CN105893830A - Student IC card service management method - Google Patents

Student IC card service management method Download PDF

Info

Publication number
CN105893830A
CN105893830A CN201610196614.0A CN201610196614A CN105893830A CN 105893830 A CN105893830 A CN 105893830A CN 201610196614 A CN201610196614 A CN 201610196614A CN 105893830 A CN105893830 A CN 105893830A
Authority
CN
China
Prior art keywords
card
key
file
root
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610196614.0A
Other languages
Chinese (zh)
Other versions
CN105893830B (en
Inventor
刘林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Yinshida Information Technology Co Ltd
Original Assignee
Chengdu Yinshida Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Yinshida Information Technology Co Ltd filed Critical Chengdu Yinshida Information Technology Co Ltd
Priority to CN201610196614.0A priority Critical patent/CN105893830B/en
Publication of CN105893830A publication Critical patent/CN105893830A/en
Application granted granted Critical
Publication of CN105893830B publication Critical patent/CN105893830B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Toxicology (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a student IC card service management method. The method includes the steps that two key seeds are connected in series to form a system root key, and the system root key is saved in a root key basic card key file; an IC basic card is derived from a root key basic card, a key is provided by the IC basic card, and initialization and card write operation are conducted on the student IC card. The student IC card service management method greatly improves the card functionality and safety, ensures the activity convenience of a student in a school and improves the working efficiency and the informatization level of the education department.

Description

Student's IC-card business management method
Technical field
The present invention relates to IC-card, particularly to a kind of student's IC-card business management method.
Background technology
In Internet of Things evolution, IC-card technology is the technology of identification terminal object, is to be most widely used Technology.Encrypting IC card has good, vast capacity portable, compatible, the feature such as highly stable.Electricity now The when of the application that son is commercial, E-Government is the most popular Internet era of being increasingly becoming, it is asked safely Topic becomes to highlight the most.Encryption is all employ in a lot of field such as manufacture, logistics, finance, traffic, tourism IC-card technology, drastically increases the operating efficiency of people, the more convenient life of people.At educational system In, all of worker and student with student's IC-card come in and go out in school, movable, consume, register, it is also possible to logical The terminal crossing school snaps into transferring accounts of student's IC-card to carry out bank, greatly facilitates the life of teaching and administrative staff and student Live and study, also improve operating efficiency and the level of IT application of each department of school simultaneously.Student IC-card system The function of Tong Shi school control decision-making replenishment system, is the important means of campus informatization collection.But encryption The function of IC-card cannot meet the SOC(system on a chip) of growing needs, especially encrypting IC card urgently from function Promote in property and security.
Summary of the invention
For solving the problem existing for above-mentioned prior art, the present invention proposes a kind of student's IC-card service management Method, including:
By two key seed series connection formation system root keys, it is saved in the card key file of root key basis; Derived IC basis card by described root key basis card, IC basis card provide key, student's IC-card is entered Row initializes and writing operation.
Preferably, described initialization farther includes procedure below, and IC-card Default Value has root and card Master control key, by IC basis card offer key:
1) certification IC-card initiating master key;
2) wipe root and rebuild, setting up key file;
3) checking IC basis card and certification card password, and by certification card, basis card is authenticated;
4) IC-card sequence number is imported basis card, basis card divides in plain text and derive the sub-control key of this IC-card, Ciphertext dividing mode derives this IC-card protection key;
5) by sub-for IC-card control key with in key file under clear-text way write IC-card root;
6) IC-card protection key is done under encipherment protection write IC-card root close with card slice, thin piece control key In key file;
7) set up and write each data file and application catalogue under root;
Further, the card process of writing of described IC-card farther includes:
1) under the protection of card slice, thin piece protection key, data file under root is updated;
2) card sequence number is passed to encryption equipment, inside encryption equipment, produce this IC-card slice, thin piece control key;
3) under described application catalogue, key file is created, and will application under the protection of card slice, thin piece control key Sub-control key write key file;
4) inside encryption equipment, produce this IC-card application son protection key, and with applying the encryption of sub-control key to pass Go out;
5) will application son protection key write key file on IC-card;
6) apply sub-control key that master key is encrypted with this IC-card inside encryption equipment to spread out of;
7) on IC-card, master key is write key file;
8) set up and write each data file under application catalogue.
Preferably, the division of described plaintext and ciphertext farther includes:
The master key MK of double length of one 16 byte is processed the division data of 8 byte lengths, therefrom Derive the sub-key DK of the double length of 16 bytes;Use the master key MK division number to 16 bit lengths According to carrying out AES encryption computing;The division data of 16 bit lengths are negated and obtains inputting data, then use Master key DK carries out AES encryption computing to input data.
The present invention compared to existing technology, has the advantage that
The present invention proposes a kind of student's IC-card business management method, and security functional at card has very Big lifting, it is ensured that student is convenience in the activity of school, improves operating efficiency and the informationization of education department Level.
Accompanying drawing explanation
Fig. 1 is the flow chart of student's IC-card business management method according to embodiments of the present invention.
Detailed description of the invention
Hereafter provide one or more embodiment of the present invention together with the accompanying drawing of the diagram principle of the invention is detailed Thin description.Describe the present invention in conjunction with such embodiment, but the invention is not restricted to any embodiment.This Bright scope is limited only by the appended claims, and the present invention contains many replacements, amendment and equivalent.? Middle elaboration many detail is described below to provide thorough understanding of the present invention.For exemplary purposes And these details are provided, and can also be according to right without some in these details or all details Claim realizes the present invention.
An aspect of of the present present invention provides a kind of student's IC-card business management method.Fig. 1 is real according to the present invention Execute student's IC-card business management method flow chart of example.
The present invention is cipher key system and the safety body of the SOC(system on a chip) to contactless CPU encryption student's IC-card The realization of system structure, the security management mechanism of proposition file and certification and discrimination process.
The internal structure of encrypting IC card has CPU, controls memory and interface.CPU be responsible for perform order and Computing, controls memory and includes that random access memory ram, read only memory ROM and electric erasable program are deposited Reservoir EEPROM, EEPROM be used for storing card issuer and the side of holding for information about and application data, connect Mouth is then the port of card and PERCOM peripheral communication.
The software architecture of encrypting IC card is made up of following four functional unit.Communications management unit Data communication between management card and card reader, it is ensured that the integrality of data transmission;Security managing unit is Data to be transmitted are encrypted and decrypted, the discriminating of encrypting IC card, control the access control of file; Instruction Interpretation unit is the instruction received from outside to judge integrality and calls other unit and do from further Reason, finally returns to communications management unit, the file management unit management wound to various files by process structure Build and read and write.
The SOC(system on a chip) of student's IC-card is dispatched and distributes software and hardware resource, on the sheet of encrypting IC card System carries out the process initializing and instructing.From the beginning of card powers on, open connecing of the pending datas such as card interface Receive, receive the process of data subsequently into circulation, constantly ask whether that receiving card reader sends the selection of coming Instruction, selects instruction effectively if having received, then SOC(system on a chip) initializes and performs environment, initialization files System, selects root master file, and then host process sends response to communications unit and selects signal, reads Card device receives the most initialized return of SOC(system on a chip) and responds, and card will be selected.Communications unit is beaten Open data input output ports, according to communications protocol, blocks of data is combined to form complete data and put into receipts Send out buffering area, and data block is judged its integrality.After communications unit has received data, by it Being transferred to instruct Interpretation unit, at this moment the SOC(system on a chip) of encrypting IC card will start command process flow process.Etc. referring to Making processing unit processes complete, the result of process will be returned to card reader by communications unit.Flow process meeting The reception of circular wait message, carries out the process instructed, the instruction that single treatment is a plurality of after the power-up the most again.
Encrypting IC card is to communicate with the form of instruction with card reader, and card reader sends instruction, encrypts IC Card receives instruction, the mode of this employing repeat-back, returns response result after having processed the instruction of reception. In the system architecture of student's IC-card, instruction process unit is by instruction processing unit and instruction interpreter two parts group Becoming, instruction interpreter is after transmission unit receives director data, by call instruction processor responsible to finger Making the judgement of processing environment, if instruction processing unit is in normal state, instruction processing unit will start and root According to command mappings entrance, then perform corresponding operation and return result.
Command process be divided into command interpretation and command process, command interpretation part be used to check card mode, Update data mode, application state and renewal random number.Subsequently into command process part, refer to according to searching Order performs entrance, calls other unit and operates accordingly.
In terms of data I/O, using block chain mode to transmit data, the data of transmitting-receiving are stored in long 256 words In the RAM that joint is long, data block is divided into three parts, including starting territory, information field and end territory.Start territory by Card identifier, protocol integrated test system word, node address NAD are constituted.What information field comprised is order data.Terminate What territory comprised is error detecting code, is to start territory and the check results of information field.
The I/O flow process of system application data farther includes: data are passed to order after receiving data by system Layer, layer order just processes according to command process flow process and produces reply data, and these data will be placed in receipts Sending out in buffering area, then host process calls transmission unit, starts data transmission flow, and communications unit is beaten Open data sending terminal mouth, checking data and judge transmission mode, if not carrying out block chain transmission, just assembling number According to block and add protocol integrated test system word and card identifier sends;If sent in block chain mode, the most first calculate Block chain number, assembles with maximum length data block and sends, and then circulation assembles and sends until data are complete Portion sends.
The file system of SOC(system on a chip) uses tree to carry out multi-zone supervision, independent between each catalogue.File system System is divided into these three grades of catalogues of root, object directory and application catalogue file.The file storage of card is exactly handle The File Mapping of logical construction is in EEPROM.In card, storage organization includes: the storage of single file and literary composition The storage of part chain.
The storage of single file refers to single file object data structure in card, is used for single file Storage and management.The storage of single file is divided into two parts.File description block is used for the genus of log file The information such as property, contain the description to application file, SOC(system on a chip) manage and safeguard.File body is literary composition The data information portion of part.For object directory file, file body contains all subfile object information; For application catalogue file, file body contains the application data of reality.File body is file system management Concrete object.
File chain is the most also tree.File chain only realizes unidirectional function of search.Realize file Chain includes:
The Initial Entry of file, automatically selects root after card electrification reset, subsequently into file system; The relation of same level file, is used for safeguarding the relation of same level file;Object directory file and the pass of subfile System.It is used for safeguarding the relation of before and after's hierarchical direct (HD).
The initial address of root file preassigns in SOC(system on a chip), such as first of EEPROM or N-th data block is as the initial address of root file description block, when root is chosen automatically then from finger Determine address to enter.File under same layer is all successively continuous in storage space according to file creation time Storage, the file chain of same level file has explicit connection and implicit expression connection two kinds with the file chain of father and son's layer.
The explicit address connecting the next file referred under record same level in file description block, in traversal This pointer is just used to access during file.In object directory file, in file description block record sublayer The initial address of one file, thus can link up the file chain of different layers.
In hiding link, the file of different relations is defined by the SOC(system on a chip) of encrypting IC card and explains location Mode, is exactly generally that memory space carrys out continuous dispensing by block, does not then have the file data of free time between each file Block, the initial address of block is just as the initial address of file, and the space of subfile is from the initial address of father file Start distribution, as long as the initial of next file just can be calculated by the file size of file description block record Address, then travels through file.
The space structure of file is divided into the space structure of file description block and the space structure of file body.So root Catalogue and object directory can be designed as identical file space structure.Master file root is file system Root, has and only one of which in file system, and first root file is created when initializing, and The most effective at whole card life span.
Transparent binary file is most basic file inside student's IC-card file system, its space structure In file description block, control word is 0xFF, and file body then stores continuous print byte stream.
The SOC(system on a chip) security system of student's IC-card of present invention design includes: state machine unit, safety belong to Property unit, security mechanism unit, cryptographic algorithm unit four part composition.
State machine unit is also referred to as safe condition unit, and it refers to the level of security that card is presently in.Encryption The SOC(system on a chip) of IC-card stores current safe condition with a register, and low four expressions of register are worked as The safe condition of front application, high four safe conditions representing root.Security attribute is just by certain literary composition The condition that part operation needs reach, and authority when this condition is exactly file access, authority is set up at file Time just set.The access rights of the SOC(system on a chip) of encrypting IC card describe with an interval.If The authority of the reading of file is LR, then the condition that the safe condition of current application is to be met is: L > M > R;As Really enactment document is forbidden being accessed for authority, then define current security attribute LR and meet L > R.
SOC(system on a chip) changes safe condition, at application file by external authentication and checking password two ways Can only change by checking password mode under catalogue.Any safe condition can jump to another safety State.If catalogue have changed, then safe condition is set to 0, under new catalogue, creates key file and is not subject to The restriction of directory creating authority, in key file, loads first key the most not by this mechanism of restriction.
SOC(system on a chip) uses one of following two symmetric key encryption algorithm.
1) first, ciphertext is divided into the plaintext of 64 of multistage, carries out encryption piecemeal, then do with close The initial transformation process that key is unrelated, then the structure to conversion carries out the iteration of 16 times altogether, each different The key of 56 carry out identical iteration, after each iteration is complete, 28, a left side for key and right 28 follow Ring shifts, and forms key next time, after 16 iteration are complete, 32, a left side for result and 32, the right side Transposition, finally, then carries out restoring transformation result and just obtains the ciphertext of 64, and restoring transformation is just It it is the inverse transformation of initial transformation.
2) utilizing K to represent the different key in aes algorithm, X represents in plain text, and Y represents ciphertext, therefore It is formulated as:
Ciphering process: Y=AES (KL) [AES-1(KR)[AES(KL[X])]]
Decrypting process: X=AES-1 (KL) [AES (KR) [AES-1(KL[Y])]]
Wherein AES () represents the ciphering process of aes algorithm;AES-1() represents the decrypting process of aes algorithm;
The security attribute of file shows in the control mode of the operation to file and access.Operation to file Mode be exactly document creation when definition allow which operation file carries out, the establishment of such as file, Deletion, read and write operation, and for key file, read operation can not be defined.The control accessed Mode is exactly the access rights must being fulfilled for regulation when conducting interviews file.
In order to ensure encrypting IC card and the security of external information transmission, the SOC(system on a chip) of encrypting IC card also carries For secure packet forwarding, secure packet forwarding can be to the certification of the integrality of data, reliability and sender. Utilizing message authentication code to ensure the integrality of data and the certification to sender, the encryption to information field then ensures The reliability of data.
Message authentication code is function disclosed in key and message content, and is output as the data block of fixed length.False If I is message content, K is key, and M is the algorithm generating message authentication code, then message authentication code MAC=M (I, K).Only in the case of I is identical, just can produce identical message authentication code value, So message authentication code can differentiate the integrality of message.The transmission of safe packet has a following two mode:
(1) sender first carries out message authentication code computing and obtains the message authentication code value of 4 bytes, by it data Being attached to after data and send recipient to, recipient also carries out message authentication code fortune to data after receiving Calculation obtains message authentication code value, and compares with the message authentication code value being attached to after data, if identical Then receive data.
(2) first data are carried out before sending data AES encryption and forms ciphertext, then ciphertext is carried out message and recognize Card code computing obtains message authentication code value, and data the most first carry out message authentication code computing to ciphertext and obtain Message authentication code value the message authentication code value with sender compare, and if the same receive and carry out AES deciphering obtains in plain text.
In order to verify the legitimacy of card user, the present invention uses the mode of personal password to verify user's Identity information, to there being checking instruction in encrypting IC card, the use of checking instruction is defeated by checking user The password integrality entered is to determine the legitimacy of card user.After personal password completes input, if password Correctly, change the value safe condition as password key of safe condition register, and resetting password is wrong Miscount device;If password bad, password just allows the number of times of mistake deduct 1, but if input is wrong Password number of times exceedes the number of times of permission by mistake, then personal identification number will be locked, and locked password can only be by solving Lock instruction recovers.
The process of checking personal password is as follows: first card user passes through input through keyboard personal password, then reads Card device carries out coding to it and issues card, just the data in data field is carried out message authentication code after receiving instruction Verifying and decipher, if contrasted with the personal identification number of storage in file by the personal identification number obtained, result is consistent If then safe condition is set to the safe condition of personal password and resets error counter, return password test Demonstrate,prove successful code.
When card reader is to encrypting IC card certification, card reader and encrypting IC card are instructed by internal authorization and carry out Internal authentication, the internal key producing random number and storage of card reader can carry out data authentication.The mistake of certification Cheng Shi: the first double secret key in encrypting IC card needs the data of certification to carry out AES encryption to obtain authentication data, Then as reply data, authentication data is returned to card reader carry out AES deciphering and compare with authentication data Relatively verify.
During by card checking card reader, the process of certification is: card reader first produces random number, then passes through External authentication key is encrypted, and issues encrypting IC card, encrypting IC card according still further to external command coded format Contrasting by the corresponding secret key random number to data deciphering and with storage, identical, certification is passed through, if it is different, Then authentification failure, returns error code.
Key management is divided into two parts: a part is to be responsible for generation and the management of key by bank's aspect, Another part is to be produced by the cipher key system of school side and managed.
Key management system has private key, management key, shared key three kinds.Encrypting IC card generates Private key and shared key, be stored in the card of encryption IC basis, be used for carrying out campus consumption, encrypt IC Card can also generate the protection key concluded the business for other.Management key can be divided into protection key and certification key, The former is for the encipherment protection of encrypting IC card, and the latter is for card reader certification.
Before transmission key is divided into zones of different, in the case of key is intercepted, still can pass through This algorithm gives key for change.Key partitioning algorithm be by the master key MK of double length of 16 bytes for Process the division data of 8 byte lengths, therefrom derive the sub-key DK of the double length of 16 bytes.
Being derived as of the left-hand component of sub-key DK: use the master key MK division number to 16 bit lengths According to carrying out AES encryption computing;The process of derivation sub-key DK right half part is: first draw 16 bit lengths Divided data carries out negating and obtains inputting data, then with master key DK, input data is carried out AES encryption fortune Calculate.
During root key produces, first, school 16 seed A and seed B are inputted, by seed A and B is compressed and carries out formation system root key of connecting respectively, and derives key form to divide in plain text Being saved in IC-card key file, this card is key basis card, other all card key the most thus basis Card derives from.For preventing basis card from damaging, seed A and B also should backup preservation, in order to regenerates basis Card.
The present invention uses two-stage basis card key system, root key basis card, then is derived from by root key basis card Go out IC basis card.
Writing khaki certification card, basis card and basis card certification card while writing basis card in use must be defeated Entering password, after password passes through, basis is stuck in after certification card certification can be supported to derive cipher key function.
IC-card Default Value has root and a card master control key, and i.e. card master control key, initialized Journey can only complete in safety zone.Initializing and provided key by IC basis card, flow process is as follows:
1) certification IC-card initiating master key;
2) wiping root and rebuild, setting up key file, length is wanted to preserve 2 16 byte key;
3) checking IC basis card and certification card password, and by certification card, basis card is authenticated;
4) IC-card sequence number is imported basis card, basis card divides in plain text and derive the sub-control key of this IC-card, Ciphertext dividing mode derives this IC-card protection key;
5) by sub-for IC-card control key with in key file under clear-text way write IC-card root;
6) IC-card protection key is done under encipherment protection write IC-card root close with card slice, thin piece control key In key file;
7) set up and write each data file and application catalogue under root.
IC-card writes card, connects encryption equipment, and key plain can only occur in encryption equipment, and flow process is as follows:
1) under the protection of card slice, thin piece protection key, data file under root is updated;
2) card sequence number is passed to encryption equipment, inside encryption equipment, produce this IC-card slice, thin piece control key;
3) under described application catalogue, key file is created, and will application under the protection of card slice, thin piece control key Sub-control key write key file;
4) inside encryption equipment, produce this IC-card application son protection key, and with applying the encryption of sub-control key to pass Go out;
5) will application son protection key write key file on IC-card;
6) apply sub-control key that master key is encrypted with this IC-card inside encryption equipment to spread out of;
7) on IC-card, master key is write key file;
8) set up and write each data file under application catalogue.
In sum, the present invention proposes a kind of student's IC-card business management method, and peace functional at card There is the biggest lifting in full property, it is ensured that student is convenience in the activity of school, improve the work effect of education department Rate and the level of IT application.
Obviously, it should be appreciated by those skilled in the art, each unit or each step of the above-mentioned present invention are permissible Realizing by general calculating system, they can concentrate in single calculating system, or is distributed in many On the network that individual calculating system is formed, alternatively, they can use the executable program code of calculating system Realize, it is thus possible to be stored in storage system being performed by calculating system.So, this Bright be not restricted to any specific hardware and software combine.
It should be appreciated that the above-mentioned detailed description of the invention of the present invention is used only for exemplary illustration or explains this The principle of invention, and be not construed as limiting the invention.Therefore, without departing from the spirit and scope of the present invention In the case of any modification, equivalent substitution and improvement etc. done, should be included in protection scope of the present invention Within.Additionally, claims of the present invention be intended to fall into scope and border or Whole in the equivalents on this scope of person and border change and modifications example.

Claims (3)

1. student's IC-card business management method, it is characterised in that including:
By two key seed series connection formation system root keys, it is saved in the card key file of root key basis; Derived IC basis card by described root key basis card, IC basis card provide key, student's IC-card is entered Row initializes and writing operation.
Method the most according to claim 1, it is characterised in that described initialization farther includes following Process, IC-card Default Value has root and card master control key, by IC basis card offer key:
1) certification IC-card initiating master key;
2) wipe root and rebuild, setting up key file;
3) checking IC basis card and certification card password, and by certification card, basis card is authenticated;
4) IC-card sequence number is imported basis card, basis card divides in plain text and derive the sub-control key of this IC-card, Ciphertext dividing mode derives this IC-card protection key;
5) by sub-for IC-card control key with in key file under clear-text way write IC-card root;
6) IC-card protection key is done under encipherment protection write IC-card root close with card slice, thin piece control key In key file;
7) set up and write each data file and application catalogue under root;
Further, the card process of writing of described IC-card farther includes:
1) under the protection of card slice, thin piece protection key, data file under root is updated;
2) card sequence number is passed to encryption equipment, inside encryption equipment, produce this IC-card slice, thin piece control key;
3) under described application catalogue, key file is created, and will application under the protection of card slice, thin piece control key Sub-control key write key file;
4) inside encryption equipment, produce this IC-card application son protection key, and with applying the encryption of sub-control key to pass Go out;
5) will application son protection key write key file on IC-card;
6) apply sub-control key that master key is encrypted with this IC-card inside encryption equipment to spread out of;
7) on IC-card, master key is write key file;
8) set up and write each data file under application catalogue.
Method the most according to claim 2, it is characterised in that described plaintext and ciphertext be partitioned into one Step includes:
The master key MK of double length of one 16 byte is processed the division data of 8 byte lengths, therefrom Derive the sub-key DK of the double length of 16 bytes;Use the master key MK division number to 16 bit lengths According to carrying out AES encryption computing;The division data of 16 bit lengths are negated and obtains inputting data, then use Master key DK carries out AES encryption computing to input data.
CN201610196614.0A 2016-03-31 2016-03-31 Student's IC card business management method Active CN105893830B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610196614.0A CN105893830B (en) 2016-03-31 2016-03-31 Student's IC card business management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610196614.0A CN105893830B (en) 2016-03-31 2016-03-31 Student's IC card business management method

Publications (2)

Publication Number Publication Date
CN105893830A true CN105893830A (en) 2016-08-24
CN105893830B CN105893830B (en) 2018-08-21

Family

ID=57011755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610196614.0A Active CN105893830B (en) 2016-03-31 2016-03-31 Student's IC card business management method

Country Status (1)

Country Link
CN (1) CN105893830B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150504A (en) * 2017-06-14 2019-01-04 深圳市中兴微电子技术有限公司 A kind of method that realizing data transmission and processing and Advanced Encryption Standard system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1501322A (en) * 2002-11-15 2004-06-02 上海市社会保障和市民服务信息中心上 A personalized method for making identification card adaptive for the need of issuing card in batch
CN1527532A (en) * 2003-03-07 2004-09-08 江门市亿业科技有限公司 Cipher key creating and distributing method and the computer network system therewith
CN101339678A (en) * 2008-08-12 2009-01-07 深圳市思达仪表有限公司 Pre-payment meter key management system
CN101739758A (en) * 2008-11-18 2010-06-16 中兴通讯股份有限公司 Method for encrypting and decrypting smart card, system and reader-writer
CN103580872A (en) * 2013-11-11 2014-02-12 北京华大智宝电子系统有限公司 System and method for generating and managing secret key
CN105321261A (en) * 2014-07-18 2016-02-10 北京市燃气集团有限责任公司 Automobile gas filling secret key management system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1501322A (en) * 2002-11-15 2004-06-02 上海市社会保障和市民服务信息中心上 A personalized method for making identification card adaptive for the need of issuing card in batch
CN1527532A (en) * 2003-03-07 2004-09-08 江门市亿业科技有限公司 Cipher key creating and distributing method and the computer network system therewith
CN101339678A (en) * 2008-08-12 2009-01-07 深圳市思达仪表有限公司 Pre-payment meter key management system
CN101739758A (en) * 2008-11-18 2010-06-16 中兴通讯股份有限公司 Method for encrypting and decrypting smart card, system and reader-writer
CN103580872A (en) * 2013-11-11 2014-02-12 北京华大智宝电子系统有限公司 System and method for generating and managing secret key
CN105321261A (en) * 2014-07-18 2016-02-10 北京市燃气集团有限责任公司 Automobile gas filling secret key management system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150504A (en) * 2017-06-14 2019-01-04 深圳市中兴微电子技术有限公司 A kind of method that realizing data transmission and processing and Advanced Encryption Standard system

Also Published As

Publication number Publication date
CN105893830B (en) 2018-08-21

Similar Documents

Publication Publication Date Title
CN101765996B (en) Device and method for remote authentication and transaction signatures
US20240013212A1 (en) Transferring cryptocurrency from a remote limited access wallet
CN106789875B (en) A kind of block chain service unit, block chain service system and its communication means
CN100576196C (en) Content enciphering method, system and utilize this encryption method that the method for content is provided by network
CN106789052A (en) A kind of remote cipher key based on quantum communication network issues system and its application method
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
RU2573211C2 (en) Execution method and universal electronic card and smart card system
CN106776904A (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
CN102843422A (en) Account management system and account management method based on cloud service
CN104281272B (en) Password Input processing method and processing device
CN106789024A (en) A kind of remote de-locking method, device and system
CN104484628B (en) It is a kind of that there is the multi-application smart card of encrypting and decrypting
KR102014647B1 (en) Electronic voting method based on blockchain
CN106650372A (en) open method and device of administrator authority
CN206611428U (en) A kind of remote cipher key based on quantum communication network issues system
CN100459495C (en) Password dynamic enciphering inputmethod of public emipering mode
CN106487505B (en) Key management, acquisition methods and relevant apparatus and system
JPH10200522A (en) Ic card use enciphering method, system therefor and ic card
CN102983969A (en) Security login system and security login method for operating system
CN105893830A (en) Student IC card service management method
CN105897426A (en) Student IC card information access method based on Internet
CN106453300A (en) Data encryption and decryption method and device, and data transmission system
TWI621029B (en) Personal identity authentication method and system using graphic lock

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant