CN110175475A - A kind of intelligent card data processing method, device and computer readable storage medium - Google Patents
A kind of intelligent card data processing method, device and computer readable storage medium Download PDFInfo
- Publication number
- CN110175475A CN110175475A CN201910452766.6A CN201910452766A CN110175475A CN 110175475 A CN110175475 A CN 110175475A CN 201910452766 A CN201910452766 A CN 201910452766A CN 110175475 A CN110175475 A CN 110175475A
- Authority
- CN
- China
- Prior art keywords
- data
- index value
- intelligent card
- encryption
- area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses a kind of intelligent card data processing methods, comprising: generates index value at random;At corresponding address, the data of preset length are chosen as additional keys in the code area of intelligent card chip memory space from the index value;Protection of goal data are encrypted by the additional keys;The encryption data obtained after encryption and the index value are stored in the user data area of intelligent card chip memory space;It solves key and is stored in user data area (i.e. the area Data) by the encrypted data of key, criminal need to only break through the area Data, key ciphertext data can be utilized, thus the technical issues of learning the important information for including in smart card.
Description
Technical field
This application involves technical field of intelligent card more particularly to a kind of intelligent card data processing methods, device and computer
Readable storage medium storing program for executing.
Background technique
Smart card is a kind of card for being embedded with microchip, and chip can store various equipped with certain memory space
Data.
To prevent the data stored in smart card to be tampered or steal, data are before storing, it usually needs first to data into
Row encryption.In this way, if criminal does not have key, before can not learning data encryption stealing the data in smart card yet
Raw information.
But currently, key and user data area (i.e. the area Data), criminal are stored in by the encrypted data of key
The area Data only need to be broken through, key ciphertext data can be utilized, to learn the important information for including in smart card.
Summary of the invention
This application provides a kind of intelligent card data processing method, device and computer readable storage mediums, solve close
Key and it is stored in user data area (i.e. the area Data) by the encrypted data of key, criminal need to only break through the area Data, just
Using key ciphertext data, thus the technical issues of learning the important information for including in smart card.
In view of this, the application first aspect provides a kind of intelligent card data processing method, comprising:
It is random to generate index value;
At corresponding address, preset length is chosen in the code area of intelligent card chip memory space from the index value
Data are as additional keys;
Protection of goal data are encrypted by the additional keys;
The encryption data obtained after encryption and the index value are stored in the user data of intelligent card chip memory space
Area.
Preferably, described at corresponding address, to be chosen pre- in the code area that intelligent card chip stores from the index value
If the data of length are specifically included as additional keys:
It deviates after the index value from corresponding address, chooses pre- from the start address for the code area that intelligent card chip stores
If the data of length are as additional keys.
Preferably, after the start address offset index value from the code area that intelligent card chip stores correspondingly
At location, the data for choosing preset length are specifically included as additional keys:
It is deviated after the index value from corresponding address from the start address for the code area that intelligent card chip stores, chooses length
Data identical with protection of goal data are spent as additional keys.
Preferably, after the start address offset index value from the code area that intelligent card chip stores correspondingly
At location, chooses length data identical with protection of goal data and is specifically included as additional keys:
Since corresponding address after the start address for the code area that intelligent card chip the stores offset index value, take out
Length data identical with protection of goal data are as additional keys.
Preferably, it is described protection of goal data are encrypted by the additional keys after further include:
Calculate the integrity degree of the encrypted result obtained after encryption;
The user that the encryption data obtained after encryption and the index value are stored in intelligent card chip memory space
Data field specifically includes:
The encryption data obtained after encryption, the index value and the integrity degree are stored in intelligent card chip together to deposit
Store up the user data area in space.
Preferably, described at corresponding address, to be selected in the code area of intelligent card chip memory space from the index value
Take the data of preset length as additional keys before further include:
If the index value generated is 0, the random generation index value is returned.
Preferably, described at corresponding address, to be selected in the code area of intelligent card chip memory space from the index value
Take the data of preset length as additional keys before further include:
If taking-up value of the index value in the code area of intelligent card chip memory space at corresponding address is 0, return
Return the random generation index value.
The application second aspect provides a kind of intelligent card data processing device, comprising:
Generation unit, for generating index value at random;
Selection unit, for from the index value in the code area of intelligent card chip memory space at corresponding address,
The data of preset length are chosen as additional keys;
Encryption unit, for being encrypted by the additional keys to protection of goal data;
Storage unit, it is empty for the encryption data obtained after encryption and the index value to be stored in intelligent card chip storage
Between user data area.
Preferably, further includes:
Integrity degree computing unit, for calculating the integrity degree of the encrypted result obtained after encryption;
The storage unit is specifically used for encryption data, the index value and the integrity degree one that will be obtained after encryption
And it is stored in the user data area of intelligent card chip memory space.
The application third aspect provides a kind of computer readable storage medium, and the computer readable storage medium is for depositing
Program code is stored up, said program code is used to execute any intelligent card data processing side that above-mentioned first aspect provides
Method.
As can be seen from the above technical solutions, the application has the following advantages:
In the application, provide a kind of intelligent card data processing method, it is random generate index value after, according to index value,
One piece of data is chosen in the code area (area Code) of intelligent card chip memory space as additional keys, using additional keys to mesh
Mark protection data are encrypted, and encrypted encryption data and index value are stored in user data area (area Data).Such as
This, even if criminal breaks through the area Data, but it can only obtain index value and encrypted encryption data, crack encryption number
According to first having to recognize that index value can be directed toward additional keys, after recognizing, also to break through the area Code again, just may be used in this way
Additional keys can be obtained.Compared to as long as encryption data, intelligence provided by the present application can be cracked by breaking through the area Data originally
Card data processing method can greatly improve the safety of smart card information.
Detailed description of the invention
Fig. 1 is the flow chart of intelligent card data processing method in one embodiment provided by the present application;
Fig. 2 is the flow chart of intelligent card data processing method in second embodiment provided by the present application;
Fig. 3 is a kind of structural schematic diagram of intelligent card data processing device provided by the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction with the attached drawing in the application,
Technical solution in the application is clearly and completely described, it is clear that described embodiment is only that the application a part is real
Example is applied, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making creation
Property labour under the premise of every other embodiment obtained, shall fall in the protection scope of this application.
This application provides a kind of intelligent card data processing methods, solve in the prior art, key and are encrypted by key
The data crossed are stored in user data area (i.e. the area Data), and criminal need to only break through the area Data, can be decrypted using key
Data, thus the technical issues of learning the important information for including in smart card.
It may refer to Fig. 1, Fig. 1 is the process of intelligent card data processing method in one embodiment provided by the present application
Figure, this method comprises:
Step 101 generates index value at random.
It should be noted that in the application, specific location phase of the index value generated at random with additional keys in the area Code
Association when specific implementation, can make an address in the area Code of index value intelligent card corresponding chip memory space, at this point,
The numerical value that index value can be randomly generated.
Step 102 at corresponding address, chooses default length in the code area of intelligent card chip memory space from index value
The data of degree are as additional keys.
By index value, some address in the area Code can be determined, at the address determined, can select pre-
If the data of length are as additional keys.
It is understood that specifically how to choose can be there are many mode when data are chosen in the address determined.Such as
Can fetch evidence backward since the address, and can also fetch forward evidence since the address, can also only limit taken number
According to including the corresponding value in the address.Certainly, it there are also other modes, does not enumerate herein.
The data length of selection, which also can according to need, to be set, and the application provides a kind of preferred selection mode, i.e.,
The data length of selection is the length of protection of goal data, specifically be will be described later.
Step 103 encrypts protection of goal data by additional keys.
Step 104, the user that the encryption data obtained after encryption and index value are stored in intelligent card chip memory space
Data field.
Index value is directed to the index of additional keys.In order to facilitate one's own side it is subsequent to encryption data use or transfer, can
Index value and encryption data are stored in the area Data together.When needed, one's own side can be found by index value in the area Code
Additional keys, to decryption to encryption data or the processing such as compare.
It should be noted that since criminal is not aware that index value is directed to the key message of additional keys in advance,
Therefore index value is stored in the area Data together can't reduce the safety of information.Backward, even if criminal is aware of,
It will obtain additional keys, also in addition break through the area Code, scheme also has greatly promotion in safety compared to existing technology.
It may refer to Fig. 2, Fig. 2 is the process of intelligent card data processing method in second embodiment provided by the present application
Figure, this method comprises:
Step 201 generates index value at random.
It can be with reference to the step 101 in above-mentioned one embodiment.
Step 202 judges whether the index value generated is 0, if so, otherwise return step 201 enters step 203.
If index value is 0, in contrast, the additional keys being directed toward are relatively easy to know, slightly weak in safety, therefore
It needs to generate again.
Step 203 judges taking-up value of the index value in the code area of intelligent card chip memory space at corresponding address
It whether is 0, if so, return step 201, otherwise enters step 204.
Step 204 deviates corresponding address after above-mentioned index value from the start address for the code area that intelligent card chip stores
Start, takes out length data identical with protection of goal data as additional keys.
The incidence relation of certain position in index value and code area, can be there are many setting means.Present embodiments provide one
Kind preferred mode, that is, after setting the start address offset index value of code area corresponding address as the corresponding address of index value,
Specifically, i.e. code area start address plus resulting address after index value at, carry out the selection of additional keys.
And the specific selection mode of additional keys, it is to start since the corresponding address of index value in the present embodiment, takes out and preset
The additional keys of length, wherein preset length is specially data length identical with protection of goal data.
Step 205 encrypts protection of goal data by additional keys.
Step 206, the integrity degree for calculating the encrypted result obtained after encryption.
It should be noted that the calculating of integrity degree can be used for judging whether data are tampered with.If a certain data are logical
After crossing calculating integrity degree, difference is compared with the integrity degree stored before, it is believed that it is tampered with, and belongs to fly-by-night number
According to.
In view of being easy to be attacked during calculating integrity degree by criminals such as hackers, if carrying out before encryption complete
Degree calculates, and data may be tampered or steal, and therefore, in the present embodiment, selection carries out integrity degree to encrypted result after encryption
It calculates, in this way, can only also steal encryption data even if criminal steals data, can not know that encryption data is carried on the back
Important information afterwards.
Further, since encryption data is identical as the content that protection of goal data substantially include, only because additional keys
Encryption behavior is different in the form of expression, thus to encryption data carry out the effect of integrity degree calculating with to protection of goal data into
The effect that row integrity degree calculates has no identical.
The encryption data obtained after encryption, index value and integrity degree are stored in intelligent card chip together and deposit by step 207
Store up the user data area in space.
Calculated integrity degree is stored in the area Data with encryption data and index value together, takes subsequent to data
Integrity degree verification is carried out in use, facilitating out.
For example, if the protection of goal data stored in the area Data be sensitive data, take out sensitive data (such as PIN) be used for than
Compared with when, specifically, first taking out encryption data from the area Data, and calculate its integrity degree, calculated integrity degree and be stored in Data
The integrity degree in area is compared, if integrity degree is consistent, it is believed that encryption data is credible.Index value is further taken out, is existed according to index value
The area Code takes out additional keys, is encrypted using additional keys to the second sensitive data for making comparisons, is obtained after encryption
The second encryption data can be compared with the encryption data of taking-up.
And if the protection of goal data stored in the area Data be common key, take out common key for calculate when, equally
Need first to take out encryption data from the area Data, and calculate its integrity degree, calculated integrity degree be stored in the complete of the area Data
Degree is compared, if integrity degree is consistent, it is believed that encryption data is credible.Index value is further taken out, is taken out according to index value in the area Code
Additional keys.Encryption data is decrypted using additional keys at this time, so that original common key is restored, for subsequent
Calculating.
In the present embodiment, provide a kind of intelligent card data processing method, it is random generate index value after, according to index value,
One piece of data is chosen in the code area (area Code) of intelligent card chip memory space as additional keys, utilizes additional keys pair
Protection of goal data are encrypted, and encrypted encryption data carries out integrity degree calculating, then by encryption data, index value and
Integrity degree is stored in together in user data area (area Data).In this way, even if criminal breaks through the area Data, but it can only be obtained
Index value and encrypted encryption data, will crack encryption data, first have to recognize that index value can be directed toward encryption data
Key, i.e. additional keys.And after recognizing, to break through the area Code again also to obtain additional keys, it just can be to encryption number
According to being decrypted.Such process that cracks needs criminal while breaking through the area Code and two, the area Data storage region, compares
As long as encryption data can be cracked by originally breaking through the area Data, intelligent card data processing method provided in this embodiment can be big
The big safety for improving smart card information.
Secondly, index value and integrity degree are stored in user data area together, it can also be the case where not reducing safety
Under, convenience is provided to the access of data for one's own side.
It may refer to Fig. 3, Fig. 3 is a kind of structural schematic diagram of intelligent card data processing device provided by the present application, the dress
It sets and includes:
Generation unit 301, for generating index value at random;
Selection unit 302, at corresponding address, being selected in the code area of intelligent card chip memory space from index value
Take the data of preset length as additional keys;
Encryption unit 303, for being encrypted by additional keys to protection of goal data;
Storage unit 304, it is empty for the encryption data obtained after encryption and index value to be stored in intelligent card chip storage
Between user data area.
Further, further includes:
Integrity degree computing unit 305, for calculating the integrity degree of the encrypted result obtained after encryption;
Storage unit 304 is specifically used for for the encryption data, index value and the integrity degree that obtain after encryption being stored in together
The user data area of intelligent card chip memory space.
In the present embodiment, provide a kind of intelligent card data processing device, it is random generate index value after, according to index value,
One piece of data is chosen in the code area (area Code) of intelligent card chip memory space as additional keys, utilizes additional keys pair
Protection of goal data are encrypted, and encrypted encryption data carries out integrity degree calculating, then by encryption data, index value and
Integrity degree is stored in together in user data area (area Data).In this way, even if criminal breaks through the area Data, but it can only be obtained
Index value and encrypted encryption data, will crack encryption data, first have to recognize that index value can be directed toward encryption data
Key, i.e. additional keys.And after recognizing, to break through the area Code again also to obtain additional keys, it just can be to encryption number
According to being decrypted.Such process that cracks needs criminal while breaking through the area Code and two, the area Data storage region, compares
As long as encryption data can be cracked by originally breaking through the area Data, intelligent card data processing device provided in this embodiment can be big
The big safety for improving smart card information.
The application also provides a kind of computer readable storage medium, and for storing program code, the program code is for holding
Any one embodiment in a kind of intelligent card data processing method described in row foregoing individual embodiments.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description
It with the specific work process of unit, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
The description of the present application and term " first " in above-mentioned attached drawing, " second ", " third ", " the 4th " etc. are (if deposited
) it is to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that use in this way
Data are interchangeable under appropriate circumstances, so that embodiments herein described herein for example can be in addition to illustrating herein
Or the sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that
Cover it is non-exclusive include, for example, containing the process, method, system, product or equipment of a series of steps or units need not limit
In step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, produce
The other step or units of product or equipment inherently.
It should be appreciated that in this application, " at least one (item) " refers to one or more, and " multiple " refer to two or two
More than a."and/or" indicates may exist three kinds of relationships, for example, " A and/or B " for describing the incidence relation of affiliated partner
It can indicate: only exist A, only exist B and exist simultaneously tri- kinds of situations of A and B, wherein A, B can be odd number or plural number.Word
Symbol "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or"." at least one of following (a) " or its similar expression, refers to
Any combination in these, any combination including individual event (a) or complex item (a).At least one of for example, in a, b or c
(a) can indicate: a, b, c, " a and b ", " a and c ", " b and c ", or " a and b and c ", and wherein a, b, c can be individually, can also
To be multiple.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied
Another system is closed or is desirably integrated into, or some features can be ignored or not executed.Another point, it is shown or discussed
Mutual coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or logical of device or unit
Letter connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (full name in English: Read-Only
Memory, english abbreviation: ROM), random access memory (full name in English: Random Access Memory, english abbreviation:
RAM), the various media that can store program code such as magnetic or disk.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before
Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of intelligent card data processing method characterized by comprising
It is random to generate index value;
At corresponding address, the data of preset length are chosen in the code area of intelligent card chip memory space from the index value
As additional keys;
Protection of goal data are encrypted by the additional keys;
The encryption data obtained after encryption and the index value are stored in the user data area of intelligent card chip memory space.
2. intelligent card data processing method according to claim 1, which is characterized in that it is described from the index value in intelligence
In the code area of card chip storage at corresponding address, the data for choosing preset length are specifically included as additional keys:
It is deviated after the index value from corresponding address from the start address for the code area that intelligent card chip stores, chooses default length
The data of degree are as additional keys.
3. intelligent card data processing method according to claim 2, which is characterized in that it is described from intelligent card chip store
After the start address offset index value of code area at corresponding address, the data for choosing preset length have as additional keys
Body includes:
Deviated after the index value from corresponding address from the start address for the code area that intelligent card chip stores, choose length with
The identical data of protection of goal data are as additional keys.
4. intelligent card data processing method according to claim 3, which is characterized in that it is described from intelligent card chip store
After the start address offset index value of code area at corresponding address, length data identical with protection of goal data are chosen
It is specifically included as additional keys:
Since corresponding address after the start address for the code area that intelligent card chip the stores offset index value, length is taken out
Data identical with protection of goal data are as additional keys.
5. intelligent card data processing method according to claim 1, which is characterized in that described to pass through the additional keys pair
After protection of goal data are encrypted further include:
Calculate the integrity degree of the encrypted result obtained after encryption;
The user data that the encryption data obtained after encryption and the index value are stored in intelligent card chip memory space
Area specifically includes:
It is empty that the encryption data obtained after encryption, the index value and the integrity degree are stored in intelligent card chip storage together
Between user data area.
6. intelligent card data processing method according to claim 1, which is characterized in that it is described from the index value in intelligence
In the code area of card chip memory space at corresponding address, the data for choosing preset length are also wrapped before as additional keys
It includes:
If the index value generated is 0, the random generation index value is returned.
7. intelligent card data processing method according to claim 6, which is characterized in that it is described from the index value in intelligence
In the code area of card chip memory space at corresponding address, the data for choosing preset length are also wrapped before as additional keys
It includes:
If taking-up value of the index value in the code area of intelligent card chip memory space at corresponding address is 0, institute is returned
State random generation index value.
8. a kind of intelligent card data processing device characterized by comprising
Generation unit, for generating index value at random;
Selection unit, at corresponding address, being chosen in the code area of intelligent card chip memory space from the index value
The data of preset length are as additional keys;
Encryption unit, for being encrypted by the additional keys to protection of goal data;
Storage unit, for the encryption data obtained after encryption and the index value to be stored in intelligent card chip memory space
User data area.
9. intelligent card data processing device according to claim 8, which is characterized in that further include:
Integrity degree computing unit, for calculating the integrity degree of the encrypted result obtained after encryption;
The storage unit is specifically used for together depositing the encryption data, the index value and the integrity degree that obtain after encryption
Store up the user data area in intelligent card chip memory space.
10. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium is for storing program generation
Code, said program code require the described in any item intelligent card data processing methods of 1-7 for perform claim.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910452766.6A CN110175475B (en) | 2019-05-28 | 2019-05-28 | Smart card data processing method and device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910452766.6A CN110175475B (en) | 2019-05-28 | 2019-05-28 | Smart card data processing method and device and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110175475A true CN110175475A (en) | 2019-08-27 |
CN110175475B CN110175475B (en) | 2023-03-31 |
Family
ID=67695758
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910452766.6A Active CN110175475B (en) | 2019-05-28 | 2019-05-28 | Smart card data processing method and device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110175475B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111209583A (en) * | 2020-01-13 | 2020-05-29 | 多点(深圳)数字科技有限公司 | Encryption algorithm for magnetic card data |
CN115103358A (en) * | 2022-05-06 | 2022-09-23 | 东信和平科技股份有限公司 | Smart card access authentication method, device, equipment and storage medium |
CN115878155A (en) * | 2022-12-13 | 2023-03-31 | 东信和平科技股份有限公司 | Method and device for upgrading Java application of smart card and electronic equipment |
CN115982735A (en) * | 2022-12-12 | 2023-04-18 | 东信和平科技股份有限公司 | Method, device and storage medium for automatically processing production data |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1323147A (en) * | 2000-05-10 | 2001-11-21 | 日本电气株式会社 | Mobile communication apparatus and data implicit method |
CN105512578A (en) * | 2015-12-08 | 2016-04-20 | 北京元心科技有限公司 | Methods and devices for storing, deleting and reading data on SD (secure digital) card |
CN105678192A (en) * | 2015-12-29 | 2016-06-15 | 北京数码视讯科技股份有限公司 | Smart card based secret key application method and application apparatus |
-
2019
- 2019-05-28 CN CN201910452766.6A patent/CN110175475B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1323147A (en) * | 2000-05-10 | 2001-11-21 | 日本电气株式会社 | Mobile communication apparatus and data implicit method |
CN105512578A (en) * | 2015-12-08 | 2016-04-20 | 北京元心科技有限公司 | Methods and devices for storing, deleting and reading data on SD (secure digital) card |
CN105678192A (en) * | 2015-12-29 | 2016-06-15 | 北京数码视讯科技股份有限公司 | Smart card based secret key application method and application apparatus |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111209583A (en) * | 2020-01-13 | 2020-05-29 | 多点(深圳)数字科技有限公司 | Encryption algorithm for magnetic card data |
CN115103358A (en) * | 2022-05-06 | 2022-09-23 | 东信和平科技股份有限公司 | Smart card access authentication method, device, equipment and storage medium |
CN115982735A (en) * | 2022-12-12 | 2023-04-18 | 东信和平科技股份有限公司 | Method, device and storage medium for automatically processing production data |
CN115878155A (en) * | 2022-12-13 | 2023-03-31 | 东信和平科技股份有限公司 | Method and device for upgrading Java application of smart card and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110175475B (en) | 2023-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110175475A (en) | A kind of intelligent card data processing method, device and computer readable storage medium | |
CN109948347A (en) | A kind of date storage method and device, server and readable storage medium storing program for executing | |
CN106776904A (en) | The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment | |
CN111342963A (en) | Data uplink method, data storage method and device | |
CN107135077B (en) | Software protecting method and device | |
CN111275448A (en) | Face data processing method and device and computer equipment | |
CN112365001B (en) | Model generation method, device and server | |
CN106446667B (en) | Password data processing method, device and equipment | |
CN111935179B (en) | Model training method and device based on trusted execution environment | |
CN111161062A (en) | Cross-chain transaction method and device | |
CN109815289A (en) | Block generation method, calculating equipment, storage medium for block chain network | |
CN108805538A (en) | A kind of digital cash method of commerce and device | |
CN109286500A (en) | Vehicle Electronic Control Unit ECU authentication method, device and equipment | |
US20150199527A1 (en) | Method of inputting confidential data on a terminal | |
CN111597167A (en) | Big data management system and method applying block chain technology | |
CN109271189A (en) | A kind of processing method and relevant apparatus of embedded system firmware | |
CN106548097A (en) | The operation method and device of network device software | |
CN108229210A (en) | A kind of method, terminal and computer readable storage medium for protecting data | |
CN105450402A (en) | Method, device and system for inputting combined-type image verification code | |
CN109302442A (en) | A kind of data storage method of proof and relevant device | |
CN111353140A (en) | Verification code generation and display method, device and system | |
CN103593592B (en) | User data encryption and decryption method | |
CN105512520A (en) | Anti-cloning vehicle-mounted system and work method thereof | |
CN107239500A (en) | A kind of character string matching method and system | |
CN106651371A (en) | Electronic ticket producing method and system and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |