Cloud key management method and system based on intelligent IC card security authentication

A key management system and security certification technology, which is applied in the cloud key management method and system field based on smart IC card security certification, can solve the problems of high requirements for the enterprise center network environment, high implementation cost, and long card production cycle , to achieve the effect of convenient expansion, high security, and low requirements

Active Publication Date: 2022-03-11
CHENGDU HUAQI HOUPU ELECTRONICS TECH
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are various ways of using smart IC card key management systems in China, such as: banks basically have their own private key management systems, and provinces and municipalities have regional key management system authority; similarly, PetroChina, Sinopec, and CNOOC are almost similar ;Large enterprises use hardware encryption machines for key management in the center of the key management system, and the cost is relatively high. The requirements for the network environment of the enterprise center are high, and the implementation cost is high.
At present, most small and medium-sized enterprises adopt centralized card production and offline key management. The card production cycle is long and insecure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud key management method and system based on intelligent IC card security authentication
  • Cloud key management method and system based on intelligent IC card security authentication
  • Cloud key management method and system based on intelligent IC card security authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the present invention will be further described in detail below in conjunction with specific embodiments.

[0064] Such as figure 1 As shown, a kind of cloud key management method based on smart IC card security authentication of the present invention comprises:

[0065] S1 generates and stores a root key group, which includes an derived key EPKn, a protection key PPKn, and a transmission key TPKn.

[0066] S2 For an unregistered user, receive a registration application and application materials from the user.

[0067] S3 reviews the application materials, and after the review is passed, registers the user's company basic information, company initial administrator rights, and the number of watchdogs issued by the company, and generates the company number CNO, system project number PNO, RSA public key CRPK, and private key CSSK.

[0068] S4 receives the car...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud key management method and system based on intelligent IC card security certification, and the method comprises the steps: generating and storing a root key group which comprises an export key EPKn, a protection key PPKn and a transmission key TPKn; for a registered user, receiving a card making application from the user and loading a random number SRDn; checking the identity of the registered user applying for card making, generating corresponding encrypted data according to the service initiated by the registered user after the checking is passed, and issuing the encrypted data to the user; and making the intelligent IC card by using the issued encrypted data. A hardware encryption machine is abandoned, the cost is reduced, cloud system deployment, access, operation and maintenance are rapid and low in cost, data are highly concentrated and shared, and an enterprise can clearly know the card making condition. And large-scale popularization and use are facilitated.

Description

technical field [0001] The invention belongs to the technical field of encryption, and in particular relates to a cloud key management method and system based on smart IC card security authentication. Background technique [0002] At present, smart IC cards have been widely popularized and used in various industries, such as: refueling, gas refueling, medical care, transportation, social security cards, bank cards, ETC, supermarkets and other industries. However, for some small and medium-sized enterprises, it is difficult and costly to build their own key management system. If they do not build their own key management system, there will be problems such as long card production cycle or high cost of bulk purchase card production. The verification of smart IC cards is offline verification. In order to respond quickly and meet customer needs and improve the safety of smart IC cards, this puts forward new requirements for the low-cost deployment of the key management system an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/0869H04L9/0819H04L9/302H04L9/3242
Inventor 秦江君杨君杨春龙张朝斌刘兵廖婷钟怀军
Owner CHENGDU HUAQI HOUPU ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products