CN104484698B - A kind of based on many application processes of the CPU card for consuming key more - Google Patents
A kind of based on many application processes of the CPU card for consuming key more Download PDFInfo
- Publication number
- CN104484698B CN104484698B CN201410768631.8A CN201410768631A CN104484698B CN 104484698 B CN104484698 B CN 104484698B CN 201410768631 A CN201410768631 A CN 201410768631A CN 104484698 B CN104484698 B CN 104484698B
- Authority
- CN
- China
- Prior art keywords
- public key
- cpu card
- key
- module
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention belongs to CPU card applied technical field, there is provided a kind of based on many application processes of the CPU card for consuming key more, including:Operation program is solidificated in signal processing module, multiple pseudo-random sequences, fascination key and private key is produced;Signal processing module order consumption module is initialized;The user identity that command control unit is read in CPU card again is proved and card number;Pass to public key module again, calculate CPU card public key cryptography;Signal processing module can read different user identity prove, card number, consumption time, terminal number and MAC Address, obtain multiple public key cryptographies, one-time-consumption can be recorded automatically, and pass to data memory module and being stored.The present invention has and simultaneously loads multiple consumption keys in a CPU card application, and each consumption key when being consumed separate records consumption count so that an application can be consumed in multiple systems simultaneously, realize many application purposes, the characteristics of simple to operate.
Description
Technical field
The invention belongs to CPU card applied technical field, more particularly to insurance, traffic police, government industry, finance, traffic, business
The fields such as industry, aviation a kind of based on many application processes of the CPU card for consuming key more.
Background technology
CPU card is applied to the multiple fields such as finance, insurance, traffic police, government industry, with user's space greatly, reading speed
The features such as hurry up, support one card for multiple uses;With the continuous expansion of CPU card application, CPU card technology is constantly ripe, CPU card on market
Type and quantity are all being on the increase, a mass transit card one, and the CPU card in the whole nation alreadys exceed 800,000,000.
As financial IC card snaps into the excessive of CPU card from magnetic stripe, the storage of CPU card further will increase.CPU card quantity
Increase, increasing for application will cause the increasing number that holds of each user, be user for the use of CPU card brings not
Just, therefore multi-application card or all-purpose card become the content that CPU card project will be related to, for example, the band finance of portion of people society distribution
The social security card of function, the residents ' health of Ministry of Public Health's distribution are stuck on Specification Design and all consider the problem that applies a card more.
Existing CPU card supports that the mode of many applications is all that each application adopts one using multiple application logic isolations
There is an independent security domain, this kind of mode to have for DDF DDF or automatic position search engine ADF, each application
Following shortcoming:(1) when making the multi-application card that issues in this way, as each application adopts independent security domain, with one
The independent key of set, is therefore required for redeploying new division operation POS when deployment is implemented, replaces original system
POS, so as to support multiple applications on new POS, the CPU card of corresponding existed system is often replaced using recovery or in POS
Upper individually exploitation has CPU card, there is a problem of that compatible existed system is difficult, relatively costly;(2) when multiple applications have offline
Stored value card, electronic cash or during electronic bankbook, user is the offline wallet balances using multiple applications, generally require with
To each wallet will have the amount of money, exist in-convenience in use, cause user's fund waste, be unfavorable for user using ask
Topic;(3), in many application consumption flow processs of existing CPU card, the consumer need of multiple applications selects multiple ADF, and before consuming
It is required to judge whether the wallet balances in various applications disclosure satisfy that spending amount, the wallet amount of money in multiple applications can not
General;And when needing to improve the situation that this remaining sum can not be general, need POS to carry out extra circle and carry, enclose to deposit etc. and operate, step
More, to implement to replicate, the system of current operation is not applied substantially.
Therefore, CPU card applied technical field is badly in need of one kind in a CPU card application while loading multiple consumption keys,
And separate records consumption when each consumption key is consumed is counted so that an application can disappear in multiple systems simultaneously
Take, realize many application purposes, simple to operate based on many application processes of the CPU card for consuming key more.
Content of the invention
The invention provides a kind of based on many application processes of the CPU card for consuming key, technical scheme is as follows more:
A kind of based on many application processes of the CPU card for consuming key more, it is characterised in that comprise the steps:
Step one, operation program is solidificated in signal processing module in binary form, then will be produced by chaotic maps
Raw pseudo-random sequence, fascination key and private key are all solidificated in public key module in binary form;
Step 2, repeat step more than times so as to produce multiple pseudo-random sequences, fascination key and private key, and difference
It is solidificated in public key module with binary form;
Step 3, when CPU card is in consumption status, signal processing module order consumption module is initialized;
Step 4, after the completion of initial work, signal processing module command control unit reads the user identity in CPU card
Prove and card number;
Step 5, signal processing module proves the user identity for reading and card number passes to public key module, public key mould
Block proves the public key cryptography for calculating CPU card with card number according to user identity;
Step 6, when CPU card is consumed on different machines, signal processing module can read different users
Proof of identification, card number, consumption time, terminal number and MAC Address, are operated according to step 5, and public key module is according to user's body
Part proves and card number can obtain multiple public key cryptographies, often produces a public key cryptography, and CPU card can record one-time-consumption automatically, disappear
Take number of times to be constantly overlapped, and pass to data memory module and stored;
Step 7, when the consumer record to CPU card carries out reconciliation, it is only necessary to which signal processing module called data stores mould
Corresponding MAC Address below multiple public key cryptographies in block, you can whether effectively to judge consumer record, and can check
Obtain the concrete consumption information corresponding to specific public key cryptography.
A kind of based on many application processes of the CPU card for consuming key as above more, wherein, in step 5 public key module according to
Prove according to user identity and card number calculates the public key cryptography of CPU card and comprises the following steps that:
First, public key is calculated and realizes that public key is with times point addition on elliptic curve:
Wherein, IPK represents public key,The corresponding value of element in public key matrix is represented, according to the difference of ID, configuration
Different coefficients, produces different users, and then produces different chaotic maps, according to public key, further draw SciPseudo- with
Machine sequence.
The invention has the beneficial effects as follows:In the same application of same CPU card, increase multiple consumption keys, reach
To the purpose of CPU card many applications in multiple parallel systems, on the basis of security, availability is not reduced, use is solved
Card multiple offline wallets in family need the problem that independently supplements with money;When also solving system deployment upgrading, the compatibility to original system
Cost is less, and can also enable new legacy system in the period of certain while operation, solves system upgrade and compatibility is old
The difficult problem of card.
Description of the drawings
With reference to the accompanying drawings and detailed description describing the present invention in detail:
Fig. 1 is a kind of flow chart based on many application processes of the CPU card for consuming key of the present invention more.
Specific embodiment
In order that measure, creation characteristic, reached purpose and effect that the technology of the present invention is realized are easy to understand, tie below
Conjunction is specifically illustrating, and the present invention is expanded on further.
Fig. 1 is a kind of flow chart based on many application processes of the CPU card for consuming key of the present invention more.
Step one, operation program is solidificated in signal processing module in binary form, then will be produced by chaotic maps
Raw pseudo-random sequence, fascination key and private key are all solidificated in public key module in binary form;
Step 2, repeat step more than times so as to produce multiple pseudo-random sequences, fascination key and private key, and difference
It is solidificated in public key module with binary form;
Step 3, when CPU card is in consumption status, signal processing module order consumption module is initialized;
Step 4, after the completion of initial work, signal processing module command control unit reads the user identity in CPU card
Prove and card number;
The user identity for reading and card number are passed to public key module by step 5, signal processing module, public key module according to
Prove the public key cryptography that CPU card is calculated with card number according to user identity, comprise the following steps that:
First, public key is calculated and realizes that public key is with times point addition on elliptic curve:
Wherein, IPK represents public key,The corresponding value of element in public key matrix is represented, according to the difference of ID, configuration
Different coefficients, produces different users, and then produces different chaotic maps, according to public key, further draw SciPseudo- with
Machine sequence;.
Step 6, when CPU card is consumed on different machines, signal processing module can read different users
Proof of identification, card number, consumption time, terminal number and MAC Address, are operated according to step 5, and public key module is according to user's body
Part proves and card number can obtain multiple public key cryptographies, often produces a public key cryptography, and CPU card can record one-time-consumption automatically, disappear
Take number of times to be constantly overlapped, and pass to data memory module and stored;
Step 7, when the consumer record to CPU card carries out reconciliation, it is only necessary to which signal processing module called data stores mould
Corresponding MAC Address below multiple public key cryptographies in block, you can whether effectively to judge consumer record, and can check
Obtain the concrete consumption information corresponding to specific public key cryptography.
The present invention in the same application of same CPU card increases multiple consumption keys, reaches CPU card multiple
The purpose of many applications in parallel system, on the basis of security, availability is not reduced, solves user's card multiple offline
Wallet needs the problem that independently supplements with money;When also solving system deployment upgrading, the compatible cost to original system is less, and
New legacy system can be enabled in the period of certain while operation, solves the problems, such as that system upgrade and compatible old card are difficult.
General principle, principal character and the advantages of the present invention of the present invention has been shown and described above.The technology of the industry
Personnel it should be appreciated that the present invention is not restricted to the described embodiments, simply explanation described in above-described embodiment and specification this
The principle of invention, without departing from the spirit and scope of the present invention the present invention also have various changes and modifications, these change
Change and improvement is both fallen within scope of the claimed invention.The claimed scope of the invention by appending claims and its
Equivalent is defined.
Claims (2)
1. a kind of based on many application processes of the CPU card for consuming key, it is characterised in that to comprise the steps more:
Step one, operation program is solidificated in signal processing module in binary form, then will be produced by chaotic maps
Pseudo-random sequence, fascination key and private key are all solidificated in public key module in binary form;
Step 2, repeating said steps more than times so as to produce multiple pseudo-random sequences, fascination key and private key, and difference
It is solidificated in the public key module with binary form;
Step 3, when CPU card is in consumption status, the signal processing module order consumption module initialization;
Step 4, after the completion of initial work, the signal processing module command control unit reads the user in the CPU card
Proof of identification and card number;
Step 5, the signal processing module proves the user identity for reading and card number passes to public key module, the public affairs
Key module proves the public key cryptography for calculating CPU card with card number according to user identity;
Step 6, when the CPU card is consumed on different machines, the signal processing module can read different
User identity is proved, card number, consumption time, terminal number and MAC Address, is operated according to the step 5, public key module according to
Prove according to user identity and card number can obtain multiple public key cryptographies, often produce a public key cryptography, the CPU card can be recorded automatically
One-time-consumption, consumption number of times are constantly overlapped, and pass to data memory module and stored;
Step 7, when the consumer record to the CPU card carries out reconciliation, it is only necessary to which signal processing module is transferred the data and deposited
Corresponding MAC Address below multiple public key cryptographies in storage module, you can whether effectively to judge consumer record, and can
Check the concrete consumption information for obtaining corresponding to specific public key cryptography.
2. according to claim 1 a kind of based on many application processes of the CPU card for consuming key, it is characterised in that described more
In step 5, public key module calculates comprising the following steps that for the public key cryptography of CPU card according to user identity proof and card number:
First, public key is calculated and realizes that public key is with times point addition on elliptic curve:
Wherein, IPK represents public key,The corresponding value of element in public key matrix is represented, according to the difference of ID, configuration is different
Coefficient, produce different users, and then produce different chaotic maps, according to public key, further draw SciPseudorandom sequence
Row.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410768631.8A CN104484698B (en) | 2014-12-12 | 2014-12-12 | A kind of based on many application processes of the CPU card for consuming key more |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410768631.8A CN104484698B (en) | 2014-12-12 | 2014-12-12 | A kind of based on many application processes of the CPU card for consuming key more |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104484698A CN104484698A (en) | 2015-04-01 |
CN104484698B true CN104484698B (en) | 2017-03-15 |
Family
ID=52759239
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410768631.8A Active CN104484698B (en) | 2014-12-12 | 2014-12-12 | A kind of based on many application processes of the CPU card for consuming key more |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104484698B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102044114A (en) * | 2010-06-29 | 2011-05-04 | 北京飞天诚信科技有限公司 | Method for consuming electronic wallet |
CN104077511A (en) * | 2014-07-09 | 2014-10-01 | 上海象形通讯科技有限公司 | Non-contact processor card based on combined public key authentication and use method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7233926B2 (en) * | 2000-03-07 | 2007-06-19 | Thomson Licensing | Electronic wallet system with secure inter-purses operations |
-
2014
- 2014-12-12 CN CN201410768631.8A patent/CN104484698B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102044114A (en) * | 2010-06-29 | 2011-05-04 | 北京飞天诚信科技有限公司 | Method for consuming electronic wallet |
CN104077511A (en) * | 2014-07-09 | 2014-10-01 | 上海象形通讯科技有限公司 | Non-contact processor card based on combined public key authentication and use method |
Also Published As
Publication number | Publication date |
---|---|
CN104484698A (en) | 2015-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10789530B2 (en) | Neural embeddings of transaction data | |
CN104391725B (en) | Page display method and page presentation device | |
CN105260404B (en) | The method and apparatus of storage time sequence data | |
CN110648138B (en) | Transaction query and transaction data processing method, device and equipment based on block chain | |
EP3321819A1 (en) | Device, method and program for securely reducing an amount of records in a database | |
CN105931065B (en) | Method and device for processing client group characteristic data | |
CN105205508A (en) | Self-service card issuing machine for intelligent card | |
EP2674898A1 (en) | Improved serialization of RFID tags | |
CN102567818A (en) | Method for generating order bill of material and system thereof | |
CN105095306A (en) | Operating method and device based on associated objects | |
CN105446990A (en) | Service data processing method and equipment | |
US20160125337A1 (en) | Transaction derived in-business probability modeling apparatus and method | |
CN104915440A (en) | Commodity de-duplication method and system | |
CN111026758B (en) | Electronic ticket issuing method and device | |
CN103226610A (en) | Method and device for querying database table | |
CN105183949A (en) | Railway main data cleaning method and system | |
CN107729330A (en) | The method and apparatus for obtaining data set | |
CN104484698B (en) | A kind of based on many application processes of the CPU card for consuming key more | |
CN102521746B (en) | Safely-consuming smart card and method thereof | |
CN110717814B (en) | Method and device for generating risk message | |
CN108304469A (en) | Method and apparatus for character string fuzzy matching | |
CN105608103A (en) | Transforming method and device of data storing structure | |
CN110209349A (en) | The method and terminal device of data processing | |
CN105830105A (en) | A method for electrically personalizing a payment chip and a payment chip | |
CN105930534B (en) | A kind of fragmentation of data reduction method based on cloud storage service price |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 201416 Shanghai city Fengxian District new temple town Muhua Road No. 500 C District 26 room Applicant after: Shanghai Polytron Technologies Inc Address before: 201206, room 2, No. 289, Lane 1810, zhe Qiao Road, Shanghai, Pudong New Area Applicant before: Shanghai pictograph communication Science and Technology Ltd. |
|
COR | Change of bibliographic data | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |