491981 PA880520.DOC - 3/12 A7 B7 五、發明說明() 【技術領域】 本發明係關於一種交通運輸電子票證之階層式結構基 碼管理系統,特別是指基碼結構與基碼的生成及各種加解 密運算處理,皆在硬體安全模組内一次處理完成,處理過 5 程中無法追蹤程式,竊取資訊;在硬體的安全設計上具有 防制盜取基碼資料的機制,當有不當的破壞與拆解時,内 部資料將自動消除;1C卡讀寫機用以發行安控卡及當作 安全控管的讀寫設備。 【先前技術】 10 在電子票證系統中的安全考量包括端末設備合法性 的認證、票卡及安全模組的發行、系統存活性、資料傳輸 時的安全加密保護及重要資料的安全儲存避免重要資料被 竊取。這些安全考量都牽涉到基碼的管理是否符合安全原 則,如果不符合就好像一個非常安全的保險庫,一旦鑰匙 15 被竊,則這座保險庫很難對抗擁有鑰匙者入侵,因此基碼 管理在電子票證系統中是非常重要的。 所以本案發明人根據電子票證系統之交易安全控管需 求及考量基碼生成、傳送、輸入、使用、儲存、復原、毁 壞到存檔等階段的管理,構思一套四階層式結構之基碼管 20 理系統,並乃亟思加以創新,並經多年苦心孤詣潛心研究 後,終於成功研發完成本件交通運輸電子票證之階層式結 構基碼管理系統。 【發明目的】 本發明之目的即在於提供一種交通運輸電子票證之階 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------------^---------線 (t請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 9 PA880520.DOC - 4/13 A7 B7 五、發明說明(>) 層式結構基碼管理系統,使具有符合安全原則避免重要資 料於傳輸時被竊取之特性。 本發明之次一目的係在於提供一種交通運輸電子票證 之階層式結構基碼管理系統,使具有端末設備合法性的認 5 證、票卡及安全模組的發行、系統存活性、資料傳輸時的 安全加密保護及重要資料的安全儲存等功能。 【技術内容】 可達成上述新型目的之交通運輸電子票證之階層式 結構基碼管理系統,特別構思一套四階層式結構之基碼管 10 理系統,最上一層是主基碼,其下分別是子系統的基碼加 密基碼、通訊基碼、工作基碼及多樣化基碼,如圖(一) 所示。依據此階層式基碼結構進而發展出本基碼管理系 統,它是由硬體安全模組、系統管理單元、基碼生成與維 護管理單元、基碼儲存管理單元、安控卡及端末設備安全 15 模組的註冊與發行管理單元及1C卡讀寫機組成,如圖 (二)所示。 【圖式簡單說明】 請參閱以下有關本發明一較佳實施例之詳細說明及其 附圖,將可進一步瞭解本發明之技術内容及其目的功效; 20 有關該實施例之附圖為: 圖一為本發明之基碼的階層式結構圖; 圖二為電子票證基碼管理系統架構圖; 圖三為安控卡認證硬體安全模組流程圖; 圖四為硬體安全模組認證安控卡流程圖;以及 -4- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 請 先 閱 讀 背 δ 之 注 意 事 項 頁 經濟部智慧財產局員工消費合作社印制衣 491981 PA880520.DOC - 5/12 經濟部智慧財產局員工消費合作社印製 A7 B7 發明說明) 圖五為階層式結構基碼管理系統之應用實例示意 圖。 【主要部分代表符號】 1基碼管理系統 10主基碼 101基碼加密基碼 102通訊基碼 103認證基碼 104工作基碼 11基碼管理系統伺服器 111基碼加密基碼 112通訊基碼 113票卡基碼 114票卡多樣化基碼 12硬體安全模組 121基碼加密基碼 122通訊基碼 123認證基碼 124工作基碼 13 1C卡讀寫機 14安控卡 15系統管理 16基碼生成與維護管理 17基碼儲存管理 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 491981 PA880520.DOC - 6/13 經濟部智慧財產局員工消費合作社印製 A7 B7 發明說明(L/) 18端末設備安全模組的註冊與發行管理 2帳務中心 3發卡系統 4加值系統 5駕駛車輛 6電子收費車道系統 【較佳實施例】 請參閱圖一,為基碼的階層式結構圖主要分成四階 層式結構之基碼管理系統,最上一層是主基碼10,其下分 別是子系統的基螞加密基碼101,111,121、通訊基碼 5 102,112,122、認證基碼103,123、工作基碼104,124、票卡基 碼113及票卡多樣化基碼114,由圖一顯示子系統分別成三 個支系,一支系由主基碼10提供系統加密,成為基碼加密 基碼101再轉成通訊基碼102提供成為認證基碼103及工作基 碼104 ;另一支系由主基碼10提供系統加密,成為基碼加 10 密基碼111再轉成通訊基碼112提供成為票卡基碼113與票卡 多樣化基碼114 ;再一支系由主基碼10提供系統加密,成 為基碼加密基碼121再轉成通訊基碼122提供成為認證基碼 123及工作基碼124。 請參閱圖二、圖三及圖四所示,係依據此階層式 15 基碼結構進而發展出本基碼管理系統伺服器11,它是由硬 體安全模組12、系統管理15單元、基碼生成與維護管理16 單元、基碼儲存管理17單元、安控卡14及端末設備安全模 組的註冊與發行管理18單元及1C卡讀寫機13組成,各單元 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱·讀背面之注意事項再填寫本頁) --------訂---------線 981 981 PA880520.DOC - 7/13 A7 B7 五、發明說明(f) 功能分述如下: (一) 硬體安全模組12 此硬體安全模組具有防制盜取基碼資料的機制,當 有不當的破壞與拆解時,内部資料將自動消除,它用以產 5 生及儲存基碼、執行各種加解密運算處理及與安控卡相互 認證,其相互認證的程序如圖(三)與圖(四)所示。 (二) 系統管理15單元 此單元設定系統功能的權限,依不同的權限而有不 同的系統執行功能,本系統共分為三個高低層次的權限, 10 最高權限為可執行安控卡發行管理、基碼生成與維護管 理、及基碼儲存管理之功能,此最高權限之執行,由兩個 人各控管一張最高權限安控卡,欲執行此權限之功能時須 兩人同時在時才可執行;次一級的權限可執行端末設備安 全模組發行管理功能;最低權限為可執行更改安控卡密 15 碼。 (三) 基碼生成與維護管理16單元 本單元包含基碼的生成、傳送、更新與銷毁,基碼 的產生是由隨機亂數產生器在硬體安全模組中生成,在基 碼生成的中間狀態及值無法以明文或其它未經保護的形式 20 存取,可避免因人為因素而導致基碼外洩。基碼的傳送是 採用三重控制(triple control)方式,首先將各子系統(如發卡 系統、加值系統)之基碼加密基碼加密分成A碼及B碼,分 別儲存在兩張安控1C卡片(A卡及B卡)内,由兩位安控人員 保管,A卡及B卡内的資料由PIN來控管;其他欲傳送的基 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂---------線赢 經濟部智慧財產局員工消費合作社印製 491981 PA880520.DOC - 8/13 Α7 Β7 五、發明說明(b) 碼(如端末設備和發卡設備之通訊基碼、認證基碼與工作 基碼,及票卡之基碼),則由各子系統之基碼加密基碼加 密後儲存在另一張安控1C卡片(C卡)内,由第三位安控人 員保管,基碼傳送是由三位安控人員同時持三張安控1C卡 5 交給各子系統的安控人員,雙方的安控人員先由A卡及B 卡復原基碼加岔基碼’再由C卡解出所需的基碼,以完成 基碼的傳送。在基碼的使用期限内,若原始的基碼有被破 解的可能時,或基碼的使用期限到期,則基碼應該更新成 新基碼,而舊的基碼則予以銷毀。 10 (四)基碼儲存管理17及分持單元 主基碼儲’存在硬體安全模組的唯寫記憶體中,同時 利用分持機密方法切成五個部份,由五位值得信賴的人員 分持保管,只有當三位以上人員到齊才可以回復主基碼; 其它基碼經主基碼加密後儲存於硬體安全模組及資料庫 15 中。其分持機密方法簡述如下·· 假設Μ是欲分持的主基碼,取一二階多項式 F(x) = ( a χΛ2 + bx + Μ ) mod P 其中a,b為任意選取的係數;P為大於a,b之大質數。 在這二階多項式中選取五個不同點,則可得五把分持 20 的子基碼。 K / - F( X /) /=1,2,.., 5 當知道其中三把子基碼,則可藉由LaGrange内差多項 式求得Μ。 當基碼管理系統遭破壞,造成基碼損毁,此單元可利 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -------------, (_請先閱讀背面之注意事項再填寫本頁)491981 PA880520.DOC-3/12 A7 B7 V. Description of the Invention (Technical Field) The present invention relates to a hierarchical structure base code management system for electronic tickets for transportation, especially the base code structure and the generation and Various encryption and decryption operations are completed in the hardware security module at one time. The program cannot be traced and the information is stolen in 5 passes. The hardware security design has a mechanism to prevent theft of base code data. When improper destruction and dismantling, the internal data will be automatically eliminated; 1C card readers are used to issue security control cards and serve as read and write devices for security control. [Prior art] 10 Security considerations in electronic ticket systems include certification of the legitimacy of terminal equipment, issuance of ticket cards and security modules, system survivability, secure encryption protection during data transmission, and secure storage of important data to avoid important data Stolen. These security considerations involve whether the management of the base code complies with the security principles. If it does not comply, it is like a very safe vault. Once the key 15 is stolen, the vault is difficult to resist the invasion of the key owner, so the base code management It is very important in the electronic ticket system. Therefore, the inventor of this case conceived a set of four-level structure of the base code tube based on the transaction security control requirements of the electronic ticket system and considering the management of the base code generation, transmission, input, use, storage, restoration, destruction, and archival 20 Management system, and was eager to innovate, and after years of painstaking research, finally successfully developed a hierarchical structure base code management system for this transportation electronic ticket. [Objective of the Invention] The purpose of the present invention is to provide a grade of paper for transportation electronic tickets which is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) ------------- ------- ^ --------- line (t Please read the notes on the back before filling this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 9 PA880520.DOC-4/13 A7 B7 V. Description of the invention (>) The layered structure base code management system has the characteristics of complying with security principles and preventing important data from being stolen during transmission. A secondary objective of the present invention is to provide a hierarchical structure base code management system for electronic tickets for transportation, so that certificates with legitimacy of terminal equipment, issuance of ticket cards and security modules, system survivability, and data transmission Security encryption protection and safe storage of important data. [Technical content] Hierarchical structure base code management system for transportation electronic tickets that can achieve the above-mentioned new purpose. A four-level structure base code management system is specially conceived. The top layer is the main base code, and the bottom is The base code encryption base code, communication base code, working base code, and diversified base code of the subsystem are shown in Figure (1). Based on this hierarchical base code structure, this base code management system was developed. It consists of a hardware security module, a system management unit, a base code generation and maintenance management unit, a base code storage management unit, a security card, and end-device security. 15 Module registration and issuance management unit and 1C card reader, as shown in Figure (2). [Brief description of the drawings] Please refer to the following detailed description of a preferred embodiment of the present invention and the accompanying drawings for further understanding of the technical content of the present invention and its effects. 20 The drawings related to this embodiment are: The first is the hierarchical structure diagram of the base code of the present invention; the second is the architecture diagram of the electronic ticket base code management system; the third is the flowchart of the security card authentication hardware security module; the fourth is the hardware security module authentication security Control card flow chart; and -4- This paper size is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) Please read the note on the back page of δ. Intellectual Property Bureau, Ministry of Economic Affairs, Employee Consumption Cooperatives, printed clothing 491981 PA880520 .DOC-5/12 A7 B7 printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economics) Figure 5 is a schematic diagram of an example of the application of a hierarchical structure base code management system. [Representative symbols of main parts] 1 base code management system 10 main base code 101 base code encryption base code 102 communication base code 103 authentication base code 104 working base code 11 base code management system server 111 base code encryption base code 112 communication base code 113 ticket card base code 114 ticket card diversified base code 12 hardware security module 121 base code encryption base code 122 communication base code 123 authentication base code 124 working base code 13 1C card reader 14 security control card 15 system management 16 Base code generation and maintenance management 17 Base code storage management This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the precautions on the back before filling this page) 491981 PA880520.DOC-6 / 13 Printed by A7 B7, Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 Invention Description (L /) 18 Registration and Issuance Management of Terminal Equipment Security Modules 2 Accounting Center 3 Card Issuing System 4 Value-added System 5 Driving Vehicles 6 Electronic Toll Lane System Preferred embodiment] Please refer to FIG. 1. This is a hierarchical structure diagram of the base code. The base code management system is mainly divided into a four-level structure. The top layer is the main base code 10, and the base is the base encryption base code of the subsystem. 101, 1 11, 121, communication base code 5 102, 112, 122, authentication base code 103, 123, work base code 104, 124, ticket card base code 113, and ticket card diversification base code 114. Three branches, one is provided by the main base code 10 for system encryption, which becomes the base code encryption base code 101, which is then converted into the communication base code 102 and provided as the authentication base code 103 and the working base code 104; the other is provided by the main base. Code 10 provides system encryption, which becomes the base code plus 10. The secret base code 111 is then converted into a communication base code 112 and is provided as a ticket card base code 113 and a ticket card diversified base code 114. Another system is provided by the main base code 10 for system encryption. The encrypted base code 121 becomes the communication base code 122 and is provided as the authentication base code 123 and the working base code 124. Please refer to Figure 2, Figure 3 and Figure 4. Based on this hierarchical 15 base code structure, this base code management system server 11 is developed. It consists of hardware security module 12, system management 15 units, base Code generation and maintenance management 16 units, base code storage management 17 units, security control card 14 and registration and issuance management of terminal equipment security modules 18 units and 1C card reader 13 and each unit is based on Chinese national standards (CNS) A4 specification (210 X 297 mm) (Please read and read the notes on the back before filling this page) -------- Order --------- line 981 981 PA880520. DOC-7/13 A7 B7 V. Description of the Invention (f) The functions are described as follows: (1) Hardware security module 12 This hardware security module has a mechanism to prevent theft of base code data, and there is improper damage When disassembling and disassembling, the internal data will be automatically deleted. It is used to generate and store the base code, perform various encryption and decryption operations and mutual authentication with the security control card. The procedures for mutual authentication are shown in Figure (3) and Figure (4). ). (II) System Management Unit 15 This unit sets the system function permissions. There are different system execution functions according to different permissions. The system is divided into three high-level and low-level permissions. 10 The highest permission is the execution of security card management. , Base code generation and maintenance management, and base code storage management functions. The execution of this highest authority is controlled by two people each with a highest authority security control card. To perform the functions of this authority, two people must be present at the same time. Only the next level of authority can execute the terminal device security module issuance management function; the minimum authority is the ability to change the security control card secret 15 codes. (III) Base code generation and maintenance management 16 units This unit contains the generation, transmission, update and destruction of base code. The base code generation is generated by the random random number generator in the hardware security module and generated in the base code. Intermediate states and values cannot be accessed in clear text or other unprotected form20, which can prevent the leakage of base codes due to human factors. The base code is transmitted using triple control. First, the base code encryption of each subsystem (such as the card issuing system and value-added system) is encrypted into A code and B code, which are stored in two security control 1C. The cards (A and B cards) are kept by two security personnel, and the data in the A and B cards are controlled by the PIN; other basic paper sizes to be transmitted apply the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the notes on the back before filling out this page) Order --------- Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 491981 PA880520.DOC-8/13 Α7 Β7 V. Description of the invention (b) Codes (such as the communication base code, authentication base code and work base code of the terminal equipment and card issuing equipment, and the base code of the ticket card) are stored after being encrypted by the base code encryption base code of each subsystem In another security control 1C card (C card), it is kept by the third security control personnel, and the base code transmission is carried out by three security control personnel holding three security control 1C cards 5 at the same time to the security control of each subsystem Personnel, the security control personnel on both sides shall be restored by the A card and the B card. Desired base code, the base code to complete the transfer. During the use period of the base code, if the original base code is likely to be broken, or the base code's use period expires, the base code should be updated to the new base code, and the old base code will be destroyed. 10 (IV) Base code storage management 17 and the main base code storage of the split-unit unit are stored in the write-only memory of the hardware security module, and are divided into five parts by using the split-secret method. The personnel are kept separately. Only when more than three people arrive, the main base code can be restored. The other base codes are encrypted in the main base code and stored in the hardware security module and database 15. The method of separating secrets is briefly described below. Assuming that M is the main base code to be divided, take a first- and second-order polynomial F (x) = (a χΛ2 + bx + Μ) mod P where a and b are arbitrarily selected coefficients. ; P is a large prime number greater than a, b. By choosing five different points in this second-order polynomial, you can get five subbases with a score of 20. K /-F (X /) / = 1,2, .., 5 When three of the subbase codes are known, then M can be obtained by LaGrange's internal difference polynomial. When the base code management system is damaged, causing the base code to be damaged, this unit can be used in accordance with the Chinese National Standard (CNS) A4 specification (210 X 297 mm). -------------, (_Please read the notes on the back before filling this page)
訂---------線L 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491981 A7 B7_PA88Q52Q.DOC - 9/13 五、發明說明) 用備份的程式及分持機密的理論,由三位擁有分持基碼的 人員結合以回復主基碼,之後再由主基碼對儲存在資料庫 中的基碼于以解密,以復原其他的基碼。 (五)安控卡14和端末設備安全模組的註冊與發行管 5 理18單元 A. 安控卡的發行流程如下列步驟所示: 1. 認證發卡端末認證基碼。 2. 產生卡片母檔(MF)下所有基碼檔與資料檔 並寫入貢料。 10 3.產生卡片母檔(MF)下所有基碼檔與資料檔 並寫入資料。 4. 產生卡片專屬應用檔(DF)下所有基碼檔與 資料檔並寫入資料。 5. 在產生並寫入基碼槽後驗證該基碼以確保 15 基碼資料無誤。 6. 直到格式化完畢。 7. 記錄每張發行之安控卡的卡號及發卡曰期 時間。 B. 端末設備安全模組的註冊與發行流程如下列步 20 驟所示: 1. 啟用安全模組。 2. 建立安全模組交談關係。 3. 變更端末設備主基碼。 4. 寫入亂碼基碼資料。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ----------------------------- c請先•閱讀背面之注意事項再填寫本頁) A7五、發明說明( B7 PA88Q520.D〇n _ 10/13 5 10 15 經濟部智慧財產局員工消費合作社印製 20 5·中斷安全模組交談關係。 6·記錄每㈣末設備安全触的編號及發行 曰期時間。 (六)1C卡讀寫機13 1C卡讀寫機13用以發行安 作安全控管的讀寫設備。 t力值母卡及县 五所示’為基碼管理系統则在電子收 L車逼糸統6的典型實施例,該基碼管理系統i開始運作時 ^巴相關基碼事⑽送錢務中心2,及發卡系統3與加值 乐統4,作為認證辨識用,如此加值系統4與電子收費車道 系統6才可對駕駛車輛5進行加值與收費的服務,並且提供 帳矛^心2正確的資料作帳。例如駕敬車輛5向發卡系統3 取仔發行票卡,此時發卡系統3會將票卡發行資料傳送到 帳務中心2 ’作為駕馱車輛5通過收費站時扣繳通行費,或 進行票卡加值時的資料認證、比對 '扣款及入款作業。以 域碼管理系⑻加人作業系統中將可提高資料傳送時的 安全性及可靠性,是為極佳之實施例。 【特點及功效】 …本發明所提供之交通運輸電子票證之階層式結構基碼 ί理系統,具有下列之優點: > 1·在電子票證系統中資料傳輸時,因附有安全加密保 達及重要資料的安全儲存,可避免重要㈣被竊取,具有 完整的安全考量。 2·在電子票證系統之交易安全控管中,由基碼生成、 -10- 意 事 項 再 填鳥1 m 頁i 訂 線 ^氏張尺度適用中^^標準(CNS)A4規格 491981 A7 ~-----PA880520 DQC. 1 五、發明朗(Cj ) ' 專迖輪入、使用、儲存、復原、毀壞到存檔等階段的管 里係為一套四階層式結構之基碼管理系統所完成,安 性極為可靠。 上列詳細說明係針對本發明之一可行實施例之呈心兒 5明,惟該實施例並非用以限制本發明之專利範圍,凡未脫 離本發明技藝精神所為之等效實施或變更,均應包含於 案之專利範圍中。 、 、綜上所述,本案不但在空間型態上確屬創新,並能增 進上述多項功效,應已充分符合新穎性及進步性之法— 10明專利要件,麦依法提出申請,懇請貴局核准本件= 專利申請案,以勵發明,至感德便。 ------------— - (請先閱讀背面之注意事項再填寫本頁) 訂---------ΑΨ 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 χ 297公釐)Order --------- Line L Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491981 A7 B7_PA88Q52Q.DOC-9/13 V. Description of the invention And the theory of sub-holding secrets, three people with sub-holding base codes are combined to restore the main base code, and then the main base code is used to decrypt the base code stored in the database to restore other base codes. (V) Registration and issuance management of security control card 14 and terminal equipment security module 5 Management of unit 18 A. The issuing process of security control card is shown in the following steps: 1. Authentication card end-end authentication base code. 2. Generate all base code files and data files under the card master file (MF) and write them to the tribute. 10 3. Generate all base code files and data files under the card master file (MF) and write the data. 4. Generate all base code files and data files under the card-specific application file (DF) and write the data. 5. After the base code slot is generated and written, verify the base code to ensure that the 15 base code data is correct. 6. Until formatting is complete. 7. Record the card number and date of issue of each security control card issued. B. The registration and issuance process of the terminal device security module is shown in the following step 20: 1. Enable the security module. 2. Establish a security module conversation. 3. Change the terminal base code. 4. Write garbled base code data. This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ----------------------------- cPlease • Read the notes on the back before filling out this page) A7 V. Invention description (B7 PA88Q520.D0n _ 10/13 5 10 15 Printed by the Intellectual Property Bureau Employee Consumer Cooperatives of the Ministry of Economic Affairs 20 5 · Interrupt the security module conversation 6. Record the serial number and date of issue of the device's secure touch at the end of each period. (Six) 1C card reader 13 The 1C card reader 13 is used to issue read and write equipment for security control. The card and county five are shown as a typical embodiment of the base code management system in the electronic collection system 6. When the base code management system i starts to operate, the relevant base code is sent to the money center 2, and The card issuing system 3 and the value-added music system 4 are used for authentication and identification. In this way, the value-added system 4 and the electronic toll lane system 6 can provide value-added and charging services to the driving vehicle 5 and provide the correct information of the account 2 For example, driving the vehicle 5 to obtain a ticket card from the card issuing system 3, at this time the card issuing system 3 will transmit the ticket card issuing data to the account center 2 'as a driving car The vehicle 5 withholds the toll when it passes the toll station, or performs data authentication, comparison, and debit operations when the card is recharged. The domain code management system can be added to the operating system to improve data transmission. The security and reliability are excellent examples. [Features and Effects]… The hierarchical structure base code management system of the electronic ticket for transportation provided by the present invention has the following advantages: > 1 · 在 电子When the data in the ticket system is transmitted, because it is secured with secure encryption and secure storage of important data, it is possible to avoid theft of important documents and have complete security considerations. 2. In the transaction security control of the electronic ticket system, the base code Generate, -10- Matter and fill in the bird 1m page i ^ ^ Zhang scale applicable in the standard ^^ standard (CNS) A4 specifications 491981 A7 ~ ----- PA880520 DQC. 1 V. Invention (Cj) ' The tube which is specialized in the stages of rotation, use, storage, restoration, destruction, and archiving is completed by a set of four-level structured base code management system with extremely reliable security. The detailed description above is directed to one of the inventions The heart of a feasible embodiment 5 However, this embodiment is not intended to limit the patent scope of the present invention. Any equivalent implementation or change that does not depart from the technical spirit of the present invention should be included in the patent scope of the case. In summary, this case is not only in It is indeed an innovation in space type and can enhance the above-mentioned multiple effects. It should have fully met the novelty and progressiveness method—10 patent requirements, and Mai applied for it according to law. We ask your office to approve this piece = patent application to encourage invention. ———————— (Please read the notes on the back before filling this page) Order --------- ΑΨ Staff of Intellectual Property Bureau, Ministry of Economic Affairs The paper size printed by the consumer cooperative is applicable to China National Standard (CNS) A4 (210 x 297 mm)