TW543314B - Security module of electronic ticket credit adding system for transportation providing distributed security management architecture - Google Patents

Security module of electronic ticket credit adding system for transportation providing distributed security management architecture Download PDF

Info

Publication number
TW543314B
TW543314B TW89118192A TW89118192A TW543314B TW 543314 B TW543314 B TW 543314B TW 89118192 A TW89118192 A TW 89118192A TW 89118192 A TW89118192 A TW 89118192A TW 543314 B TW543314 B TW 543314B
Authority
TW
Taiwan
Prior art keywords
module
key
security module
security
value
Prior art date
Application number
TW89118192A
Other languages
Chinese (zh)
Inventor
Bo-Shuen Jeng
You-Fu Guan
Jia-Shin Miau
Hung-Ren Jang
Jr-Ming Chen
Original Assignee
Chunghwa Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chunghwa Telecom Co Ltd filed Critical Chunghwa Telecom Co Ltd
Priority to TW89118192A priority Critical patent/TW543314B/en
Application granted granted Critical
Publication of TW543314B publication Critical patent/TW543314B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A security module of electronic ticket credit adding system for transportation providing distributed security management architecture is dedicated to the requirement of adding credit to a card for an electronic token application system in transportation to bring up the security module of electronic ticket credit adding system for transportation providing distributed security management architecture. The system comprises a random number generation module, a command encryption module, a varied transmission key matching activation module, a key management module and a transaction token verification module. Features of verification of personal identify, card and transmitted data and anti-falsification can be executed free of worry by using the microprocessor function of system and the application of logic processing circuit. With multi-layer security protection action, it makes the possibility to falsely add credit of electronic ticket extremely low so as to attain the goal of secure transaction.

Description

543314 A7 PA880522.TWP - 3/13 B7 五、發明說明() 【技術領域】 (身先閱讀背面之注意事項再填寫本頁) 本發明係關於一種具有分散式安全管理架構的交通運 輸電子票證加值機安全模組,特別是關於一種針對交通運 輸電子票證應用系統在卡片加值的需要,提出具有分散式 5 安全管理架構的交通運輸電子票證加值機安全模組。 【先前技術】 隨著科技日新月異的發展,利用電子資訊科技發展的 各項設備也隨之蓬勃,因此本發明係針對交通運輸電子票 證應用系統在卡片加值時的需要,提供多層的安全保護措 10 施,使得電子票證卡被偽造加值的機率降低,達成安全交 易的目的。 本案發明人鑑於上述習用加值技術所衍生的各項缺 點,乃亟思加以改良創新,並經多年苦心孤詣潛心研究 後,終於成功研發完成本件具有分散式安全管理架構的交 15 通運輸電子票證加值機安全模組。 【發明目的】 … 經濟部智慧財產局員工消費合作社印製 本發明之目的即在於提供一種具有分散式安全管理架 構的交通運輸電子票證加值機安全模組,係可提供給交通 運輸電子票證收費系統中所使用之收費卡來進行卡片儲值 20 金額的加值服務,使得持卡人在加值程序中,有個方便、 可靠且不具爭議性的加值服務,同時也要達成整體安全、 正確的基本要求。 本發明之次一目的係在於提供一種具有分散式安全管 理架構的交通運輸電子票證加值機安全模組,為防止卡片 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)、 543314 Α7 PA880522.TWP - 4/13 Β7 五、發明說明Ο) (請先閱讀背面之注意事項再填寫本頁) 被非法加值,而最常用的方法是使用一種特有的基碼來對 資料做混亂化的運算子,使得外界不知悉此資料格式的人 根本無法開啟,更遑論:要篡改卡片内容。 【技術内容】 ' 5 具有上述優點之本件具有分散式安全管理架構的交通 運輸電子票證加值機安全模組,係針對交通運輸電子票證 應用系統在卡片安全加值的需要,提出具有分散式安全管 理技術的交通運輸電子票證加值機安全模組。所謂分散式 安全管理技術就是舞一個安全認證的關卡都有獨立的屬性 10 與金匙的控管。本發明主要由亂數產生模組、命令加密模 組、多重變化的傳輸金匙配對啟用模組、金匙管理模組與 交易標記(Token)驗證模組等單元所組成。透過系統内之微 處理機功能及邏輯處理電路之應用可以執行安全無慮的個 人身份確認,卡片認證,傳輸資料認證,交易資料被防止 15 被篡改等功能。利用多層的安全保.護措施,使得交通卡被 偽造加值的機率極低,以達成安全交易的目的。 【圖式簡單說明】 經濟部智慧財產局員工消費合作社印製 請參閱以下有關本發明一較佳實施例之詳細說明及其 附圖,將可進一步瞭解本發明之技術内容及其目的功效; 20 有關該實施例之附圖為: 圖一為本發明具有分散式安全管理架構的交通運輸電 子票證加值機安全模組之亂數產生器架構圖; ’ 圖二為該具有分散式安全管理架構的交通運輸電子票 證加值機安全模組之金匙管理器之運算架構圖;以及 -4- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 543314 ' -----:----- PA880522.TWP - 5/13 五、發明說明(》) 表一為该具有分散式安全管理架構的交通運輸電子票 證加值機安全模組之命令安全條件表。 【較佳實施例】 本系統主要由亂數產生模組、命令加密模組、多重變 5化的傳輸金匙配對啟用模組、金匙管理模“與交易標記 (Token)驗證模組等單元所組成。透過系統内之微處理機功 能及邏輯處理電路之應用可以執行安全無慮的個人身份確 卡片^也,傳輸^料認證,交易資料被防止被暮改等 功能。利用多層的安全保護措施,使得電子票證卡被偽造 10加值的機率極低,以達成安全交易的目的。 第一部分,請參閱圖一,為本發明具有分散式安全管 理架構的交通運輸電子票證加值機安全模組之亂數產生器 ¥構圖、由圖中可知’ 一般而言移位暫存器越長能使資料 更,、然而若參與運算之位元串沒㈣#安排的話仍然不. 15夠安全’理論上以陳元之線性回饋移位暫存器最多可以 產生N 1位元長度之擬亂序列。除了上述之線性回饋移 位暫存 '之外’另外便是利用許多線性回饋移位暫存器做 XQR^運算而得到更大之週期’我們可在N位元線性回饋_ 移位暫存H之狀況下,彻2N個輸出位元找出他的起始 20 狀態及回授條株,μ l〜、 1余件例如C⑻=ΧΛ3+ΧΛ2+1。初值狀態為 ⑽’1)戶斤產生之序列為(WA0J),若明文Μ為 (,L ’ ’ ’〇)則岔文C為(丨,1,0,0,1,!)。則從線性回饋移位暫 存器之結構我們可以很容易得到下列的矩陣方程式: --- (請洗閱讀背面之注意事項再填寫本頁) 汀i----- 線丨·543314 A7 PA880522.TWP-3/13 B7 V. Description of the Invention (Technical Field) (Read the precautions on the back before filling out this page) The present invention relates to a transportation electronic ticket with a decentralized security management architecture. The check-in security module, in particular, relates to a need for adding value to a card in a transportation electronic ticket application system, and proposes a transportation electronic ticket value-added security module with a decentralized 5 security management architecture. [Previous technology] With the rapid development of science and technology, various equipments developed using electronic information technology will also flourish. Therefore, the present invention is directed to the needs of transportation electronic ticket application systems when adding value to cards, and provides multiple layers of security protection measures. 10, reducing the chance of counterfeit and value-added electronic ticket cards to achieve the purpose of secure transactions. In view of the various shortcomings derived from the conventional value-added technology, the inventor of this case was eager to improve and innovate. After years of painstaking and meticulous research, he finally successfully developed this transport electronic ticket with a decentralized security management structure. Check-in security module. [Objective of the Invention]… Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economics The purpose of the present invention is to provide a transportation electronic ticket value-added machine security module with a decentralized security management structure, which can provide transportation electronic ticket charges The charge card used in the system is used to perform card value-added services of 20 credits, so that cardholders have a convenient, reliable and non-controversial value-added service in the value-added process, while also achieving overall security, Correct basic requirements. A secondary objective of the present invention is to provide a security module for a transport electronic ticket value-added machine with a decentralized security management structure, in order to prevent the paper size of the card from applying the Chinese National Standard (CNS) A4 specification (210 X 297 mm) , 543314 Α7 PA880522.TWP-4/13 Β7 V. Description of the invention 〇) (Please read the notes on the back before filling this page) The value is illegally added, and the most commonly used method is to use a unique base code for data Doing confusing operators makes it impossible for people outside the outside world who do n’t know the format of the data, let alone to tamper with the card content. [Technical content] '5 The transportation e-ticket value-added machine security module with the above-mentioned advantages and a decentralized security management structure is designed to address the need for transportation electronic ticket application systems to add value to card security, and proposes decentralized security Security technology security module for transportation electronic ticket value-added machines. The so-called decentralized security management technology is to control a security certification level with independent attributes 10 and golden keys. The invention is mainly composed of a random number generating module, a command encryption module, a multi-variable transmission key pair enabling module, a key management module and a transaction token verification module. Through the microprocessor function and logic processing circuit application in the system, functions such as secure personal identification, card authentication, transmission data authentication, and transaction data prevention can be performed. Utilizing multiple layers of security protection measures, the probability of value-added traffic cards is extremely low to achieve the purpose of secure transactions. [Brief description of the drawings] Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economics Please refer to the following detailed description of a preferred embodiment of the present invention and the accompanying drawings, which will further understand the technical content of the present invention and its effects; 20 The drawings related to this embodiment are: FIG. 1 is a structural diagram of a random number generator of a transportation electronic ticket value-added machine security module with a decentralized security management structure according to the present invention; Diagram of the calculation architecture of the key manager of the security module of the transportation electronic ticket value-added machine; and -4- This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) Employees of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Consumer Cooperative 543314 '-----: ----- PA880522.TWP-5/13 V. Description of the invention (") Table 1 shows the security of the transportation electronic ticket value-added machine with decentralized security management structure. Module command safety condition table. [Preferred embodiment] The system is mainly composed of a random number generating module, a command encryption module, a multi-variable transmission key pairing enabling module, a golden key management module, and a transaction token verification module. It can be implemented through the microprocessor function and logic processing circuit in the system to perform secure personal identification card ^ also, transmission ^ material authentication, transaction data is prevented from being tampered with and other functions. Use multiple layers of security protection measures In order to achieve the purpose of secure transactions, the electronic ticket card has a 10% chance of being counterfeited. For the first part, please refer to FIG. 1, which is a security module of a transportation electronic ticket value-added machine with a decentralized security management structure according to the present invention. The composition of the random number generator ¥ can be seen from the figure. 'Generally speaking, the longer the shift register, the more data can be made, but if the bit string participating in the calculation is not arranged ## it is still not enough. 15 safe enough theory Chen Yuan's linear feedback shift register can generate a pseudo-random sequence with a length of N 1 bit at most. In addition to the linear feedback shift register described above, in addition to using the The linear feedback shift register performs XQR ^ operation to get a larger period. 'We can find out its initial 20 states through 2N output bits under the condition of N-bit linear feedback _ shift register H. And feedback strains, μ l ~, more than 1 such as C⑻ = χΛ3 + χΛ2 + 1. The initial value state is ⑽'1) The sequence produced by the household caterer is (WA0J), if the plaintext M is (, L '' ' 〇) Then the fork C is (丨, 1, 0, 0, 1 ,!). From the structure of the linear feedback shift register, we can easily get the following matrix equation: --- (Please read the back (Please note this page before filling out this page) Ting i ----- line 丨 ·

543314 A7 B7 PA880522.TWP - 6/13 五 、發明說明(ψ kl k2 k3 k2 k3 k4 k3 k4 k5 cO cl c2 k4 k5 k6 經濟部智慧財產局員工消費合作社印製 可以得到C0=1,C1=0,C2=1,所以回授多項式 C(X)=XA3+XA2+:l。 5 第二部份是命令加密模組的描述。允許有關於保護安 全模組命令在傳送時,不被篡改或辨認出,經由終端裝置 送給卡片的命令或是卡片回給終端裝置的回應碼,皆可被 加密後傳送,以致於不被辨認出。被傳送的安全模組命令 或是回應碼亦可以與原始的命令或回應做驗證,即在被傳 10 送的命令或回應中分別加入驗證碼,如此可避免命令或是 回應被篡改。 一個命令的安全屬性,具有格式如下:INS + LEN + CLA一A + KID1 + ··…+KID(LEN-1),其中 INS是指令碼,LEN 是命令之安全屬性長度,包含CLA_A*LEN-1個KID(密碼 15 或是金匙的代碼),CLA_A*指明於CLA内的安全條件, 代表在執行INS指令碼時,是否需要命令即回應的加密或 驗證,組合如表一所示。KID1、KID2、……、KID(LEN-l)可 為用於確認/驗證時的密碼或是金匙,只有在所有的KID 都被'成功的確認/驗證後INS的指令才允許被執行。 20 第三部份是描述多重變化的傳輸金匙配對啟用模組。 (請先閱讀背面之注意事項再填寫本頁) 訂--------線 __ 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) J^314 A7 PA880522.TWP - 7/13 經濟部智慧財產局員工消費合作社印製 五、發明說明(yy 本安全模組係使用分散式的機構來存放密碼與金匙。每一 個檔案都有它自己的專屬密碼與金匙,使得外界不知悉此 資料袼式的人根本無法通過成層層密碼的檢驗,更遑論要 篡改卡片内容。在安全模組的晶片製造時期就把一組傳輸 5金匙寫入於機密的位址,此資料不可被終端裝置讀取或修 改傳輸姜迷的產生方式,可以有下面兩種方式,以達成 產生多重金匙的目的:(1)查閱使用者資料表,根據每一張 卡片的使用者資料不同,以致於每一個安全模組的傳輸金 4都不相同。(2)利用金匙產生演算法,根據不同的使用者 資料可以選定一種特殊的演算法,將使用者資料搗亂之後 所產生的每一組傳輸金匙自然就不相同,這樣一來有不法 份子就無從得知其編碼的規則了。 在產生傳輸金匙之後,使用者還必須建立自己的主基 碼,所以11 一套系統是具有層層密碼關卡的保護,即使單 一環節被破仍然無損整體的安全性,這 理系統的最大優點之所在。建立主基瑪二=二 開電源,取得安全模組的開機重置碼。(2)讀取安全模組上 的使用者資料’根據資料形態檢查資料值。(3)根據使用者 資料以查表法或是預定之演算法計算出傳輸金匙。⑷使用 亂數產生器得到-組亂數值。(5)使用傳輸金匙對亂數值做 三重對稱性區塊加密運算,將加密結果送到安全模組,以 驗證傳輸金起之真實性,如果驗證失敗,則重複㈣ 4〜5。(6)寫人相關金起與使用者密碼,就完成多重變化的 傳輸金匙啟用程序。啟用之後安全模組就與加值機必須配 10 15 20 ^紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱 (讀先閱讀背面之注意事項再填寫本頁) ---.---·—訂---------. 543314 PA880522.TWP-8/13 五 經濟部智慧財產局員工消費合作社印製 A7 B7 發明說明(b) 對使用,每次加值時兩方面就會相互認證,以確保交易的 安全性、如果安全模組與加值機有所異動就會認證失敗而 無法進行加值。 / 第四部份是如圖二所示的金匙管理器之運算架構,所 5 有的金匙密碼都需要管理以防止未經合法授權的揭露,修 改及替換。金匙的產生是使用亂數產生器,所有的值應該 是被隨機生成,而且需要兩個或更多的個體分別持有某一 密碼金匙的一部份來共同管理此金匙。但是單獨個體所持 的部份機密,將無法得到密碼金匙得任何資訊,簡單的說 10 明例如: 金匙 :100110000 金匙一 :101010100 金匙二 :101011010 金匙三 :110010010 金匙四 :010111000 金匙=金匙一㊉金匙二㊉金匙三㊉金匙四 依據上述XOR運算的結果,我們可以得知金匙之分持 方式。當然在實際應用時我們可以加入移位暫存器將個別 之金匙再加以左右移位(shift)以打亂資料。 20 第五部份是描述交易標記(Token)驗證模組,這主要是 在為避免加值機撰寫應用程式之人員沒從主機端取得授 權,而直接執行加值之命令,在加值時安全模組會產生一 組亂數,帶給安全伺服器主機,在產生授權碼時的同時, 帶回交易標記給安全模組以供確認之用,加值機程式開發 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 543314 A7 B7 ,_PA880522.TWP - 9/13 五、發明說明(7) 人員無從知道交易標記產生之規則,就無法假造而擅自加 值。這是提供持卡人在加值程序中,有個可靠且不具爭 議性的加值服務。 【特點及功效】 .5 本發明所提供之具有分散式安全管理架構的交通運輸 電子票證加值機安全模組,與其他習用技術相互比較時, 更具有下列之優點: 一、 本發明一種具有分散式安全管理架構的交通運輸 電子票證加值機安全模組,係可提供給交通運輸電子票證 10 收費系統中所使用之收費卡來進行卡片儲值金額的加值服 務,使得持卡人在加值程序中,有個方便、可靠且不具爭 議性的加值服務,同時也要達成整體安全、正確的基本要 求。 二、 本發明一種具有分散式安全管理架構的交通運輸 15 電子票證加值機安全模組,為防止卡片被非法加值,而最 常用的方法是使用一種特有的基碼來對資料做混亂化的運 算子,使得外界不知悉此資料格式的人根本無法開啟,更 遑論要墓改卡片内容。 上列詳細說明係針對本發明之一可行實施例之具體說 20 明,惟該實施例並非用以限制本發明之專利範圍,凡未脫 離本發明技藝精神所為之等效實施或變更,均應包含於本 案之專利範圍中。 綜上所述,本案不但在技術思想上確屬創新,並能較 習用物品增進上述多項功.效,應已充分符合新穎性及進步 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)、 ---------------------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 543314 A7 B7_PA880522.TWP - 10/13 五、發明說明(f) 性之法定發明專利要件,爰依法提出申請,懇請貴局核 准本件發明專利申請案,以勵發明,至感德便。 . (請先閱讀背面之注意事項再填寫本頁) 0裝 · 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)543314 A7 B7 PA880522.TWP-6/13 V. Description of the invention (ψ kl k2 k3 k2 k3 k4 k3 k4 k5 cO cl c2 k4 k5 k6 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economy can get C0 = 1, C1 = 0 , C2 = 1, so the feedback polynomial C (X) = XA3 + XA2 +: l. 5 The second part is the description of the command encryption module. It is allowed to protect the security module commands from being tampered or recognized during transmission. The command sent to the card by the terminal device or the response code returned by the card to the terminal device can be encrypted and transmitted so that it cannot be recognized. The transmitted security module command or response code can also be the same as the original To verify the order or response of the command, that is, to add a verification code to the command or response sent by 10. This can prevent the command or response from being tampered with. The security attributes of a command have the following format: INS + LEN + CLA-A + KID1 + ·· ... + KID (LEN-1), where INS is the instruction code and LEN is the security attribute length of the command, including CLA_A * LEN-1 KIDs (password 15 or key code), CLA_A * indicates The security conditions in the CLA represent when executing the INS instruction code Whether the command is required to respond to the encryption or verification, the combination is shown in Table 1. KID1, KID2, ..., KID (LEN-l) can be the password or key used for confirmation / authentication, only in all KIDs The INS commands are allowed to be executed only after they have been successfully verified / verified. 20 The third part describes the multi-variable transmission key pairing and enabling module. (Please read the precautions on the back before filling this page) Order- ------- Line __ This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) J ^ 314 A7 PA880522.TWP-7/13 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Description of the invention (yy This security module uses a decentralized mechanism to store passwords and golden keys. Each file has its own unique password and golden key, making it impossible for people outside the world who do not know this type of data to pass. The inspection of layered passwords, let alone tampering with the card content. During the chip manufacturing period of the security module, a set of 5 gold keys was written to a confidential address. This information cannot be read or modified by the terminal device. The generation method can have the following There are two ways to achieve the purpose of generating multiple gold keys: (1) consult the user data table, according to the user data of each card, so that the transmission gold 4 of each security module is different. (2) ) Use a golden key to generate an algorithm. According to different user data, a special algorithm can be selected. Each group of transmission golden keys generated after the user data is disrupted is naturally different. In this way, there will be no lawful elements. Learned its coding rules. After generating the transmission key, the user must also establish his own master base code, so 11 sets of systems are protected with layers of password levels. Even if a single link is broken, the overall security is not compromised. The biggest advantage of this system is Where it is. Establish the main Kima II = 2 power on, get the boot reset code of the security module. (2) Read the user data on the security module 'to check the data value according to the data form. (3) Calculate the transmission key based on user data by table lookup method or predetermined algorithm. ⑷ Use the random number generator to get -groups of random values. (5) Use the transmission gold key to perform a triple-symmetric block encryption operation on the random value, and send the encryption result to the security module to verify the authenticity of the transmission gold. If the verification fails, repeat ㈣ 4 ~ 5. (6) Write the relevant key and user password to complete the multi-variable transmission key activation process. After activation, the security module and the value-added machine must be equipped with 10 15 20 ^ The paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 public love (read the precautions on the back before filling this page) ---. --- · —Order ---------. 543314 PA880522.TWP-8 / 13 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 Invention Description (b) For use, each time you add value The two sides will mutually authenticate to ensure the security of the transaction, and if the security module and the value-added machine are changed, the authentication fails and the value cannot be added. / The fourth part is the key management shown in Figure 2. All the key passwords need to be managed in order to prevent unauthorized disclosure, modification and replacement. The key generation is performed using a random number generator. All values should be randomly generated and need to be generated. Two or more individuals separately hold a part of a cryptographic key to manage this key together. However, some secrets held by individual individuals will not be able to obtain any information on the cryptographic key. Simply explain 10 For example: Golden spoon: 100110000 Golden spoon one: 101010100 Golden spoon two: 101011010 Golden spoon three: 110010010 Golden spoon four: 010111000 Golden spoon = one golden spoon, two golden spoons, three golden spoons, and four golden spoons. According to the result of the XOR calculation above, we can know how the golden spoons are held. .Of course, in actual application, we can add a shift register to shift individual gold keys left and right to shift the data. 20 The fifth part describes the transaction token verification module, which mainly In order to avoid that the person who wrote the application program of the value-added machine did not obtain authorization from the host, and directly executed the value-added command, the security module will generate a set of random numbers during the value-added, which will be brought to the security server host. At the same time as the authorization code, the transaction mark is returned to the security module for confirmation. The value-added machine program is developed. The paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm). Please fill in this page again) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 543314 A7 B7, _PA880522.TWP-9/13 V. Description of the invention (7) The person cannot know the rules for the generation of the transaction mark, so it cannot be faked. Self-value-added. This is to provide cardholders with a reliable and non-controversial value-added service in the value-added process. [Features and Effects] .5 Transportation electronics with decentralized security management structure provided by the present invention Compared with other conventional technologies, the security module of the ticket value-added machine has the following advantages: 1. The present invention provides a security module of a transportation electronic ticket value-added machine with a decentralized security management structure, which can be provided to traffic. The electronic card 10 is used to charge the stored value of the card in the electronic ticket 10 charging system to provide value-added services, so that cardholders have a convenient, reliable and non-controversial value-added service in the value-added process. Achieve overall safety and correct basic requirements. 2. The present invention has a decentralized security management architecture for transportation. 15 Electronic ticket value-added machine security module, in order to prevent the card from being illegally recharged, the most commonly used method is to use a unique base code to confuse the data. Operator makes it impossible for anyone outside of the outside to know this data format, let alone to change the card content. The above detailed description is a specific description of a feasible embodiment of the present invention. However, this embodiment is not intended to limit the scope of the patent of the present invention. Any equivalent implementation or change without departing from the technical spirit of the present invention should be Included in the patent scope of this case. To sum up, this case is not only technically innovative, but also can improve many of the above-mentioned functions compared with conventional items. It should have fully met the novelty and progress. This paper standard applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm), --------------------- Order --------- line (Please read the precautions on the back before filling this page) 543314 A7 B7_PA880522.TWP-10/13 V. Description of invention (f) A statutory invention patent element, apply in accordance with the law, and kindly ask your office to approve this invention patent application, in order to encourage the invention, to the greatest degree. (Please read the precautions on the back before filling out this page) 0 packs · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

Claims (1)

543314 8888 ABCD PA880522.TWP - 11/13 六、申請專利範圍 1. 一種具有分散式安全管理架構的交通運輸電子票證加 值機安全模組,包括: . 一亂數產生模組,係利用線性回.饋移位暫存器作XOR 之運算而得到更大的週期; ί 5 一命令加密模組,係保護安全模組命令在傳送時,不 被暮改或辨認出,經由終端裝置送給卡片的命令或是 卡片回傳給終端裝置的回應碼,皆可被加密後傳送; 一多重變化的傳輸金匙配對啟用模組,係使用分散式 的機構來存放密碼與金匙,每一個檔案都有它自己的 10 專屬密碼與金匙,使得外界不知悉此資料格式的人根 本無法通過成層層密碼的檢驗、,在安全模組的晶片製 造時期就把一組傳輸金匙寫入於機密的位址,此資料 不可被終端裝置讀取或修改; 一金匙管理模組,所有的金匙密碼都需要管理以防止 15 未經合法授權的揭露,修改及替換;金匙的產生是使 用亂數產生器,所有的值應該是被隨機生成,而且需 要兩個或更多的個體分別持有某一密碼金匙的一部份 來共同管理此金匙; 一交易標記(Token)驗證模組,為避免加值機撰寫 20 應用程式之人員沒從主機端取得授權,而直接執行加 值之命令,在加值時安全模組會產生一組亂數,帶給 安全伺服器主機,在產生授權碼時的同時,帶回交易 標記給安全模組以供確認之用,加值機程式開發人員 無從知道交易標記產生之規則,就無法假造而擅自加 -11 - ------------•裝 i:---- 1 訂---------^0·. (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)、 543314 經濟部智慧財產局員工消費合作社印製 A8 B8 C8 D8 PA880522.TWP - 12/13六、申請專利範圍 值;‘ 透過系統内之微處理機功能及邏輯處理電路之應用可 以執行安全無慮的個人身份確認,卡片認證,傳輸資 料認證,交易資料被防止被篡改等功能,並利用多層 5 的安全保護措施,使得電子票證卡被偽造加值的機率 極低,以達成安全交易的目的。 2. 如申請專利範圍第1項所述之具有分散式安全管理架 構的交通運·輸電子票證加值機安全模組,其中該傳輸 " 金匙的產生方式,,可藉由查閱使用者資料表,並根據 10 每一張卡片的使用者資料不同,以致於每一個安全模 組的傳輸金匙都不相同。 3. 如申請專利範圍第1項所述之具有分散式安全管理架 構的交通運輸電子票證加值機安全模組,其中該傳輸 金匙的產生方式,亦可利用金匙產生演算法,根據不 15 同的使用者資料可以選定一種特殊的演算法,將使用 . 者資料搗亂之後所產生的每一組傳輸金匙自然就不相 同。 4. 如申請專利範圍第1項所述之具有分散式安全管理架 構的交通運輸電子票證加值機安全模組,其中在傳輸 20 金匙產生之後,使用者還需建立主基碼以獲得多重 之保護。 5. 如申請專利範圍第4項所述之具有分散式安全管理架 構的交通運輸電子票證加值機安全模組,其中該建立 主基碼之程序如下:(1)打開電源,取得安全模組的開 -12- (請先閱讀背面之注意事項再填寫本頁) ·« 裝 % 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 543314 8888 ABCD 5 六、 申請專利範圍 機重置碼’(2)讀取安全模組上的使用者資料,根據資 料形態檢查資料值;(3)根據使用者資料以查表法或是 預定之演异法計算出傳輸金匙;⑷使用亂數產生器得 到一組亂數值;(5)使用傳輸金匙對亂數值做三重;稱 性區塊加密運算,將加密結果送到安全模組,以驗證 傳輸金匙之真實性,如果驗證失敗,則重複步驟 (4)〜(5); _人相關金匙與使用者密碼,㉟完成多重 變化的傳輸金匙啟用程序。 ------------:---:—tT··^--------線 (請先閱讀背面之注音?事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 13 -543314 8888 ABCD PA880522.TWP-11/13 6. Scope of patent application 1. A transportation electronic ticket value-added machine security module with a decentralized security management structure, including:. An random number generation module, which uses a linear return .Feed shift register for XOR operation to get a larger cycle; ί 5 A command encryption module, which protects security module commands from being modified or recognized during transmission, and is sent to the card via the terminal device. The command or response code sent back to the terminal device by the card can be encrypted and sent; a multi-variable transmission key pairing activation module uses a distributed mechanism to store passwords and golden keys, and each file Each has its own 10 unique passwords and golden keys, so that people who do not know the data format at all cannot pass the layered password inspection. During the chip manufacturing period of the security module, a set of transmission keys are written into the secret. Address, this information cannot be read or modified by the terminal device; a key management module, all key passwords need to be managed to prevent 15 unauthorized disclosure, Change and replace; the key is generated using a random number generator. All values should be randomly generated, and two or more individuals need to hold a part of a cryptographic key to jointly manage this key. Key; a transaction token (Token) verification module, in order to avoid the person who wrote the 20 application of the value-added machine from obtaining the authorization from the host, and directly execute the value-added command, the security module will generate a set of disorder during the value-added When the authorization code is generated, the transaction mark is returned to the security module for confirmation. The value-added program developer cannot know the rules of the transaction mark generation and cannot forge it without authorization. Plus -11------------- • install i: ---- 1 order --------- ^ 0 ·. (Please read the precautions on the back before filling in this Page) Printed by the Intellectual Property Bureau Employees ’Cooperatives of the Ministry of Economics This paper is printed in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm), 543314 Printed by the Employees’ Cooperatives of Intellectual Property Bureau of the Ministry of Economics A8 B8 C8 D8 PA880522.TWP -12/13 VI. Patent application scope value; 'through The microprocessor functions and logic processing circuits in the system can perform functions such as secure personal identification confirmation, card authentication, transmission data authentication, transaction data being prevented from being tampered, and the use of multiple layers of security protection measures to make electronic tickets The chance of the card being counterfeit and adding value is extremely low to achieve the purpose of secure transactions. 2. As described in item 1 of the scope of the patent application, the security module of the transport / transport electronic ticket value-added machine with a decentralized security management structure, in which the transmission " golden key generation method can be viewed by the user The data table and user data of each card are different, so that the transmission key of each security module is different. 3. As described in Item 1 of the scope of the patent application, the transportation electronic ticket value-added machine security module with a decentralized security management structure, wherein the transmission key generation method can also use the golden key generation algorithm. 15 Different user data can choose a special algorithm that will be used. Each set of transmission keys generated after tampering with the user data is naturally different. 4. As described in item 1 of the scope of the patent application, the transportation electronic ticket value-added machine security module with a decentralized security management structure, in which after the transmission of 20 gold keys is generated, the user needs to establish a master base code to obtain multiple Its protection. 5. As described in item 4 of the scope of the patent application, the transportation electronic ticket value-added machine security module with a decentralized security management structure, wherein the procedure for establishing the main base code is as follows: (1) Turn on the power to obtain the security module Kai-12- (Please read the precautions on the back before filling this page) · «Loading% This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 543314 8888 ABCD 5 VI. Application scope Machine reset code '(2) Read the user data on the security module and check the data value according to the data form; (3) Calculate the transmission golden key based on the user data by table lookup method or predetermined differentiating method; ⑷ Use a random number generator to get a set of random values; (5) use the transmission golden key to do the triple of the random values; weigh the block encryption operation and send the encrypted result to the security module to verify the authenticity of the transmitted golden key. If the verification fails, repeat steps (4) ~ (5); _ person related keys and user passwords, and complete the multi-variable transmission key activation process. ------------: ---: —tT ·· ^ -------- line (please read the note on the back? Matters before filling out this page) Bureau of Intellectual Property, Ministry of Economic Affairs Printed by Employee Consumer Cooperatives 13-
TW89118192A 2000-09-06 2000-09-06 Security module of electronic ticket credit adding system for transportation providing distributed security management architecture TW543314B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW89118192A TW543314B (en) 2000-09-06 2000-09-06 Security module of electronic ticket credit adding system for transportation providing distributed security management architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW89118192A TW543314B (en) 2000-09-06 2000-09-06 Security module of electronic ticket credit adding system for transportation providing distributed security management architecture

Publications (1)

Publication Number Publication Date
TW543314B true TW543314B (en) 2003-07-21

Family

ID=29729376

Family Applications (1)

Application Number Title Priority Date Filing Date
TW89118192A TW543314B (en) 2000-09-06 2000-09-06 Security module of electronic ticket credit adding system for transportation providing distributed security management architecture

Country Status (1)

Country Link
TW (1) TW543314B (en)

Similar Documents

Publication Publication Date Title
JP5739876B2 (en) Unique identifiers, methods for providing unique identifiers, and use of unique identifiers
Hendry Smart card security and applications
US4529870A (en) Cryptographic identification, financial transaction, and credential device
US4823388A (en) Communications network using an enciphering and deciphering device
TW460819B (en) A personal web site for electronic commerce on a smart java card with multiple security check points
JP4323098B2 (en) A signature system that verifies the validity of user signature information
US20020016913A1 (en) Modifying message data and generating random number digital signature within computer chip
CN104322003B (en) Cryptographic authentication and identification method using real-time encryption
CN104463016B (en) Data safety storing method suitable for IC cards and two-dimension codes
CN103326864A (en) Electronic tag anti-fake authentication method
US20010016838A1 (en) Electronic negotiable documents
JP2019530271A (en) Forgery prevention
CN107852323A (en) Counterfeit prevents
JP2009272737A (en) Secret authentication system
CN203753614U (en) Anti-counterfeit packing box
CN107003833A (en) Counterfeit is prevented
CA2212457C (en) Electronic negotiable documents
TW543314B (en) Security module of electronic ticket credit adding system for transportation providing distributed security management architecture
JP2011088330A (en) Label printing system
JP2004515098A (en) Authentication method and authentication device
JPS63273980A (en) Mutual confirmation system
CN105894076A (en) Credible authentication interconnection and intercommunication PSAM card
US11741332B2 (en) Securing cryptographic keys
US20240089120A1 (en) Securing cryptographic keys
JP2004500593A (en) Security module and method for creating anti-counterfeit documents

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees