtain the key during transmission through wireless technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CPU card reader-writer and system authentication method based on full-dimensional public key authentication
  • CPU card reader-writer and system authentication method based on full-dimensional public key authentication
  • CPU card reader-writer and system authentication method based on full-dimensional public key authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the measures, creative features, goals and effects achieved by the technology of the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0036] figure 1 It is a structural schematic diagram of the CPU card reader-writer based on the full-dimensional public key authentication of the present invention.

[0037] Such as figure 1 As shown, the present invention provides a CPU card reader based on full-dimensional public key authentication, including: USB interface 101, signal processing module 102, public key module 103, encryption module 104, control unit 105 and digital signature module 106, and The signal processing module 102 is respectively connected with the USB interface 101, the public key module 103, the digital signature module 104 and the control unit 105, and the encryption module 104 is connected with the public key module 103, the digital signature module 10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of authentication security, and provides a CPU (central processing unit) card reader-writer based on full-dimensional public key authentication and a system authentication method. The CPU card reader-writer comprises a USB (universal serial bus) interface, a signal processing module, a public key module, an encryption module, a control unit and a digital signature module, wherein the signal processing module is respectively connected with the USB interface, the public key module, the digital signature module and the control unit, and the encryption module is connected with the public key module, the digital signature module and the signal processing module. The system authentication method comprises the following steps that programs are solidified in the public key module through the USB interface; a CPU card is put in a radio frequency part of the control unit; the control unit reads the user identification and the card number of the CPU card; the public key module calculates a CPU card public key; the encryption module encrypts the CPU card public key; the control unit carries out card writing on the CPU card. The CPU card reader-writer and the system authentication method have the characteristics that a full-dimensional public key authentication method is used, the secret key transmission is not needed, the security requirement in the communication process is not high, the use security is high, and the large-scale popularization and use are favorably realized.

Description

technical field [0001] The invention belongs to the technical field of authentication safety, and in particular relates to a CPU card reader-writer and a system authentication method based on full-dimensional public key authentication in the fields of insurance, traffic police, government industry, finance, transportation, commerce, aviation and the like. Background technique [0002] In the prior art, the most commonly used reader is a non-contact IC card reader, the theme of which is radio frequency identification technology as the core, and the reader mainly uses a dedicated read-write processing chip, which is used for read / write operations. The core device, its functions include modulation, demodulation, radio frequency signal generation, safety management and anti-collision mechanism; its internal structure is divided into radio frequency area and interface area: the radio frequency area contains a modem and power supply circuit, directly connected to the antenna; the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34H04L9/32
CPCG06F21/34G06F21/602H04L9/3263
Inventor 赵飞聂明陈浩曹喆佶
Owner 上海象形通讯科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products