CN104484698B - A kind of based on many application processes of the CPU card for consuming key more - Google Patents

A kind of based on many application processes of the CPU card for consuming key more Download PDF

Info

Publication number
CN104484698B
CN104484698B CN201410768631.8A CN201410768631A CN104484698B CN 104484698 B CN104484698 B CN 104484698B CN 201410768631 A CN201410768631 A CN 201410768631A CN 104484698 B CN104484698 B CN 104484698B
Authority
CN
China
Prior art keywords
public key
cpu card
key
module
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410768631.8A
Other languages
Chinese (zh)
Other versions
CN104484698A (en
Inventor
曹喆佶
聂明
赵飞
陈浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Polytron Technologies Inc
Original Assignee
Shanghai Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Polytron Technologies Inc filed Critical Shanghai Polytron Technologies Inc
Priority to CN201410768631.8A priority Critical patent/CN104484698B/en
Publication of CN104484698A publication Critical patent/CN104484698A/en
Application granted granted Critical
Publication of CN104484698B publication Critical patent/CN104484698B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention belongs to CPU card applied technical field, there is provided a kind of based on many application processes of the CPU card for consuming key more, including:Operation program is solidificated in signal processing module, multiple pseudo-random sequences, fascination key and private key is produced;Signal processing module order consumption module is initialized;The user identity that command control unit is read in CPU card again is proved and card number;Pass to public key module again, calculate CPU card public key cryptography;Signal processing module can read different user identity prove, card number, consumption time, terminal number and MAC Address, obtain multiple public key cryptographies, one-time-consumption can be recorded automatically, and pass to data memory module and being stored.The present invention has and simultaneously loads multiple consumption keys in a CPU card application, and each consumption key when being consumed separate records consumption count so that an application can be consumed in multiple systems simultaneously, realize many application purposes, the characteristics of simple to operate.

Description

A kind of based on many application processes of the CPU card for consuming key more
Technical field
The invention belongs to CPU card applied technical field, more particularly to insurance, traffic police, government industry, finance, traffic, business The fields such as industry, aviation a kind of based on many application processes of the CPU card for consuming key more.
Background technology
CPU card is applied to the multiple fields such as finance, insurance, traffic police, government industry, with user's space greatly, reading speed The features such as hurry up, support one card for multiple uses;With the continuous expansion of CPU card application, CPU card technology is constantly ripe, CPU card on market Type and quantity are all being on the increase, a mass transit card one, and the CPU card in the whole nation alreadys exceed 800,000,000.
As financial IC card snaps into the excessive of CPU card from magnetic stripe, the storage of CPU card further will increase.CPU card quantity Increase, increasing for application will cause the increasing number that holds of each user, be user for the use of CPU card brings not Just, therefore multi-application card or all-purpose card become the content that CPU card project will be related to, for example, the band finance of portion of people society distribution The social security card of function, the residents ' health of Ministry of Public Health's distribution are stuck on Specification Design and all consider the problem that applies a card more.
Existing CPU card supports that the mode of many applications is all that each application adopts one using multiple application logic isolations There is an independent security domain, this kind of mode to have for DDF DDF or automatic position search engine ADF, each application Following shortcoming:(1) when making the multi-application card that issues in this way, as each application adopts independent security domain, with one The independent key of set, is therefore required for redeploying new division operation POS when deployment is implemented, replaces original system POS, so as to support multiple applications on new POS, the CPU card of corresponding existed system is often replaced using recovery or in POS Upper individually exploitation has CPU card, there is a problem of that compatible existed system is difficult, relatively costly;(2) when multiple applications have offline Stored value card, electronic cash or during electronic bankbook, user is the offline wallet balances using multiple applications, generally require with To each wallet will have the amount of money, exist in-convenience in use, cause user's fund waste, be unfavorable for user using ask Topic;(3), in many application consumption flow processs of existing CPU card, the consumer need of multiple applications selects multiple ADF, and before consuming It is required to judge whether the wallet balances in various applications disclosure satisfy that spending amount, the wallet amount of money in multiple applications can not General;And when needing to improve the situation that this remaining sum can not be general, need POS to carry out extra circle and carry, enclose to deposit etc. and operate, step More, to implement to replicate, the system of current operation is not applied substantially.
Therefore, CPU card applied technical field is badly in need of one kind in a CPU card application while loading multiple consumption keys, And separate records consumption when each consumption key is consumed is counted so that an application can disappear in multiple systems simultaneously Take, realize many application purposes, simple to operate based on many application processes of the CPU card for consuming key more.
Content of the invention
The invention provides a kind of based on many application processes of the CPU card for consuming key, technical scheme is as follows more:
A kind of based on many application processes of the CPU card for consuming key more, it is characterised in that comprise the steps:
Step one, operation program is solidificated in signal processing module in binary form, then will be produced by chaotic maps Raw pseudo-random sequence, fascination key and private key are all solidificated in public key module in binary form;
Step 2, repeat step more than times so as to produce multiple pseudo-random sequences, fascination key and private key, and difference It is solidificated in public key module with binary form;
Step 3, when CPU card is in consumption status, signal processing module order consumption module is initialized;
Step 4, after the completion of initial work, signal processing module command control unit reads the user identity in CPU card Prove and card number;
Step 5, signal processing module proves the user identity for reading and card number passes to public key module, public key mould Block proves the public key cryptography for calculating CPU card with card number according to user identity;
Step 6, when CPU card is consumed on different machines, signal processing module can read different users Proof of identification, card number, consumption time, terminal number and MAC Address, are operated according to step 5, and public key module is according to user's body Part proves and card number can obtain multiple public key cryptographies, often produces a public key cryptography, and CPU card can record one-time-consumption automatically, disappear Take number of times to be constantly overlapped, and pass to data memory module and stored;
Step 7, when the consumer record to CPU card carries out reconciliation, it is only necessary to which signal processing module called data stores mould Corresponding MAC Address below multiple public key cryptographies in block, you can whether effectively to judge consumer record, and can check Obtain the concrete consumption information corresponding to specific public key cryptography.
A kind of based on many application processes of the CPU card for consuming key as above more, wherein, in step 5 public key module according to Prove according to user identity and card number calculates the public key cryptography of CPU card and comprises the following steps that:
First, public key is calculated and realizes that public key is with times point addition on elliptic curve:
Wherein, IPK represents public key,The corresponding value of element in public key matrix is represented, according to the difference of ID, configuration Different coefficients, produces different users, and then produces different chaotic maps, according to public key, further draw SciPseudo- with Machine sequence.
The invention has the beneficial effects as follows:In the same application of same CPU card, increase multiple consumption keys, reach To the purpose of CPU card many applications in multiple parallel systems, on the basis of security, availability is not reduced, use is solved Card multiple offline wallets in family need the problem that independently supplements with money;When also solving system deployment upgrading, the compatibility to original system Cost is less, and can also enable new legacy system in the period of certain while operation, solves system upgrade and compatibility is old The difficult problem of card.
Description of the drawings
With reference to the accompanying drawings and detailed description describing the present invention in detail:
Fig. 1 is a kind of flow chart based on many application processes of the CPU card for consuming key of the present invention more.
Specific embodiment
In order that measure, creation characteristic, reached purpose and effect that the technology of the present invention is realized are easy to understand, tie below Conjunction is specifically illustrating, and the present invention is expanded on further.
Fig. 1 is a kind of flow chart based on many application processes of the CPU card for consuming key of the present invention more.
Step one, operation program is solidificated in signal processing module in binary form, then will be produced by chaotic maps Raw pseudo-random sequence, fascination key and private key are all solidificated in public key module in binary form;
Step 2, repeat step more than times so as to produce multiple pseudo-random sequences, fascination key and private key, and difference It is solidificated in public key module with binary form;
Step 3, when CPU card is in consumption status, signal processing module order consumption module is initialized;
Step 4, after the completion of initial work, signal processing module command control unit reads the user identity in CPU card Prove and card number;
The user identity for reading and card number are passed to public key module by step 5, signal processing module, public key module according to Prove the public key cryptography that CPU card is calculated with card number according to user identity, comprise the following steps that:
First, public key is calculated and realizes that public key is with times point addition on elliptic curve:
Wherein, IPK represents public key,The corresponding value of element in public key matrix is represented, according to the difference of ID, configuration Different coefficients, produces different users, and then produces different chaotic maps, according to public key, further draw SciPseudo- with Machine sequence;.
Step 6, when CPU card is consumed on different machines, signal processing module can read different users Proof of identification, card number, consumption time, terminal number and MAC Address, are operated according to step 5, and public key module is according to user's body Part proves and card number can obtain multiple public key cryptographies, often produces a public key cryptography, and CPU card can record one-time-consumption automatically, disappear Take number of times to be constantly overlapped, and pass to data memory module and stored;
Step 7, when the consumer record to CPU card carries out reconciliation, it is only necessary to which signal processing module called data stores mould Corresponding MAC Address below multiple public key cryptographies in block, you can whether effectively to judge consumer record, and can check Obtain the concrete consumption information corresponding to specific public key cryptography.
The present invention in the same application of same CPU card increases multiple consumption keys, reaches CPU card multiple The purpose of many applications in parallel system, on the basis of security, availability is not reduced, solves user's card multiple offline Wallet needs the problem that independently supplements with money;When also solving system deployment upgrading, the compatible cost to original system is less, and New legacy system can be enabled in the period of certain while operation, solves the problems, such as that system upgrade and compatible old card are difficult.
General principle, principal character and the advantages of the present invention of the present invention has been shown and described above.The technology of the industry Personnel it should be appreciated that the present invention is not restricted to the described embodiments, simply explanation described in above-described embodiment and specification this The principle of invention, without departing from the spirit and scope of the present invention the present invention also have various changes and modifications, these change Change and improvement is both fallen within scope of the claimed invention.The claimed scope of the invention by appending claims and its Equivalent is defined.

Claims (2)

1. a kind of based on many application processes of the CPU card for consuming key, it is characterised in that to comprise the steps more:
Step one, operation program is solidificated in signal processing module in binary form, then will be produced by chaotic maps Pseudo-random sequence, fascination key and private key are all solidificated in public key module in binary form;
Step 2, repeating said steps more than times so as to produce multiple pseudo-random sequences, fascination key and private key, and difference It is solidificated in the public key module with binary form;
Step 3, when CPU card is in consumption status, the signal processing module order consumption module initialization;
Step 4, after the completion of initial work, the signal processing module command control unit reads the user in the CPU card Proof of identification and card number;
Step 5, the signal processing module proves the user identity for reading and card number passes to public key module, the public affairs Key module proves the public key cryptography for calculating CPU card with card number according to user identity;
Step 6, when the CPU card is consumed on different machines, the signal processing module can read different User identity is proved, card number, consumption time, terminal number and MAC Address, is operated according to the step 5, public key module according to Prove according to user identity and card number can obtain multiple public key cryptographies, often produce a public key cryptography, the CPU card can be recorded automatically One-time-consumption, consumption number of times are constantly overlapped, and pass to data memory module and stored;
Step 7, when the consumer record to the CPU card carries out reconciliation, it is only necessary to which signal processing module is transferred the data and deposited Corresponding MAC Address below multiple public key cryptographies in storage module, you can whether effectively to judge consumer record, and can Check the concrete consumption information for obtaining corresponding to specific public key cryptography.
2. according to claim 1 a kind of based on many application processes of the CPU card for consuming key, it is characterised in that described more In step 5, public key module calculates comprising the following steps that for the public key cryptography of CPU card according to user identity proof and card number:
First, public key is calculated and realizes that public key is with times point addition on elliptic curve:
I P K = Σ i = 1 32 Sc i × R w i , i
Wherein, IPK represents public key,The corresponding value of element in public key matrix is represented, according to the difference of ID, configuration is different Coefficient, produce different users, and then produce different chaotic maps, according to public key, further draw SciPseudorandom sequence Row.
CN201410768631.8A 2014-12-12 2014-12-12 A kind of based on many application processes of the CPU card for consuming key more Active CN104484698B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410768631.8A CN104484698B (en) 2014-12-12 2014-12-12 A kind of based on many application processes of the CPU card for consuming key more

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410768631.8A CN104484698B (en) 2014-12-12 2014-12-12 A kind of based on many application processes of the CPU card for consuming key more

Publications (2)

Publication Number Publication Date
CN104484698A CN104484698A (en) 2015-04-01
CN104484698B true CN104484698B (en) 2017-03-15

Family

ID=52759239

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410768631.8A Active CN104484698B (en) 2014-12-12 2014-12-12 A kind of based on many application processes of the CPU card for consuming key more

Country Status (1)

Country Link
CN (1) CN104484698B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102044114A (en) * 2010-06-29 2011-05-04 北京飞天诚信科技有限公司 Method for consuming electronic wallet
CN104077511A (en) * 2014-07-09 2014-10-01 上海象形通讯科技有限公司 Non-contact processor card based on combined public key authentication and use method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7233926B2 (en) * 2000-03-07 2007-06-19 Thomson Licensing Electronic wallet system with secure inter-purses operations

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102044114A (en) * 2010-06-29 2011-05-04 北京飞天诚信科技有限公司 Method for consuming electronic wallet
CN104077511A (en) * 2014-07-09 2014-10-01 上海象形通讯科技有限公司 Non-contact processor card based on combined public key authentication and use method

Also Published As

Publication number Publication date
CN104484698A (en) 2015-04-01

Similar Documents

Publication Publication Date Title
US10789530B2 (en) Neural embeddings of transaction data
CN104391725B (en) Page display method and page presentation device
CN105260404B (en) The method and apparatus of storage time sequence data
CN110648138B (en) Transaction query and transaction data processing method, device and equipment based on block chain
EP3321819A1 (en) Device, method and program for securely reducing an amount of records in a database
CN105931065B (en) Method and device for processing client group characteristic data
CN105205508A (en) Self-service card issuing machine for intelligent card
EP2674898A1 (en) Improved serialization of RFID tags
CN102567818A (en) Method for generating order bill of material and system thereof
CN105095306A (en) Operating method and device based on associated objects
CN105446990A (en) Service data processing method and equipment
US20160125337A1 (en) Transaction derived in-business probability modeling apparatus and method
CN104915440A (en) Commodity de-duplication method and system
CN111026758B (en) Electronic ticket issuing method and device
CN103226610A (en) Method and device for querying database table
CN105183949A (en) Railway main data cleaning method and system
CN107729330A (en) The method and apparatus for obtaining data set
CN104484698B (en) A kind of based on many application processes of the CPU card for consuming key more
CN102521746B (en) Safely-consuming smart card and method thereof
CN110717814B (en) Method and device for generating risk message
CN108304469A (en) Method and apparatus for character string fuzzy matching
CN105608103A (en) Transforming method and device of data storing structure
CN110209349A (en) The method and terminal device of data processing
CN105830105A (en) A method for electrically personalizing a payment chip and a payment chip
CN105930534B (en) A kind of fragmentation of data reduction method based on cloud storage service price

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 201416 Shanghai city Fengxian District new temple town Muhua Road No. 500 C District 26 room

Applicant after: Shanghai Polytron Technologies Inc

Address before: 201206, room 2, No. 289, Lane 1810, zhe Qiao Road, Shanghai, Pudong New Area

Applicant before: Shanghai pictograph communication Science and Technology Ltd.

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant