TWI351865B - - Google Patents

Download PDF

Info

Publication number
TWI351865B
TWI351865B TW96150715A TW96150715A TWI351865B TW I351865 B TWI351865 B TW I351865B TW 96150715 A TW96150715 A TW 96150715A TW 96150715 A TW96150715 A TW 96150715A TW I351865 B TWI351865 B TW I351865B
Authority
TW
Taiwan
Prior art keywords
authentication
card
key
module
security
Prior art date
Application number
TW96150715A
Other languages
Chinese (zh)
Other versions
TW200929986A (en
Inventor
Chien Hsien Lee
Original Assignee
Trade Van Information Services Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trade Van Information Services Co filed Critical Trade Van Information Services Co
Priority to TW96150715A priority Critical patent/TW200929986A/en
Publication of TW200929986A publication Critical patent/TW200929986A/en
Application granted granted Critical
Publication of TWI351865B publication Critical patent/TWI351865B/zh

Links

Landscapes

  • Storage Device Security (AREA)

Description

1351865 九、發轲說明: 【發明所屬之技術領域】 - 本發明係有關於一種認證系統及方法,更詳而一 '係有關於一種應用安全認證模組之系統及方法 【先前技術】 目前智慧ic卡已普遍應用於社會的各個領域,且有 曰益普及的趨勢,一個人身上同時具有多張1〇卡 為奇。在1C卡的應用領域中,通常卡片本身係一=== 鲁較常看見的-部份,然而單靠卡片是無法完成整體系統的 運作,後端電腦、應用軟體、讀卡機設備等都是不可缺少 的要件,其中該讀卡機設備負責後端的軟硬體與Ic卡^ 的資訊傳遞工作。而就功能設計而言,由於其應用環境二 差異而有顯著的不同,基本上,有接觸式與非接觸式的區 別。 相較於接觸式1C卡系統,非接觸式IC卡由於卡片與 Φ靖卡機的訊息傳遞不必直接接觸,所以在使用上較為便 利,且可免除許多接觸式IC系統的接點磨損等缺點:因 此,在社會上各階層的應用越來越多,其應用範圍包括會 員卡、金融卡、信用卡、門禁卡、校園卡、儲值卡、記帳 卡、掛號證、保險證'以及捷運及公車所用的悠遊卡等。 非接觸式1C卡又以RFID之技術為主,RFID是「Radi〇1351865 IX. Description of the invention: [Technical field to which the invention pertains] - The present invention relates to an authentication system and method, and more particularly to a system and method for applying a security authentication module [Prior Art] Current wisdom The ic card has been widely used in various fields of society, and there is a trend of popularization. It is strange that one person has multiple cards at the same time. In the field of application of 1C card, usually the card itself is a part of === Lu is often seen, but the card can not complete the operation of the whole system, the back-end computer, application software, card reader equipment, etc. It is an indispensable element, and the card reader device is responsible for the information transfer of the software and hardware of the back end and the Ic card. In terms of functional design, there are significant differences due to differences in their application environments. Basically, there are contact and non-contact differences. Compared with the contact 1C card system, the non-contact IC card does not need to be in direct contact with the message transmission of the card and the Φ card machine, so it is convenient to use, and can avoid the disadvantages of contact wear of many contact IC systems: Therefore, there are more and more applications in all walks of life in society, including loyalty cards, financial cards, credit cards, access cards, campus cards, stored value cards, billing cards, registration certificates, insurance certificates, as well as MRT and buses. The use of the leisure card and so on. The contactless 1C card is based on RFID technology, and the RFID is "Radi〇".

Frequency identificati〇n」的縮寫,中文可以稱為「無線 射頻識別系統」。通常是由感應器(ReaderH〇 RFID標籤 (Tag)所組成的系統,其運作的原理是利用感應器發射無 110681 5 1351865 •線H福動感應範圍㈣RFID標藏,藉由電磁感應產 生電流’供應RFID標籤上的晶片運作並發出電磁波回應 .感應器。 、· 由於上述的非接觸式1C卡大部分只有辨識功能而少 •.有安全認證設計,故僅是用於低安全性且簡單的識別。為 解決非接觸式1C卡之低安全性問題,遂有針對其安全性 問題而開發的非接觸式智慧IC卡的出現,目前非接觸式 智慧1C卡讀卡機及智慧、IC卡大都使用飛利浦的Mifare 鲁技術,該技術係遵照IS0 14443 #接觸式智慧卡與讀卡機 國際標準。其t所用的Mifare卡内晶片可讀/寫資料, 更在每個磁區獨立加密,使其具備更好的安全性。 然而,目前的非接觸式刪㈣卡機仍有其安全上的 顧慮’即’ SAM卡若被竊取等於得到可以任意存取或修 改非接觸1C卡的權限,因此控管機制較差,故有需要提 供額外的控管機制以增加咖〇讀卡機之安全性,也可同 籲時降低金鑰在讀卡機外部被側錄的情況發生。 綜上所述,如何解決上述非接觸式RFID讀卡機之安 全上的顧慮’以防止安全認證模組卡被絲後被任意使 用’遂成為目前亟待解決之間題。 【發明内容】 鑒於以上習知技術之缺點,本發明之主要目的在於提 供一種安全認證模組之認證系統及方法,係應用於具有 胸)電路之讀卡機與肅阶卡上透過此認證機制,可 防止SAM被拿到該對應讀卡機以外的地方使用。 6 (S ) 110681 1351865 未發桷之另一目的在於提供一種安全認證模組之認 證系統及方法,係應用於具有RFID電路之讀卡機與 Mifare卡上,透過此認證機制,可在安全認證模組卡被盜 取後防止取得複製金鑰(A/B key)。 本發明之又一目的在於提供一種安全認證模組之認 證系統及方法,係應用於具有RFID電路之讀卡機與 Mifare卡上,透過此認證機制,可增加非接觸式讀卡機之 安全性。 為達上揭及其它目的,本發明提供一種安全認證模組 之認證系統,係應用於具有RFID電路之讀卡機與Mifare 卡,該讀卡機具有可分別插置安全認證模組卡與認證卡之 安全認證模組卡插槽及認證卡插槽,該安全認證模組卡與 該認證卡分別具有金鑰儲存區,且該安全認證模組卡之金 鑰儲存區儲存有複製金鑰,該安全認證模組之認證系統包 括:金鑰生成交換模組,係内建於該安全認證模組卡,用 以令該安全認證模組卡產生包括公鑰與私鑰之RSA金鑰 對,並將該金鑰對中的公鑰傳送至該讀卡機,該私鑰則係 儲存於該安全認證模組卡中;金鑰傳送模組,係内建於該 認證卡,用以令該讀卡機將其所接收的公鑰傳入該認證卡 中;認證金鑰生成模組,係内建於該認證卡’用以在該認 證卡上產生認證金鑰,並將該認證金鑰儲存於該認證卡之 金鑰儲存區中;認證金鑰加密模組,係内建於該認證卡, 用以將認證金鑰生成模組所產生之認證金鑰透過該金鑰 傳送模組所傳入之公鑰予以加密,並透過該金鑰傳送模組 7 110681 1351865 回_讀加途過之認證金錄給該讀卡機;以及金鐘註冊功能 模組,係内建於該安全認證模組卡,用以將該讀卡機所接 收之加密過的認證金錄傳入該安全認證模組卡内,再使用 . 其私鑰將該加密過的認證金鑰解密,並判斷該認證金鑰解 密是否成功,若是,則將該認證金鑰儲存至該安全認證模 組卡之金鑰儲存區中;若否,則不予以儲存。 前述安全認證模組之認證系統的另一實施例中,該安 全認證模組之認證系統復包括複製金鑰加密模組,係内建 •於該安全認證模組卡,用以當Mifare卡插入該讀卡機時, 呼叫安全認證模組卡取得該複製金鑰,接著令該安全認證 模組卡使用該認證金鑰將該複製金鑰加密,並傳給認證 卡;以及複製金鑰解密模組,係内建於該認證卡,用以解 密加密過後的複製金鑰,換言之,將該加密過的複製金鑰 傳入該認證卡並令儲存於該認證卡中的認證金鑰將該加 密過的複製金鑰解密,並將該解密過之複製金鑰傳送至該 • Mifare 卡。 本發明之安全認證模組之認證方法,係應用於具有 RFID電路之讀卡機與Mifare卡,該讀卡機具有可分別插 置安全認證模組卡與認證卡之安全認證模組卡插槽及認 證卡插槽’該安全認證模組卡與該認證卡分別具有金錄儲 存區,且該安全認證模組卡之金鑰儲存區儲存有複製金 鑰,該安全認證模組之方法包括:透過該安全認證模組卡 產生包括公鑰與私鑰之RSA金鑰對,並將該金鑰對其中 的公錄傳送至該讀卡機;透過該讃卡機將其所接收的公錄 8 110681 1351865 傳入譆認挺卡_,並在該認證卡上產生認證金鑰;將該認 證金餘儲存於該認證卡之金錄儲存區中,同時將該認證金 •錄透過該讀卡機所傳入之公錄予以加密,再傳送該加密過 .. 之認證金錄至該讀卡機;令該讀卡機所接收之加密過的認 證金錄傳入該安全認證模組卡内,並透過該私錄將該加密 過的認證金鑰解密;以及判斷認證金鑰解密是否成功,若 是,則將該認證金鑰儲存至該安全認證模組卡之金鑰儲存 區中;若否,則不予以儲存。 • 前述安全認證模組之認證方法的另一實施例復包 括:將Mifare卡插入讀卡機中;呼叫安全認證模組卡取 得該複製金鑰;令該安全認證模組卡使用認證金鑰加密該 複製金鑰,並傳給認證卡;令該認證卡使用認證金鑰將該 加密過的複製金鑰解密;以及將該解密過之複製金鑰傳送 至該Mifare卡。 因此,本發明之安全認證模組之認證系統及方法係透 過插置有安全認證模組卡及認證卡之RFID讀卡機來施行 ®認證機制,首先由該RFID讀卡機呼叫安全認證模組卡交 換金鑰產生功能,然後將讀卡機電路板上所產生RSA金 鑰對傳送至安全認證模組卡並回傳其中的公鑰(public key)、將該公錄傳入讀卡機之認證卡並於該認證卡之電路 板上產生認證金鑰(Des3)、使用該公鑰加密此認證金繪並 回傳加密過之該認證金鑰、將該加密過之認證金鑰傳入該 安全認證模組卡中並使用該安全認證模組卡中之RSA私 錄(private key)解密、若解密成功則將該認證金绩儲存至 110681 9 1351865 安全款'證板組卡中’藉此,以後若%要透過該讀卡機取得 該安全認證模組卡之複製金錄時’鱿需要透過該讀卡機之 •該認證金錄來認證’因此可防止盜取安全認證模組卡及防 .止侧錄之情形發生’因而提南非接觸式RFID讀卡機之安 全性。 【實施方式】 以下係藉由特定的具體實施例說明本發明之實施方 式’熟悉此技藝之人士可由本說明書所揭示之内容輕易地 •瞭解本發明之其他優點與功效。本發明亦可藉由其他不同 的具體實施例加以施行或應用’本說明書中的各項細節亦 可基於不同觀點與應用,在不悖離本發明之精神下進行各 種修飾與變更。 請參閱第1 (A)圖’用以顯示本發明之安全認證模組 之認證系統1之一實施例的系統架構方塊示意圖。本發明 之安全認證模組之認證系統係例如建構在具有RFID電路 擊之Mifare讀卡機上,該讀卡機具有可分別插置安全認證 模組卡與認證卡之安全認證模組卡插槽及認證卡插槽,該 安全認證模組卡與該認證卡分別具有金鑰儲存區,且該安 全認證模組卡之金鑰儲存區儲存有複製金鑰,藉由本發明 之安全認證模組之認證系統1之建置可以增加RFID讀卡 機之安全性。如圖所示,該安全認證模組之認證系統1 包括安全認證模組卡1 〇内的金錄生成交換模組12、與金 鑰註冊功能模組14、以及認證卡20内的金鑰傳送模組 22、認證金鑰生成模組23、和認證金鑰加密模組24。該 10 110681 1351865 t全認證丨莫組係如同讀卡機之識別機制,亦即讀卡機上 傳、更新、開機確認時都需要使用到安全認證模組卡1〇。 當欲進行本發明安全認證模組認證之初始設定時,需 •.先同時準備兩張安控卡,一張為安全認證模組卡,另一張 則為讀卡機認證卡。讀卡機認證卡是空白卡,發給讀卡機 廠商並内建於項卡機中;而安全認證模組卡提供Mifare 複製金鑰,其預儲存於安全認證模組卡之儲存區内,用來 提供存取Mifare卡認證使用,其中該Mifare卡可例如為Abbreviation for Frequency identificati〇n, which can be called "radio frequency identification system" in Chinese. Usually a system consisting of a sensor (ReaderH〇RFID tag (Tag), the principle of operation is to use the sensor to emit no 110681 5 1351865 • Line H fusitivity range (4) RFID tag, generate current by electromagnetic induction The chip on the RFID tag operates and emits electromagnetic waves to respond. The sensor. Because the above-mentioned non-contact 1C card is mostly only identification function and less. It has a safety certification design, so it is only used for low security and simple identification. In order to solve the problem of low security of non-contact 1C card, there is a non-contact smart IC card developed for its security problem. Currently, non-contact smart 1C card readers and smart and IC cards are mostly used. Philips' Mifare technology, which complies with IS0 14443 #Contact Smart Card and Reader International Standard. The Mifare card read/write data used by t is independently encrypted in each magnetic zone, making it Better security. However, the current non-contact type (four) card machine still has its security concerns. That is, if the SAM card is stolen, it can be arbitrarily accessed or modified. The authority of the C card, and therefore the control mechanism is poor, it is necessary to provide an additional control mechanism to increase the security of the curry card reader, or to reduce the key to be recorded on the outside of the card reader. In summary, how to solve the security concerns of the above-mentioned non-contact RFID card readers to prevent the security authentication module card from being used arbitrarily after being used is a problem that needs to be solved at present. Disadvantages of the prior art, the main purpose of the present invention is to provide an authentication system and method for a security authentication module, which is applied to a card reader with a chest circuit and a step card to prevent the SAM from being taken through the authentication mechanism. Use it outside the corresponding card reader. 6 (S ) 110681 1351865 Another object of the unissued is to provide a certification system and method for a security authentication module, which is applied to a card reader with an RFID circuit and a Mifare card, through which the authentication mechanism can be used for security authentication. After the module card is stolen, the copy key (A/B key) is prevented. Another object of the present invention is to provide an authentication system and method for a security authentication module, which is applied to a card reader with an RFID circuit and a Mifare card, and the security of the contactless card reader can be increased through the authentication mechanism. . In order to achieve the above and other objects, the present invention provides an authentication system for a security authentication module, which is applied to a card reader with an RFID circuit and a Mifare card, which has a security authentication module card and a certificate that can be separately inserted. The security authentication module card slot and the authentication card slot of the card, the security authentication module card and the authentication card respectively have a key storage area, and the key storage area of the security authentication module card stores a copy key. The authentication system of the security authentication module includes: a key generation switching module, which is built in the security authentication module card, so that the security authentication module card generates an RSA key pair including a public key and a private key. And transmitting the public key of the key pair to the card reader, the private key is stored in the security authentication module card; the key transmission module is built in the authentication card to enable the The card reader transmits the public key it receives to the authentication card; the authentication key generation module is built in the authentication card to generate an authentication key on the authentication card, and the authentication key is generated Stored in the key storage area of the authentication card; The encryption module is built in the authentication card, and the authentication key generated by the authentication key generation module is encrypted by the public key transmitted by the key transmission module, and transmitted through the key transmission mode. Group 7 110681 1351865 Back to the read-through certificate is recorded to the card reader; and the Admiralty registration function module is built in the security authentication module card for encrypting the card reader The certificate is sent to the security authentication module card and used. The private key decrypts the encrypted authentication key and determines whether the authentication key is successfully decrypted. If yes, the authentication key is stored. To the key storage area of the security authentication module card; if not, it will not be stored. In another embodiment of the authentication system of the foregoing security authentication module, the authentication system of the security authentication module includes a copy key encryption module, which is built in the security authentication module card, and is used to insert the Mifare card. When the card reader is in use, the call security authentication module card obtains the copy key, and then causes the security authentication module card to encrypt the copy key using the authentication key, and transmits the copy key to the authentication card; and the copy key decryption mode The group is built in the authentication card to decrypt the encrypted copy key, in other words, the encrypted copy key is transmitted to the authentication card and the authentication key stored in the authentication card is encrypted. The copied key is decrypted and the decrypted copy key is transferred to the • Mifare card. The authentication method of the security authentication module of the present invention is applied to a card reader with an RFID circuit and a Mifare card, and the card reader has a security authentication module card slot in which a security authentication module card and an authentication card can be respectively inserted. And the authentication card slot, the security authentication module card and the authentication card respectively have a gold record storage area, and the key storage area of the security authentication module card stores a copy key, and the method of the security authentication module includes: Generating an RSA key pair including a public key and a private key through the security authentication module card, and transmitting the public key to the card reader; and receiving the public record 8 through the card reader 110681 1351865 The incoming authentication card _, and the authentication key is generated on the authentication card; the authentication amount is stored in the golden record storage area of the authentication card, and the authentication fee is recorded through the card reader The incoming public address is encrypted, and then the encrypted authentication certificate is recorded to the card reader; the encrypted authentication record received by the card reader is transmitted to the security authentication module card. And encrypt the encrypted authentication key through the private record. Adhesion; and determining whether the decrypted authentication keys successful, if yes, storing the authentication key to the key storage area in the security authentication module card; if not, will not be stored. • Another embodiment of the authentication method of the foregoing security authentication module includes: inserting a Mifare card into the card reader; calling the security authentication module card to obtain the copy key; and causing the security authentication module card to be encrypted using the authentication key And copying the key to the authentication card; causing the authentication card to decrypt the encrypted copy key using the authentication key; and transmitting the decrypted copy key to the Mifare card. Therefore, the authentication system and method of the security authentication module of the present invention implements the authentication mechanism by using an RFID card reader with a security authentication module card and an authentication card. First, the RFID card reader calls the security authentication module. The card exchange key generation function, and then the RSA key pair generated on the card reader circuit board is transmitted to the security authentication module card and the public key (public key) is returned, and the public record is transmitted to the card reader. The authentication card generates an authentication key (Des3) on the circuit board of the authentication card, encrypts the authentication key with the public key, and returns the encrypted authentication key, and transmits the encrypted authentication key to the authentication key. The security authentication module card uses the RSA private key in the security authentication module card to decrypt, and if the decryption succeeds, the certification value is stored in the 110681 9 1351865 security section 'board card group' In the future, if % is required to obtain the copy of the security certification module card through the card reader, 'the certificate needs to be authenticated through the card reader', so it can prevent theft of the security authentication module card. Preventing the occurrence of side recordings happening' An Tinan the non-contact type RFID reader of the whole. [Embodiment] The following embodiments of the present invention are described by way of specific embodiments. Those skilled in the art can readily understand the other advantages and functions of the present invention from the disclosure herein. The present invention may be embodied or applied in various other specific embodiments. The details of the present invention can be variously modified and changed without departing from the spirit and scope of the invention. Please refer to FIG. 1(A) for a block diagram showing the system architecture of an embodiment of the authentication system 1 of the security authentication module of the present invention. The authentication system of the security authentication module of the present invention is, for example, constructed on a Mifare card reader with an RFID circuit, and the card reader has a security authentication module card slot in which a security authentication module card and an authentication card can be respectively inserted. And the authentication card slot, the security authentication module card and the authentication card respectively have a key storage area, and the key storage area of the security authentication module card stores a copy key, by the security authentication module of the present invention The establishment of the authentication system 1 can increase the security of the RFID reader. As shown in the figure, the authentication system 1 of the security authentication module includes a golden record generation switch module 12 in the secure authentication module card 1 , a key registration function module 14 , and a key transfer in the authentication card 20 . The module 22, the authentication key generation module 23, and the authentication key encryption module 24. The 10 110681 1351865 t full-certification group is like the recognition mechanism of the card reader, that is, the card reader is required to use the security authentication module card when uploading, updating, and booting. When the initial setting of the security authentication module authentication of the present invention is to be performed, it is necessary to prepare two security control cards at the same time, one for the security authentication module card and the other for the card reader authentication card. The card reader authentication card is a blank card that is sent to the card reader manufacturer and built into the card reader machine. The security authentication module card provides the Mifare copy key, which is pre-stored in the storage area of the security authentication module card. Used to provide access to Mifare card authentication, wherein the Mifare card can be, for example

•符合ISO 14443標準之塑膠卡片’其可以是PVC、ABS 或更高級的合成塑膠材質,内含有微處理或記憶體與控制 邏輯所組成的晶片以及與該讀卡機通訊的介面。 使用者取得安全認證模組卡後安裝於讀卡機1的安 全認證模組插槽(未顯示於圖中)中,然後啟動初始設定, 於是該讀卡機1透過内建於該安全認證模組卡10之金錄 生成交換模組12而令該安全認證模組卡產生包括公鑰與 鲁私錄之RSA金输對(RSA key pair),並將該金鑰對其中 的公鑰(Kpuk)傳送至該讀卡機1,其中該RSA金鑰對係結 合讀卡機上的序號產生,且該RSA金鑰對包括一把公錄 (public key)和一把私鑰(private key),由於該私錄(KpVk) 係於該安全認證模組卡中,故無法回傳。需補充說明者, 較佳者,RS A金論對係以onboard方式產生,則私錄係 onboard於該安全認證模組卡中。 金鑰傳送模組22係内建於該認證卡20,用以令該讀 卡機1將其所接收的公錄(Kpuk)傳入該認證卡20中,亦 11 110681 1351865 即,·一·旦該讀卡機1接收到公鑰(Kpuk)便會通知該金鑰傳 送模組22立即摘取該公鑰(Kpuk)。 認證金鑰生成模組23,係内建於該認證卡20,用以 在該認證卡20上產生認證金鑰(Triple-DES,Kdes3)’並將 該認證金鑰(Kdes3)儲存於該認證卡之金鑰儲存區中,其 中該認證金鑰係屬於一種三重資料加密標準(Triple Data Encryption Standard)演算法的基底類別,所有Triple DES 實作(Implementation)必須從它衍生。需補充說明者,較 φ佳者,認證金输係以onboard方式產生。 認證金鑰加密模組24 ’係内建於該認證卡20 ’用以 將認證金鑰生成模組23所產生之認證金鑰(Kdes3)透過該 金鑰傳送模組22所傳入之公鑰(Kpuk)予以加密並透過該 金鑰傳送模組22回傳該加密過之認證金鑰(E(Kpuk, Kdes3))給該讀卡機1。 金鑰註冊功能模組14,係内建於該安全認證模組卡 10,用以將該讀卡機1所接收之加密過的認證金輪 (E(Kpuk,Kdes3))傳入該安全認證模組卡10内,並使用其 私鑰(Kpvk)將該加密過的認證金鑰解密(E(Kpuk, Kdes3)),若解密成功,則將該認證金鑰(Kdes3)儲存至該 安全認證模組卡10之金鑰儲存區(圖中未顯示)中,此時 即完成SAM認證之初始設定’若否’則不予以儲存。 上述内容中,需要附加說明的是該安全認證模組卡 10中的金鑰對產生及認證金鑰註冊被設計成只能被寫入 一次,而且是無法被讀取的(write only & once) ’而認證 12 110681 1351865 卡20乏認證金鑰(Kdes3)產生被設計成只能被寫入無法讀 取,但能覆寫多次(write only)。由此可知,安全認證模組 -設計成write only & once表示一經設定就無法更改,認證 . 卡20允許覆寫是因為可能需要更換安全認證模組卡1〇, 一旦更換該安全認證模組卡10就須重新設定認證卡20 中的認證金鑰(Kdes3),由於兩者都無法被讀取金鑰,因 此,可確保認證金鑰(Kdes3)不會被側錄外洩。 請參閱第1(B)圖,其用以顯示本發明之安全認證模 #組之認證系統Γ之另一實施例的系統架構方塊示意圖。 本實施例之安全認證模組之認證系統1,,其中除複製金 鑰加密模組16與複製金鑰解密模組21外,各系統構件間 的運作關係與第1(A)圖相同,故在此將不另贅述,惟本 圖加入一 Mifare卡30作為該安全認證模組認證初始設定 完成後之示範操作實施例。透過本實施例可暸解Mifare 卡30如何取得安全認證模組卡10之複製金鑰及如何透過 •讀卡機1之認證金鑰(kdes3)來認證。 複製金鑰加密模組16,係内建於該安全認證模組卡 10,用以當Mifare卡30插入該讀卡機1,時,令該安全認 證模組卡10使用該認證金鑰(kdes3)將該複製金鑰加密, 並傳給認證卡20。 複製金鑰解密模組21,係内建於認證卡20,用以解 密加密過後的複製金錄,換言之,將該加密過的複製金錄 傳入認證卡20並令儲存於該認證卡中的認證金鑰(kdes3) 將該加密過的複製金鑰解密,並將該解密過之複製金鑰傳 13 110681 1351865 送i該Mifare卡。 請參閱第2圖,係顯示本發明之安全認證模組之認證 •方法的基本運作流程示意圖,其係應用於具有rfid電路 .·之須卡機與Mifare卡,該讀卡機具有可分別插置於其安 --全認證模組卡插槽及認證卡插槽之安全認證模組卡與認 證卡,透過本方法之設定,可初始該安全認證模組認證之 設定’該流程包括以下步驟。 於步驟S22中,令該安全認證模組卡產生包括公鑰與 φ私錄之RSA金鑰對(RSA key pair),並將該金鑰對其中 的公錄(Kpuk)傳送至該讀卡機,需補充說明者,較佳者, RSA金錄對係以〇nb〇ard方式產生。接著進行步驟S2 3。 RSA係由羅納德.李維斯特(Ron Rivest)、阿迪.薩莫爾 (Adi Shamir)和倫納德.阿德曼(Leonard Adleman)於 1977 年共同提出的非對稱加密演算法。 於步驟S23中,令該讀卡機將其所接收的公鑰(Kpuk) 傳入該認證卡中,並在該認證卡上產生認證金鑰 (Kdes3),需補充說明者,較佳者,認證金錄係以onboard 方式產生。接著進行步驟S24。 於步驟S24中,將該認證金鑰(Kdes3)儲存於該認證 卡之金鑰儲存區中,同時將該認證金鑰(Kdes3)透過該讀 卡機所傳入之公錄(Kpuk)予以加密,然後傳送該加密過之 認證金錄E(Kpuk,Kdes3)至該讀卡機,接著進行步驟S25。 於步驟S25中,令該讀卡機所接收之加密過的認證金 鑰E(Kpuk,Kdes3)傳入該安全認證模組卡内,並透過其私 14 110681 1351865 ‘(kp'vk)將該加密過的認證金鑰E(Kpuk, Kdes3)解密,若 解密成功,接著進行步驟S26,若否,則不儲存。 於步驟S26中,令該認證金鑰(Kdes3)儲存至該安全 認證模組卡之金鑰儲存區中。 請參閱第3圖,係顯示本發明之使用Mifare卡取得 複製金鑰之加解密方法的一實施例的運作流程示意圖,用 以說明依據第2圖所完成SAM認證初始設定後之運作流 程式示意圖。透過該流程可讓使用者瞭解認證卡與該讀卡 籲機(安全認證模組卡)間的運作及如何加解密複製金鑰,該 流程包括以下步驟。 於步驟S30中,將Mifare卡插入讀卡機中,接著進 行步驟S31。 於步驟S31中,呼叫安全認證模組卡取得複製金鑰, 接著進行步驟S32。 於步驟S32中,令該安全認證模組卡使用認證金鑰加 密該複製金鑰,接著進行步驟S34。 ^ 於步驟S34中,令該加密過的複製金鑰傳送至認證卡 中,接著進行步驟S36。 於步驟S36中,令該認證卡使用認證金鑰解密該加密 過之複製金鑰,接著進行步驟S38。 於步驟S38中,將該解密過之複製金鑰傳送至該 Mifare 卡。 綜上所述,本發明之安全認證模組之認證系統及方法 係透過插置有安全認證模組卡及認證卡之RFID讀卡機來 15 110681 1351865 施行詨證板制,透過此認證機制,安全認證模組卡一經設 定就無法更改、覆寫,且其所產生之認證金鑰亦無法被讀 _取,因此可防止安全認證模組卡被盜取及防止側錄之情形 _. 發生,因而提高非接觸式RFID讀卡機之安全性。 上述實施例僅為例示性說明本發明之原理及其功 效,而非用於限制本發明。任何熟習此項技藝之人士均可 在不違背本發明之精神及範疇下,對上述實施例進行修飾 與變化。因此,本發明之權利保護範圍,應如後述之申請 _專利範圍所列。 【圖式簡單說明】 第1(A)圖係用以顯示本發明之安全認證模組之認證 系統1之一實施例的系統架構方塊示意圖; 第1 (B)圖係用以顯示本發明之安全認證模組之認證 系統Γ之另一實施例的系統架構方塊示意圖。; 第2圖係顯示本發明之安全認證模組之認證方法的 I基本運作流程示意圖;以及 第3圖係顯示本發明之使用Mifare卡取得複製金鑰 之加解密方法的一實施例的運作流程示意圖。 【主要元件符號說明】 1,Γ 讀卡機 2 讀卡機本身 10 安全認證模組卡 12 金鑰生成交換模組 金鑰註冊功能模組 16 110681 14 1351865 16 ‘ 凌製金鑰加密模組 20 認證卡 21 複製金鑰解密模組 22 金鑰傳送模組 23 認證金鑰生成模組 24 認證金鑰加密模組 30 Mifare 卡 步驟 S22, S23, S24, S25, S23 步驟 • S30, S31, S32, S34, S36, S38• A plastic card conforming to the ISO 14443 standard. It can be a PVC, ABS or higher synthetic plastic material containing a wafer of microprocessor or memory and control logic and an interface for communication with the card reader. After the user obtains the security authentication module card, it is installed in the security authentication module slot (not shown in the figure) of the card reader 1, and then starts the initial setting, so that the card reader 1 is built in the security authentication mode. The group card 10 records the exchange module 12 to cause the security authentication module card to generate an RSA key pair including the public key and the private record, and the public key to the key (Kpuk) Transferring to the card reader 1, wherein the RSA key pair is generated in conjunction with a serial number on the card reader, and the RSA key pair includes a public key and a private key. Since the private record (KpVk) is attached to the security authentication module card, it cannot be returned. It is necessary to add a note. Preferably, the RS A gold theory is generated on the onboard method, and the private record is onboard in the security authentication module card. The key transfer module 22 is built in the authentication card 20 for causing the card reader 1 to transmit the received public record (Kpuk) to the authentication card 20, which is also 11 110681 1351865, ie, Once the card reader 1 receives the public key (Kpuk), it will notify the key delivery module 22 to immediately extract the public key (Kpuk). The authentication key generation module 23 is built in the authentication card 20 for generating an authentication key (Triple-DES, Kdes3) on the authentication card 20 and storing the authentication key (Kdes3) in the authentication. In the key storage area of the card, the authentication key belongs to the base class of the Triple Data Encryption Standard algorithm, and all Triple DES implementations must be derived from it. Those who need to add a note are more likely to use the onboard method than the φ. The authentication key encryption module 24' is built in the authentication card 20' to transmit the authentication key generated by the authentication key generation module 23 (Kdes3) to the public key transmitted by the key transmission module 22. (Kpuk) encrypts and transmits the encrypted authentication key (E(Kpuk, Kdes3)) to the card reader 1 through the key transfer module 22. The key registration function module 14 is built in the security authentication module card 10, and is used to transmit the encrypted authentication gold wheel (E(Kpuk, Kdes3)) received by the card reader 1 to the security authentication mode. The encrypted authentication key is decrypted (E(Kpuk, Kdes3)) using the private key (Kpvk) in the group card 10. If the decryption is successful, the authentication key (Kdes3) is stored in the security authentication mode. In the key storage area of the group card 10 (not shown), the initial setting of the SAM authentication is completed at this time, and if not, it is not stored. In the above, it should be additionally noted that the key pair generation and authentication key registration in the security authentication module card 10 is designed to be written only once and cannot be read (write only & once ) And the certification 12 110681 1351865 card 20 lack of authentication key (Kdes3) generation is designed to be written only unreadable, but can be written multiple times (write only). It can be seen that the security authentication module - designed to write only & once means that once set, it cannot be changed, the authentication. The card 20 allows overwriting because the security authentication module card may need to be replaced, once the security authentication module is replaced. The card 10 is required to reset the authentication key (Kdes3) in the authentication card 20, and since neither of them can be read, it is ensured that the authentication key (Kdes3) is not marginally leaked. Please refer to FIG. 1(B), which is a block diagram showing the system architecture of another embodiment of the authentication system of the security authentication module of the present invention. In the authentication system 1 of the security authentication module of the embodiment, except for the copy key encryption module 16 and the copy key decryption module 21, the operational relationship between the system components is the same as that of the first (A) figure. It will not be described here, but the figure is added to a Mifare card 30 as an exemplary operation example after the initial setting of the security authentication module is completed. Through this embodiment, it is understood how the Mifare card 30 obtains the copy key of the secure authentication module card 10 and how it is authenticated by the authentication key (kdes3) of the card reader 1. The copy key encryption module 16 is built in the security authentication module card 10 for enabling the security authentication module card 10 to use the authentication key when the Mifare card 30 is inserted into the card reader 1 (kdes3) The copy key is encrypted and passed to the authentication card 20. The copy key decryption module 21 is built in the authentication card 20 for decrypting the encrypted copy record, in other words, the encrypted copy record is transmitted to the authentication card 20 and stored in the authentication card. The authentication key (kdes3) decrypts the encrypted copy key and transmits the decrypted copy key 13 110681 1351865 to the Mifare card. Please refer to FIG. 2, which is a schematic diagram showing the basic operation flow of the authentication method of the security authentication module of the present invention, which is applied to a card machine and a Mifare card having an rfid circuit, and the card reader has a separately insertable The security authentication module card and the authentication card placed in the security-certified module card slot and the authentication card slot can be initially set by the method of the method. The process includes the following steps. . In step S22, the security authentication module card is generated to generate an RSA key pair including a public key and a private record, and the public key (Kpuk) of the key is transmitted to the card reader. It is necessary to add a note, preferably, the RSA record is produced in the form of 〇nb〇ard. Next, step S2 3 is performed. RSA is an asymmetric encryption algorithm jointly proposed by Ron Rivest, Adi Shamir and Leonard Adleman in 1977. In step S23, the card reader is caused to transmit the public key (Kpuk) received by the card reader to the authentication card, and the authentication key (Kdes3) is generated on the authentication card, and the explanation is added, preferably, The certification record is generated onboard. Next, step S24 is performed. In step S24, the authentication key (Kdes3) is stored in the key storage area of the authentication card, and the authentication key (Kdes3) is encrypted through the public record (Kpuk) introduced by the card reader. Then, the encrypted authentication record E (Kpuk, Kdes3) is transmitted to the card reader, and then step S25 is performed. In step S25, the encrypted authentication key E (Kpuk, Kdes3) received by the card reader is transmitted to the security authentication module card, and the private authentication module is used by the user 14 110681 1351865 '(kp'vk) The encrypted authentication key E (Kpuk, Kdes3) is decrypted. If the decryption is successful, then step S26 is performed, and if not, it is not stored. In step S26, the authentication key (Kdes3) is stored in the key storage area of the secure authentication module card. Please refer to FIG. 3, which is a schematic diagram showing the operation of an embodiment of the encryption and decryption method for obtaining a copy key using the Mifare card according to the present invention, which is used to illustrate the operational flow diagram after the initial setting of the SAM authentication according to FIG. . Through this process, the user can understand the operation between the authentication card and the card reader (secure authentication module card) and how to encrypt and decrypt the copy key. The process includes the following steps. In step S30, the Mifare card is inserted into the card reader, and then step S31 is performed. In step S31, the call security authentication module card obtains the copy key, and then proceeds to step S32. In step S32, the secure authentication module card is caused to encrypt the copy key using the authentication key, and then proceeds to step S34. In step S34, the encrypted copy key is transmitted to the authentication card, and then step S36 is performed. In step S36, the authentication card is caused to decrypt the encrypted copy key using the authentication key, and then proceeds to step S38. In step S38, the decrypted copy key is transmitted to the Mifare card. In summary, the authentication system and method of the security authentication module of the present invention is implemented by the RFID card reader with the security authentication module card and the authentication card, and the authentication mechanism is implemented by 15 110681 1351865. Once the security authentication module card is set, it cannot be changed or overwritten, and the authentication key generated by it cannot be read and retrieved. Therefore, it can prevent the security authentication module card from being stolen and prevent the side recording. Therefore, the security of the contactless RFID card reader is improved. The above embodiments are merely illustrative of the principles and effects of the invention and are not intended to limit the invention. Modifications and variations of the above-described embodiments can be made by those skilled in the art without departing from the spirit and scope of the invention. Therefore, the scope of the protection of the present invention should be as listed in the application _ patent scope described later. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1(A) is a block diagram showing the system architecture of an embodiment of the authentication system 1 of the security authentication module of the present invention; FIG. 1(B) is a diagram showing the present invention. A block diagram of a system architecture of another embodiment of an authentication system of a secure authentication module. 2 is a schematic diagram showing a basic operation flow of the authentication method of the security authentication module of the present invention; and FIG. 3 is a flowchart showing an operation of an embodiment of the encryption and decryption method for obtaining a copy key using the Mifare card of the present invention; schematic diagram. [Main component symbol description] 1, 读 Card reader 2 Card reader itself 10 Security authentication module card 12 Key generation switching module key registration function module 16 110681 14 1351865 16 'Ling key encryption module 20 Authentication Card 21 Copy Key Decryption Module 22 Key Transfer Module 23 Authentication Key Generation Module 24 Authentication Key Encryption Module 30 Mifare Card Steps S22, S23, S24, S25, S23 Steps • S30, S31, S32, S34, S36, S38

17 11068117 110681

Claims (1)

第96150715號專利申請案 100年8月2自修正替換頁 十、申請專利範園: 1. 一種戈·全涊證模組之認證系統,係應用於具有rfid 電路之讀卡機與Mifare卡,該讀卡機具有可分別插置 安全認證模組卡與認證卡之安全認證模組卡插槽及認 證卡插槽’該安全認證模組卡與該認證卡分別具有金 錄儲存區’且該安全認證模組卡之金錄儲存區健存有 複製金鑰,該安全認證模組之認證系統包括: 金鑰生成交換模組,係内建於該安全認證模組 卡’用以令該安全認證模組卡產生包括公输與私錄之 RSA金鑰對’並將該RSA金鑰對中的公鑰傳送至該讀 卡機,該私鑰則係儲存於該安全認證模組卡中; 金鑰傳送模組,係内建於該認證卡,用以令該讀 卡機將其所接收的公鑰傳入該認證卡中; 認證金鑰生成模組,係内建於該認證卡,用以在 該認證卡上產生認證金鑰,並將該認證金鑰儲存於該 認證卡之金錄儲存區中; 認證金鑰加密模組’係内建於該認證卡’用以將 該認證金鑰生成模組所產生之認證金鑰透過該金鑰傳 送模組所傳入之公錄予以加密,並透過該金输傳送模 組回傳該加密過之認證金鑰給該讀卡機;以及 金鑰註冊功能模組,係内建於該安全認證模組 卡,用以將該讀卡機所接收之加密過的認證金錄傳入 該安全認證模組卡内’再使用其私鑰將該加密過的認 證金鑰解密,並判斷該認證金錄解密是否成功’若是’ 110681(修正版) 1351865 2. 第96150715號專利申請案 ' 100年8月2日修正替換頁 則將該認證金鑰儲存至該安全認證模組卡之金鑰儲存 區中;若否,則不予以儲存。 如申請專利範圍第1項之安全認證模組之認證系統, 其中,該金鑰註冊功能模組所解密的認證金鑰只能寫 入該安全認證模組卡之金鑰儲存區一次,且無法被讀 取0 3. 如申請專利範圍第2項之安全認證模組之認證系統, 其中,該解密的認證金鑰於寫入該安全認證模組卡之 金鑰儲存區後即無法變更。 4. 如申請專利範圍第1項之安全認證模組之認證系統, 其中,該認證金鑰生成模組所產生之認證金鑰只能被 寫入而無法讀取,且能覆寫多次至該認證卡之金鑰儲 存區。 5. 如申請專利範圍第1項之安全認證模組之認證系統, 其中,該安全認證模組卡僅對應單獨之認證金鑰。 6. 如申請專利範圍第1項之安全認證模組之認證系統, 復包括一複製金鑰加密模組,係内建於該安全認證模 組卡,用以當該Mi fare卡插入該讀卡機時,呼叫該安 全認證模組卡取得該複製金鑰,接著令該安全認證模 組卡使用該認證金鑰將該複製金鑰加密,並將該加密 過的複製金鑰傳送至該認證卡。 7. 如申請專利範圍第6項之安全認證模組之認證系統, 復包括一複製金鑰解密模組,係内建於該認證卡,用 以將該加密過的複製金鑰解密,並將該解密過之複製 19 110681(修正版) 1351865 第96150715號專利申請案 100年8月2日修正替換頁 金錄傳送至該Mifare卡。 8·如申請專利範圍第1項之安全認證模組之認證系統, 其中,該安全認證模組卡係以onboard方式產生該RSA 金錄對。 9. 如申請專利範圍第1項之安全認證模組之認證系統, 其中,該認證卡係以onboard方式產生該認證金鑰。 10. —種安全認證模組之認證方法,係應用於具有RFID 電路之讀卡機與Mif are卡,該讀卡機具有可分別插置 安全認證模組卡與認證卡之安全認證模組卡插槽及認 證卡插槽,該安全認證模組卡與該認證卡分別具有金 鑰儲存區,且該安全認證模組卡之金鑰儲存區儲存有 複製金瑜’該安全認證模組之方法包括: 透過該安全認證模組卡產生包括公鏑與私餘之 RSA金鑰對,並將該RSA金鑰對其中的公鑰傳送至該 讀卡機; 透過該讀卡機將其所接收的公鑰傳入該認證卡 中,並在該認證卡上產生認證金鑰; 將該認證金鑰儲存於該認證卡之金鑰儲存區中, 同時將該認證金鑰透過該讀卡機所傳入之公鑰予以加 密,再傳送該加密過之認證金鑰至該讀卡機; 令該讀卡機所接收之加密過的認證金鑰傳入該安 全認證模組卡内,並透過該私鑰將該加密過的認證金 鑰解密;以及 判斷該認證金鑰解密是否成功,若是,則將該認 20 110681(修正版) 1351865 _ - 第96150715號專利申請案 . 100年8月2日修正替換頁 • 證金鑰儲存至該安全認證模組卡之金鑰儲存區中;若 ' 否,則不予以儲存。 11. 如申請專利範圍第1 〇項之安全認證模組之認證方 法,復包括使用該Mifare卡取得該安全認證模組卡之 複製金鑰的方法,包括: 將該Mi fare卡插入該讀卡機中; 呼叫該安全認證模組卡取得該複製金鑰; 令該安全認證模組卡使用該認證金鑰加密該複製 鲁 金錄; 令該加密過的複製金錄傳送至該認證卡中; 令該認證卡使用該認證金鑰解密該加密過之複製 金鑰;以及 將該解密過之複製金鑰傳送至該Mifare卡。 12. 如申請專利範圍第10項之安全認證模組之認證方 法,其中,該解密的認證金鑰只能寫入該安全認證模 組卡之金錄儲存區一次,且無法被讀取。 _ 13.如申請專利範圍第11項之認證方法,其中,該解密的 認證金鑰寫入該安全認證模組卡之金鑰儲存區後即無 法變更。 14. 如申請專利範圍第10項之安全認證模組之認證方 法,其中,該認證金鑰只能被寫入而無法讀取,且能 覆寫多次至該認證卡之金錄儲存區。 15. 如申請專利範圍第1 〇項之安全認證模組之認證方 法,其中,該安全認證模組卡僅對應單獨之認證金鑰。 21 110681(修正版) 1351865 第96150715號專利申請案 100年8月2日修正替換頁 16. 如申請專利範圍第10項之安全認證模組之認證方 法,其中,該安全認證模組卡係以onboard方式產生 該RSA金鑰對。 17. 如申請專利範圍第10項之安全認證模組之認證方 法,其中,該認證卡係以onboard方式產生該認證金 鑰0Patent Application No. 96150515, August 2, 2, Amendment and Replacement Page 10, Application for Patent Fan Park: 1. A certification system for the Ge·Fujian certificate module, which is applied to a card reader with a rfid circuit and a Mifare card. The card reader has a security authentication module card slot and a certification card slot for respectively inserting a security authentication module card and an authentication card, and the security authentication module card and the authentication card respectively have a gold recording storage area and The security certificate module has a copy key stored in the golden record storage area. The authentication system of the security authentication module includes: a key generation exchange module, which is built in the security authentication module card to make the security The authentication module card generates an RSA key pair including public and private records and transmits the public key of the RSA key pair to the card reader, and the private key is stored in the security authentication module card; The key transfer module is built in the authentication card, so that the card reader can transmit the public key received by the card reader to the authentication card; the authentication key generation module is built in the authentication card, and is used by the card. To generate an authentication key on the authentication card and to use the authentication key Stored in the golden record storage area of the authentication card; the authentication key encryption module is built in the authentication card to transmit the authentication key generated by the authentication key generation module to the key transmission module The incoming public address is encrypted, and the encrypted authentication key is returned to the card reader through the gold transmission module; and the key registration function module is built in the security authentication module card. And the encrypted authentication certificate received by the card reader is sent to the security authentication module card, and then the encrypted authentication key is decrypted by using the private key, and it is determined whether the authentication record is decrypted. Successful 'if' 110 681 (Revised Edition) 1351865 2. Patent Application No. 96150515 "August 2, 100, revised replacement page, the authentication key is stored in the key storage area of the security authentication module card; No, it will not be stored. For example, the authentication system of the security authentication module of the first application of the patent scope, wherein the authentication key decrypted by the key registration function module can only be written into the key storage area of the security authentication module card once, and cannot be Read 0. 3. For the authentication system of the security authentication module of claim 2, the decrypted authentication key cannot be changed after being written into the key storage area of the security authentication module card. 4. The authentication system of the security authentication module of claim 1 of the patent scope, wherein the authentication key generated by the authentication key generation module can only be written and cannot be read, and can be overwritten multiple times to The key storage area of the authentication card. 5. For the authentication system of the security certification module of claim 1 of the patent scope, the security authentication module card only corresponds to a separate authentication key. 6. The authentication system of the security authentication module of claim 1 of the patent scope includes a copy key encryption module built in the security authentication module card for inserting the card into the Mi fare card. Calling the security authentication module card to obtain the copy key, and then causing the security authentication module card to encrypt the copy key using the authentication key, and transmitting the encrypted copy key to the authentication card . 7. The authentication system of the security authentication module of claim 6 of the patent scope includes a copy key decryption module built in the authentication card for decrypting the encrypted copy key, and The decrypted copy 19 110681 (revision) 1351865 Patent No. 96150515 Patent Aug. 2, 100, revised replacement page is transferred to the Mifare card. 8. The authentication system of the security authentication module of claim 1 of the patent scope, wherein the security authentication module card generates the RSA golden record pair onboard. 9. The authentication system of the security authentication module of claim 1 of the patent scope, wherein the authentication card generates the authentication key in an onboard manner. 10. The authentication method of the safety certification module is applied to the card reader with the RFID circuit and the Mif are card, and the card reader has a security authentication module card capable of respectively inserting the security authentication module card and the authentication card. a slot and an authentication card slot, the security authentication module card and the authentication card respectively have a key storage area, and the key storage area of the security authentication module card stores a method for copying Jin Yu' the security authentication module The method includes: generating, by using the security authentication module card, an RSA key pair including a public and private, and transmitting the public key of the RSA key to the card reader; receiving the received by the card reader The public key is transmitted to the authentication card, and an authentication key is generated on the authentication card; the authentication key is stored in the key storage area of the authentication card, and the authentication key is transmitted through the card reader. The public key is encrypted, and the encrypted authentication key is transmitted to the card reader; the encrypted authentication key received by the card reader is transmitted to the security authentication module card, and the private key is transmitted through the private authentication module The key decrypts the encrypted authentication key; It is judged whether the decryption of the authentication key is successful, and if so, the patent application of the claim 20 110681 (revision) 1351865 _ - No. 96150515. The revised replacement page of the August 2, 100, is stored in the security authentication mode. In the key storage area of the group card; if no, it will not be stored. 11. The method for authenticating the security authentication module of claim 1 includes the method of obtaining the copy key of the security authentication module card by using the Mifare card, including: inserting the Mi fare card into the card Calling the security authentication module card to obtain the copy key; causing the security authentication module card to encrypt the copy Lujin record using the authentication key; and transmitting the encrypted copy record to the authentication card; Having the authentication card decrypt the encrypted copy key using the authentication key; and transmitting the decrypted copy key to the Mifare card. 12. For the authentication method of the security authentication module of claim 10, the decrypted authentication key can only be written into the golden record storage area of the security authentication module card once and cannot be read. _ 13. The authentication method of claim 11, wherein the decrypted authentication key cannot be changed after being written into the key storage area of the secure authentication module card. 14. For the authentication method of the security authentication module of claim 10, the authentication key can only be written and cannot be read, and can be overwritten to the golden record storage area of the authentication card. 15. For the authentication method of the security authentication module of the first application of the patent scope, the security authentication module card only corresponds to a separate authentication key. 21 110681 (Revised Edition) 1351865 Patent Application No. 96150515, Rev. A., August 2, 100. The replacement method of the security authentication module of claim 10, wherein the security authentication module card is The onboard method generates the RSA key pair. 17. For the authentication method of the security authentication module of claim 10, wherein the authentication card generates the authentication key onboard. 22 11068U修正版)22 11068U revision)
TW96150715A 2007-12-28 2007-12-28 Authentication system and method for a safety authentication module TW200929986A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96150715A TW200929986A (en) 2007-12-28 2007-12-28 Authentication system and method for a safety authentication module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96150715A TW200929986A (en) 2007-12-28 2007-12-28 Authentication system and method for a safety authentication module

Publications (2)

Publication Number Publication Date
TW200929986A TW200929986A (en) 2009-07-01
TWI351865B true TWI351865B (en) 2011-11-01

Family

ID=44864713

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96150715A TW200929986A (en) 2007-12-28 2007-12-28 Authentication system and method for a safety authentication module

Country Status (1)

Country Link
TW (1) TW200929986A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120314865A1 (en) * 2011-06-07 2012-12-13 Broadcom Corporation NFC Communications Device for Setting Up Encrypted Email Communication
CN103971044A (en) * 2014-05-07 2014-08-06 深圳市建设工程交易服务中心 Radio frequency identification and digital signature integration device

Also Published As

Publication number Publication date
TW200929986A (en) 2009-07-01

Similar Documents

Publication Publication Date Title
US7870998B2 (en) Private information exchange in smart card commerce
CN106415611B (en) Self-authentication chip
AU2005223902B2 (en) Authentication between device and portable storage
JP5272637B2 (en) Information processing apparatus, encryption switching method, and program
US7409554B2 (en) Data processing system, memory device, data processing unit, and data processing method and program
US5781723A (en) System and method for self-identifying a portable information device to a computing unit
TW201248409A (en) Security architecture for using host memory in the design of a secure element
WO2013155562A1 (en) Nfc card lock
JP4729839B2 (en) IC card
CA2568041A1 (en) Apparatus and method for operating plural applications between portable storage device and digital device
TWI351865B (en)
US8782749B2 (en) Information processing device, information processing method, and program
JP2004287805A (en) Slave card issuance system and slave card utilization system
JPH0375983A (en) Card utilizing system
JP3693709B2 (en) Information writing / reading method for portable information recording medium
US8458493B2 (en) Protection of a digital content on a physical medium
JP7120214B2 (en) Terminal device, information processing system, terminal device control method and program
JP2003174442A (en) Cryptographic key generation processing method
WO2015177310A1 (en) System and method for post-issuance enablement of asymmetric-key application loading on smartcards issued as symmetric-key application-loading smartcards
JP2005309976A (en) Content management system and method, and individual authentication device
KR20100067997A (en) Apparatus for reading and writing smartcard, and data security method thereby
JP2005018807A (en) Information storage by using tag to store information and related apparatus
JP2000331240A (en) Device for recording data onto recording medium
IDflex Document Version: 1.0 Date: May 2, 2012
JP2004178407A (en) Ic card issuing device and ic card issuing method

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees