WO2011076102A1 - 一种一卡通系统的实现方法和系统以及一种智能卡 - Google Patents

一种一卡通系统的实现方法和系统以及一种智能卡 Download PDF

Info

Publication number
WO2011076102A1
WO2011076102A1 PCT/CN2010/080042 CN2010080042W WO2011076102A1 WO 2011076102 A1 WO2011076102 A1 WO 2011076102A1 CN 2010080042 W CN2010080042 W CN 2010080042W WO 2011076102 A1 WO2011076102 A1 WO 2011076102A1
Authority
WO
WIPO (PCT)
Prior art keywords
enterprise
sensitive data
message
encryption key
key
Prior art date
Application number
PCT/CN2010/080042
Other languages
English (en)
French (fr)
Inventor
乐祖晖
郭漫雪
任晓明
罗烽
李亚强
Original Assignee
中国移动通信集团公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国移动通信集团公司 filed Critical 中国移动通信集团公司
Priority to KR1020127018868A priority Critical patent/KR101509043B1/ko
Priority to RU2012130527/08A priority patent/RU2573211C2/ru
Priority to JP2012545068A priority patent/JP2013515301A/ja
Priority to EP10838665.7A priority patent/EP2518933A4/en
Priority to US13/518,224 priority patent/US20120284519A1/en
Publication of WO2011076102A1 publication Critical patent/WO2011076102A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0866Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3574Multiple applications on card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3576Multiple memory zones on card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to the field of technology, and in particular to a system implementation method and system and a smart card.
  • the system helps to realize information exchange, sharing and unified management within the enterprise.
  • the current enterprise card system has covered employee identification, employee attendance, salary management, personnel management, electronic access control, access control, vehicle access management, Employee internal consumption management, electronic sign-in for meetings, and security patrol management. Yes, the card system has penetrated into all aspects of enterprise management, making all management work more efficient and scientific.
  • SIM Subscriber Identity Module
  • USIM global User Identity Module
  • a smart card usually includes only one enterprise application, and can be divided into a single application card and a multi-application card depending on the number of applications.
  • FIG. 1 is a schematic diagram of an existing single application card; the card includes only one application of a certain enterprise, such as an employee identification application or a salary management application.
  • FIG. 2 is a schematic diagram of an existing multi-application card; the card includes multiple applications of a certain enterprise, such as an employee identification application and a salary management application.
  • the existing one-card system brings convenience to users, it also has certain defects.
  • the applications on the smart card are preset, and dynamic management cannot be realized.
  • an application cannot be added as needed;
  • the two applications of employee identification and vehicle access management correspond to two different enterprises, one for the user's unit A and one for the unit A.
  • Property B of the office building, by Users may often use both applications at the same time, so it is hoped that the two applications can exist on the same smart card, but the prior art cannot meet the above requirements of the user. Summary of the invention
  • the main object of the present invention is to provide a one-system implementation method, which can implement dynamic management of applications and realize coexistence of multi-enterprise applications.
  • Another object of the present invention is to provide an implementation system for a card system, which can realize dynamic management of applications and realize coexistence of multi-enterprise applications.
  • the smart card receives the created master application message from the card issuer service platform, decrypts the message according to the pre-stored card issuer sensitive data encryption key, obtains the master application data, and according to the master application data Creating a master sub-application; the master sub-application data includes an enterprise management key;
  • Receiving a non-master application packet from the enterprise service platform decrypting the non-master application packet according to the enterprise sensitive data encryption key in the enterprise management key, and acquiring the non-master application Data, and creating a non-master application based on the non-master application data.
  • a system for implementing the system including: a smart card, a card issuer service platform, and an enterprise business platform;
  • the smart card is configured to receive a create master application message from the card issuer service platform, decrypt the message according to the pre-stored card issuer sensitive data encryption key, obtain the master application data, and
  • the master sub-application data creates a sub-control sub-application, where the main control sub-application data includes an enterprise management key; and receives a non-master sub-application message from the enterprise service platform, according to the enterprise management
  • the enterprise sensitive data encryption key in the key decrypts the created non-master application message, obtains the non-master application data, and uses the non-master application data according to the non-master application data. Create a non-master application.
  • a smart card comprising: a card application processing logic unit and a storage unit;
  • the card application processing logic unit is configured to receive a create master application message from the card issuer service platform, decrypt the message according to the pre-stored card issuer sensitive data encryption key, and obtain the master application data. And creating a master sub-application in the storage unit according to the master application data, where the master sub-application data includes an enterprise management key; and receiving a non-master application from the enterprise service platform Decoding the created non-master application message according to the enterprise sensitive data encryption key in the enterprise management key, acquiring non-master application data, and according to the non-master application data Creating a non-master application in the storage unit;
  • the storage unit is configured to save the created master sub-application and the non-master sub-application.
  • the one-card application processing logic unit in the smart card creates a master-controlled cow application according to the message received from the self-issued card-side service platform, and creates a non-based message according to the message received from the enterprise service platform and the master control application.
  • the master application Compared with the prior art, the solution of the present invention can create applications of multiple enterprises on one smart card as needed, and can dynamically manage applications of each enterprise, such as adding and deleting, as needed.
  • FIG. 1 is a schematic diagram of a single application card in the prior art
  • FIG. 2 is a schematic diagram of a multi-application card in the prior art
  • FIG. 3 is a schematic structural diagram of a smart card in an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a first type of secure transmission model according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a second security transmission model in an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of a third secure transmission model in an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a system embodiment according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a structure of a smart card embodiment according to an embodiment of the present invention. detailed description
  • each enterprise has one main control sub-application, and each main control sub-application Corresponding to multiple non-master applications, all enterprises share the same application processing logic; the main control sub-application is mainly used for authorization of creation and management of each non-master sub-control, and the non-master application is Specific sub-applications of the enterprise, such as the canteen consumer sub-application, the employee identification sub-application, and the salary management sub-application; before creating a non-master sub-application of an enterprise, the main sub-application of the enterprise must be created; A space pool, that is, a shared space is opened in advance in the smart card. When each enterprise creates a master and a non-master application, the corresponding space is allocated from the shared space.
  • Step 41 An application processing logic receives a create master application message from a card issuer service platform, and encrypts the message according to a pre-stored card issuer sensitive data encryption key. Decrypting, obtaining the master application data, and creating a master application according to the data;
  • a three-layer key structure is defined, which is a card issuer management key, an enterprise management key, and a sub-application key, as shown in Table 1:
  • Issuance Sensitive Number is used for data encryption and permission verification of the following functions: Smart Card; Card Issuer Service Key Key Encryption Key • Create, Suspend/Resume Master Sub Application Platform
  • the calculation data of the MAC should include
  • the card issuer is not sensitive. It is used for non-sensitive data plus smart card between the card issuer service platform and the smart card; card issuer service data secret key secret platform
  • the card-issuing MAC is used to secure the data integrity between the card-issuing service platform and the smart card;
  • the card-issuing service Key protection platform enterprise management enterprise sensitive data is used for data encryption and authority verification of the following functions: smart card; enterprise business flat key encryption key • create, suspend/resume enterprise non-master sub-application desk
  • Enterprise non-sensitive number Used for non-sensitive data encryption between enterprise business platform and smart card; smart card; enterprise business data encryption key station
  • Enterprise MAC key Used for data integrity protection between enterprise service platform and smart card. Smart card; enterprise business platform
  • Sub-application password identity identification for the access control, attendance and other identification applications smart card recognition; access control / attendance terminal (for example) identification of the application security certificate module secret key (SAM, Safe key Authentication
  • TAC Online transaction code
  • the offline consumption is used for the smart card of the POS (Point of Sales) card swiping process; the consumer key of the consumer terminal is used to recharge the smart card; the enterprise business flat key is used offline to generate consumption TAC smart card for related transactions;
  • the enterprise business easy TAC station key is shown in Table 1.
  • the card issuer management key includes: card issuer sensitive data encryption key, card issuer non-sensitive data encryption key and card issuer message authentication code (MAC) , Message Authentication Code ) key; enterprise management key includes: enterprise sensitive data encryption key, enterprise non-sensitive data encryption key and enterprise MAC key; sub-application key is only an example, in practical application, according to non The sub-application key will also be different depending on the type of master application. The specific functions of the issuer management key and enterprise management key shown in Table 1 are described in detail later.
  • the card-issuing service platform sends a sub-application sub-application message to the smart card, and uses the card-issuing sensitive data.
  • the encryption key is used to encrypt the main control sub-application 4; the "application processing logic" uses the card issuer sensitive data encryption key to decrypt the received message, and obtains the main control sub-application data, including the enterprise name,
  • the enterprise manages the key and other information, and creates a master application according to the obtained master application data, that is, allocates a space for the master application, and then the master Application data is saved to this space.
  • Step 42 The application processing logic receives the non-master application message from the enterprise service platform, decrypts the message according to the enterprise sensitive data encryption key in the enterprise management key, and obtains the non-master control. Apply data and create a non-master application based on that data.
  • the enterprise service platform sends a non-master sub-application message to the smart card, and uses the enterprise sensitive data encryption key to encrypt the smart card.
  • the card application processing logic decrypts the received message by using the enterprise sensitive data encryption key, obtains the non-master application data, and creates a non-master application according to the data, that is, assigns a corresponding to the non-master application. Space, and save the acquired non-master application data into the space.
  • the non-master application data includes a sub-application key, an affiliated enterprise identifier, and other data specifically related to the sub-application type.
  • the card-issuing service platform and the enterprise service platform can also manage the smart card according to their own needs, that is, send the management packet, and use different encryption methods to encrypt according to the data sensitivity carried in the management packet, for example, For the management packets carrying sensitive data, use the sensitive data encryption key for encryption. For the management packets carrying non-sensitive data, use the non-sensitive data encryption key to encrypt.
  • the card application processing logic receives the received 4 The text is decrypted and different operations are performed according to the content of the message.
  • the management packets that are sent with sensitive data mainly include: suspending or restoring the master sub-application message, deleting the master control, and/or the non-master application report.
  • the enterprise management platform sends the management packets carrying sensitive data to the enterprise service platform, including: suspending or recovering.
  • the non-master application applies the packet, updates the enterprise management key message, and updates the non-master application data packet.
  • the specific role of suspending or resuming the main control sub-application message, deleting the main control and/or the non-master sub-application message, and suspending or restoring the non-master sub-application message is the same as the message name, and is not introduced;
  • the unlocking master and/or the non-master application message are used when the master or non-master application is maliciously attacked or due to The user's misoperation is locked and unlocked;
  • the non-master sub-application data message is used to update the non-master application data, such as the balance on the card.
  • Table 1 shows only examples. In practical applications, which data is sensitive data and which data is non-sensitive data can be determined according to actual needs.
  • the card issuing side platform and the enterprise service platform can also use the respective sensitive data encryption key or MAC key to perform integrity protection on the message sent to the application processing logic;
  • the application processing logic performs integrity verification on the received message according to the sensitive data encryption key or the MAC key of each platform, and performs a decryption operation after the verification is passed. In this way, not only the privacy of the message is guaranteed, but also the integrity is guaranteed.
  • FIG. 5 is an illustration of the first secure transmission model of the present invention.
  • the card issuer service platform encrypts and sends the message sent to the smart card by using the issuer's sensitive data encryption key or the card issuer's non-sensitive data encryption key, and uses the card issuer's sensitive data encryption key or the card issuer.
  • the MAC key performs integrity protection.
  • the smart card performs integrity check on the received packet, passes the check, and performs decryption.
  • FIG. 6 is a schematic diagram of a second secure transmission model of the present invention.
  • the enterprise service platform encrypts the packets sent to the smart card by using the enterprise sensitive data encryption key or the enterprise non-sensitive data encryption key, and completes the enterprise sensitive data encryption key or enterprise MAC key.
  • Sexual protection The smart card performs integrity check on the received ⁇ text, verifies the pass, and performs decryption operation.
  • FIG. 7 is a schematic diagram of a third secure transmission model of the present invention.
  • the enterprise service platform needs to send updated non-master sub-application data packets to the smart card.
  • the smart card is a SIM card in the mobile phone
  • the enterprise service platform cannot directly communicate with the smart card, so it is necessary to resort to the card issuer.
  • the enterprise service platform encrypts and protects the packets respectively.
  • the card-issuing service platform further performs encryption and integrity protection.
  • the smart card After receiving the packet, the smart card encrypts the key or sends the card according to the sensitive data of the card-issuing party.
  • the party MAC key is integrity checked, verified, decrypted according to the sender's sensitive data encryption key or the card issuer's non-sensitive data encryption password, and then integrity based on the enterprise sensitive data encryption key or enterprise MAC key. Verification, verification pass, and decryption based on the enterprise sensitive data encryption key or enterprise non-sensitive data encryption password.
  • the card application processing logic can complete a specific application according to each non-master application data, and is specifically implemented as a prior art.
  • how to perform encryption and integrity protection and how to perform decryption and integrity verification is also a prior art. No longer.
  • FIG. 8 is a schematic structural diagram of a system embodiment of the present invention. As shown in FIG. 8, the method includes: a smart card 81, a card issuer service platform 82, and an enterprise service platform 83;
  • the smart card 81 is configured to receive the created master application message from the card issuer service platform 82, decrypt the message according to the pre-stored card issuer sensitive data encryption key, obtain the master application data, and according to the master control
  • the sub-application data creates a sub-control sub-application, and the main control sub-application data includes an enterprise management key; receives the non-master sub-application text from the enterprise service platform 83, and encrypts the key pair according to the enterprise sensitive data in the enterprise management key.
  • Create a non-master application packet to decrypt, obtain non-master application data, and create a non-master application based on the non-master application data.
  • the card issuer service platform 82 can be further configured to send a management message to the smart card 81, and use different encryption methods to encrypt according to the data sensitivity carried in the management message.
  • the encryption method includes: The data management message is encrypted by using the card issuer's sensitive data encryption key. For the management message carrying the non-sensitive data, the card issuer's non-sensitive data encryption key is used for encryption; the smart card 81 is further used, according to the pre-stored The card issuer sensitive data encryption key or the card issuer non-sensitive data encryption key decrypts the received management message and performs different operations according to the content of the message.
  • the enterprise service platform 83 is further configured to send the management 3 ⁇ 4 text to the smart card 81, and use different encryption methods to encrypt according to different data sensitivity carried in the management message, and the encryption method
  • the method includes: for the management packet carrying the sensitive data, the enterprise sensitive data encryption key is used for encryption, and the management message carrying the non-sensitive data is encrypted by using the enterprise non-sensitive data encryption key; the smart card 81 is further used for The received management message is decrypted according to the enterprise sensitive data encryption key or the enterprise non-sensitive data encryption key in the enterprise management key, and different operations are performed according to different message contents.
  • the enterprise service platform 83 may be further configured to encrypt the message sent to the smart card 81 by using the enterprise sensitive data encryption key or the enterprise non-sensitive data encryption key, and send the message to the card issuer service platform 82; the card issuer service platform 82 Further, the card is encrypted by the card issuer sensitive data encryption key or the card issuer non-sensitive data encryption key, and is sent to the smart card 81; the smart card 81 is further used to sequentially use the card issuer sensitive data.
  • the smart card 81 further stores a card issuer MAC key, and the enterprise management key further includes an enterprise MAC key; the issuer service platform 82 and the enterprise service platform 83 are further used to use the respective sensitive data after the encryption operation is completed.
  • the encryption key or the MAC key is used to perform integrity protection on the packet sent to the smart card 81.
  • the smart card 81 performs integrity verification on the received packet according to the sensitive data encryption key or the MAC key of each platform. And after the verification is passed, the decryption operation is performed.
  • the system shown in Fig. 8 will further include a reader/writer 84, the specific functions of the reader/writer 84, the connection relationship with other components, and the components shown in Fig. 8.
  • the interfaces between the two are the same as in the prior art and will not be described again.
  • FIG. 9 is a schematic structural diagram of a smart card embodiment of the present invention. As shown in FIG. 9, comprising: a cartoon application processing logic unit 91 and a storage unit 92;
  • a card application processing logic unit 91 configured to receive a create master application message from the card issuer service platform, decrypt the message according to the pre-stored card issuer sensitive data encryption key, and obtain the master application data, and Creating a master sub-application in the storage unit according to the master sub-application data, the main control sub-application data includes an enterprise management key; receiving the creation non-master from the enterprise service platform The control application packet is used to decrypt the non-master application message according to the enterprise sensitive data encryption key in the enterprise management key, to obtain the non-master application data, and to store the data in the storage unit according to the non-master application data. Create a non-master application;
  • the storage unit 92 is configured to save the created master sub-application and the non-master sub-application.
  • the card application processing logic unit 91 may be further configured to: receive the management message from the card issuer service platform, and decrypt the received management report according to the pre-stored card issuer sensitive data encryption key or the card issuer non-sensitive data encryption key. And performing different operations according to the content of the message; receiving the management message from the enterprise service platform, decrypting the received management message according to the enterprise sensitive data encryption key or the enterprise non-sensitive data encryption key, and according to Different contents of the message perform different operations.
  • the card application processing logic unit 91 may be further configured to: receive the management message sent by the enterprise service platform through the card issuer service platform, and sequentially use the pre-stored card issuer sensitive data encryption key or the card issuer non-sensitive data encryption key.
  • the key, and the enterprise sensitive data encryption key or the enterprise non-sensitive data encryption key in the enterprise management key decrypt the received message; and can be used to encrypt the key or the card issuer according to the pre-stored card issuer sensitive data.
  • the MAC key performs integrity verification on the received management packet, and/or performs the received management packet according to the enterprise sensitive data encryption key or the enterprise MAC key in the enterprise management key. Integrity check, and after the check is passed, perform the decryption operation.
  • the technical solution of the present invention not only realizes the dynamic management of the application, but also realizes the coexistence of multi-enterprise applications and ensures the privacy and integrity of data transmission.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Finance (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Technology Law (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Sub-Exchange Stations And Push- Button Telephones (AREA)

Description

一种一卡通系统的实现方法和系统以及一种智能卡 技术领域
本发明涉及一" ^通技术领域, 尤其涉及一种 系统的实现方法和系 统以及一种智能卡。 背景技术
一^ 系统有助于实现企业内部的信息交换、 共享和统一管理, 目前的 企业一卡通系统, 已经涵盖了员工身份识别、 员工考勤、 薪资管理、 人事管 理、 电子门禁、 出入口控制、 车辆进出管理、 员工内部消费管理、 会议电子 签到, 以及保安巡更管理等各个方面。 可 , 一卡通系统已经渗透到了企业 管理的各个环节, 使得各项管理工作更加高效和科学。
传统的一卡通系统多基于接触或非接触式的集成电路(IC , Integrate Circuit )卡实现, 随着技术的发展, 目前已经扩展到了手机中的用户身份识别 模块 ( SIM, Subscriber Identity Module )卡以及全球用户身份识别模块 ( USIM, Universal Subscriber Identity Module )卡等。 在实际应用中 , 可将上述 IC卡、 SIM卡以及 USIM卡等统称为智能卡。
智能卡上通常只包括一个企业的应用, 根据应用数目的不同, 可分为单 应用卡和多应用卡。 如图 1所示, 图 1为现有单应用卡的示意图; 该卡上只 包括某一个企业的某一个应用, 比如员工身份识别应用或薪资管理应用等。 如图 2所示, 图 2为现有多应用卡的示意图; 该卡上包括有某一个企业的多 个应用, 如同时包括员工身份识别应用和薪资管理应用等。
现有一卡通系统在给用户带来方便的同时, 也存在着一定的缺陷, 比如: 智能卡上的应用均为预置的方式, 无法实现动态管理, 如不能根据需要 增加一个应用等; 另外, 现有智能卡上只能包括单个企业的应用, 无法实现 多企业的并存, 比如, 员工身份识别和车辆进出管理这两个应用对应两个不 同的企业, 一个为用户所在单位 A, 一个为单位 A所在办公楼的物业 B, 由 于用户可能会经常同时用到这两个应用, 所以会希望这两个应用能够存在于 同一张智能卡上, 但现有技术还无法满足用户的上述需求。 发明内容
有鉴于此, 本发明的主要目的在于提供一种一- 系统的实现方法, 能 够实现应用的动态管理, 并能够实现多企业应用的并存。
本发明的另一目的在于提供一种一卡通系统的实现系统, 能够实现应用 的动态管理, 并能够实现多企业应用的并存。
本发明的又一目的在于提供一种智能卡, 能够实现应用的动态管理, 并 能够实现多企业应用的并存。
为达到上述目的, 本发明的技术方案是这样实现的:
一种一" ^通系统的实现方法, 该方法包括:
智能卡接收来自发卡方业务平台的创建主控子应用报文, 根据预先保存 的发卡方敏感数据加密密钥对该报文进行解密, 获取主控子应用数据, 并根 据所述主控子应用数据创建主控子应用; 所述主控子应用数据中包含有企业 管理密钥;
接收来自企业业务平台的创建非主控子应用报文, 根据所述企业管理密 钥中的企业敏感数据加密密钥对所述创建非主控子应用报文进行解密, 获取 非主控子应用数据, 并根据所述非主控子应用数据创建非主控子应用。
一" ^通系统的实现系统, 包括: 智能卡、 发卡方业务平台以及企业业务 平台;
所述智能卡, 用于接收来自所述发卡方业务平台的创建主控子应用报文, 根据预先保存的发卡方敏感数据加密密钥对该报文进行解密, 获取主控子应 用数据, 并根据所述主控子应用数据创建主控子应用, 所述主控子应用数据 中包含有企业管理密钥; 接收来自所述企业业务平台的创建非主控子应用报 文, 根据所述企业管理密钥中的企业敏感数据加密密钥对所述创建非主控子 应用报文进行解密, 获取非主控子应用数据, 并根据所述非主控子应用数据 创建非主控子应用。
一种智能卡, 包括: 一卡通应用处理逻辑单元以及存储单元;
所述一卡通应用处理逻辑单元, 用于接收来自发卡方业务平台的创建主 控子应用报文 , 根据预先保存的发卡方敏感数据加密密钥对该报文进行解密, 获取主控子应用数据, 并根据所述主控子应用数据在所述存储单元中创建主 控子应用, 所述主控子应用数据中包含有企业管理密钥; 接收来自所述企业 业务平台的创建非主控子应用报文, 根据所述企业管理密钥中的企业敏感数 据加密密钥对所述创建非主控子应用报文进行解密, 获取非主控子应用数据, 并根据所述非主控子应用数据在所述存储单元中创建非主控子应用;
所述存储单元, 用于保存所创建的主控子应用和非主控子应用。
可见, 采用本发明的技术方案, 智能卡中的一卡通应用处理逻辑单元根 据接收自发卡方业务平台的报文创建主控牛应用 , 并根据接收自企业业务平 台的报文以及主控子应用创建非主控子应用。 与现有技术相比, 本发明所述 方案可根据需要在一张智能卡上创建多个企业的应用, 并能够根据需要, 对 每个企业的应用进行动态的管理, 如增加和删除等。 附图说明
图 1为现有技术中, 单应用卡的示意图;
图 2为现有技术中, 多应用卡的示意图;
图 3为本发明实施例中, 智能卡中的 έ用结构示意图;
图 4为本发明实施例中, 方法实施例的流程图;
图 5为本发明实施例中, 第一种安全传输模型的示意图;
图 6为本发明实施例中, 第二种安全传输模型的示意图;
图 7为本发明实施例中, 第三种安全传输模型的示意图;
图 8为本发明实施例中, 系统实施例的组成结构示意图;
图 9为本发明实施例中, 智能卡实施例的组成结构示意图。 具体实施方式
针对现有技术中存在的问题, 本发明中提出一种全新的一卡通实现方案, 对应的智能卡中的应用结构如图 3 所示, 每个企业拥有一个主控子应用, 每 个主控子应用下对应多个非主控子应用, 所有企业共享同一个一^ ^通应用处 理逻辑; 主控子应用主要用于各非主控子 ^用的创建和管理的授权, 非主控 子应用为企业的具体子应用, 如食堂消费子应用, 员工身份识别子应用以及 薪资管理子应用等; 在创建某企业的非主控子应用之前, 必须先创建该企业 的主控子应用; 各企业共享一个空间池, 即预先在智能卡中开辟出一块共享 空间, 每个企业创建主控和非主控子应用时, 均从该共享空间中分配相应的 空间。
为使本发明的目的、 技术方案及优点更加清楚明白, 以下参照附图并举 实施例, 对本发明作进一步地详细说明。
图 4为本发明方法实施例的流程图。 如图 4所示, 包括以下步骤: 步骤 41 : 一" ^通应用处理逻辑接收来自发卡方业务平台的创建主控子应 用报文, 根据预先保存的发卡方敏感数据加密密钥对该报文进行解密, 获取 主控子应用数据, 并才艮据该数据创建主控子应用;
本发明所迷方案中, 定义了三层密钥结构, 分别为发卡方管理密钥、 企 业管理密钥和子应用密钥, 如表一所示:
: 三层密钥结构
密钥层次 密钥类型 用途 存储位置 发卡方管 发卡方敏感数 用于如下功能的数据加密及权限验证: 智能卡; 发卡方业务 理密钥 据加密密钥 • 创建、 暂停 /恢复主控子应用 平台
• 删除子应用 (包括主控、 非主控子应用)
• 恢复企业管理密钥
• 解锁主控和 /或非主控子应用
不能执行如下功能:
• 用于更新企业管理密钥
• 用于读取、 更新非主控子应用数据
说明: 权限验证是通过在报文中携带由该密钥计
算的 MAC来实现的, MAC的计算数据应包括报
文所涉及的关键信息
发卡方非敏感 用于发卡方业务平台同智能卡之间非敏感数据加 智能卡; 发卡方业务 数据 密密钥 密 平台
发卡方 MAC密 用于发卡方业务平台同智能卡之间数据完整性保 智能卡; 发卡方业务 钥 护 平台 企业管理 企业敏感数据 用于如下功能的数据加密及权限验证: 智能卡; 企业业务平 密钥 加密密钥 • 创建、 暂停 /恢复企业非主控子应用 台
• 用于更新企业管理密钥
• 用于更新非主控子应用数据
企业非敏感数 用于企业业务平台同智能卡之间非敏感数据加密 智能卡; 企业业务平 据加密密钥 台
企业 MAC密钥 用于企业业务平台同智能卡之间数据完整性保护 智能卡; 企业业务平 台
子应用密 身份 身份识 用于门禁、 考勤等身份识 类应用刷卡过程的认 智能卡;门禁 /考勤终 钥(举例 ) 识别 别应用 证 端的安全认证模块 类密 密钥 ( SAM , Safe 钥 Authentication
Module )卡 联机 联机交 对联机交易的鉴权 智能卡; 企业业务平 消 费 易鉴权 台
密钥 密钥
联机交 用于生成联机交易的交易认证码 ( TAC ,
易 TAC Transaction Authorization Code )
密钥
脱机 消费密 用于销售点(POS, Point of Sales )刷卡过程的认 智能卡; 消费终端的 消 费 钥 证 SAM卡 密钥 充值密 用于充值 智能卡; 企业业务平 钥 台 脱机交 用于生成消费相关交易的 TAC 智能卡; 企业业务平 易 TAC 台 密钥 如表一所示, 发卡方管理密钥包括: 发卡方敏感数据加密密钥、 发卡方 非敏感数据加密密钥以及发卡方消息鉴别码(MAC, Message Authentication Code ) 密钥; 企业管理密钥包括: 企业敏感数据加密密钥、 企业非敏感数据 加密密钥以及企业 MAC密钥; 子应用密钥仅为举例说明, 在实际应用中, 根 据非主控子应用类型的不同, 子应用密钥也将不同。 表一所示发卡方管理密 钥和企业管理密钥的具体功能将在后续进行详细介绍。
初始状态下, 智能卡中仅设置有一- ^通应用处理逻辑, 当需要创建某个 企业的主控子应用时, 发卡方业务平台向智能卡发送创建主控子应用报文, 并利用发卡方敏感数据加密密钥对创建主控子应用 4艮文进行加密; 一" ^通应 用处理逻辑利用发卡方敏感数据加密密钥对接收到的报文进行解密, 获取主 控子应用数据, 包括企业名称、 企业管理密钥等信息, 并才艮据获取到的主控 子应用数据创建主控子应用, 即为主控子应用分配一块空间, 然后将主控子 应用数据保存到该空间中。
步骤 42: —" ^通应用处理逻辑接收来自企业业务平台的创建非主控子应 用报文, 根据企业管理密钥中的企业敏感数据加密密钥对该报文进行解密, 获取非主控子应用数据, 并根据该数据创建非主控子应用。
按照步骤 41所示方式创建好某一企业的主控子应用后, 本步骤中, 企业 业务平台向智能卡发送创建非主控子应用报文, 并利用企业敏感数据加密密 钥进行加密; 智能卡中的一卡通应用处理逻辑利用企业敏感数据加密密钥对 接收到的报文进行解密, 获取非主控子应用数据, 并根据该数据创建非主控 子应用, 即为该非主控子应用分配对应的空间, 并将获取到的非主控子应用 数据保存到该空间中。 所述非主控子应用数据中包含有子应用密钥、 所属企 业标识以及其它与子应用类型具体相关的数据等。
后续, 发卡方业务平台和企业业务平台还可根据自身需要, 对智能卡进 行管理, 即发送管理报文, 并根据管理报文中携带的数据敏感度的不同, 采 用不同的加密方式进行加密, 比如: 对于携带有敏感数据的管理报文, 采用 敏感数据加密密钥进行加密, 对于携带有非敏感数据的管理报文, 采用非敏 感数据加密密钥进行加密; 一卡通应用处理逻辑对接收到的 4艮文进行解密, 并根据报文内容的不同执行不同的操作。
如表一所示, 对于发卡方业务平台来说, 其发送的携带有敏感数据的管 理报文主要包括: 暂停或恢复主控子应用报文、 删除主控和 /或非主控子应用 报文、 恢复企业管理密钥报文, 以及解锁主控和 /或非主控子应用报文等; 对 于企业业务平台来说, 其发送的携带有敏感数据的管理报文主要包括: 暂停 或恢复非主控子应用报文、 更新企业管理密钥报文, 以及更新非主控子应用 数据报文等。
其中, 暂停或恢复主控子应用报文、 删除主控和 /或非主控子应用报文, 以及暂停或恢复非主控子应用报文的具体作用与报文名称相同, 不作介绍; 更新企业管理密钥报文主要用于根据用户的请求, 对应用建立初期由发卡方 业务平台设置的各密钥进行修改, 恢复企业管理密钥^ =艮文用于当用户忘记自 己修改后的密钥时, 将各密钥的取值恢复为原始值; 解锁主控和 /或非主控子 应用报文用于当主控或非主控子应用由于受到恶意攻击或由于用户的误操作 而被锁定后进行解锁; 更新非主控子应用数据报文用于对非主控子应用数据, 如卡上的余额等进行更新。
表一所示仅为举例说明, 在实际应用中, 哪些数据为敏感数据, 哪些数 据为非敏感数据, 可根据实际需要而定。
另外, 在完成加密操作后, 发卡方业^平台和企业业务平台还可利用各 自的敏感数据加密密钥或 MAC 密钥对发送给一- ^通应用处理逻辑的报文进 行完整性保护; 一卡通应用处理逻辑根据各平台的敏感数据加密密钥或 MAC 密钥对接收到的报文进行完整性校验, 并在校验通过后, 执行解密操作。 这 样一来, 不但保证了报文的私密性, 而且保证了完整性。
基于上述介绍, 并根据报文传送过程中涉及到的对象的不同, 本发明所 述方案中定义了三种安全传输模型, 分别为: 发卡方业务平台 -智能卡、 企 业业务平台-智能卡、 企业业务平台 -发卡方业务平台-智能卡。
图 5为本发明第一种安全传输模型的 意图。 如图 5所示, 发卡方业务 平台利用发卡方敏感数据加密密钥或发卡方非敏感数据加密密钥对发送给智 能卡的报文进行加密保护,并利用发卡方敏感数据加密密钥或发卡方 MAC密 钥进行完整性保护; 智能卡对接收到的报文进行完整性校验, 校验通过, 进 行解密操作。
图 6为本发明第二种安全传输模型的示意图。 如图 6所示, 企业业务平 台利用企业敏感数据加密密钥或企业非敏感数据加密密钥对发送给智能卡的 报文进行加密保护,并利用企业敏感数据加密密钥或企业 MAC密钥进行完整 性保护; 智能卡对接收到的^ 文进行完整性校验, 校验通过, 进行解密操作。
图 7为本发明第三种安全传输模型的示意图。 某些情况下, 比如, 企业 业务平台需要向智能卡发送更新非主控子应用数据报文, 但由于智能卡为手 机中的 SIM卡, 企业业务平台无法直接与智能卡进行通信, 所以需要借助于 发卡方业务平台, 殳为中国移动, 即借助于短信来发送 文, 那么就会需 要用到图 7所示安全传输模型。 企业业务平台分别对报文进行加密和完整性 保护, 然后发卡方业务平台在此基础上, 进一步进行加密和完整性保护, 智 能卡接收到报文后,先根据发卡方敏感数据加密密钥或发卡方 MAC密钥进行 完整性校验, 校验通过, 根据发卡方敏感数据加密密钥或发卡方非敏感数据 加密密码进行解密,然后再根据企业敏感数据加密密钥或企业 MAC密钥进行 完整性校验, 校验通过, 再根据企业敏感数据加密密钥或企业非敏感数据加 密密码进行解密。
后续, 一卡通应用处理逻辑可根据各非主控子应用数据完成具体的应用, 具体实现为现有技术, 另外, 如何进行加密和完整性保护以及如何进行解密 和完整性校验也是现有技术, 不再赘述。
基于上述介绍, 图 8为本发明系统实施例的组成结构示意图。 如图 8所 示, 包括: 智能卡 81、 发卡方业务平台 82以及企业业务平台 83;
智能卡 81 , 用于接收来自发卡方业务平台 82的创建主控子应用报文,根 据预先保存的发卡方敏感数据加密密钥对该报文进行解密, 获取主控子应用 数据, 并根据主控子应用数据创建主控子应用, 主控子应用数据中包含有企 业管理密钥; 接收来自企业业务平台 83的创建非主控子应用 文, 根据企业 管理密钥中的企业敏感数据加密密钥对创建非主控子应用报文进行解密, 获 取非主控子应用数据, 并根据非主控子应用数据创建非主控子应用。
其中, 发卡方业务平台 82可进一步用于, 向智能卡 81发送管理报文, 并根据管理报文中携带的数据敏感度的不同, 采用不同的加密方式进行加密, 加密方式包括: 对于携带有敏感数据的管理报文, 采用发卡方敏感数据加密 密钥进行加密, 对于携带有非敏感数据的管理报文, 采用发卡方非敏感数据 加密密钥进行加密; 智能卡 81进一步用于, 根据预先保存的发卡方敏感数据 加密密钥或发卡方非敏感数据加密密钥, 解密接收到的管理报文, 并根据报 文内容的不同执行不同的操作。
企业业务平台 83进一步用于, 向智能卡 81发送管理 ¾文, 并根据管理 报文中携带的数据敏感度的不同, 采用不同的加密方式进行加密, 加密方式 包括: 对于携带有敏感数据的管理报文, 采用企业敏感数据加密密钥进行加 密, 对于携带有非敏感数据的管理报文, 采用企业非敏感数据加密密钥进行 加密; 智能卡 81进一步用于, 根据企业管理密钥中的企业敏感数据加密密钥 或企业非敏感数据加密密钥, 解密接收到的管理报文, 并根据报文内容的不 同执行不同的操作。
企业业务平台 83还可进一步用于, 利用企业敏感数据加密密钥或企业非 敏感数据加密密钥, 对发送给智能卡 81的报文进行加密, 发送给发卡方业务 平台 82; 发卡方业务平台 82进一步用于, .利用发卡方敏感数据加密密钥或发 卡方非敏感数据加密密钥, 对接收到的报文进行加密, 并发送给智能卡 81; 智能卡 81进一步用于, 依次利用发卡方敏感数据加密密钥或发卡方非敏感数 据加密密钥, 以及企业敏感数据加密密钥或企业非敏感数据加密密钥, 对接 收到的报文进行解密。
另外, 智能卡 81中进一步保存有发卡方 MAC密钥, 企业管理密钥中进 一步包括企业 MAC密钥;发卡方业务平台 82和企业业务平台 83进一步用于, 完成加密操作后, 利用各自的敏感数据加密密钥或 MAC密钥,对发送给智能 卡 81的报文进行完整性保护; 智能卡 81 .根据各平台的敏感数据加密密钥或 MAC密钥, 对接收到的报文进行完整性校验, 并在校验通过后, 执行解密操 作。
在实际应用中, 图 8所示系统中还将进一步包括一个读 /写卡器 84, 读 / 写卡器 84的具体功能、 与其它组成部分之间的连接关系以及图 8所示各组成 部分之间的接口均与现有技术中相同, 不再赘述。
图 9为本发明智能卡实施例的组成结构示意图。 如图 9所示, 包括: 一 卡通应用处理逻辑单元 91以及存储单元 92;
一卡通应用处理逻辑单元 91 , 用于接收来自发卡方业务平台的创建主控 子应用报文, 根据预先保存的发卡方敏感数据加密密钥对该报文进行解密, 获取主控子应用数据, 并根据主控子应用数据在存储单元中创建主控子应用, 主控子应用数据中包含有企业管理密钥; 接收来自企业业务平台的创建非主 控子应用报文, 根据企业管理密钥中的企业敏感数据加密密钥对创建非主控 子应用报文进行解密, 获取非主控子应用数据, 并根据非主控子应用数据在 存储单元中创建非主控子应用;
存储单元 92, 用于保存所创建的主控子应用和非主控子应用。
一卡通应用处理逻辑单元 91可进一步用于, 接收来自发卡方业务平台的 管理报文, 根据预先保存的发卡方敏感数据加密密钥或'发卡方非敏感数据加 密密钥, 解密接收到的管理报文, 并根据报文内容的不同执行不同的操作; 接收来自企业业务平台的管理报文, 根据企业敏感数据加密密钥或企业非敏 感数据加密密钥, 解密接收到的管理报文、 并根据报文内容的不同执行不同 的操作。
另外, 一卡通应用处理逻辑单元 91还可进一步用于, 接收企业业务平台 通过发卡方业务平台发送来的管理报文, 依次利用预先保存的发卡方敏感数 据加密密钥或发卡方非敏感数据加密密钥, 以及企业管理密钥中的企业敏感 数据加密密钥或企业非敏感数据加密密钥, 对接收到的报文进行解密; 并可 用于根据预先保存的发卡方敏感数据加密密钥或发卡方 MAC密钥,对接收到 的管理报文进行完整性校验, 和 /或, 根据所述企业管理密钥中的企业敏感数 据加密密钥或企业 MAC密钥,对接收到的管理报文进行完整性校验, 并在校 验通过后, 执行解密操作。
图 8和 9所示系统和装置实施例的具体工作流程请参照图 4所示方法实 施例中的相应说明, 此处不再赘述。
总之, 釆用本发明的技术方案, 不但实现了应用的动态管理, 而且实现 了多企业应用的并存, 并且保证了数据传输的私密性和完整性。
综上所述, 以上仅为本发明的较佳实施例而已, 并非用于限定本发明的 保护范围。 凡在本发明的精神和原则之内, 所作的任何修改、 等同替换、 改 进等, 均应包含在本发明的保护范围之内。 ·

Claims

权 利 要 求
1、 一种一卡通系统的实现方法, 其特征在于, 该方法包括:
智能卡接收来自发卡方业务平台的创建主控子应用报文, 根据预先保存 的发卡方敏感数据加密密钥对该报文进行解密, 获取主控子应用数据, 并根 据所述主控子应用数据创建主控子应用; 所述主控子应用数据中包含有企业 管理密钥;
接收来自企业业务平台的创建非主控子应用报文, 根据所述企业管理密 钥中的企业敏感数据加密密钥对所述创建非主控子应用报文进行解密, 获取 非主控子应用数据, 并根据所述非主控子应用数据创建非主控子应用。
2、 根据权利要求 1所述的方法, 其特征在于, 该方法进一步包括: 智能卡接收所述发卡方业务平台发送的管理报文, 其中接收的管理报文 是发卡方业务平台根据所述管理报文中携带的数据敏感度的不同, 采用不同 的加密方式加密后发送的, 加密方式包括: 对于携带有敏感数据的管理报文, 采用发卡方敏感数据加密密钥进行加密, 对于携带有非敏感数据的管理报文, 采用发卡方非敏感数据加密密钥进行加密; 以及
根据预先保存的发卡方敏感数据加密密钥或发卡方非敏感数据加密密 钥, 解密接收到的管理报文, 并根据报文! 容的不同执行不同的操作。
3、 根据权利要求 2所述的方法, 其特征在于, 所述携带有敏感数据的管 理报文包括: 暂停或恢复主控子应用报文、删除主控和 /或非主控子应用报文、 恢复企业管理密钥报文, 以及解锁主控和 /或非主控子应用 ^艮文。
4、 根据权利要求 1所述的方法, 其特征在于, 该方法进一步包括: 智能卡接收所述企业业务平台发送的管理报文, 其中接收的管理报文是 企业业务平台根据所述管理报文中携带的数据敏感度的不同, 釆用不同的加 密方式加密后发送的, 加密方式包括: 对于携带有敏感数据的管理报文, 采 用企业敏感数据加密密钥进行加密, 对于 带有非敏感数据的管理报文, 采 用企业非敏感数据加密密钥进行加密; 以及 根据企业管理密钥中的企业敏感数据加密密钥或企业非敏感数据加密密 钥, 解密接收到的管理报文, 并根据报文内容的不同执行不同的操作。
5、 根据权利要求 4所述的方法, 其特征在于, 所述携带有敏感数据的管 理报文包括: 暂停或恢复非主控子应用报文、 更新企业管理密钥报文, 以及 更新非主控子应用数据报文。
6、 根据权利要求 1所述的方法, 其特征在于, 该方法进一步包括: 智能卡接收所述企业业务平台通过所述发卡方业务平台发送的管理报 文, 其中接收到的管理报文是所述企业业务平台利用企业敏感数据加密密钥 或企业非敏感数据加密密钥, 对管理报文进行加密后发送给所述发卡方业务 平台, 所述发卡方业务平台利用发卡方敏感数据加密密钥或发卡方非敏感数 据加密密钥, 对接收到的管理报文进行加密后发送的; 以及
依次利用发卡方敏感数据加密密钥或发卡方非敏感数据加密密钥, 以及 企业敏感数据加密密钥或企业非敏感数据加密密钥, 对接收到的管理报文进 行解密。
7、 根据权利要求 1 - 6 中任一项所述的方法, 其特征在于, 所述智能卡 中进一步保存有发卡方消息鉴别码 MAC密钥,所述企业管理密钥中进一步包 括企业 MAC密钥;
所述智能卡接收到的报文是所述发卡方业务平台和企业业务平台在完成 加密操作后,分别利用各自的敏感数据加密密钥或 MAC密钥进行完整性保护 后发送的;
该方法进一步包括:
所述智能卡根据各平台的敏感数据加密密钥或 MAC密钥,对接收到的报 文进行完整性校验, 并在校验通过后, 执行解密操作。
8、 一卡通系统的实现系统, 其特征在于, 包括: 智能卡、 发卡方业务平 台以及企业业务平台;
所述智能卡, 用于接收来自所述发卡方业务平台的创建主控子应用报文, 根据预先保存的发卡方敏感数据加密密钥对该报文进行解密, 获取主控子应 用数据, 并根据所述主控子应用数据创建主控子应用, 所述主控子应用数据 中包含有企业管理密钥; 接收来自所述企业业务平台的创建非主控子应用才艮 文, 根据所述企业管理密钥中的企业敏感数据加密密钥对所述创建非主控子 应用报文进行解密, 获取非主控子应用数据, 并根据所述非主控子应用数据 创建非主控子应用。
9、 根据权利要求 8所述的系统, 其特征在于, 所述发卡方业务平台进一 步用于, 向所述智能卡发送管理报文, 并根据所述管理报文中携带的数据敏 感度的不同, 采用不同的加密方式进行加密, 加密方式包括: 对于携带有敏 感数据的管理 4艮文, 采用发卡方敏感数据加密密钥进行加密, 对于携带有非 敏感数据的管理报文, 采用发卡方非敏感数据加密密钥进行加密;
所述智能卡进一步用于, 根据预先保存的发卡方敏感数据加密密钥或发 卡方非敏感数据加密密钥, 解密接收到的管理报文, 并根据报文内容的不同 执行不同的操作。
10、 根据权利要求 8所述的系统, 其特征在于, 所述企业业务平台进一 步用于, 向所述智能卡发送管理报文, 并根据所述管理报文中携带的数据敏 感度的不同, 采用不同的加密方式进行加密, 加密方式包括: 对于携带有敏 感数据的管理报文, 采用企业敏感数据加密密钥进行加密, 对于携带有非敏 感数据的管理报文, 采用企业非敏感数据加密密钥进行加密;
所述智能卡进一步用于, 才 据企业管理密钥中的企业敏感数据加密密钥 或企业非敏感数据加密密钥, 解密接收到的管理报文, 并根据报文内容的不 同执行不同的操作。
11、 根据权利要求 8所述的系统, 其特征在于,
所述企业业务平台进一步用于, 利用企业敏感数据加密密钥或企业非敏 感数据加密密钥, 对发送给所述智能卡的报文进行加密, 并发送给所述发卡 方业务平台;
所述发卡方业务平台进一步用于, 利用发卡方敏感数据加密密钥或发卡 方非敏感数据加密密钥, 对接收到的报文进行加密, 并发送给所述智能卡; 所述智能卡进一步用于, 依次利用所述发卡方敏感数据加密密钥或发卡 方非敏感数据加密密钥, 以及企业敏感数据加密密钥或企业非敏感数据加密 密钥, 对接收到的报文进行解密。
12、 根据权利要求 8 ~ 11 中任一项所述的系统, 其特征在于, 所述智能 卡中进一步保存有发卡方消息鉴别码 MAC密钥,所述企业管理密钥中进一步 包括企业 MAC密钥;
所述发卡方业务平台和企业业务平台进一步用于, 完成加密操作后, 利 用各自的敏感数据加密密钥或 MAC密钥,对发送给智能卡的报文进行完整性 保护;
所述智能卡进一步用于, 根据各平台的敏感数据加密密钥或 MAC密钥, 对接收到的报文进行完整性校验, 并在校验通过后, 执行解密操作。
13、 一种智能卡, 其特征在于, 包括': 一" ^通应用处理逻辑单元以及存 储单元;
所述一卡通应用处理逻辑单元, 用于接收来自发卡方业务平台的创建主 控子应用报文, 根据预先保存的发卡方敏感数据加密密钥对该报文进行解密, 获取主控子应用数据, 并根据所述主控子应用数据在所述存储单元中创建主 控子应用, 所述主控子应用数据中包含有企业管理密钥; 接收来自所述企业 业务平台的创建非主控子应用报文, 根据所迷企业管理密钥中的企业敏感数 据加密密钥对所述创建非主控子应用报文进行解密, 获取非主控子应用数据, 并根据所述非主控子应用数据在所述存储单元中创建非主控子应用;
所述存储单元, 用于保存所创建的主控子应用和非主控子应用。
14、 根据权利要求 13所述的智能卡, 其特征在于, 所述一卡通应用处理 逻辑单元进一步用于, 接收来自所述发卡方业务平台的管理 4艮文, ^^据预先 保存的发卡方敏感数据加密密钥或发卡方非敏感数据加密密钥, 解密接收到 的管理报文, 并根据报文内容的不同执行不同的操作;
接收来自所述企业业务平台的管理报文, 根据企业管理密钥中的企业敏 感数据加密密钥或企业非敏感数据加密密钥, 解密接收到的管理报文, 并根 据报文内容的不同执行不同的操作。
15、 根据权利要求 13所述的智能卡, 其特征在于, 所述一卡通应用处理 逻辑单元进一步用于, 接收所述企业业务平台通过所述发卡方业务平台发送 来的管理报文, 依次利用预先保存的发卡方敏感数据加密密钥或发卡方非敏 感数据加密密钥, 以及获取到的企业管理密钥中的企业敏感数据加密密钥或 企业非敏感数据加密密钥, 对接收到的报文进行解密。
16、 根据权利要求 13、 14或 15所述的智能卡, 其特征在于, 所述一卡 通应用处理逻辑单元进一步用于, 根据预先保存的发卡方敏感数据加密密钥 或发卡方消息鉴别码 MAC密钥, 对接收到的管理 4艮文进行完整性校验, 和 / 或,根据企业管理密钥中的企业敏感数据加密密钥或企业 MAC密钥,对接收 到的管理报文进行完整性校验; 并在校验通过后, 执行解密操作。
PCT/CN2010/080042 2009-12-21 2010-12-21 一种一卡通系统的实现方法和系统以及一种智能卡 WO2011076102A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
KR1020127018868A KR101509043B1 (ko) 2009-12-21 2010-12-21 범용 카드 시스템의 실현 방법과 시스템 및 스마트 카드
RU2012130527/08A RU2573211C2 (ru) 2009-12-21 2010-12-21 Способ исполнения и система универсальной электронной карты и смарт-карты
JP2012545068A JP2013515301A (ja) 2009-12-21 2010-12-21 汎用カードシステムの実現方法、システム及びスマートカード
EP10838665.7A EP2518933A4 (en) 2009-12-21 2010-12-21 IMPLEMENTATION PROCEDURE, SYSTEM OF A UNIVERSAL CARD SYSTEM AND CHIP CARD
US13/518,224 US20120284519A1 (en) 2009-12-21 2010-12-21 Implementing method, system of universal card system and smart card

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2009102434273A CN102103651B (zh) 2009-12-21 2009-12-21 一种一卡通系统的实现方法和系统以及一种智能卡
CN200910243427.3 2009-12-21

Publications (1)

Publication Number Publication Date
WO2011076102A1 true WO2011076102A1 (zh) 2011-06-30

Family

ID=44156421

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/080042 WO2011076102A1 (zh) 2009-12-21 2010-12-21 一种一卡通系统的实现方法和系统以及一种智能卡

Country Status (7)

Country Link
US (1) US20120284519A1 (zh)
EP (1) EP2518933A4 (zh)
JP (1) JP2013515301A (zh)
KR (1) KR101509043B1 (zh)
CN (1) CN102103651B (zh)
RU (1) RU2573211C2 (zh)
WO (1) WO2011076102A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290200A (zh) * 2019-06-24 2019-09-27 吉林大学 一种防信息泄露的电子授权印章管理系统及使用方法

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130116782A (ko) 2012-04-16 2013-10-24 한국전자통신연구원 계층적 비디오 부호화에서의 계층정보 표현방식
CN103888248B (zh) * 2012-12-24 2017-12-08 中国银联股份有限公司 智能卡的密钥管理方法、系统及相应的智能卡
CN105516181A (zh) * 2015-12-29 2016-04-20 邵军利 安全设备管理系统及方法
JP6705290B2 (ja) * 2016-06-01 2020-06-03 大日本印刷株式会社 マルチペイメントカード発行システム,端末装置およびコンピュータプログラム
CN107665419B (zh) * 2017-08-24 2024-01-12 北京融通智慧科技有限公司 国家电网智慧工地管控平台的劳务实名制管理系统
CN108183795A (zh) * 2017-12-29 2018-06-19 新开普电子股份有限公司 一卡通密钥管理方法
WO2019198327A1 (ja) * 2018-04-10 2019-10-17 フェリカネットワークス株式会社 情報処理装置、及び情報処理方法
CN110135175A (zh) * 2019-04-26 2019-08-16 平安科技(深圳)有限公司 基于区块链的信息处理、获取方法、装置、设备及介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1304602A (zh) * 1998-05-05 2001-07-18 杰伊·C·陈 一种用于电子交易的密码系统和方法
CN1308750A (zh) * 1998-05-06 2001-08-15 美国快递旅游服务股份有限公司 动态智能卡同步和个人化方法及设备
EP1927956A1 (en) * 2006-11-30 2008-06-04 Incard SA Multi-applications IC Card with secure management of applications

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6A (en) * 1836-08-10 Thomas blanghard
US6005942A (en) * 1997-03-24 1999-12-21 Visa International Service Association System and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
US6367011B1 (en) * 1997-10-14 2002-04-02 Visa International Service Association Personalization of smart cards
PT1068589E (pt) * 1998-04-02 2002-05-31 Swisscom Mobile Ag Metodo de carregamento de dados em cartoes de pastilha electronica e aparelhos adaptados em conformidade
WO2000025278A1 (en) * 1998-10-27 2000-05-04 Visa International Service Association Delegated management of smart card applications
DE19929164A1 (de) * 1999-06-25 2001-01-11 Giesecke & Devrient Gmbh Verfahren zum Betreiben eines zur Ausführung von nachladbaren Funktionsprogrammen ausgebildeten Datenträgers
DE10108487A1 (de) * 2001-02-22 2002-09-12 Giesecke & Devrient Gmbh Verfahren und System zur verteilten Erstellung eines Programms für einen programmierbaren, tragbaren Datenträger
JP3880384B2 (ja) * 2001-12-06 2007-02-14 松下電器産業株式会社 Icカード
JP2004013438A (ja) * 2002-06-05 2004-01-15 Takeshi Sakamura 電子価値データ通信方法、通信システム、icカード及び携帯端末
US7188089B2 (en) * 2002-07-26 2007-03-06 Way Systems, Inc. System and method for securely storing, generating, transferring and printing electronic prepaid vouchers
CN1308882C (zh) * 2003-01-06 2007-04-04 李之彦 开放式功能动态集成的智能卡系统
US20050195975A1 (en) * 2003-01-21 2005-09-08 Kevin Kawakita Digital media distribution cryptography using media ticket smart cards
JP2004334542A (ja) * 2003-05-08 2004-11-25 Dainippon Printing Co Ltd Icカード、icカードプログラム及びicカードのメモリ領域の割当方法
EP1536606A1 (fr) * 2003-11-27 2005-06-01 Nagracard S.A. Méthode d'authentification d'applications
US7360691B2 (en) * 2004-02-02 2008-04-22 Matsushita Electric Industrial Co., Ltd. Secure device and mobile terminal which carry out data exchange between card applications
JP2009258860A (ja) * 2008-04-14 2009-11-05 Sony Corp 情報処理装置および方法、記録媒体、プログラム、並びに情報処理システム
JP5324813B2 (ja) * 2008-04-28 2013-10-23 Kddi株式会社 鍵生成装置、証明書生成装置、サービス提供システム、鍵生成方法、証明書生成方法、サービス提供方法およびプログラム

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1304602A (zh) * 1998-05-05 2001-07-18 杰伊·C·陈 一种用于电子交易的密码系统和方法
CN1308750A (zh) * 1998-05-06 2001-08-15 美国快递旅游服务股份有限公司 动态智能卡同步和个人化方法及设备
EP1927956A1 (en) * 2006-11-30 2008-06-04 Incard SA Multi-applications IC Card with secure management of applications

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290200A (zh) * 2019-06-24 2019-09-27 吉林大学 一种防信息泄露的电子授权印章管理系统及使用方法

Also Published As

Publication number Publication date
EP2518933A4 (en) 2016-08-10
US20120284519A1 (en) 2012-11-08
RU2012130527A (ru) 2014-01-27
JP2013515301A (ja) 2013-05-02
RU2573211C2 (ru) 2016-01-20
KR101509043B1 (ko) 2015-04-06
CN102103651A (zh) 2011-06-22
EP2518933A1 (en) 2012-10-31
CN102103651B (zh) 2012-11-14
KR20120112598A (ko) 2012-10-11

Similar Documents

Publication Publication Date Title
WO2011076102A1 (zh) 一种一卡通系统的实现方法和系统以及一种智能卡
CN106603484B (zh) 虚拟钥匙方法及应用该方法的装置、后台系统、用户终端
EP1388989B1 (en) Digital contents issuing system and digital contents issuing method
CN110291754A (zh) 使用移动设备的系统访问
US20080209225A1 (en) Methods and systems for assigning roles on a token
JP4360422B2 (ja) 認証情報管理システム、認証情報管理サーバ、認証情報管理方法及びプログラム
JP4209840B2 (ja) Icカード、端末装置及びデータ通信方法
CN101807994B (zh) 一种ic卡应用数据传输的方法及系统
JP2013546108A (ja) 非接触型スマートカードのためのローカルのトラステッドサービスマネージャ
JP2006505993A (ja) ユーザ・デバイスへのアクセス・コード・セットの提供
CN101167298A (zh) 用于访问装在移动终端内的sim卡的方法和装置
CN112347453A (zh) 一种汽车电子标识内嵌nfc芯片的数据安全写入方法及系统
KR100544991B1 (ko) 자율형 집적회로 카드
CN101741565A (zh) 一种ic卡应用数据传输的方法及系统
CN101159754A (zh) 一种运行在智能移动终端的互联网应用管理系统
JP2000011101A (ja) Icカードおよび記録媒体
CN101571926A (zh) Ic卡的安全读写设备以及该设备的使用方法
JP4576633B2 (ja) ネットワークを利用したicカードの即時再発行方法及びシステム
CN102480724A (zh) 一种软件认证数据卡、软件认证系统和软件认证方法
KR101604459B1 (ko) 거래연동 오티피 생성 방법, 장치 및 시스템
KR102550600B1 (ko) NFT(Non-fungible Token)와 원본을 결합하는 시스템 및 그 방법
CN108075887A (zh) 用于cpu卡加密认证的方法、云平台、用户设备和系统
Go et al. Gyroscope-based Secure NFC payment system using signatures
JP2000029996A (ja) Icカード機能管理方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10838665

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2012545068

Country of ref document: JP

ENP Entry into the national phase

Ref document number: 20127018868

Country of ref document: KR

Kind code of ref document: A

Ref document number: 2012130527

Country of ref document: RU

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 6335/CHENP/2012

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 13518224

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2010838665

Country of ref document: EP