WO2014101635A1 - 智能卡的密钥管理方法、系统及相应的智能卡 - Google Patents

智能卡的密钥管理方法、系统及相应的智能卡 Download PDF

Info

Publication number
WO2014101635A1
WO2014101635A1 PCT/CN2013/088316 CN2013088316W WO2014101635A1 WO 2014101635 A1 WO2014101635 A1 WO 2014101635A1 CN 2013088316 W CN2013088316 W CN 2013088316W WO 2014101635 A1 WO2014101635 A1 WO 2014101635A1
Authority
WO
WIPO (PCT)
Prior art keywords
record
smart card
application
key
key management
Prior art date
Application number
PCT/CN2013/088316
Other languages
English (en)
French (fr)
Inventor
李春欢
王丰
丁林润
徐晋耀
肖波
回春野
王红剑
陆东东
詹成初
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Publication of WO2014101635A1 publication Critical patent/WO2014101635A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3576Multiple memory zones on card
    • G06Q20/35765Access rights to memory zones
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]

Definitions

  • the present invention relates to a key technology for a smart card, and more particularly to key management for the application of a smart card.
  • keys are typically applied to the application or file layer of the smart card.
  • the smart card A includes the A payment application and the B payment application
  • the key management must be implemented for the A payment application and the B payment application respectively, that is, the A payment application implements key management for A
  • the B payment application implementation targets B's key management.
  • a payment application and the B payment application are essentially the same and only the interests of the party are different, such a key management mechanism is too complicated, and the data in the smart card is complicated in structure.
  • the payment application of both is a conventional transportation card payment application, but the A payment application belongs to Company A, and the B payment application belongs to Company B.
  • the present invention provides a key management method for a smart card, the method comprising setting an association record for each of the different applications of the smart card, wherein each application corresponds to at least one associated record; Each associated record uses a key management mechanism.
  • the present invention further provides a key management system for a smart card, the system comprising: an association record setting module, which sets an association record for each of the different applications of the smart card, wherein each application corresponds to at least one association Recording; a key management module for processing key related data for each associated record.
  • the present invention further provides a smart card, the smart card includes: a different application module, an associated record setting module, configured to set an association record for each application module, each application module corresponding to at least one associated record; a key management module, It is used to process key related data for each associated record.
  • the method or system of the present invention makes the encryption management of the smart card application change from the file level to the record level, thereby effectively reducing the number of settings of the same type of application in the smart card and ensuring the security and specificity of the application processing. . DRAWINGS
  • 1 is a smart card in accordance with an example of the present invention.
  • FIG. 2 is a flow chart showing a key control method for a smart card according to an example of the present invention.
  • FIG. 3 is a flow chart of a method for issuing a smart card.
  • FIG. 4 is a flow chart showing one specific example of adding an association record.
  • FIG. 5 is a flow chart showing a specific example of updating an association record.
  • FIG. 6 is a specific example of using a smart card in accordance with the present invention.
  • the smart card 1 is a smart card in accordance with an example of the present invention.
  • the construction process of the smart card is similar to that of a conventional smart card, and will not be described here.
  • the smart card includes different application modules, such as an application module 1, an application module 2 and an application module 3, an association record setting module 20, and a key management module 30.
  • Each application module in the smart card performs different functions, for example, the application module 1 is used as a traffic payment, the application module 2 is used as a merchant credit, and the application module 3 is used as a parking fee payment.
  • the association record setting module 20 sets an association record for each application module, and can set an association record for each application module, or set multiple association records.
  • the setting of the associated record can be set based on the attribute of the service processed by the application module, such as the affiliate. For example, in the first region, the traffic payment service processed by the traffic payment of the application module 1 belongs to A, in the second region, belongs to B, and in the third region, belongs to C.
  • the associated record setting module 20 is an application module.
  • the associated record setting module 20 sets the associated record 21 and the associated record 22 for the application module 2; the affiliate of the financial service processed by the application module 3
  • the association record setting module 20 sets the association records 31, 31 and 33 for the application module 3.
  • the key management module 30 implements a key management mechanism. Specifically, when setting each associated record, the key management module 30 first sets a corresponding record for each associated record. The record key controlled by the affiliation party; in all subsequent processes, the key management module 30 receives the transmitted security message and matches the security message with the record key. If the key management module 30 successfully matches the security message with the record key, the record can be subsequently used, thereby enabling the application-related business process to proceed smoothly.
  • All the associated records are, for example, an extended application special file of a variable length recording structure, and Table 1 exemplifies the structure of one such file including the associated record of the smart card. It should be noted that the table is only an example, and does not necessarily correspond to the application of the smart card shown in FIG. 1 .
  • Table 2 is the recommended value of the SFI value in Table 1.
  • FIG. 1 An example of the use of the smart card illustrated in FIG. 1 is as follows: The user carries the card in the first area to take the bus to cause the payment service. In the payment process, the machine that reads the card first calculates the security message, and the smart card obtains the security. After the message, the password management module 30 matches the security message with the record key of the associated record 11. If the match is successful, the process proceeds to the regular payment process, and the normal payment process is completed by the application 1. It can be seen that the application 1 can complete the regular payment service only if the key matching of the associated record 11 is successful. The user carries the card in the second area to take the bus to cause the payment service.
  • the machine that reads the card first calculates the security message, and after the smart card obtains the security message, the password management module 30 records the security message and the associated record.
  • the record key of 12 matches, and if the match is successful, the routine payment process is entered, and the regular payment process is completed by the application 2.
  • Application 1 in other regions and its
  • the traffic payment service handled by the transportation payment belongs to A
  • the second region belongs to company B
  • in the third region if it belongs to company C, it will be in the smart card.
  • three applications for payment processing are set at the same time.
  • the three applications for payment processing include file keys controlled by A, B, and C, respectively, for each time processing the transportation payment service, and the card reading machine.
  • the calculated security messages are matched to ensure the security and specificity of the payment.
  • the smart card shown in FIG. 1 has only one application for traffic payment of the same type of service, and all the conventional processes involved in payment, regardless of which party is handled by it.
  • the smart card according to the present invention sets an association record managed by a key mechanism, each associated record corresponding to one affiliation, and each associated record is provided with a record key controlled by the affiliation.
  • each service processing only when the security message calculated by the card reading machine matches the record key of the associated record corresponding to the belonging party of the service, the corresponding application can enter the normal payment processing flow.
  • the smart card shown in FIG. 1 only needs one application, which reduces the storage space of the smart card occupied by the application. Moreover, the smart card shown in FIG. 1 also achieves a key management function due to the setting of the associated record and the record key, ensuring the security and specificity of the transaction.
  • step 200 an association record is set for each of the different applications of the smart card, wherein each application corresponds to at least one associated record.
  • step 202 a key control mechanism is employed for each associated record.
  • the plurality of applications included in the smart card respectively have different functions, which may be hardware modules or software modules.
  • the application and application modules may be used instead of each other.
  • the execution of the method shown in Fig. 2 will be described herein in conjunction with the smart card of Fig. 1.
  • association records are set for the application modules 1, 2, and 3, respectively, based on the attribute of the service to be processed. Specifically, an association record 11, an association record 12, and an association record 13 are set for the application module 1; an association record 21 and an association record 22 are set for the application module 2; an association record 31, an association record 32, and an association record 33 are set for the application module 3.
  • each is managed by a key management mechanism. It can be seen that each associated record corresponds to one application and each associated record only corresponds to one affiliate related to the service processed by the application, whereby the record key for the associated record is the corresponding party of the associated record. control.
  • the present invention also provides a key management system for a smart card, the system including the associated record setting module 20 and the key management module 30 shown in FIG.
  • the operation of the system, that is, the associated record setting module 20 and the key management module 30 have been explained in conjunction with FIG. 1, and will not be described again.
  • the present invention also provides a method for issuing a smart card, and FIG. 3 illustrates a flow of the method.
  • the activation key of the smart card issuer is obtained to obtain the permission to set the associated record for each application.
  • Each application has an opening key that is controlled by the card issuer.
  • the association record is set by the authority for a specific application only if the provisioning key is obtained. Only when the opening key is obtained, has permission to set the associated record for each application, such as application modules 1, 2 and 3 in Figure 1.
  • an association record is set for the application of the smart card, and a recording key is set for each associated record. How to set up an association record for a smart card application has been described in conjunction with Figure 1.
  • each of the affiliation parties also sets the record key controlled by the affiliation party for the associated record corresponding thereto by, for example, the key management module 30 shown in Fig. 1.
  • FIG. 4 is a flow chart showing a specific example of adding an association record.
  • the data structure of the associated record is shown in Table 1.
  • the terminal or issuer backend system 40 issues information to the smart card 42 selecting the application file directory.
  • the selection is successful.
  • the terminal or the card issuer backend system 40 calculates a security message; the calculation of the security message can be performed according to the maintenance key ID indicated when the fixed length record file with the extended domain is created, and the corresponding maintenance key is searched for, thereby calculating Add related security messages for recording indications.
  • an indication of an increased record with the calculated security message is issued.
  • the smart card 42 verifies the security message, and in the case of the verification pass, returns an indication of increasing the record success in step 404; the smart card 42 searches for the idle record in the fixed length record file of the domain to be extended, after verifying the security message, Write the new record content to the idle record.
  • FIG. 5 is a flow diagram of a specific example of updating an association record.
  • the data structure of the associated record is shown in Table 1.
  • the terminal or issuer backend system 40 issues information to the smart card 42 selecting the application file directory.
  • the selection is successful.
  • the terminal or the card issuer backend system 40 calculates a security message; the security message calculation can calculate a security message for updating the record indication according to the record key of the associated record itself.
  • an indication of the updated association record with the calculated security message is issued.
  • the smart card 42 verifies the security message and, in the event that the verification passes, returns an indication that the concept update record was successful in step 504.
  • the new associated record and record key are saved.
  • FIG. 6 is a specific example of using a smart card in accordance with the present invention.
  • the data structure of the associated record is shown in Table 1.
  • terminal 60 sends an indication to the smart card 42 to select the directory of the desired application.
  • the smart card 42 sends the information that the selection is successful.
  • Step 602 Perform a related transaction process.
  • the calculation Security message At step 603, the calculation Security message.
  • the associated associated record is read and written.
  • the smart card verifies the message by associating the recorded record key. In the case where the verification is passed, the execution success indication is sent, as shown in step 606. Subsequently, the subsequent related transaction process is executed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Lock And Its Accessories (AREA)

Abstract

本发明提供一种用于智能卡的密钥管理方法,所述方法包括为所述智能卡不同应用中的每一个设置关联记录,其中各应用至少对应一条关联记录;以及对每一条关联记录采用密钥管理机制。

Description

智能卡的密钥管理方法、 系统及相应的智能卡 技术领域
[0001] 本发明涉及智能卡的密钥技术, 更具体地, 涉及对智能卡的应用的密钥管理。
背景技术
[0002] IC智能卡的应用已经非常普及。 由于 IC智能卡的使用多涉及例如支付等功能或涉及 到持卡人的私人信息, 因此, 通常对 IC智能卡中的内容, 都会采用加密机制。
[0003] 就常规的 IC 智能卡加密而言, 密钥一般都应用在智能卡的应用或文件层。 举例来 说, 智能卡 A包含甲支付应用和乙支付应用, 则必须分别对甲支付应用和乙支付应用实施 密钥管理, 也就是说甲支付应用实施针对甲的密钥管理, 乙支付应用实施针对乙的密钥管 理。
[0004] 如果甲支付应用和乙支付应用的本质相同而仅利益所属方不同, 则这样的密钥管理 机制就太过复杂, 还使得智能卡内的数据繁多结构复杂。 甲支付应用和乙支付应用的本质相 同而仅利益所属方不同的情况例如是: 两者的支付应用都是常规的交通卡支付应用, 但是甲 支付应用隶属于甲公司, 而乙支付应用隶属于乙公司。
[0005] 有鉴于此, 有必要对智能卡的密钥管理方式进行改进。
发明内容
[0006] 有鉴于此, 本发明提供一种用于智能卡的密钥管理方法, 所述方法包括为所述智能 卡不同应用中的每一个设置关联记录, 其中各应用至少对应一条关联记录; 以及对每一条关 联记录采用密钥管理机制。
[0007] 本发明还提供一种用于智能卡的密钥管理系统, 所述系统包括: 关联记录设置模 块, 其为所述智能卡不同应用中的每一个设置关联记录, 其中各应用至少对应一条关联记 录; 密钥管理模块, 其用于对每一条关联记录的密钥相关数据进行处理。
[0008] 本发明还提供一种智能卡, 所述智能卡包括: 不同的应用模块, 关联记录设置模 块, 用于为各应用模块设置关联记录, 各应用模块至少对应一个关联记录; 密钥管理模块, 其用于对每一条关联记录的密钥相关数据进行处理。
[0009] 本发明所述的方法或系统, 使得对智能卡应用的加密管理变从文件级变为记录级, 从而有效地降低了智能卡中同类应用的设置数目且确保了应用处理的安全与专属性。 附图说明
[0010] 图 1是根据本发明的一个示例的智能卡。
[0011] 图 2是是根据本发明的一个示例的用于智能卡的密钥控制方法的流程示意。
[0012] 图 3是智能卡的发行方法的流程示意。
[0013] 图 4是增加关联记录的一个具体示例的流程示意。
[0014] 图 5是更新关联记录的一个具体示例的流程示意。
[0015] 图 6是使用按照本发明的智能卡的一个具体示例。
具体实施方式
[0016] 现在参照附图描述本发明的示意性示例, 相同的附图标号表示相同的元件。 下文描 述的各实施例有助于本领域技术人员透彻理解本发明, 且意在示例而非限制。
[0017] 图 1 是根据本发明的一个示例的智能卡。 该智能卡的构造工艺与常规智能卡类似, 在此就不赘述。 该智能卡包括不同的应用模块, 如应用模块 1、 应用模块 2和应用模块 3, 关联记录设置模块 20, 密钥管理模块 30。
[0018] 该智能卡中各应用模块分别执行不同的功能, 例如应用模块 1 用作交通支付, 应用 模块 2用作商户积分, 应用模块 3用作停车收费支付。 关联记录设置模块 20为每一个应用 模块设置关联记录, 可为每个应用模块设置一个关联记录, 也可设置多个关联记录。 关联记 录的设置可基于该应用模块所处理的业务的隶属性来设置, 比如隶属方。 举例来说, 在第一 地域, 应用模块 1的交通支付所处理的交通支付业务属于甲, 在第二地域, 属于乙, 在第三 地域, 属于丙, 这样, 关联记录设置模块 20为应用模块 1设置针对甲的关联记录 11, 设置 针对乙的关联记录 12, 设置针对丙的关联记录 13。 类似地, 本例中, 基于应用模块 2所处 理的金融业务的隶属方, 关联记录设置模块 20为应用模块 2设置关联记录 21 和关联记录 22; 基于应用模块 3所处理的金融业务的隶属方, 关联记录设置模块 20为应用模块 3设置 关联记录 31, 31 和 33。 针对每一条关联记录, 密钥管理模块 30对其实施密钥管理机制, 具体而言, 密钥管理模块 30 在设置每一条关联记录的时候, 会首先为每一条关联记录设置 由该关联记录对应的隶属方所控制的记录密钥; 在后续的所有处理过程中, 密钥管理模块 30接收传送来的安全报文, 并将该安全报文与该记录密钥匹配。 如果密钥管理模块 30将安 全报文与该记录密钥匹配成功, 则后续可使得该记录被使用, 从而使与应用相关的业务处理 得以顺利进行。
[0019] 在此需要说明的是, 关联记录的记录密钥、 安全报文的计算、 安全报文与记录密钥 的匹配等并非本发明的重点, 本文将不对其进行阐述。 [0020] 所有的关联记录例如为一个变长记录结构的扩展应用专用文件, 表 1 示例了包括智 能卡的关联记录的一个这种文件的结构。 需要说明的是, 该表仅为示例, 且不一定与图 1所 示的智能卡的应用对应。
[0021] 表 1
Figure imgf000004_0001
表 2是表 1中 SFI值的推荐值。
[0022] 表 2
Figure imgf000004_0002
图 1所示例的智能卡的使用的一个示例简述如下: 用户携卡在第一地域乘坐公交车引起支付 业务, 该支付过程中, 读取卡片的机器首先计算安全报文, 智能卡在获得该安全报文之后, 密码管理模块 30将该安全报文与关联记录 11的记录密钥匹配, 在匹配成功的情况下, 进入 到常规的支付流程, 该常规的支付流程由该应用 1完成。 可见, 只有在对关联记录 11 的密 钥匹配成功的情况下, 才能使得应用 1完成常规的支付业务。 用户携卡在第二地域乘坐公交 引起支付业务, 该支付过程中, 读取卡片的机器首先计算安全报文, 智能卡在获得该安全报 文之后, 密码管理模块 30将该安全报文与关联记录 12的记录密钥匹配, 在匹配成功的情况 下, 进入到常规的支付流程, 该常规的支付流程由该应用 2完成。 应用 1在其它地域以及其
替换页(细则第 26条) 它应用在各隶属方的具体使用情况与此类似, 不再一一描述。
[0023] 如果是常规的智能卡, 在第一地域, 交通支付所处理的交通支付业务属于甲, 在第 二地域, 属于公司乙, 在第三地域, 属于公司丙的情况下, 则会在智能卡中同时设置三个用 于支付处理的应用, 这三个用于支付处理的应用包括由甲、 乙和丙分别控制的文件密钥, 用 于在每一次处理交通支付业务时, 与读卡机器所计算的安全报文进行匹配, 从而确保支付的 安全与专属性。
[0024] 图 1 所示的智能卡, 针对交通支付这种同类型业务, 仅设置一个应用, 所有涉及支 付的常规处理, 不论是哪一个隶属方, 均由其处理。 根据本发明的智能卡设置了以密钥机制 进行管理的关联记录, 每个关联记录对应一个隶属方, 且每条关联记录设置有由该隶属方控 制的记录密钥。 在每一次业务处理中, 仅在读卡机器计算的安全报文与该业务的隶属方对应 的关联记录的记录密钥匹配的情况下, 才能使对应的应用进入到常规的支付处理流程。
[0025] 与常规的智能卡相比, 图 1 所示的智能卡同类业务仅需一个应用, 降低了应用所占 据的智能卡的存储空间。 且图 1所示的智能卡由于关联记录及记录密钥的设置, 同样达成了 密钥管理功能, 确保了交易的安全与专属性。
[0026] 图 2 是根据本发明的一个示例的用于智能卡的密钥控制方法的流程示意图。 如图所 示, 在步骤 200, 为智能卡的不同应用中的每一个设置关联记录, 其中各应用至少对应一条 关联记录。 在步骤 202, 对每一条关联记录采用密钥控制机制。
[0027] 智能卡包括的多个应用分别具有不同的功能, 它们可以是硬件模块也可是软件模 块, 在本文中, 应用和应用模块可以相互替代使用。 在此结合图 1的智能卡来说明图 2所示 方法的执行过程。
[0028] 对于应用模块 1、 应用模块 2和应用模块 3, 基于其所处理业务的隶属性, 分别为应 用模块 1、 2和 3设置关联记录。 具体地, 为应用模块 1设置关联记录 11、 关联记录 12和 关联记录 13 ; 为应用模块 2设置关联记录 21和关联记录 22; 为应用模块 3设置关联记录 31、 关联记录 32和关联记录 33。 对于所设置的这些关联记录, 每一条都采用密钥管理机制 进行管理。 可以看出, 每个关联记录对应一个应用且每个关联记录仅对应一个与该应用处理 的业务有关的隶属方, 由此, 针对该关联机录的记录密钥由该关联记录对应的隶属方控制。
[0029] 本发明还提供了一种用于智能卡的密钥管理系统, 该系统包括图 1 所示的关联记录 设置模块 20和密钥管理模块 30。 有关该系统的工作, 亦即有关联记录设置模块 20和密钥 管理模块 30已结合图 1阐述, 不再赘述。
[0030] 本发明还提供一种智能卡的发行方法, 图 3示意了该方法的流程。 [0031] 在步骤 300, 获取智能卡发卡方的开通密钥, 以获得为每个应用设置关联记录的权 限。 每个应用, 都有一个开通密钥, 由发卡方控制。 仅在获得该开通密钥的情况下, 才由权 限针对具体的应用设置关联记录。 只有获得了开通密钥, 才有权限针对各应用设置关联记 录, 如图 1中的应用模块 1, 2和 3。
[0032] 在步骤 302, 在获得开通密钥之后, 为所述智能卡的应用设置关联记录, 同时为各关 联记录设置记录密钥。 结合图 1 已经介绍了如何为智能卡的应用设置关联记录。 在设置关联 记录的时候, 各隶属方也通过例如图 1 所示的密钥管理模块 30为与其对应的关联记录设置 由隶属方控制的记录密钥。
[0033] 增加关联记录的流程简述如下: 选择所需应用的目录。 在选择成功的情况下, 发出 增加关联记录的请求, 智能卡在验证该请求之后, 即增加关联记录。
[0034] 图 4 是增加关联记录的一个具体示例的流程示意。 该示例中, 关联记录的数据结构 如表 1所示。 在步骤 400, 终端或发卡方后端系统 40向智能卡 42发出选择应用文件目录的 信息。 步骤 401, 选择成功。 在步骤 402, 终端或发卡方后端系统 40计算安全报文; 安全报 文的计算可根据带扩展域的定长记录文件创建时指示的维护密钥 ID, 查找相应的维护密 钥, 从而计算增加记录指示用的相关安全报文。 随后在步骤 403, 发出带有所计算的安全报 文的增加记录的指示。 智能卡 42验证该安全报文, 并在验证通过的情况下, 在步骤 404中 返回增加记录成功的指示; 智能卡 42 查找待扩展域的定长记录文件中的空闲记录, 在验证 安全报文之后, 将新的记录内容写入到空闲记录中。
[0035] 更新关联记录的流程简述如下: 选择相应应用的目录。 在选择成功的情况下, 发出 更新关联记录的请求, 智能卡在验证该请求之后, 即更新关联记录。
[0036] 图 5 是更新关联记录的一个具体示例的流程示意。 该示例中, 关联记录的数据结构 如表 1所示。 在步骤 500, 终端或发卡方后端系统 40向智能卡 42发出选择应用文件目录的 信息。 步骤 501, 选择成功。 在步骤 502, 终端或发卡方后端系统 40计算安全报文; 安全报 文的计算可根据该关联记录自身的记录密钥计算更新记录指示用的安全报文。 随后在步骤 503, 发出带有所计算的安全报文的更新关联记录的指示。 智能卡 42验证该安全报文, 并在 验证通过的情况下, 在步骤 504中返回观念更新记录成功的指示。 在步骤 505, 保存新的关 联记录和记录密钥。
[0037] 图 6 是使用按照本发明的智能卡的一个具体示例。 该示例中, 关联记录的数据结构 如表 1 所示。 在步骤 600, 终端 60 向智能卡 42发送选择所需的应用的目录的指示。 步骤 601, 智能卡 42发送选择成功的信息。 步骤 602, 执行相关的交易流程。 在步骤 603, 计算 安全报文。 在步骤 604, 读写相关关联记录。 在步骤 605 , 智能卡通过关联记录的记录密钥 验证报文。 在验证通过的情况下, 发送执行成功指示, 如步骤 606所示。 随后, 执行后续相 关的交易流程。
[0038] 尽管已结合附图在上文的描述中, 公开了本发明的具体实施例, 但是本领域技术人 员可以理解到, 可在不脱离本发明精神的情况下, 对公开的具体实施例进行变形或修改。 本 发明的实施例仅用于示意并不用于限制本发明。

Claims

权 利 要 求 书
1. 一种用于智能卡的密钥管理方法, 其特征在于, 所述方法包括:
为所述智能卡不同应用中的每一个设置关联记录, 其中各应用至少对应一条关联记录; 以及 对每一条关联记录采用密钥管理机制。
2. 如权利要求 1 所述的密钥控制方法, 其特征在于, 所述关联记录的设置基于各应用所处 理业务的隶属性。
3. 如权利要求 2 或 3 所述的密钥控制方法, 其特征在于, 在每一条关联记录的设置过程 中, 同时设置由该关联记录对应的隶属方控制的记录密钥。
4. 一种用于智能卡的密钥管理系统, 其特征在于, 所述系统包括:
关联记录设置模块, 其为所述智能卡不同应用中的每一个设置关联记录, 其中各应用至少对 应一条关联记录;
密钥管理模块, 其用于对每一条关联记录的密钥相关数据进行处理。
5. 如权利要求 4 所述的密钥管理系统, 其特征在于, 所述关联记录的设置基于各应用所处 理业务的隶属性。
6. 如权利要求 4 或 5 所述的密钥管理系统, 其特征在于, 密钥管理模块在每一条关联记录 的设置过程中, 同时设置由该关联记录对应的隶属方控制的记录密钥。
7. 一种智能卡, 其特征在于, 所述智能卡包括:
不同的应用模块,
关联记录设置模块, 用于为各应用模块设置关联记录, 各应用模块至少对应一个关联记录; 密钥管理模块, 其用于对每一条关联记录的密钥相关数据进行处理。
8. —种智能卡的发行方法, 其特征在于, 所述方法包括:
获取智能卡发卡方的开通密钥, 以获得为每个应用设置关联记录的权限;
在获得开通密钥之后, 为所述智能卡的应用设置关联记录, 同时为各关联记录设置密钥。
PCT/CN2013/088316 2012-12-24 2013-12-02 智能卡的密钥管理方法、系统及相应的智能卡 WO2014101635A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210565185.1A CN103888248B (zh) 2012-12-24 2012-12-24 智能卡的密钥管理方法、系统及相应的智能卡
CN201210565185.1 2012-12-24

Publications (1)

Publication Number Publication Date
WO2014101635A1 true WO2014101635A1 (zh) 2014-07-03

Family

ID=50956976

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/088316 WO2014101635A1 (zh) 2012-12-24 2013-12-02 智能卡的密钥管理方法、系统及相应的智能卡

Country Status (4)

Country Link
CN (1) CN103888248B (zh)
HK (1) HK1199334A1 (zh)
TW (1) TW201428531A (zh)
WO (1) WO2014101635A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101930640A (zh) * 2009-06-26 2010-12-29 海南新生信息技术有限公司 一卡多账户多交易方法和系统
CN102103651A (zh) * 2009-12-21 2011-06-22 中国移动通信集团公司 一种一卡通系统的实现方法和系统以及一种智能卡
CN102467672A (zh) * 2010-11-11 2012-05-23 中国移动通信集团公司 智能卡片的子应用管理方法及设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0270571B1 (en) * 1986-05-16 1992-06-24 AT&T Corp. Arrangement for a portable data carrier having multiple application files
CN102056077B (zh) * 2009-10-29 2013-11-06 中国移动通信集团公司 一种通过密钥进行智能卡应用的方法和装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101930640A (zh) * 2009-06-26 2010-12-29 海南新生信息技术有限公司 一卡多账户多交易方法和系统
CN102103651A (zh) * 2009-12-21 2011-06-22 中国移动通信集团公司 一种一卡通系统的实现方法和系统以及一种智能卡
CN102467672A (zh) * 2010-11-11 2012-05-23 中国移动通信集团公司 智能卡片的子应用管理方法及设备

Also Published As

Publication number Publication date
CN103888248B (zh) 2017-12-08
HK1199334A1 (zh) 2015-06-26
CN103888248A (zh) 2014-06-25
TW201428531A (zh) 2014-07-16

Similar Documents

Publication Publication Date Title
US10902425B2 (en) System and method for biometric credit based on blockchain
EP3132564B1 (en) Identity verification system and associated methods
US11245513B2 (en) System and method for authorizing transactions in an authorized member network
US8332322B2 (en) Method of establishing identity validation based on an individual's ability to access multiple secure accounts
TW202002570A (zh) 基於區塊鏈的電子簽名方法及裝置、電子設備
US20140282900A1 (en) Methods and systems for providing secure transactions
US20200082388A1 (en) Authenticating server and method for transactions on blockchain
CN103339636A (zh) 创建用于认证应用的签名
US10438197B2 (en) Public ledger authentication system
CN111612456A (zh) 过期数字证书管控方法、系统、装置及存储介质
JP7462903B2 (ja) 利用者端末、認証者端末、登録者端末、管理システムおよびプログラム
WO2022087791A1 (zh) 一种数字资产交易控制方法、装置、终端设备及存储介质
US20210004791A1 (en) Guaranteeing server and method for transaction on blockchain
WO2023134259A1 (zh) 基于点对点的数据处理方法、系统、计算设备及存储介质
WO2014101635A1 (zh) 智能卡的密钥管理方法、系统及相应的智能卡
KR101876671B1 (ko) 서버 사이의 통신을 통한 전자 서명 방법 및 이를 실행하는 시스템
US20230245118A1 (en) Point-to-point (p2p)-based data processing method and system, computing device, and storage medium
JP6009521B2 (ja) 利用者特定システム、方法、およびプログラム
TWI643143B (zh) 非集中化電子交易紀錄系統及其認證方法
US11966925B2 (en) Methods for improving identification threat protection and devices thereof
KR102645894B1 (ko) 통신 단말 기반의 계약 처리 시스템 및 방법
US20240086503A1 (en) User Verification with Non-Fungible Tokens
KR20240077220A (ko) Nft 기반의 분산신원증명 처리 장치 및 방법
US20230306824A1 (en) Authorized resource distribution via a resource distribution node in a distributed network of nodes
US20230308427A1 (en) Consensus authentication utilizing nodes in a distributed network of nodes

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13869748

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15.10.15)

122 Ep: pct application non-entry in european phase

Ref document number: 13869748

Country of ref document: EP

Kind code of ref document: A1