CN104579674A - Terminal security module and management method thereof, and vehicle charge management method and system thereof - Google Patents

Terminal security module and management method thereof, and vehicle charge management method and system thereof Download PDF

Info

Publication number
CN104579674A
CN104579674A CN201410391273.3A CN201410391273A CN104579674A CN 104579674 A CN104579674 A CN 104579674A CN 201410391273 A CN201410391273 A CN 201410391273A CN 104579674 A CN104579674 A CN 104579674A
Authority
CN
China
Prior art keywords
key
security module
terminal security
manager
access times
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410391273.3A
Other languages
Chinese (zh)
Other versions
CN104579674B (en
Inventor
王政
甘志刚
张恩泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Genvict Technology Co Ltd
Original Assignee
Shenzhen Genvict Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Genvict Technology Co Ltd filed Critical Shenzhen Genvict Technology Co Ltd
Priority to CN201410391273.3A priority Critical patent/CN104579674B/en
Publication of CN104579674A publication Critical patent/CN104579674A/en
Application granted granted Critical
Publication of CN104579674B publication Critical patent/CN104579674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a terminal security module, and a management method thereof, and a vehicle charge management method and a system thereof. The management method of terminal security module comprises the following steps: when secret keys are used for declassifying data, judging whether the authentication of a manager or PIN verification is passed or not; when the authentication of the manager or the PIN verification is passed, modifying the state value of the usage permissions of a current application catalogue; judging whether the state value of the usage permissions of the current application catalogue is greater than or equal to a preset threshold of the usage permissions, wherein the threshold of the usage permissions is set during the creating of the secret keys; when the threshold is greater than or equal to the preset threshold of the usage permissions, using the secret keys to declassify the data. Through the implementation of the technical scheme, the potential safety hazards can be eliminated.

Description

Terminal security module and management method, vehicle toll management method and system
Technical field
The present invention relates to intelligent and safe management domain, particularly relate to a kind of terminal security module and management method, vehicle toll management method and system.
Background technology
PSAM (Purchase Secure Access Module, terminal security module) is widely used in, on the equipment such as commercial POS, site terminal, direct-connected terminal, having security control management function, be applicable to many applied environments.
Such as, independently parking system is all runed by property usually in the parking lot being used in institutional settings, market, office building, residential quarters etc. at present local, the vehicle in parking lot of coming in and going out is charged, data communication between the smart card that parking lot is generally held by user and the transaction terminal of turning roadway terminal realizes charging, in order to ensure the accuracy of charge, Secure Transaction based on smart card is ensured by key code system, subscriber card, when terminal is concluded the business, needs the PSAM by being installed on transaction terminal to carry out certification.If relate to consumption, PSAM has relevant consumption key.Manager by management the key of PSAM and the key of user to reach the control of certification and consumption.The fail safe of concluding the business is by the safety of key.
The another kind of typical apply based on smart card, such as: the entrance and exit as highway ETC (Electronic TollCollection, electronic toll collection) track is separately installed with one PSAM.Only have acquisition PSAM, subscriber card just can write access information when entering ETC track, and could consume withhold when exporting.Such as: Entrance needs to write access information and comprises temporal information, the temporal information of entrance is read in outlet again, calculates concrete paying price by temporal information.In order to prevent cheating, entry time information may need encryption write parking card, and outlet uses after decrypts information again.
PSMA can storage key and file, needs to use PSAM when being encrypted computing, has external system to send be-encrypted data by instruction and use the double secret key data stored to be encrypted to PSAM, PSAM, and encrypted result is returned to external system.
But the management of PSAM is a difficult problem.In the PSMA supporting ISO7816 agreement, the not rights of using of regulation key, this present situation may cause following hidden danger: if assailant illegally obtains PSAM, backstage just cannot limit the use of this PSAM, as long as assailant understands the application flow of this PSAM, then it just can use arbitrarily in the range of application of this PSAM.
Summary of the invention
The technical problem to be solved in the present invention is, the management for the above-mentioned PSAM of prior art exists the defect of potential safety hazard, provides a kind of terminal security module and management method, vehicle toll management method and system, can eliminate safe hidden trouble.
The technical solution adopted for the present invention to solve the technical problems is: the management method constructing a kind of terminal security module, and described terminal security module stores key, when using described double secret key data to carry out encryption and decryption, carries out following steps:
A. the certification by manager or PIN checking is judged whether;
B. when certification or the PIN checking of passing through manager, the state value of the rights of using of amendment current application catalogue;
C. judge whether the state value of the rights of using of current application catalogue is more than or equal to the threshold values of default rights of using, wherein, the threshold values of described rights of using sets when key creates;
D., when being more than or equal to the threshold values of default rights of using, described double secret key data are used to carry out encryption and decryption.
In the management method of terminal security module of the present invention, in described steps A, judge whether that the step of the certification by manager comprises:
A1. terminal security module produces a random number, and the authenticate key using self to store is encrypted to produce the first enciphered data to described random number, meanwhile, sends described random number by card reader to manager;
A2. terminal security module is received from the certification instruction of manager by card reader, comprise in described certification instruction manager use the authenticate key self stored to be encrypted described random number after the second enciphered data;
A3. whether more described first enciphered data of terminal security module is identical with the second enciphered data, if identical, then determines the certification by manager; If different, then determine not by the certification of manager.
In the management method of terminal security module of the present invention, step B is specially: when certification or the PIN checking of passing through manager, under judging current state, whether described key can be used, and when described key is available under current state, just revises the state value of the rights of using of current application catalogue.
In the management method of terminal security module of the present invention, under judging current state described key whether can concrete grammar be:
Judge whether the access times of key are more than or equal to maximum access times, wherein, described maximum access times set when key creates; Described access times set to 0 when described terminal security module resets, and each use double secret key data to carry out encryption and decryption time, access times are added 1; If not, then under determining current state, described key can be used; If so, under then determining current state, described key is unavailable;
Or,
Judge whether the residue access times of key are less than or equal to 0, wherein, described maximum access times set when key creates; Described residue access times are set to described maximum access times when described terminal security module resets, and when each use double secret key data carry out encryption and decryption, residue access times are subtracted 1; If not, then under determining current state, described key can be used; If so, under then determining current state, described key is unavailable.
The present invention also constructs a kind of terminal security module, and described terminal security module stores key, and described terminal security module comprises:
Authentication ' unit or authentication unit, for when using described double secret key data to carry out encryption and decryption, judge whether the certification by manager or PIN checking;
Amendment unit, during for verifying in the certification or PIN of passing through manager, the state value of the rights of using of amendment current application catalogue;
First judging unit, for judging whether the state value of the rights of using of current application catalogue is more than or equal to the threshold values of default rights of using, wherein, the threshold values of described rights of using sets when key creates;
Encryption/decryption element, for when being more than or equal to the threshold values of default rights of using, uses described double secret key data to carry out encryption and decryption.
In terminal security module of the present invention, described authentication ' unit comprises:
Random number generating subunit, for generation of a random number;
Random number encryption subelement, the authenticate key stored for using self is encrypted to produce the first enciphered data to described random number;
Send subelement, for sending described random number by card reader to manager;
Receive subelement, for being received from the certification instruction of manager by card reader, comprise in described certification instruction manager use the authenticate key self stored to be encrypted described random number after the second enciphered data;
Relatively whether subelement, identical with the second enciphered data for more described first enciphered data, if so, then determines the certification by manager; If not, then determine not by the certification of manager.
In terminal security module of the present invention, described terminal security module also comprises the second judging unit, and during for verifying in the certification or PIN of passing through manager, under judging current state, whether described key can be used;
When described amendment unit is also available for key described under current state, the state value of the rights of using of amendment current application catalogue.
In terminal security module of the present invention, when described second judging unit is specifically for verifying in the certification or PIN of passing through manager, judge whether the access times of key are more than or equal to maximum access times, wherein, described maximum access times set when key creates; Described access times set to 0 when described terminal security module resets, and each use double secret key data to carry out encryption and decryption time, access times are added 1; If not, then under determining current state, described key can be used; If so, under then determining current state, described key is unavailable;
Or,
When described second judging unit is specifically for verifying in the certification or PIN of passing through manager, judge whether the residue access times of key are less than or equal to 0, wherein, described maximum access times set when key creates; Described residue access times are set to described maximum access times when described terminal security module resets, and when each use double secret key data carry out encryption and decryption, residue access times are subtracted 1; If not, then under determining current state, described key can be used; If so, under then determining current state, described key is unavailable.
The present invention also constructs a kind of vehicle toll management method, comprising:
In porch, terminal security module uses above-described management method to be encrypted access information, and writes board units;
In exit, the access information after the encryption that terminal security module uses above-described management method to send board units is decrypted;
Server calculates Parking Fee according to the access information after outlet information and deciphering, and according to the corresponding relation of the board units prestored and user account, deducts described Parking Fee from proper account.
The present invention also constructs a kind of vehicle toll management system, comprise server and be arranged on the board units on vehicle, described vehicle toll management system also comprises: the first terminal security module being arranged on porch and the second terminal security module being arranged on exit, described first terminal security module and the second terminal security module are respectively above-described terminal security module, and
Described first terminal security module, for being encrypted access information, and writes described board units;
Described second terminal security module, is decrypted for the access information after the encryption that sends described board units;
Described server, for calculating Parking Fee according to the access information after outlet information and deciphering, and according to the corresponding relation of the board units prestored and user account, deducts described Parking Fee from proper account.
Implement technical scheme of the present invention, terminal security module is when each use key, all must first by certification or the PIN checking of manager, certification or PIN is only had to be verified, could modify to the state value of the rights of using of current application catalogue, and, when the state value of the rights of using of current application catalogue is more than or equal to the threshold values of default rights of using, these double secret key data could be used to carry out encryption and decryption.So, even if assailant illegally obtains this terminal security module, owing to cannot be verified by the certification of manager or PIN, and then also just cannot revise the state value of rights of using of current application catalogue, so assailant still cannot use this terminal security module, thus eliminate potential safety hazard.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the flow chart of the management method embodiment one of terminal security module of the present invention;
Fig. 2 is the flow chart of steps A embodiment one in Fig. 1;
Fig. 3 is the flow chart of step B embodiment one in Fig. 1;
Fig. 4 is the flow chart of step B embodiment two in Fig. 1;
Fig. 5 is the logic diagram of terminal security module embodiments one of the present invention;
Fig. 6 is the logic diagram of authentication ' unit embodiment one in Fig. 5;
Fig. 7 is the logic diagram of terminal security module embodiments two of the present invention;
Fig. 8 is the flow chart of vehicle toll management method embodiment one of the present invention;
Fig. 9 is the logic diagram of vehicle toll management system embodiment one of the present invention.
Embodiment
Fig. 1 is the flow chart of the management method embodiment one of terminal security module of the present invention, in this embodiment, what first illustrate is, can storage key and file in terminal security module, for key, COS (the Chip Operating System of terminal security module, COS chip operating system) except specifying the attribute such as purposes, version, algorithm mark, key value of key, also can specify the rights of using of key, the rights of using of key are a numerical value, such as, can be a numeral between 0-15.
In this embodiment, key attribute field structure and the explanation of terminal security module are as shown in table 1:
Data field Key purposes Key version Algorithm identifies Rights of using Key value
Length (byte) 1 1 1 1 8/16
Table 1
In addition, terminal security module, when using the double secret key data stored to carry out encryption and decryption, carries out following steps:
A. the certification by manager or PIN checking is judged whether;
B. when certification or the PIN checking of passing through manager, the state value of the rights of using of amendment current application catalogue, preferably, can according to the succeeding state value of authenticate key or PIN key defined, the state value of the rights of using of amendment current application catalogue, such as, the state value of amended rights of using is the succeeding state value of authenticate key or PIN key defined;
C. judge whether the state value of the rights of using of current application catalogue is more than or equal to the threshold values of default rights of using, wherein, the threshold values of described rights of using sets when key creates;
D., when being more than or equal to the threshold values of default rights of using, described double secret key data are used to carry out encryption and decryption.
In step, composition graphs 2, judges whether that the step of the certification by manager comprises:
A1. terminal security module produces a random number, and the authenticate key using self to store is encrypted to produce the first enciphered data to described random number, meanwhile, sends described random number by card reader to manager;
A2. terminal security module is received from the certification instruction of manager by card reader, comprise in described certification instruction manager use the authenticate key self stored to be encrypted described random number after the second enciphered data;
A3. whether more described first enciphered data of terminal security module is identical with the second enciphered data, if identical, then determines the certification by manager; If different, then determine not by the certification of manager.
In addition, in step, judge whether that the method verified by the PIN of manager be can be: because checking PIN is exactly authentication of users password, so can be exactly directly that transmission instruction is to terminal security module by manager, contain user password in this instruction, password is that expressly terminal security module just returns correct or incorrect, if correct, just think that PIN is verified; If incorrect, just think that PIN checking is not passed through.The process of PIN checking only has a step, more simply, but due to password be expressly, so the mode comparing certification is not too safe.
In the embodiment above, before use key, all force terminal security module must first by the certification of manager or PIN checking.But, after certification or PIN have verified, in order to avoid terminal security module uses when not having breakpoint always, also continue to judge whether key is available under current state, if the state value of the rights of using of available just amendment current application catalogue.When judging that whether key is available, the COS of terminal security module also can continue two attributes increasing key, and these two attributes be access times and maximum access times, or these two attributes are for remaining access times and maximum access times.
Increased two attributes be access times and maximum access times time, the key attribute field structure of terminal security module and illustrate as shown in table 2:
Table 2
Correspondingly, composition graphs 3, step B can specifically comprise:
B1., when certification or the PIN checking of passing through manager, judge whether the access times of key are more than or equal to maximum access times, wherein, described maximum access times set when key creates; Described access times set to 0 when described terminal security module resets, and each use double secret key data to carry out encryption and decryption time, access times are added 1, and under if so, then determining current state, described key is unavailable, then points out mistake; If not, then under determining current state, described key can be used, and then performs step B2;
B2. the state value of the rights of using of current application catalogue is revised.
When increased two attributes are for residue access times and maximum access times, key attribute field structure and the explanation of terminal security module are as shown in table 3:
Table 3
Correspondingly, composition graphs 4, step B can specifically comprise:
B3., when certification or the PIN checking of passing through manager, judge whether the residue access times of key are less than or equal to 0, wherein, described maximum access times set when key creates; Described residue access times are set to described maximum access times when described terminal security module resets, and when each use double secret key data carry out encryption and decryption, residue access times are subtracted 1, if, under then determining current state, described key is unavailable, then points out mistake; If not, then under determining current state, described key can be used, and then performs the state value that step B4B4. revises the rights of using of current application catalogue.
Fig. 5 is the logic diagram of terminal security module embodiments one of the present invention, the terminal security module of this embodiment comprises the authentication ' unit 10 (or authentication unit 10 '), amendment unit 20, first judging unit 30 and the encryption/decryption element 40 that connect successively, wherein, authentication ' unit 10, for when using double secret key data to carry out encryption and decryption, judges whether the certification by manager; Authentication unit 10 ', for when using double secret key data to carry out encryption and decryption, judges whether to be verified by the PIN of manager.When amendment unit 20 is for verifying in the certification or PIN of passing through manager, the state value of the rights of using of amendment current application catalogue; First judging unit 30 is for judging whether the state value of the rights of using of current application catalogue is more than or equal to the threshold values of default rights of using, and wherein, the threshold values of described rights of using sets when key creates; Encryption/decryption element 40, for when being more than or equal to the threshold values of default rights of using, uses described double secret key data to carry out encryption and decryption.
Fig. 6 is the logic diagram of authentication ' unit embodiment one in Fig. 5, and in this embodiment, authentication ' unit 10 specifically comprises: random number generating subunit 11, random number encryption subelement 12, send subelement 13, receive subelement 14 and compare subelement 15.Wherein, random number generating subunit 11 is for generation of a random number; Random number encryption subelement 12 is encrypted to produce the first enciphered data to described random number for the authenticate key using self to store; Send subelement 13 for sending described random number by card reader to manager; Receive subelement 14 for being received from the certification instruction of manager by card reader, comprise in described certification instruction manager use the authenticate key self stored to be encrypted described random number after the second enciphered data; Relatively whether subelement 15 is identical with the second enciphered data for more described first enciphered data, if so, then determines the certification by manager; If not, then determine not by the certification of manager.
Fig. 7 is the logic diagram of terminal security module embodiments two of the present invention, this embodiment compares the embodiment one shown in Fig. 5, difference is only, between authentication ' unit 10 (or authentication unit 10 ') and amendment unit 20, also include the second judging unit 50, when second judging unit 50 is for verifying in the certification or PIN of passing through manager, under judging current state, whether described key can be used, when amendment unit 20 is also available for key described under current state, the state value of the rights of using of amendment current application catalogue.
In a kind of embodiment, when the second judging unit 50 is for verifying in the certification or PIN of passing through manager, judge whether the access times of key are more than or equal to maximum access times, wherein, described maximum access times set when key creates; Described access times set to 0 when described terminal security module resets, and each use double secret key data to carry out encryption and decryption time, access times are added 1 if not, then under determining current state, described key can be used; If so, under then determining current state, described key is unavailable.
In another embodiment, when the second judging unit 50 is for verifying in the certification or PIN of passing through manager, judge whether the residue access times of key are less than or equal to 0, wherein, described maximum access times set when key creates; Described residue access times are set to described maximum access times when described terminal security module resets, and when each use double secret key data carry out encryption and decryption, residue access times are subtracted 1; If not, then under determining current state, described key can be used; If so, under then determining current state, described key is unavailable.
Preferably, when amendment unit 30 is available for key described under current state, according to the succeeding state value of authenticate key or PIN key defined, the state value of the rights of using of amendment current application catalogue.
Fig. 8 is the flow chart of vehicle toll management method embodiment one of the present invention, and this vehicle toll management method can for parking fee collective system, also can for expressway tol lcollection.The vehicle toll management method of this embodiment comprises:
S1. in porch, terminal security module is encrypted access information, and writes board units.In this step, it should be noted that, this entrance can be Entrance also can be expressway access.Access information comprises entrance mark, entry time.When vehicle is through Entrance or expressway access, the terminal security module of porch reads access information from external system, and use the management method described in above embodiment to be encrypted access information, and by the access information write board units after encryption;
S2. in exit, the access information after the encryption that terminal security module sends board units is decrypted.In this step, it should be noted that equally, this outlet can be EXIT also can be expressway exit.When vehicle is through EXIT or expressway exit, access information after encryption can be sent to the terminal security module in exit by board units, then terminal security module uses the management method described in above embodiment to be decrypted the access information after encryption, like this, the access information of this vehicle is just obtained.In addition, this terminal security module also reads outlet information from external system;
S3. server calculates Parking Fee according to the access information after outlet information and deciphering, and according to the corresponding relation of the board units prestored and user account, deducts described Parking Fee from proper account.
Fig. 9 is the logic diagram of vehicle toll management system embodiment one of the present invention, and the vehicle toll management system of this embodiment comprises: the first terminal security module 100 being arranged on porch, the second terminal security module 200 being arranged on exit, server 300, the board units 400 be arranged on vehicle.Wherein, the logical construction of first terminal security module 100 and the second terminal security module 200 can refer to above-described embodiment, and in this embodiment, first terminal security module 100 for being encrypted access information, and writes board units 400; Second terminal security module 200 is decrypted for the access information after the encryption that sends board units 400; Server 300 for calculating Parking Fee according to the access information after outlet information and deciphering, and according to the corresponding relation of the board units prestored and user account, deducts described Parking Fee from proper account.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within right of the present invention.

Claims (10)

1. a management method for terminal security module, described terminal security module stores key, it is characterized in that, when using described double secret key data to carry out encryption and decryption, carries out following steps:
A. the certification by manager or PIN checking is judged whether;
B. when certification or the PIN checking of passing through manager, the state value of the rights of using of amendment current application catalogue;
C. judge whether the state value of the rights of using of current application catalogue is more than or equal to the threshold values of default rights of using, wherein, the threshold values of described rights of using sets when key creates;
D., when being more than or equal to the threshold values of default rights of using, described double secret key data are used to carry out encryption and decryption.
2. the management method of terminal security module according to claim 1, is characterized in that, in described steps A, judges whether that the step of the certification by manager comprises:
A1. terminal security module produces a random number, and the authenticate key using self to store is encrypted to produce the first enciphered data to described random number, meanwhile, sends described random number by card reader to manager;
A2. terminal security module is received from the certification instruction of manager by card reader, comprise in described certification instruction manager use the authenticate key self stored to be encrypted described random number after the second enciphered data;
A3. whether more described first enciphered data of terminal security module is identical with the second enciphered data, if identical, then determines the certification by manager; If different, then determine not by the certification of manager.
3. the management method of terminal security module according to claim 1, it is characterized in that, step B is specially: when certification or the PIN checking of passing through manager, under also judging current state, whether described key can be used, when described key is available under current state, just revise the state value of the rights of using of current application catalogue.
4. the management method of terminal security module according to claim 3, is characterized in that, under judging current state described key whether can concrete grammar be:
Judge whether the access times of key are more than or equal to maximum access times, wherein, described maximum access times set when key creates; Described access times set to 0 when described terminal security module resets, and each use double secret key data to carry out encryption and decryption time, access times are added 1; If not, then under determining current state, described key can be used; If so, under then determining current state, described key is unavailable;
Or,
Judge whether the residue access times of key are less than or equal to 0, wherein, described maximum access times set when key creates; Described residue access times are set to described maximum access times when described terminal security module resets, and when each use double secret key data carry out encryption and decryption, residue access times are subtracted 1; If not, then under determining current state, described key can be used; If so, under then determining current state, described key is unavailable.
5. a terminal security module, described terminal security module stores key, it is characterized in that, described terminal security module comprises:
Authentication ' unit or authentication unit, for when using described double secret key data to carry out encryption and decryption, judge whether the certification by manager or PIN checking;
Amendment unit, during for verifying in the certification or PIN of passing through manager, the state value of the rights of using of amendment current application catalogue;
First judging unit, for judging whether the state value of the rights of using of current application catalogue is more than or equal to the threshold values of default rights of using, wherein, the threshold values of described rights of using sets when key creates;
Encryption/decryption element, for when being more than or equal to the threshold values of default rights of using, uses described double secret key data to carry out encryption and decryption.
6. terminal security module according to claim 5, is characterized in that, described authentication ' unit comprises:
Random number generating subunit, for generation of a random number;
Random number encryption subelement, the authenticate key stored for using self is encrypted to produce the first enciphered data to described random number;
Send subelement, for sending described random number by card reader to manager;
Receive subelement, for being received from the certification instruction of manager by card reader, comprise in described certification instruction manager use the authenticate key self stored to be encrypted described random number after the second enciphered data;
Relatively whether subelement, identical with the second enciphered data for more described first enciphered data, if so, then determines the certification by manager; If not, then determine not by the certification of manager.
7. terminal security module according to claim 5, is characterized in that, described terminal security module also comprises the second judging unit, and during for verifying in the certification or PIN of passing through manager, under judging current state, whether described key can be used;
When described amendment unit is also available for key described under current state, the state value of the rights of using of amendment current application catalogue.
8. terminal security module according to claim 7, it is characterized in that, described second judging unit is used for, when certification or the PIN checking of passing through manager, judging whether the access times of key are more than or equal to maximum access times, wherein, described maximum access times set when key creates; Described access times set to 0 when described terminal security module resets, and each use double secret key data to carry out encryption and decryption time, access times are added 1; If not, then under determining current state, described key can be used; If so, under then determining current state, described key is unavailable;
Or,
Described second judging unit, during for verifying in the certification or PIN of passing through manager, judge whether the residue access times of key are less than or equal to 0, wherein, described maximum access times set when key creates; Described residue access times are set to described maximum access times when described terminal security module resets, and when each use double secret key data carry out encryption and decryption, residue access times are subtracted 1; If not, then under determining current state, described key can be used; If so, under then determining current state, described key is unavailable.
9. a vehicle toll management method, is characterized in that, comprising:
In porch, terminal security module uses the management method described in any one of claim 1-4 to be encrypted access information, and writes board units;
In exit, the access information after the encryption that terminal security module uses the management method described in any one of claim 1-4 to send board units is decrypted;
Server calculates Parking Fee according to the access information after outlet information and deciphering, and according to the corresponding relation of the board units prestored and user account, deducts described Parking Fee from proper account.
10. a vehicle toll management system, comprise server and be arranged on the board units on vehicle, it is characterized in that, described vehicle toll management system also comprises: the first terminal security module being arranged on porch and the second terminal security module being arranged on exit, described first terminal security module and the second terminal security module are respectively the terminal security module described in any one of claim 5-8, and
Described first terminal security module, for being encrypted access information, and writes described board units;
Described second terminal security module, is decrypted for the access information after the encryption that sends described board units;
Described server, for calculating Parking Fee according to the access information after outlet information and deciphering, and according to the corresponding relation of the board units prestored and user account, deducts described Parking Fee from proper account.
CN201410391273.3A 2014-08-08 2014-08-08 Terminal security module and its management method, vehicle toll management method and system Active CN104579674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410391273.3A CN104579674B (en) 2014-08-08 2014-08-08 Terminal security module and its management method, vehicle toll management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410391273.3A CN104579674B (en) 2014-08-08 2014-08-08 Terminal security module and its management method, vehicle toll management method and system

Publications (2)

Publication Number Publication Date
CN104579674A true CN104579674A (en) 2015-04-29
CN104579674B CN104579674B (en) 2018-07-20

Family

ID=53094955

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410391273.3A Active CN104579674B (en) 2014-08-08 2014-08-08 Terminal security module and its management method, vehicle toll management method and system

Country Status (1)

Country Link
CN (1) CN104579674B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1380630A (en) * 2002-04-25 2002-11-20 深圳市深港产学研数码科技有限公司 Non-stop charging method and system
US20090135725A1 (en) * 2005-12-15 2009-05-28 Kimie Tanaka Network device verifying apparatus
CN102064944A (en) * 2010-11-30 2011-05-18 北京飞天诚信科技有限公司 Safety card issuing method as well as card issuing equipment and system
CN102081744A (en) * 2009-11-30 2011-06-01 中兴通讯股份有限公司 Path identification system and secure interaction method thereof
CN102255727A (en) * 2011-06-23 2011-11-23 中国电力科学研究院 Improved anti-attacking intelligent card authentication method based on user defined algorithm environment
CN102568097A (en) * 2010-12-08 2012-07-11 邵通 Method and system for improving safety of electronic wallets
CN103606223A (en) * 2013-11-15 2014-02-26 深圳市捷顺科技实业股份有限公司 Card authentication method and device
CN103914913A (en) * 2012-12-28 2014-07-09 北京握奇数据系统有限公司 Intelligent card application scene recognition method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1380630A (en) * 2002-04-25 2002-11-20 深圳市深港产学研数码科技有限公司 Non-stop charging method and system
US20090135725A1 (en) * 2005-12-15 2009-05-28 Kimie Tanaka Network device verifying apparatus
CN102081744A (en) * 2009-11-30 2011-06-01 中兴通讯股份有限公司 Path identification system and secure interaction method thereof
CN102064944A (en) * 2010-11-30 2011-05-18 北京飞天诚信科技有限公司 Safety card issuing method as well as card issuing equipment and system
CN102568097A (en) * 2010-12-08 2012-07-11 邵通 Method and system for improving safety of electronic wallets
CN102255727A (en) * 2011-06-23 2011-11-23 中国电力科学研究院 Improved anti-attacking intelligent card authentication method based on user defined algorithm environment
CN103914913A (en) * 2012-12-28 2014-07-09 北京握奇数据系统有限公司 Intelligent card application scene recognition method and system
CN103606223A (en) * 2013-11-15 2014-02-26 深圳市捷顺科技实业股份有限公司 Card authentication method and device

Also Published As

Publication number Publication date
CN104579674B (en) 2018-07-20

Similar Documents

Publication Publication Date Title
US8239681B2 (en) Information processing device and method, recording medium, program and information processing system
CN107077670B (en) Method and apparatus for transmitting and processing transaction message, computer readable storage medium
CN105610871B (en) A kind of vehicle input-output control system and control method based on semi-on-line key
EP2003589B1 (en) Authentication information management system, server, method and program
US10361864B2 (en) Enabling a secure OEM platform feature in a computing environment
CN105391695A (en) Terminal registration method and verification method
US20130212407A1 (en) Method for managing memory space in a secure non-volatile memory of a secure element
CN103152174B (en) It is applied to the data processing method in parking lot, device and managing system of car parking
MX2007014237A (en) Implementation of an integrity-protected secure storage.
CN103368916A (en) Technology for generating trusted identity certification of computer terminal based on hardware information
CN106503492A (en) A kind of authorization management method, server, customer equipment and system
CN104573442A (en) E-coupon generation method and device
Cheng et al. A secure and practical key management mechanism for NFC read-write mode
CN103152732B (en) Cloud password system and operation method thereof
CN104022886A (en) Safety authentication method applied to parking lot as well as related device and system
KR20120112598A (en) Implementing method, system of universal card system and smart card
CN104683299A (en) Control method for software registration, authentication server and terminal
CN106682905B (en) Application unlocking method
CN104579675A (en) Safety module, data reading-writing system for parking lot and safety setting method
CN106656955A (en) Communication method and system and user terminal
CN104574535A (en) PSAM (Purchase Secure Access Module) and management method and system thereof as well as vehicle charge management method and system
CN105516136A (en) Authority management method, device and system
CN103765428A (en) Software authentication
CN105743651A (en) Method and apparatus for utilizing card application in chip security domain, and application terminal
WO2015162276A2 (en) Secure token implementation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant