CN103281172B - Pond communication means between highway electric prepaid card and encryption equipment - Google Patents

Pond communication means between highway electric prepaid card and encryption equipment Download PDF

Info

Publication number
CN103281172B
CN103281172B CN201310175239.8A CN201310175239A CN103281172B CN 103281172 B CN103281172 B CN 103281172B CN 201310175239 A CN201310175239 A CN 201310175239A CN 103281172 B CN103281172 B CN 103281172B
Authority
CN
China
Prior art keywords
encryption equipment
byte
buffering area
data
thread
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310175239.8A
Other languages
Chinese (zh)
Other versions
CN103281172A (en
Inventor
战庆书
伞洪亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TIANJIN TIANAN YIHE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
TIANJIN TIANAN YIHE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TIANJIN TIANAN YIHE INFORMATION TECHNOLOGY Co Ltd filed Critical TIANJIN TIANAN YIHE INFORMATION TECHNOLOGY Co Ltd
Priority to CN201310175239.8A priority Critical patent/CN103281172B/en
Publication of CN103281172A publication Critical patent/CN103281172A/en
Application granted granted Critical
Publication of CN103281172B publication Critical patent/CN103281172B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses the pond communication means between a kind of highway electric prepaid card and encryption equipment, described method comprises: the basic format of definition encryption equipment return data, defines buffering area by basic format; Server creates connection pool object factory, assembling thread and reads thread, by connection pool object factory, initial data is verified, and by assembling thread, the initial data after checking is put into the buffering area of encryption equipment with the form of message, the index in return cache district; Encryption equipment reads the message in buffer area, writes encrypted data, transfer in buffering area by encrypted data according to index according to basic format; Server reads encrypted data from buffering area, and transfers to card reader, and card reader receives encrypted data and is sent to highway electric prepaid card, and highway electric prepaid card calculates according to encrypted data.Invention increases the validity of encryption, and avoid the idle of system resource, improve operating efficiency.

Description

Pond communication means between highway electric prepaid card and encryption equipment
Technical field
The present invention relates to the communications field, particularly relate to the pond communication means between a kind of highway electric prepaid card and encryption equipment.
Background technology
The use of highway prepaid card has been the trend of following expressway tol lcollection, make electronic transaction data amount increasing, the concurrency that application program needs the process of real-time online thousands of, therefore needs to improve computations efficiency, Appropriate application encryption equipment resource.
In prior art, highway prepaid card and being generally alternately between encryption equipment: establish the link → send encrypted instruction → wait fixed time → read from buffering area → close and be connected.If the stand-by period of encryption equipment arranges too short, may cause reading data incomplete; If the stand-by period of encryption equipment arranges longer, resource can be caused again to leave unused in a large number, and each encryption all need to reconnect; If service concurrence amount increases suddenly, the restriction of encryption equipment linking number may be exceeded, cannot normally work.
Summary of the invention
The invention provides the pond communication means between a kind of highway electric prepaid card and encryption equipment, this method avoids the idle of system resource, improve operating efficiency, described below:
A pond communication means between highway electric prepaid card and encryption equipment, described method comprises:
The basic format of definition encryption equipment return data, by described basic format definition buffering area;
Card reader reads initial data from highway electric prepaid card, and by described original data transmissions to server;
Described server creates connection pool object factory, assembling thread and reads thread, by described connection pool object factory, described initial data is verified, and by described assembling thread, the initial data after checking is put into the buffering area of described encryption equipment with the form of message, return the index of described buffer area;
Described encryption equipment reads the message in buffer area, writes encrypted data, transfer in described buffering area by described encrypted data according to index according to described basic format;
Described server reads described encrypted data from described buffering area, and transfer to described card reader, described card reader receives described encrypted data and is sent to described highway electric prepaid card, and described highway electric prepaid card calculates according to described encrypted data.
The process of the basic format of described definition encryption equipment return data is specially:
First and second bytes are combined into the length n of an integer as encryption equipment return data;
Third and fourth byte is as return type;
5th and the 6th byte is as returning results, and result phase ' 0 ' ' 0 ' represents encrypts successfully;
Encrypted result length is n-6 byte.
The described process by basic format definition buffering area is specially:
Design buffering area is byte [X] [Y], and every bar returns results as a line, the agreement of the every a line of planning buffer area:
The length of store byte in byte [i] [0] and byte [i] [1];
Storage encryption return type in byte [i] [2] and byte [i] [3] ' M ' and ' H ';
Store in byte [i] [4] and byte [i] [5] and return results state, ' 0 ' ' 0 ' expression is encrypted successfully;
Storage encryption content in byte [i] [6]--byte [i] [Y].
Described server creates connection pool object factory, assembling thread and reads thread, by described connection pool object factory, described initial data is verified, and by described assembling thread, the initial data after checking is put into the buffering area of described encryption equipment with the form of message, the process returning the index of described buffer area is specially:
1) the described connection pool object factory of definition and described encryption equipment communication, and create described connection pool object factory;
Create described connection pool object factory to comprise: formation object, activation object, destroy objects and identifying object;
2) communication object in described connection pool object factory is generated by described formation object, after described communication object is used, by communication object described in described activation object activation;
3) after each request gets described communication object from described connection pool object factory, by described identifying object, link checking is carried out to described communication object, if return results correct, then proceed cryptographic operation, otherwise, destroy described communication object by described destroy objects, and obtain new communication object and again link checking;
4) define described assembling thread, described composition thread is used for assembling the initial data by checking, is formed and sends message, put in the buffering area of described encryption equipment;
5) what described encryption equipment returned to buffering area is indexed to described server, defines described reading thread, and described reading thread is used for from buffering area, reading described encrypted data according to described index.
Described encryption equipment reads the message in buffer area, writes encrypted data, the process that described encrypted data transfers in described buffering area according to index be specially according to described basic format:
Fill the first six byte, to obtain the length n-6 of subsequent byte, judge whether the message received makes a mistake, if the mistake of there occurs, thoroughly abandons this communication object according to preset rules; Described encrypted data is transferred in buffering area according to described index.
Described preset rules is: the result length of computations, can not be greater than the data length n of definition; The resultant content that encryption equipment returns is a complete array.
Described method also comprises: when after described reading thread waits time-out, described server first can wake the described reading thread of external standby time-out up, and described reading thread obtains described encrypted data again.
Described method also comprises: when described encrypted data is not read in described server timeout, and described reading thread destroys described communication object by described destroy objects.
Described method also comprises: close whole service time, described reading thread is closed by described destroy objects all communication objects set up and is destroyed.
The beneficial effect of technical scheme provided by the invention is: the connection pool object factory that the basic format defined by the present invention, buffering area, server are created processes needing the data of encryption, get the data after encryption, server reads encrypted data and finally transfers to highway electric prepaid card, invention increases the validity of encryption, and avoid the idle of system resource, improve operating efficiency.Verify by experiment, this method is when concurrent processing 1000 data, and maximum duration only needs 2 seconds used times; Ask to wait for 0.5 second at every turn compare with original, improve hundreds of times of efficiency, meet the multiple needs in practical application.
Accompanying drawing explanation
Fig. 1 is the messaging diagrams between highway electric prepaid card and encryption equipment;
Fig. 2 is the flow chart of the pond communication means between a kind of highway electric prepaid card and encryption equipment;
Fig. 3 is the communication scheme between highway electric prepaid card and encryption equipment;
Fig. 4 is the design sketch of l-G simulation test.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly, below embodiment of the present invention is described further in detail.
In order to avoid leaving unused of system resource, increase work efficiency, embodiments provide the pond communication means between a kind of highway electric prepaid card and encryption equipment, namely prepaid card in use needs to carry out read-write operation by card machine, in order to ensure the safety storing data in card, need to carry out cipher key calculation by encryption equipment, after calculating, result of calculation is turned back to card by card machine, thus realize the amendment of whole card data or the consumption of card and the operation such as to supplement with money, see Fig. 1, Fig. 2 and Fig. 3, described below:
101: the basic format of definition encryption equipment return data, defines buffering area by basic format;
This step is specially:
1) first and second bytes are combined into the length n of an integer as encryption equipment return data;
Total data length is: 0xFFFF (16 system)=65535(decimal system) byte 8 bit, i.e. FF, by height displacement, that is: the first byte is most-significant byte, second byte is least-significant byte, realize the length of data, (byte [0] & 0xFF00) >>8, (byte [1] & 0x00FF).
2) third and fourth byte is as return type;
During practical application, each encryption equipment can a corresponding return type, and the encryption equipment return type of different manufacturers is different, and the encryption equipment that the embodiment of the present invention adopts is: based on the Hua Da instruction set of SJL06 cipher machine, when relating to calculating MAC value, the resultative construction that encryption equipment exports is table 1:
Table 1
Domain output Length Type Content
Answer back code 2 A MH
Error code 2 H 00 represents correct
MAC 1-8 B
Can find out that A is printable character by table 1; B is any character, 0x00-0xFF; H is hexadecimal character ' 0 ’ – ' F ', and the return type of encryption equipment is MH, and the return type of the embodiment of the present invention to encryption equipment does not limit.
3) the 5th and the 6th byte is as returning results;
5th and the 6th result phase that byte returns ' 0 ' ' 0 ' represents encrypts successfully, and other return results such as: ' 0 ' ' 1 ', ' 1 ' ' 0 ' and ' 1 ' ' 1 ' all represents that encryption is unsuccessful.
Namely, in the data that encryption equipment finally returns, front 6 byte representation basic formats, encrypted result length is n-6 byte, when data length and front 6 bytes are all correct, represents and returns enciphered data success.
4) according to the basic format definition buffering area of encryption equipment return data.
This step is specially: design buffering area is byte [X] [Y], and this buffering area can store many simultaneously return results, and every bar returns results as a line, the agreement of the every a line of planning buffer area:
The length of store byte in byte [i] [0] and byte [i] [1];
Storage encryption return type in byte [i] [2] and byte [i] [3] ' M ' and ' H ';
Store in byte [i] [4] and byte [i] [5] and return results state, ' 0 ' ' 0 ' expression is encrypted successfully;
Storage encryption content in byte [i] [6]--byte [i] [Y].
102: card reader reads initial data from highway electric prepaid card, and by original data transmissions to server;
Being operating as of this step is conventionally known to one of skill in the art, and itself determined by each card reader, the embodiment of the present invention does not limit this.
103: server creates connection pool object factory, assembling thread and reads thread, by connection pool object factory, initial data is verified, and by assembling thread, the initial data after checking is put into the buffering area of encryption equipment with the form of message, the index index in return cache district;
In order to not process after a time out, and ensure that subsequent request returns result accurately again when not closing connection, go to read data for each communication object Socket provides one to read thread, strictly hold data format, and data are write in the buffer with strict form.
1) the connection pool object factory of definition and encryption equipment communication, and create connection pool object factory;
Realize the management to communication object Socket by connection pool object factory, create connection pool object factory and comprise: formation object makeObject(), activate object activateObject, destroy objects destroyObject and identifying object validateObject.
Wherein, formation object makeObject() be when system starts, according to the connection pool degree of depth of definition, program communicates with encryption equipment automatically, generate communication object socket(such as: formation object makeObject() can as the machine of in connection pool object factory, by this machine, just can make communication object socket); Simultaneously in object-oriented language, invention defines a complete connection pool object, the core of this connection pool object is communication object socket, has simultaneously and activates object properties, destroy objects attribute, identifying object attribute etc.
Communication object Socket has two attributes to be respectively: normal operating level line parameter and maximum operation level line parameter, and wherein, normal operating level line parameter acquiescence creates the quantity of communication object Socket in connection pool; The quantity of maximum operation level line parameter extendible communication object to greatest extent Socket, provides for subsequent use for interim request Concurrency amount increases.
Under normal circumstances, communication object socket in connection pool object factory can meet the demands, when temporary needs more communication object socket time, the communication object of (to greatest extent quantity-normal quantity) can be created, after finishing using, by destroy objects destroyObject releasing resource.
2), after the communication object Socket in connection pool object factory is used, this communication object Socket is activated;
Prevent multiple thread from holding a communication object Socket in practical application simultaneously, ensure that other threads cannot use the communication object Socket activated by activation manipulation.
3) after each request gets communication object socket from connection pool object factory, link checking is carried out to communication object socket, if return results correct, then proceed cryptographic operation, otherwise, destroy connection pool object, and obtain new object and again link checking;
Wherein, when each communication object socket of use, in order to ensure communication object socket, in connection pool object factory, still survive is effective, by checking validateObject method, whether communication object socket is survived and verifies, the rule of checking is: carry out heartbeat checking to communication object socket and encryption equipment, send the heartbeat identifying code that link identifying code 16 0(encryption equipments are supported): 0000000000000000, if communication object socket returns results normally, proceed cryptographic operation; Otherwise stop this communication object socket by destroy objects destroyObject, and obtain new communication object socket and again link checking.
4) definitions section wiring journey, composition thread is used for assembling the initial data by checking, is formed and sends message, put in the buffering area of encryption equipment;
Aforesaid operations makes after having calculative request access, does not need this request to communicate with encryption equipment at once, but after the content of request is submitted to, waits thread to be read to notify this request, thus can increase work efficiency.Because after each request of tradition, set up Socket communication, then wait is needed, this wait can only be set to regular length, and in Practical Calculation process, according to the load of the type of service calculated, encryption equipment, these stand-by period are not identical, the time that there is no need to be fixed is waited for, thus consumes the wait resource of encryption equipment.
5) encryption equipment returns the index index of buffering area byte [index] to server, and thread is read in definition, reads thread and is used for from buffering area, reading encrypted data according to index index.
Just can be arrived the assigned indexes of buffering area by this operations server under, reading the data after encryption by reading thread, avoiding the waste of resource.
104: encryption equipment reads the message in buffer area, writes encrypted data, transfer in buffering area by encrypted data according to call number according to basic format;
Namely arrange a unlimited circulation, each circulation is next byte [i] padding data, and this step is specially:
Fill the first six byte, to obtain the length n-6 of subsequent byte, judge whether the message received dislocation or mistake occur according to preset rules, if the mistake of there occurs, thoroughly abandon this and connect; Encrypted data is transferred in buffering area according to call number.
Preset rules is: 1, the result length of computations, can not be greater than the data length n of definition; 2, the resultant content that encryption equipment returns is a complete array (whether encryption equipment result of calculation is filled correct, does not need to consider).
Wherein, dislocation described above refers to: in calculating in concurrent processing, whether correctly can only verify memory location, affect whole result according to byte [2] ' M ', byte [3] ' H '.
105: server reads encrypted data from buffering area, and transfer to data card, data card receives encrypted data and is sent to highway electric prepaid card, and highway electric prepaid card calculates according to encrypted data.
Such as: the electronics prepaid card that highway uses at present is a kind of CPU card, uses the key management based on decentralized algorithm, namely deposits female key in encryption equipment, when card issuing is initialized, female key uses decentralized algorithm, and according to card number, calculate a sub-key, be put in card.
When needs operate card time, such as: A information is write in card, now, need writing the card time, write card data, card number and card and automatically generate the information such as a random number and be sent in encryption equipment, encryption equipment calculates according to these information, generate a MAC code, turn back in card, card equally also can according to sub-key, above-mentioned content is calculated, also can obtain a MAC code, if these 2 MAC codes are identical, illustrate that legal permission carries out writing operation.
When there being encrypted data in buffer area, reading thread can go to obtain the byte [] specified in buffer area by index index, obtains encrypted data, and returns the character string of encryption after verifying effective length.Wherein, when after reading thread waits time-out, server first can wake the reading thread of external standby time-out up, reads thread and obtains encrypted data again.
This method verifies effective length according to the data length of definition and first six digits, result of calculation is stored in the buffer memory of n-6 by encryption equipment, when the byte [] specified in buffer area is greater than n-6, show that the byte stored in buffer area is illegal, non-effective data result.
When encrypted data is not read in server timeout, when namely there is long-time untreated index, read thread and can destroy this communication object Socket, guarantee that the communication object Socket in connection pool object factory is always in metastable state.
During specific implementation, in order to releasing resource, this method also comprises: when closing whole service, all communication object socket set up is carried out closedown and destroys, releasing resource.
Wherein, the type of the embodiment of the present invention to highway electric prepaid card, card reader, server and encryption equipment does not limit, as long as can complete the device of above-mentioned functions.
The feasibility of the pond communication means between the highway electric prepaid card that the embodiment of the present invention provides and encryption equipment is verified below with concrete test, described below:
In an experiment, hardware as required: space flight gold card card machine * 3, common highway electric pays the Experimental Hardware such as prepaid card * 3, Hua Da encryption equipment * 1, application server * 1, operation PC*3, and equipment is combined into the LAN environment interconnected.
In the environment of experiment, in order to realize the effect of concurrent processing, also need the simulation program of a set of automatic read-write card operation, this program achieves carries out automatic read-write operation to the card machine on every platform operation PC, and record each read-write content, generate data report, concrete experiment is as follows:
1) using simulation program, writing application to often opening card, and the data of record application and the result data that returns, often open the operation 1000 times of card, and data preserved in record, can reference table 1;
2) simulation program is realizing after to 1000 operation applications often opening card, reads the data of table 1, and calls application service, calculate, and result of calculation is recorded to the MAC value of table 1;
3) run this 3000 times call in the service of encryption equipment, using thread pool to run pond quantity is 500, and maximum upper limit is the simulation test of 1000, and program running memory is adjusted to 4G;
4) total running time and single Annual distribution situation is recorded, can with reference to figure 4.
5) result that calculates according to encryption equipment of simulation program, according to order, writing operation successively, after writing card, Card Reader again, and the content that record reads, be filled up to the reading result items (result only listing data processing is several times described) in table 2.
Table 2
Can be found out by table 2 and Fig. 4, card reader is carried out concurrent reading to card and is obtained result of calculation, and by test program, these result of calculations are submitted to the connection pool service in server, Data Concurrent to be calculated is submitted in encryption equipment the calculating realizing data result by connection pool service.Can be found out by table 2, each result calculated is accurately, achieves the successful writing operation to card.
As seen in Figure 4, in the request carrying out 3000 times calculates, the number of times calculated in 20ms is greatly about 1500 times, and it is large about 1200 times that about 40ms has calculated, in 60ms to 80ms, greatly about about 200 times, more than 80ms at about 100 times.Distributed by the result of calculation of Fig. 4, describe server and meet processing requirements in processing procedure.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1. the pond communication means between highway electric prepaid card and encryption equipment, is characterized in that, described method comprises:
The basic format of definition encryption equipment return data, by described basic format definition buffering area;
Card reader reads initial data from highway electric prepaid card, and by described original data transmissions to server;
Described server creates connection pool object factory, assembling thread and reads thread, by described connection pool object factory, described initial data is verified, and by described assembling thread, the initial data after checking is put into the buffering area of described encryption equipment with the form of message, return the index of described buffering area;
Described encryption equipment reads the message in buffering area, writes encrypted data, transfer in described buffering area by described encrypted data according to index according to described basic format;
Described server reads described encrypted data from described buffering area, and transfer to described card reader, described card reader receives described encrypted data and is sent to described highway electric prepaid card, and described highway electric prepaid card calculates according to described encrypted data;
Wherein, the process of the basic format of described definition encryption equipment return data is specially:
First and second bytes are combined into the length n of an integer as encryption equipment return data;
Third and fourth byte is as return type;
5th and the 6th byte is as returning results, and result phase ' 0 ' ' 0 ' represents encrypts successfully;
Encrypted result length is n-6 byte.
2. the pond communication means between a kind of highway electric prepaid card according to claim 1 and encryption equipment, is characterized in that, the described process by basic format definition buffering area is specially:
Design buffering area is byte [X] [Y], and every bar returns results as a line, the agreement of the every a line in Plan-cache district:
The length of store byte in byte [i] [0] and byte [i] [1];
Storage encryption return type ' M ' and ' H ' in byte [i] [2] and byte [i] [3];
Store in byte [i] [4] and byte [i] [5] and return results state, ' 0 ' ' 0 ' expression is encrypted successfully;
Storage encryption content in byte [i] [6]--byte [i] [Y].
3. the pond communication means between a kind of highway electric prepaid card according to claim 2 and encryption equipment, it is characterized in that, described server creates connection pool object factory, assembling thread and reads thread, by described connection pool object factory, described initial data is verified, and by described assembling thread, the initial data after checking is put into the buffering area of described encryption equipment with the form of message, the process returning the index of described buffering area is specially:
1) the described connection pool object factory of definition and described encryption equipment communication, and create described connection pool object factory;
Create described connection pool object factory to comprise: formation object, activation object, destroy objects and identifying object;
2) communication object in described connection pool object factory is generated by described formation object, after described communication object is used, by communication object described in described activation object activation;
3) after each request gets described communication object from described connection pool object factory, by described identifying object, link checking is carried out to described communication object, if return results correct, then proceed cryptographic operation, otherwise, destroy described communication object by described destroy objects, and obtain new communication object and again link checking;
4) define described assembling thread, described assembling thread is used for assembling the initial data by checking, is formed and sends message, put in the buffering area of described encryption equipment;
5) what described encryption equipment returned to buffering area is indexed to described server, defines described reading thread, and described reading thread is used for from buffering area, reading described encrypted data according to described index.
4. the pond communication means between a kind of highway electric prepaid card according to claim 3 and encryption equipment, it is characterized in that, described encryption equipment reads the message in buffering area, write encrypted data according to described basic format, the process that described encrypted data transfers in described buffering area according to index be specially:
Fill the first six byte, to obtain the length n-6 of subsequent byte, judge whether the message received makes a mistake, if the mistake of there occurs, thoroughly abandons this communication object according to preset rules; Described encrypted data is transferred in buffering area according to described index.
5. the pond communication means between a kind of highway electric prepaid card according to claim 4 and encryption equipment, it is characterized in that, described preset rules is:
The result length of computations, can not be greater than the data length n of definition; The resultant content that encryption equipment returns is a complete array.
6. the pond communication means between a kind of highway electric prepaid card according to claim 4 and encryption equipment, it is characterized in that, described method also comprises:
When after described reading thread waits time-out, described server first can wake the described reading thread of external standby time-out up, and described reading thread obtains described encrypted data again.
7. the pond communication means between a kind of highway electric prepaid card according to claim 4 and encryption equipment, it is characterized in that, described method also comprises:
When described encrypted data is not read in described server timeout, described reading thread destroys described communication object by described destroy objects.
8. the pond communication means between a kind of highway electric prepaid card according to claim 4 and encryption equipment, it is characterized in that, described method also comprises:
When closing whole service, described reading thread closes destruction by described destroy objects all communication objects set up.
CN201310175239.8A 2013-05-13 2013-05-13 Pond communication means between highway electric prepaid card and encryption equipment Active CN103281172B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310175239.8A CN103281172B (en) 2013-05-13 2013-05-13 Pond communication means between highway electric prepaid card and encryption equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310175239.8A CN103281172B (en) 2013-05-13 2013-05-13 Pond communication means between highway electric prepaid card and encryption equipment

Publications (2)

Publication Number Publication Date
CN103281172A CN103281172A (en) 2013-09-04
CN103281172B true CN103281172B (en) 2016-03-02

Family

ID=49063632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310175239.8A Active CN103281172B (en) 2013-05-13 2013-05-13 Pond communication means between highway electric prepaid card and encryption equipment

Country Status (1)

Country Link
CN (1) CN103281172B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318287A (en) * 2014-11-04 2015-01-28 南京联创科技集团股份有限公司 Subsection inheriting method of service unification between isomerism IC card systems
CN108228338B (en) * 2016-12-22 2019-06-11 视联动力信息技术股份有限公司 A kind of view networked resources management method and system
CN107783819A (en) * 2017-10-30 2018-03-09 郑州云海信息技术有限公司 A kind of storage method, device and the medium of virtual link relation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101042736A (en) * 2006-03-24 2007-09-26 中国银联股份有限公司 Smart card and method for accessing objects in smart card
CN201355520Y (en) * 2008-11-21 2009-12-02 陈洪 Vehicle supervising system based on electronic identification
CN102521745A (en) * 2011-12-05 2012-06-27 天津市通卡公用网络系统有限公司 Online card selling method for cross-platform smart card
CN102663473A (en) * 2012-04-25 2012-09-12 山东神思电子技术股份有限公司 Method for realizing chip operating system (COS) safety mechanism of intelligent card

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7762457B2 (en) * 2001-07-10 2010-07-27 American Express Travel Related Services Company, Inc. System and method for dynamic fob synchronization and personalization
KR101041043B1 (en) * 2009-09-18 2011-06-13 한국건설교통기술평가원 Key Card For Compatible Traffic Card and Management Method therefore

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101042736A (en) * 2006-03-24 2007-09-26 中国银联股份有限公司 Smart card and method for accessing objects in smart card
CN201355520Y (en) * 2008-11-21 2009-12-02 陈洪 Vehicle supervising system based on electronic identification
CN102521745A (en) * 2011-12-05 2012-06-27 天津市通卡公用网络系统有限公司 Online card selling method for cross-platform smart card
CN102663473A (en) * 2012-04-25 2012-09-12 山东神思电子技术股份有限公司 Method for realizing chip operating system (COS) safety mechanism of intelligent card

Also Published As

Publication number Publication date
CN103281172A (en) 2013-09-04

Similar Documents

Publication Publication Date Title
CN101923660B (en) Dynamic password identity authorization system and method based on RFID
CN105160242B (en) Certificate loading method, certificate update method and the card reader of a kind of card reader
MX2007014237A (en) Implementation of an integrity-protected secure storage.
CN108345806A (en) A kind of hardware encryption card and encryption method
CN106503492A (en) A kind of authorization management method, server, customer equipment and system
CN103281172B (en) Pond communication means between highway electric prepaid card and encryption equipment
CN102693385A (en) Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN107623675A (en) Network, electronic installation and its checking step of electronic installation
CN104834873A (en) U disk for cloud data information encryption and decryption, and realization method
CN108460875A (en) A kind of entrance guard authentication method and device based on dynamic two-dimension code
CN104484628B (en) It is a kind of that there is the multi-application smart card of encrypting and decrypting
CN104301301A (en) Inter-cloud-storage-system data migration encryption method
CN101789152B (en) Multipurpose contactless card supporting large amount payment and online recharge and application method thereof
CN103093139B (en) Integrated circuit (IC) card intelligent gas meter information safety management module
CN104463020A (en) Method for protecting data integrity of memory
CN101004797A (en) Method for safely storing data in smart card with large capacity
CN101136079A (en) CPU and logical encrypt double-purpose smart card and key data processing method thereof
CN104268483A (en) Data protecting system, device and method
CN109977702A (en) A kind of FPGA device encrypted authentication system and method based on DS2432 chip
CN205091758U (en) Card reader and CPU card transaction system
CN204669402U (en) A kind of cloud data message encrypting and decrypting system based on USB flash disk
CN103862879A (en) Ink box chip and ink box employing same
CN103338107A (en) A secret key generation method and a secret key generation apparatus
CN103020551A (en) Memory architecture
CN103336977A (en) Vehicle electronic information card safety protection system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant