WO2015003587A1 - 智能卡及校验数据输出方法、操作请求响应方法及系统 - Google Patents
智能卡及校验数据输出方法、操作请求响应方法及系统 Download PDFInfo
- Publication number
- WO2015003587A1 WO2015003587A1 PCT/CN2014/081705 CN2014081705W WO2015003587A1 WO 2015003587 A1 WO2015003587 A1 WO 2015003587A1 CN 2014081705 W CN2014081705 W CN 2014081705W WO 2015003587 A1 WO2015003587 A1 WO 2015003587A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- smart card
- verification data
- verification
- information
- terminal
- Prior art date
Links
- 238000012795 verification Methods 0.000 title claims abstract description 638
- 238000000034 method Methods 0.000 title claims abstract description 205
- 230000008569 process Effects 0.000 claims abstract description 95
- 238000004891 communication Methods 0.000 claims description 328
- 238000012545 processing Methods 0.000 claims description 143
- 238000004364 calculation method Methods 0.000 claims description 72
- 230000004044 response Effects 0.000 claims description 21
- 230000006870 function Effects 0.000 description 12
- 238000001514 detection method Methods 0.000 description 7
- 238000003672 processing method Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 238000012360 testing method Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 238000003491 array Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/343—Cards including a counter
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/352—Contactless payments by cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4093—Monitoring of device authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
- G07F7/122—Online card verification
Definitions
- the present invention relates to the field of information security technologies, and in particular, to a smart card and a verification data output method, an operation request response method and system. Background technique
- the magnetic stripe card itself has the following problems: Once the user's account number and transaction password are acquired, a magnetic stripe card can be copied, thereby stealing user information and causing the user to property loss.
- the existing smart card has a chip set inside, and the chip includes two modes of card operation: a contact operation mode and a non-contact operation mode, and the chip determines which operation mode is used when transmitting information with the outside world, and which protocol is called internally.
- Information transmission when the chip transmits information, it can process the output information, including encryption or signature, and the key used for encryption or signature cannot be read and copied. Therefore, the smart card is used instead of the magnetic stripe.
- the card can prevent the card from being copied, and even if the user's account number and transaction password are obtained, the same card cannot be copied, so that the user information and property can be secured to a certain extent.
- FIG 1 shows the structure of the user's information stealing using the existing smart card.
- the ATM 101 is wired or wireless. The method is connected to the server 102 of the bank, so that the corresponding business of the bank can be realized.
- the smart card 106 held by the user is directly inserted into the ATM machine 101 to implement services such as transfer and cash withdrawal.
- the thief sets a copy card 103
- the fake card 103 is inserted into the ATM machine, and only the smart card 106 held by the user is inserted into the ATM machine 101, the information transmitted by the ATM machine 101 is received, and the ATM machine 101 is sent.
- the thief transmits the information sent by the ATM machine 101 received by the pirate card 103 to the first stealing terminal 104 set by the thief by the wireless method, and the first stealing terminal 104 is configured to receive the fake card.
- the information transmitted by the 103 and the information sent to the fake card 103 can be connected to the fake card 103 by a wired connection or the wirelessly connected fake card 103.
- the first stealing terminal 104 is connected to the second stealing terminal 105 via the Internet or a wireless network or the like.
- the second stealing terminal 105 is The mobile terminal can be carried by the thief, and is connected with the high-power RF antenna 106, and scans the smart card 107 held by the user around the antenna through the antenna 106.
- the second stealing terminal 105 can easily establish a wireless connection with the smart card 107 held by the user through the antenna 106. At this time, the second stealing terminal The terminal 105 can obtain the smart card information from the smart card 107 held by the user, and obtain the obtained smart card information through the Internet or The wireless network or the like is sent to the first stealing terminal 104, so that the acquired smart card information is sent to the ATM machine 101 through the fake card 103. At this time, after the ATM machine obtains the real information of the smart card 107 held by the user, the ATM machine 101 After the transaction password of the smart card 107 is input, services such as transfer or cash withdrawal can be directly performed. It can be seen that in this way, once the existing smart card leaks account information and transaction password, it will cause huge loss of user property, and cannot be avoided, because the stealer's mobility is more difficult to query the identity of the stealer. Summary of the invention
- the invention aims to solve the problem of security risks existing in the existing smart card.
- the main object of the present invention is to provide a verification data output method
- Another object of the present invention is to provide a smart card
- a further object of the present invention is to provide an operation request response method
- An aspect of the present invention provides a verification data output method, including: a smart card acquisition operation request; the smart card acquiring the smart card operation information of the smart card after acquiring the operation request, where the smart card operation information includes at least a smart card mode factor, the smart card mode factor is used to indicate an operation mode of the smart card; the smart card acquires a verification data generation policy, and uses the verification data generation policy to process at least the smart card operation information, Verifying the data; the smart card outputs the verification data after obtaining the verification data.
- the verification data output method further includes the steps of: the smart card establishing a communication connection with the terminal, wherein the smart card acquires an operation request of the terminal through the communication connection.
- the verification data output method further includes the steps of: the smart card acquiring an output policy corresponding to the verification data, wherein the verification data is output according to an output policy of the verification data.
- the smart card acquires a verification data generation policy corresponding to the smart card operation information from a pre-stored verification data generation policy.
- the smart card processes the smart card operation information by using the verification data generation policy
- the step of obtaining the verification data includes: the smart card processing the smart card operation information to obtain the first verification data, And processing the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, to obtain the second verification data, wherein the first verification data and the second school A combination of the test data is used as the check data.
- the smart card processes the smart card operation information by using the verification data generation policy, and the step of obtaining verification data includes: the smart card operating information, the electronic passbook balance, and the electronic passbook
- the online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time are processed to obtain the verification data.
- the method further includes: determining whether the operation request is a pre-stored target request; if the operation request is the target request, processing the smart card operation information by using the verification data generation policy .
- the steps of the processing include: an encryption process.
- the step of the encryption process includes: if the verification data generation policy is a MAC calculation policy, the smart card performs MAC calculation on at least the smart card operation information; if the verification data generation policy is a HASH calculation strategy And the smart card performs at least HASH calculation on the smart card operation information; if the verification data generation policy is a signature policy, the smart card performs at least a signature calculation on the smart card operation information.
- the smart card operation information further includes: a random number and/or a transaction count value.
- the working mode of the smart card includes a communication connection mode of the smart card.
- the communication connection mode of the smart card includes a contactless communication connection mode and/or a contact communication connection mode.
- the contact type communication connection mode includes a mode of communication connection by a chip and/or a mode of communication connection by a magnetic stripe.
- the working mode of the smart card includes: an object type connected to the smart card.
- Another aspect of the present invention provides an operation request response method, including: a smart card adopting the above method to output at least verification data; the terminal acquires the verification data, and sends at least the operation request and the verification data to a background After receiving the verification data and the operation request, the background system server verifies the verification data, and after the verification is passed, performs a process of responding to the operation request.
- the step of verifying the verification data by the background system server includes: obtaining, by the background system server, a communication manner of the terminal; and acquiring a target with the same verification data generation policy as that obtained by the smart card
- the background system server uses the target policy to verify the communication mode of the terminal, and generates first verification information; the background system server uses the first verification information and the verification data.
- the verification data corresponding to the smart card mode factor is compared; if the first verification information is the same as the verification data corresponding to the smart card mode factor in the verification data, the verification is passed; otherwise, the verification fails.
- the verification data further includes data processed by the object type connected to the smart card; wherein: the step of the background system server verifying the verification data further includes: the background system server acquiring the location Determining an object type of the terminal; the background system server uses the target to verify the communication mode information of the terminal, and generates second verification information; the background system server uses the second verification information and the Verify the data with the wisdom
- the verification data corresponding to the object type of the card connection is compared; if the second verification information is the same as the verification data corresponding to the object type of the smart card in the verification data, the verification is passed; otherwise , the verification does not pass.
- a further aspect of the present invention provides a smart card, including: an obtaining module, a processing module, and an output module; the obtaining module is configured to obtain an operation request, and obtain the smart card operation information of the smart card after obtaining the operation request,
- the smart card operation information includes at least the smart card mode factor, the smart card mode factor is used to indicate an operation mode of the smart card, and a verification data generation policy is acquired;
- the processing module is configured to generate a strategy by using the verification data And processing at least the smart card operation information to obtain verification data; and the output module is configured to output the verification data after the processing module obtains the verification data.
- the smart card further includes: a communication module, configured to establish a communication connection with the terminal, and output verification data according to an output policy of the verification data.
- the processing module is configured to process the smart card operation information, obtain the first verification data, and the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and The transaction time is processed to obtain second verification data, wherein the combination of the first verification data and the second verification data is used as the verification data.
- the processing module is configured to process the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, to obtain the verification data. .
- the smart card further includes: a judging module; after the obtaining module obtains the operation request, the judging module determines whether the operation request is a pre-stored target request, and if the operation request is determined to be the The target request instructs the processing module to process at least the smart card operation information by using the verification data generation policy.
- processing module is further configured to perform at least encryption processing on the smart card operation information by using the verification data generation policy.
- the processing module is configured to perform MAC calculation on at least the smart card operation information; and if the verification data generation policy is a HASH calculation policy, the processing And the module is configured to perform at least a HASH calculation on the smart card operation information. If the verification data generation policy is a signature policy, the processing module is configured to perform at least a signature calculation on the smart card operation information.
- the smart card operation information further includes: a random number and/or a transaction count value.
- the working mode of the smart card includes a communication connection mode of the smart card.
- the communication connection mode of the smart card includes a contactless communication connection mode and/or a contact communication connection mode.
- the contact communication connection mode includes a mode of communication connection by a chip and/or a mode of communication connection by a magnetic stripe.
- the working mode of the smart card includes: an object type connected to the smart card.
- a still further aspect of the present invention provides an operation request response system, including: a terminal, a background system server, and the smart card; the terminal acquires the verification data, and sends at least the operation request and the verification data
- the background system server includes: a receiving module, a verification module, and an execution module; the receiving module is configured to receive the verification data and the operation request sent by the terminal; The module is configured to: after the receiving module receives the verification data and the operation request, verify the verification data; the execution module is configured to execute after the verification module passes the verification The process of responding to the operation request.
- the background system server further includes an obtaining module, where the acquiring module is configured to acquire a communication mode of the terminal, and acquire a target policy that is the same as the verification data generation policy acquired by the smart card; And the method for verifying the communication mode of the terminal by using the target policy, generating first verification information, and performing the verification data corresponding to the smart card mode factor in the first verification information. If the first verification information is the same as the verification data corresponding to the smart card mode factor in the verification data, the verification is passed; otherwise, the verification fails.
- the verification data further includes data processed by the object type connected to the smart card; wherein: the background system server further includes an acquiring module, where the acquiring module is configured to acquire an object type of the terminal; The verification module is further configured to perform verification on the communication mode information of the terminal by using the target, generate second verification information, and compare the second verification information and the verification data with the smart card. The verification data corresponding to the connected object type is compared. If the second verification information is the same as the verification data corresponding to the object type of the smart card in the verification data, the verification is passed; otherwise, the calibration The test will not pass.
- a computer readable medium comprising computer instructions that, when executed, cause the verification data output method or the operation request response method to be performed.
- An aspect of the present invention provides a verification data output method, including: a smart card establishing a communication connection; after the communication connection is established, the smart card acquires an operation request of the terminal through the communication connection; After the operation request, the smart card operation information when the smart card interacts with the terminal is obtained, where the smart card operation information includes at least an operation mode of the smart card; and the smart card acquires the verification data from a pre-stored verification data generation policy.
- a verification data generation policy corresponding to the smart card operation information and processing the smart card operation information by using at least the verification data generation policy corresponding to the smart card operation information to obtain verification data; the smart card obtaining the verification data Afterwards, an output policy corresponding to the check data is obtained, and the check data is output according to an output policy of the check data.
- the smart card processes at least the smart card operation information by using a verification data generation policy corresponding to the smart card operation information
- the step of obtaining verification data includes: the smart card processing the smart card operation information to obtain a a verification data, and processing the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, to obtain second verification data, wherein the first verification A combination of the data and the second check data is used as the check data.
- the smart card processes at least the smart card operation information by using a verification data generation policy corresponding to the smart card operation information
- the step of obtaining the verification data includes: the smart card operating information, the electronic passbook balance, The electronic passbook online transaction serial number, transaction amount, transaction type identifier, terminal number, transaction date, and transaction time are processed to obtain the verification data.
- the method further includes: Determining whether the operation request is a pre-stored target request; if the operation request is the target request, processing the smart card operation information by using at least a verification data generation policy corresponding to the smart card operation information.
- the steps of the processing include: an encryption process.
- the step of the encryption process includes: if the verification data generation policy corresponding to the smart card operation information is a MAC calculation policy, the smart card performs MAC calculation on at least the smart card operation information; if the smart card operation information corresponds to The verification data generation policy is a HASH calculation policy, and the smart card performs at least HASH calculation on the smart card operation information; if the verification data generation policy corresponding to the smart card operation information is a signature policy, the smart card is at least The smart card operation information is used for signature calculation.
- the smart card operation information further includes: a random number and/or a transaction count value.
- the working mode of the smart card includes a communication connection mode of the smart card.
- the communication connection mode of the smart card includes a contactless communication connection mode and/or a contact communication connection mode.
- the contact type communication connection mode includes a mode of communication connection by a chip and/or a mode of communication connection by a magnetic stripe.
- the working mode of the smart card includes: an object type connected to the smart card.
- Another aspect of the present invention provides an operation request response method, including: a smart card adopting the above method to output at least verification data; the terminal acquires the verification data, and sends at least the operation request and the verification data to a background
- the background system server verifies the verification data, and after the verification is passed, performs a process of responding to the operation request.
- the step of verifying the verification data by the background system server includes: obtaining, by the background system server, a communication manner of the terminal; and acquiring a target with the same verification data generation policy as that obtained by the smart card
- the background system server uses the target policy to verify the communication mode of the terminal, and generates first verification information; the background system server uses the first verification information and the verification data.
- the verification data corresponding to the smart card mode factor is compared; if the first verification information is the same as the verification data corresponding to the smart card mode factor in the verification data, the verification is passed; otherwise, the verification fails.
- the verification data further includes data processed by the object type connected to the smart card; wherein: the step of the background system server verifying the verification data further includes: the background system server acquiring the location Determining an object type of the terminal; the background system server uses the target to verify the communication mode information of the terminal, and generates second verification information; the background system server uses the second verification information and the Aligning the check data corresponding to the object type connected to the smart card in the check data; if the second check information is the same as the check data corresponding to the object type of the smart card connected in the check data, Then the check passes; otherwise, the check fails.
- a further aspect of the present invention provides a smart card, including: a communication module, an acquisition module, and a processing module; the communication module is configured to establish a communication connection, and output verification data according to an output policy of the verification data; After the communication connection of the communication module is established, the operation request of the terminal is obtained through the communication connection, and after the operation request is obtained, the smart card operation information when the smart card interacts with the terminal is acquired, the smart card The operation information includes at least the working mode of the smart card, and the verification data generation policy corresponding to the smart card operation information is obtained from the pre-stored verification data generation policy, and after the processing module obtains the verification data, the school is acquired.
- An output policy corresponding to the data; the processing module is configured to process at least the smart card operation information by using a verification data generation policy corresponding to the smart card operation information, to obtain verification data.
- the processing module is configured to process the smart card operation information, obtain the first verification data, and the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and The transaction time is processed to obtain second verification data, wherein the combination of the first verification data and the second verification data is used as the verification data.
- the processing module is configured to process the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, to obtain the verification data. .
- the method further includes: a judging module; after the obtaining module obtains the operation request, determining, by the obtaining module, whether the operation request is a pre-stored target request, and if the operation request is determined to be the target request, And instructing the processing module to process the smart card operation information by using the verification data generation policy.
- processing module is further configured to use the verification data generation policy to at least enter the smart card operation information.
- Line encryption processing is further configured to use the verification data generation policy to at least enter the smart card operation information.
- the processing module is configured to perform MAC calculation on at least the smart card operation information; and if the verification data generation policy is a HASH calculation policy, the processing And the module is configured to perform at least a HASH calculation on the smart card operation information. If the verification data generation policy is a signature policy, the processing module is configured to perform at least a signature calculation on the smart card operation information.
- the smart card operation information further includes: a random number and/or a transaction count value.
- the working mode of the smart card includes a communication connection mode of the smart card.
- the communication connection mode of the smart card includes a contactless communication connection mode and/or a contact communication connection mode.
- the contact type communication connection mode includes a mode of communication connection by a chip and/or a mode of communication connection by a magnetic stripe.
- the working mode of the smart card includes: an object type connected to the smart card.
- a still further aspect of the present invention provides an operation request response system, including: a terminal, a background system server, and the smart card; the terminal acquires the verification data, and sends at least the operation request and the verification data
- the background system server includes: a receiving module, a verification module, and an execution module; the receiving module is configured to receive the verification data and the operation request sent by the terminal; The module is configured to: after the receiving module receives the verification data and the operation request, verify the verification data; the execution module is configured to execute after the verification module passes the verification The process of responding to the operation request.
- the background system server further includes an obtaining module, where the acquiring module is configured to acquire a communication mode of the terminal, and acquire a target policy that is the same as the verification data generation policy acquired by the smart card; And the method for verifying the communication mode of the terminal by using the target policy, generating first verification information, and performing the verification data corresponding to the smart card mode factor in the first verification information. If the first verification information is the same as the verification data corresponding to the smart card mode factor in the verification data, the verification is passed; otherwise, the verification fails.
- the verification data further includes data processed by the object type connected to the smart card; wherein: the background system server further includes an acquiring module, where the acquiring module is configured to acquire an object type of the terminal; The verification module is further configured to perform verification on the communication mode information of the terminal by using the target, generate second verification information, and compare the second verification information and the verification data with the smart card. The verification data corresponding to the connected object type is compared. If the second verification information is the same as the verification data corresponding to the object type of the smart card in the verification data, the verification is passed; otherwise, the calibration The test will not pass.
- the smart card is based on the smart card for acquiring the smart card.
- the operation information generates verification data
- the background system server performs a process of responding to the operation request after verifying that the verification data passes, thereby preventing user information from being stolen, improving the security of the smart card, and ensuring the security of the user information and the property.
- An aspect of the present invention provides a verification data output method, including: a smart card acquisition operation request; the smart card acquiring the smart card operation information of the smart card after acquiring the operation request, where the smart card operation information includes at least a smart card mode factor, where the smart card mode factor is used to indicate a working mode of the smart card, wherein the working mode of the smart card includes a communication mode of the smart card, wherein the communication mode of the smart card includes a contact communication mode and/or a contact communication mode; the smart card acquires a verification data generation policy, and uses the verification data generation policy to process at least the smart card operation information to obtain verification data; after the smart card obtains the verification data, And outputting the verification data according to a pre-stored output policy.
- the smart card processes the smart card operation information by using the verification data generation policy
- the step of obtaining the verification data includes: the smart card processing the smart card operation information to obtain the first verification data, And processing the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, to obtain the second verification data, wherein the first verification data and the second school A combination of the test data is used as the check data.
- the smart card processes the smart card operation information by using the verification data generation policy, and the step of obtaining verification data includes: the smart card operation information, the electronic passbook balance, and the electronic passbook online transaction serial number The transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time are processed to obtain the verification data.
- the method further includes: determining whether the operation request is a pre-stored target request; If the operation request is the target request, the smart card operation information is processed at least by using the verification data generation policy.
- the steps of the processing include: an encryption process.
- the step of the encryption process includes: if the verification data generation policy is a MAC calculation policy, the smart card performs MAC calculation on at least the smart card operation information; if the verification data generation policy is a HASH calculation strategy And the smart card performs at least HASH calculation on the smart card operation information;
- the smart card at least performs signature calculation on the smart card operation information.
- the smart card operation information further includes: a random number and/or a transaction count value.
- the contact communication connection mode includes a mode of communication connection by a chip and/or a mode of communication connection by a magnetic stripe.
- the working mode of the smart card includes: an object type connected to the smart card.
- Another aspect of the present invention provides an operation request response method, including: a smart card adopting the above method to output at least verification data; the terminal acquires the verification data, and sends at least the operation request and the verification data to a background After receiving the verification data and the operation request, the background system server verifies the verification data, and after the verification is passed, performs a process of responding to the operation request.
- the step of verifying the verification data by the background system server includes: obtaining, by the background system server, a communication manner of the terminal; and acquiring a target with the same verification data generation policy as that obtained by the smart card
- the background system server uses the target policy to verify the communication mode of the terminal, and generates first verification information; the background system server uses the first verification information and the verification data.
- the verification data corresponding to the smart card mode factor is compared; if the first verification information is the same as the verification data corresponding to the smart card mode factor in the verification data, the verification is passed; otherwise, the verification fails.
- the verification data further includes data processed by the object type connected to the smart card; wherein: the step of the background system server verifying the verification data further includes: the background system server acquiring the location Determining an object type of the terminal; the background system server uses the target to verify the communication mode information of the terminal, and generates second verification information; the background system server uses the second verification information and the Aligning the check data corresponding to the object type connected to the smart card in the check data; if the second check information is the same as the check data corresponding to the object type of the smart card connected in the check data, Then the check passes; otherwise, the check fails.
- a further aspect of the present invention provides a smart card, including: an obtaining module, a processing module, and an output module; the obtaining module is configured to obtain an operation request, and obtain the smart card operation information of the smart card after obtaining the operation request,
- the smart card operation information includes at least the smart card mode factor, where the smart card mode factor is used to indicate the working mode of the smart card, wherein the working mode of the smart card includes a communication mode of the smart card, wherein the smart card communication mode Include a contact communication mode and/or a contactless communication mode, and obtain a verification data generation policy;
- the processing module is configured to process at least the smart card operation information by using the verification data generation policy to obtain verification data.
- the output module is configured to output the verification data according to a pre-stored output policy after the processing module obtains the verification data.
- the processing module is configured to process the smart card operation information, obtain the first verification data, and the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and The transaction time is processed to obtain second verification data, wherein the combination of the first verification data and the second verification data is used as the verification data.
- the processing module is configured to process the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, to obtain the Verify the data.
- the smart card further includes: a judging module; after the obtaining module obtains the operation request, the judging module determines whether the operation request is a pre-stored target request, and if the operation request is determined to be the target request And instructing the processing module to process the smart card operation information by using the verification data generation policy.
- processing module is further configured to perform at least encryption processing on the smart card operation information by using the verification data generation policy.
- the processing module is configured to perform MAC calculation on at least the smart card operation information; and if the verification data generation policy is a HASH calculation policy, the processing And the module is configured to perform at least a HASH calculation on the smart card operation information. If the verification data generation policy is a signature policy, the processing module is configured to perform at least a signature calculation on the smart card operation information.
- the smart card operation information further includes: a random number and/or a transaction count value.
- the contact type communication connection mode includes a mode of communication connection by a chip and/or a mode of communication connection by a magnetic stripe.
- the working mode of the smart card includes: an object type connected to the smart card.
- a still further aspect of the present invention provides an operation request response system, including: a terminal, a background system server, and the smart card; the terminal acquires the verification data, and sends at least the operation request and the verification data
- the background system server includes: a receiving module, a verification module, and an execution module; the receiving module is configured to receive the verification data and the operation request sent by the terminal; The module is configured to: after the receiving module receives the verification data and the operation request, verify the verification data; the execution module is configured to execute after the verification module passes the verification The process of responding to the operation request.
- the background system server further includes an obtaining module, where the acquiring module is configured to acquire a communication mode of the terminal, and acquire a target policy that is the same as the verification data generation policy acquired by the smart card; And the method for verifying the communication mode of the terminal by using the target policy, generating first verification information, and performing the verification data corresponding to the smart card mode factor in the first verification information. If the first verification information is the same as the verification data corresponding to the smart card mode factor in the verification data, the verification is passed; otherwise, the verification fails.
- the verification data further includes data processed by the object type connected to the smart card; wherein: the background system server further includes an acquiring module, where the acquiring module is configured to acquire an object type of the terminal; The verification module is further configured to perform verification on the communication mode information of the terminal by using the target, generate second verification information, and compare the second verification information and the verification data with the smart card.
- the check data corresponding to the connected object type is compared, if the second check information is related to the check type corresponding to the object type of the smart card in the check data According to the same, the verification passes; otherwise, the verification fails.
- the smart card generates check data according to the smart card operation information of the smart card, and the background system server performs the process of responding to the operation request after verifying the verification data, thereby preventing user information. It is stolen, improving the security of smart cards and ensuring the security of user information and property.
- a method for processing information includes: acquiring, by a smart card, an operation request of a terminal; after receiving the operation request, the smart card detects a communication mode currently used by the smart card, where the communication mode of the smart card includes a contact communication mode And/or a non-contact communication mode; the smart card performs a flow of outputting at least information of the smart card communication mode, wherein the smart card communication mode information is used to indicate a communication mode currently used by the smart card; the terminal acquires smart card communication mode information; Sending the smart card communication mode information; the background system server acquires the smart card communication mode information; and acquiring the terminal communication mode information of the terminal, where the communication mode information of the terminal is used to indicate that the terminal is transmitting the operation The communication mode used by the request; the background system server compares the communication mode information of the terminal with the communication mode information of the smart card; if the communication mode information of the terminal is the same as the communication mode information of the smart card, After the background system server obtains the operation request, it performs a process of processing the operation request
- the smart card performs at least a process of outputting the smart card communication mode information, including: the smart card acquiring a verification data generation policy, and processing the smart card communication mode information by using the verification data generation policy to obtain verification data;
- the background system server compares the terminal communication mode information with the smart card communication mode information, and the method includes: the background system server acquiring the verification data generation policy, and using the verification data generation policy to at least The terminal communication mode information is processed to obtain verification information; and the verification information is compared with the verification data.
- the smart card communication mode information output by the smart card includes any one of the following information, including: the first smart card communication mode information is a communication mode currently used by the smart card; and the second smart card communication mode information is a communication mode currently used by the smart card. And a random number; the third smart card communication mode information is a communication mode and a transaction count value currently used by the smart card; the fourth smart card communication mode information is a communication mode, a random number, and a transaction count value currently used by the smart card;
- the terminal communication mode information obtained by the system server includes: when the smart card communication mode information is the first smart card communication mode information, the terminal communication mode information is a communication mode used by the terminal when transmitting the operation request; When the smart card communication mode information is the second smart card communication mode information, the terminal communication mode information is a communication mode used by the terminal when transmitting the operation request, and the random number; the smart card communication mode information is the third Smart card communication method
- the communication mode of the terminal is a communication mode used by the terminal when transmitting the operation request, and the
- the verification data includes the first verification data and the second verification data, where: the first verification data is obtained by processing, by the smart card, the smart card communication mode information; The smart card is processed by processing the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time; the verification information includes the first verification information and the second Verifying information, wherein: the first verification information is obtained by the background system server processing the communication mode information of the terminal; and the second verification information is the balance of the electronic passbook, the electronic The passbook online transaction serial number, transaction amount, transaction type identifier, terminal number, transaction date and transaction time are processed.
- the verification data is obtained by the smart card processing the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time;
- the verification information is obtained by the smart card processing the terminal communication mode information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time.
- the processing is an encryption process.
- the verification data and the verification information are obtained by any one of the following methods, including: if the verification data generation policy is a MAC calculation policy, the smart card performs MAC calculation on at least the smart card communication mode information. The calculated MAC value is used as the check data; if the check data generation policy is the HASH calculation policy, the smart card performs HASH calculation on at least the smart card communication mode information, and uses the calculated HASH value as the check data; If the verification data generation policy is a signature policy, the smart card performs at least signature calculation on the smart card communication mode information, and uses the calculated signature information as verification data.
- the smart card performs at least a process of outputting the smart card communication mode information, including: the smart card acquiring an encoding policy, and processing the smart card communication mode information by using the encoding policy to obtain encoded data; the background system server acquiring the smart card
- the communication mode information includes: the background system server acquires the encoded data, and obtains a decoding policy corresponding to the encoding policy, and decodes the encoded data by using the decoding policy to obtain smart card communication mode information.
- the method After receiving the operation request, before detecting the smart card communication mode information, the method further includes: determining whether the operation request is a pre-stored target request; if the operation request is the target request, detecting a smart card current Communication method information used.
- the contact mode comprises a mode of communication connection through a chip and/or a mode of communication connection by a magnetic stripe.
- the process of the smart card executing at least the information of the smart card communication mode includes: performing the smart card a process of outputting at least the smart card communication mode information and the object type information connected to the smart card; the background system server, after receiving the object type information of the smart card connection, before performing the process of processing the operation request, includes: The background system server acquires the object type of the terminal; the background system server compares the object type of the terminal with the object type connected to the smart card; if the object type of the terminal is connected to the smart card The object type is the same, and the terminal communicates with the smart card and the smart card
- a system for processing information comprising: a first acquiring module in a smart card, configured to acquire an operation request of a terminal; and a detecting module in the smart card, connected to the first acquiring module, configured to receive the operation request After detecting the communication mode currently used by the smart card, the communication mode of the smart card includes a contact communication mode and/or a contactless communication mode; an output module in the smart card is connected to the detection module, and is configured to execute And a flow of the smart card communication mode information, where the smart card communication mode information is used to indicate a communication mode currently used by the smart card; and the second acquisition module in the terminal is connected to the output module, and configured to acquire the smart card communication mode information.
- the sending module is connected to the terminal, and is connected to the second acquiring module, and configured to send the smart card communication mode information;
- the third acquiring module in the background system server is connected to the sending module, and is configured to obtain Smart card communication mode information; and, obtaining the
- the communication mode information is: the comparison module in the background system server is connected to the third acquisition module, and is configured to compare the communication mode information of the terminal with the communication mode information of the smart card;
- the processing module is connected to the comparison module, and is configured to: if the terminal communication mode information is the same as the smart card communication mode information, the background system server performs a process of processing the operation request after acquiring the operation request.
- the output module of the smart card is configured to obtain a verification data generation policy, and use the verification data generation strategy to process at least the smart card communication mode information to obtain verification data.
- the comparison module of the background system server is configured to acquire the verification data generation policy, and use the verification data generation policy to process at least the communication mode information of the terminal to obtain verification information; The verification information is compared with the verification data.
- the smart card communication mode information output by the output module includes any of the following information, including: the first smart card communication mode information is a communication mode currently used by the smart card; and the second smart card communication mode information is a communication currently used by the smart card.
- the third smart card communication mode information is a communication mode and a transaction count value currently used by the smart card;
- the fourth smart card communication mode information is a communication mode, a random number, and a transaction count value currently used by the smart card;
- the communication mode information of the terminal acquired by the third obtaining module includes: when the smart card communication mode information is the first smart card communication mode information, the terminal communication mode information is the communication used by the terminal when sending the operation request Method; when the smart card communication mode information is the second smart card communication mode information, The terminal communication mode information is a communication mode used by the terminal when transmitting the operation request, and the random number; when the smart card communication mode information is the third smart card communication mode information, the terminal communication mode information is the terminal a communication method and a transaction count
- the verification data includes the first verification data and the second verification data, where: the first verification data is obtained by processing, by the smart card, the smart card communication mode information;
- the smart card processes the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time;
- the verification information includes a first verification information and a second verification information, where: the first verification information is obtained by the background system server processing the communication mode information of the terminal; The verification information is obtained by the background system server processing the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time.
- the verification data is obtained by the smart card processing the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time;
- the verification information is obtained by the smart card processing the terminal communication mode information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time.
- the processing is an encryption process.
- the verification data and the verification information are obtained by any one of the following methods, including: if the verification data generation policy is a MAC calculation policy, the smart card performs MAC calculation on at least the smart card communication mode information. The calculated MAC value is used as the check data; if the check data generation policy is the HASH calculation policy, the smart card performs HASH calculation on at least the smart card communication mode information, and uses the calculated HASH value as the check data; If the verification data generation policy is a signature policy, the smart card performs at least signature calculation on the smart card communication mode information, and uses the calculated signature information as verification data.
- the output module is configured to acquire an encoding policy, and use the encoding policy to process at least the smart card communication mode information to obtain encoded data.
- the third acquiring module is configured to acquire the encoded data, and obtain the said coding strategies corresponding decoding strategy and policy using said decoding the encoded data is decoded to obtain information on the smart card communicatively 0
- the smart card further includes: a determining module, configured to: after detecting the operation request of the smart card, determine whether the operation request is a pre-stored target request, if the operation request is The target request detects the communication mode currently used by the smart card.
- the contact mode comprises a mode of communication connection by a chip and/or a mode of communication connection by a magnetic stripe.
- the output module of the smart card is configured to execute at least a process of outputting smart card communication mode information and object type information connected to the smart card; and the comparison module of the background system server is further configured to receive the smart card After the object type information is connected, the object type of the terminal is obtained, and the object type of the terminal is compared with the object type connected to the smart card; The object type is the same as the object type connected to the smart card, and the terminal communicates with the smart card in the same manner as the smart card, and after the operation request is obtained, the operation request is processed. Process.
- a smart card comprising: an obtaining module, configured to acquire an operation request; and a detecting module, configured to be connected to the acquiring module, configured to detect a communication mode currently used by the smart card after receiving the operation request,
- the communication mode of the smart card includes a contact communication mode and/or a contactless communication mode; and an output module, configured to execute at least a flow of outputting information of the smart card communication mode, wherein the smart card communication mode information is used to indicate a communication currently used by the smart card the way.
- the output module of the smart card is configured to obtain a verification data generation policy, and use the verification data generation strategy to process at least the smart card communication mode information to obtain verification data.
- the smart card communication mode information output by the output module includes any of the following information, including: the first smart card communication mode information is a communication mode currently used by the smart card; and the second smart card communication mode information is a communication currently used by the smart card.
- the third smart card communication mode information is a communication mode and a transaction count value currently used by the smart card;
- the fourth smart card communication mode information is a communication mode, a random number, and a transaction count value currently used by the smart card.
- the verification data includes first verification data and second verification data, where:
- the first verification data is obtained by the smart card processing the smart card communication mode information
- the second verification data is obtained by processing, by the smart card, an electronic passbook balance, an electronic passbook online transaction serial number, a transaction amount, a transaction type identifier, a terminal number, a transaction date, and a transaction time.
- the verification data is obtained by the smart card processing the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time.
- the processing is an encryption process.
- the verification data and the verification information are obtained by any one of the following methods, including:
- the verification data generation policy is a MAC calculation policy
- the smart card has at least a smart card communication mode. The information is subjected to MAC calculation, and the calculated MAC value is used as verification data;
- the smart card performs HASH calculation on at least the smart card communication mode information, and uses the calculated HASH value as the verification data;
- the smart card performs at least a signature calculation on the smart card communication mode information, and uses the calculated signature information as the verification data.
- the output module is configured to obtain an encoding policy, and use the encoding strategy to process at least the smart card communication mode information to obtain encoded data.
- the smart card further includes:
- a judging module configured to: after detecting the smart card communication mode information, determine whether the operation request is a pre-stored target request, and if the operation request is the target request, detecting a smart card current The communication method used.
- the contact mode comprises a mode of communication connection by a chip and/or a mode of communication connection by a magnetic stripe.
- the output module of the smart card is configured to execute at least a process of outputting smart card communication mode information and object type information connected to the smart card.
- the smart card communication mode information is output, and after the terminal outputs the smart card communication mode information, the communication mode information used by the smart card is sent to the background system server.
- the background system server compares the communication mode used by the smart card with the communication mode used by the terminal when sending the operation request, and if the two are the same, the process of processing the operation request is executed to prevent the information from being copied by the fake card.
- a smart card comprising: a communication interface, the communication interface comprises a contact communication interface and/or a contactless communication interface; a detection chip detecting a communication state of the communication interface, and the contact communication interface and/or The contactless communication interface is connected, and receives an operation request, and at least outputs a message indicating a communication interface currently used by the smart card, wherein the contact communication interface comprises a chip communication interface and/or a magnetic stripe communication interface.
- the smart card further includes:
- the detection chip is integrated on the smart card chip.
- the detection chip is a smart card chip in a smart card.
- a processing system comprising the smart card according to any one of the above; a terminal connected to the smart card, receiving the Information of a communication interface currently used by the smart card, and transmitting the information for indicating a communication interface currently used by the smart card; the background system server is connected to the terminal, and receiving the communication for indicating the current use of the smart card Information of the interface, processing the information for indicating a communication interface currently used by the smart card.
- the terminal is a POS machine, an ATM machine, a card reader or a card swiping device.
- the detection chip is included in the present invention, and the detection chip is connected to the contact communication interface and/or the contactless communication interface, so that the detection chip outputs the communication interface used by the smart card. Prevent malicious elements from stealing, improve the security of smart cards, and ensure the security of user information and property.
- the smart card generates check data according to the smart card operation information of the smart card, and the background system server performs the process of responding to the operation request after verifying the verification data, thereby preventing user information. It is stolen, improving the security of smart cards and ensuring the security of user information and property.
- FIG. 1 is a structural diagram of user information stealing in an existing smart card application
- FIG. 3 is a schematic structural diagram of a smart card provided by the present invention.
- FIG. 5 is a schematic structural diagram of an operation request response system provided by the present invention. detailed description
- connection In the description of the present invention, it should be noted that the terms “installation”, “connected”, and “connected” are to be understood broadly, and may be fixed or detachable, for example, unless otherwise explicitly defined and defined. Connected, or connected integrally; can be mechanical or electrical; can be directly connected, or indirectly connected through an intermediate medium, can be the internal communication of the two components.
- Connected, or connected integrally can be mechanical or electrical; can be directly connected, or indirectly connected through an intermediate medium, can be the internal communication of the two components.
- the specific meaning of the above terms in the present invention can be understood in a specific case by those skilled in the art.
- FIG. 2 is a flow chart showing a verification data output method of the present invention.
- the verification data output method of the present invention includes the following steps:
- Step S201 The smart card acquires an operation request.
- the smart card can obtain an operation request from the terminal, and the obtained operation request can be any operation request such as transfer, withdrawal, and query.
- the smart card can obtain an operation request from the terminal through a contact method, or can obtain an operation request from the terminal through a contact method.
- the smart card of the present invention acquires the operation information from the second stealing terminal shown in Fig. 1 through the antenna.
- the smart card may further perform the following operations: determining whether the operation request is a pre-stored target request; When the operation request is a target request, an operation of processing at least the smart card operation information by using the verification data generation policy is performed.
- the target request may be an operation request related to user property security, such as: an operation request such as transfer, cash withdrawal, etc.
- the smart card determines that the operation request is a target request, performing a use check
- the data generation policy performs at least the operation of processing the smart card operation information; otherwise, if it is determined that the operation request is not the target request, for example, an operation request such as a query, since the security of the user is not involved, the generation strategy using the verification data is not executed at least
- the smart card operation information is processed to improve the processing speed of such services.
- Step S202 After obtaining the operation request, the smart card acquires the smart card operation information of the smart card, where the smart card operation information includes at least a smart card mode factor, and the smart card mode factor is used to indicate the working mode of the smart card;
- the working mode of the smart card may include a communication connection mode of the smart card
- the communication connection mode of the smart card may include a contactless communication connection mode and/or a contact communication connection mode
- the smart card mode factor is used to indicate the smart
- the working mode of the card that is, the smart card mode factor can be used to indicate that the smart card adopts a contactless communication connection mode, or that the smart card adopts a contact communication connection mode.
- the contact communication connection mode may include a mode of communication connection through a chip and/or a mode of communication connection by a magnetic stripe
- the smart card mode factor may be used to indicate that the smart card adopts a mode of communication through a chip communication in a contact communication connection mode.
- the communication connection mode indicating the smart card can ensure that the information output by the smart card includes the communication connection mode of the smart card. Even if the user information is stolen as described in the background art, the information output by the smart card includes the communication connection mode of the smart card, that is, the smart card output.
- the information includes a communication connection manner with the second stealing terminal.
- the communication connection manner between the smart card and the second stealing terminal is non-contact, and the communication connection manner between the fake card and the ATM machine is contact type, in the subsequent background
- the communication connection mode adopted by the smart card is different from the communication connection mode of receiving the information, and the process of responding to the operation request is not performed, and the security of the smart card user information is ensured.
- the smart card can also obtain the object type connected to the smart card from the terminal for which the operation information is obtained, thereby acquiring the smart card mode factor, and the object type connected to the smart card, that is, the type of the terminal, and the terminal can include: POS machine, ATM machine, and read/write Any terminal that can acquire information of the smart card, such as a card holder or a card swiping device.
- the smart card mode factor can indicate the type of terminal.
- the indicating terminal type can ensure that the information output by the smart card includes the type of the terminal connected thereto, even if the user information is stolen as described in the background art, since the information output by the smart card includes the type of the terminal connected thereto, that is, the information output by the smart card.
- the type of the second stealing terminal is included. At this time, since the type of the second stealing terminal is often different from the terminal type of the ATM machine, the path of the smart card output information can be determined differently from the normal way in the judgment of the subsequent background system server. The process of responding to the operation request is not performed, and the security of the smart card user information is ensured.
- the smart card operation information of the present invention may include: a random number, where the random number may be a random number generator in the smart card, so that a different random number is generated each time, which ensures the subsequent The verification data obtained when processing the smart card operation information is different, thereby preventing the verification data from being cracked.
- the smart card may output the random number together when outputting the information; or may be generated by the background system server setting and the random number set in the smart card. The same algorithm is used to generate random numbers, the former makes verification easier, and the latter makes verification more secure.
- the smart card operation information processing of the present invention includes a smart card mode factor, and may further include a transaction count value, which may be a counter value generated by a counter set in the smart card, and the counter is preset according to each time the smart card outputs data.
- the method performs the counting operation and outputs the transaction count value, thereby ensuring that the verification data obtained when the subsequent processing of the smart card operation information is different, thereby preventing the verification data from being cracked.
- the transaction count value may be when the smart card outputs the information.
- the same output may also be that the background system server counts the same counting method as the smart card every time the business related to the smart card is completed, and obtains the transaction count value, the former makes the verification easier, and the latter makes the verification safer.
- the smart card operation information of the present invention may further include a smart card mode factor, a random number, and a transaction count value, thereby making the security higher.
- Step S203 The smart card acquires a verification data generation policy, and processes the smart card operation information by using the verification data generation policy to obtain verification data.
- the smart card can directly process the smart card operation information to obtain the verification data, and can also encrypt the smart card operation information to obtain the verification data.
- Direct processing is simple, processing speed is high; encryption processing security is better.
- the verification data generation policy corresponding to the smart card operation information may also be obtained from the pre-stored verification data generation policy.
- Method 1 The smart card processes the smart card operation information, obtains the first verification data, and processes the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, and obtains The second check data, wherein the combination of the first check data and the second check data is used as check data.
- processing the smart card operation information and processing the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time may be processed in the same manner or differently.
- the processing method adopts the same processing method, and the processing speed is high, and the different processing methods are safer.
- Method 2 The smart card processes the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, and obtains the verification data.
- Method 3 The smart card encrypts the smart card operation information, obtains the first verification data, and encrypts the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time. Obtaining second check data, wherein a combination of the first check data and the second check data is used as check data.
- the encryption processing of the smart card operation information and the encryption process of the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time may be the same encryption processing method.
- the smart card operation information can be encrypted, and the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time are not encrypted, or the smart card operation information is not performed. Encryption processing, electronic passbook balance, electronic passbook online transaction serial number, transaction amount, transaction type identification, terminal number, transaction date and delivery Easily time to perform encryption processing, as long as the subsequent processing can be performed to verify the processed data.
- Method 4 The smart card encrypts the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, and obtains the verification data.
- the encryption process of the third mode or the fourth mode may be any of the following:
- the smart card performs MAC calculation on at least the smart card operation information; at this time, the calculated MAC value may be used as verification data, or the calculated MAC value portion may be used as a checksum. Data, using MAC calculation strategy, simple calculation method and high processing speed.
- the smart card performs at least HASH calculation on the smart card operation information; at this time, the calculated HASH value may be used as the verification data, or the calculated HASH value portion may be used as the verification. Data, using HASH calculation strategy, is more secure.
- the smart card performs at least signature calculation on the smart card operation information; at this time, the calculated signature data may be used as verification data, or the calculated signature data portion may be used as verification data. , using a signature strategy, high security and can prevent repudiation.
- Step S204 After obtaining the verification data, the smart card outputs the verification data.
- the smart card After obtaining the verification data, the smart card outputs the verification data to the terminal, so that the terminal outputs the verification data to the background system server for verification, and only performs the relevant operation after the verification is passed, thereby ensuring the smart card user.
- Information and property security After obtaining the verification data, the smart card outputs the verification data to the terminal, so that the terminal outputs the verification data to the background system server for verification, and only performs the relevant operation after the verification is passed, thereby ensuring the smart card user.
- the verification data output method of the present invention may further comprise the steps of: the smart card establishing a communication connection with the terminal, wherein the smart card acquires an operation request of the terminal through the communication connection.
- the verification data output method of the present invention may further include the steps of: the smart card acquiring an output policy corresponding to the verification data, wherein the verification data is output according to an output policy of the verification data.
- FIG. 3 is a schematic diagram showing the structure of a smart card based on the above-mentioned verification data output method. Since the smart card of the present invention adopts the above-mentioned verification data output method, it will not be described too much here, and only the structure thereof will be briefly described: 3, the smart card 30 of the present invention includes: an obtaining module 301, a processing module 302, and an output module 303;
- the obtaining module 301 is configured to obtain an operation request, and obtain the smart card operation information of the smart card after obtaining the operation request, where the smart card operation information includes at least a smart card mode factor, and the smart card mode factor is used to indicate the working mode of the smart card. And obtaining a verification data generation strategy;
- the processing module 302 is configured to process at least the smart card operation information by using the verification data generation policy to obtain verification data.
- the output module 303 is configured to output the verification data after the processing module 302 obtains the verification data.
- the smart card 30 may further include a communication module for establishing a communication connection with the terminal and outputting the verification data in accordance with an output policy of the verification data.
- the processing module 302 of the smart card 30 can directly process the smart card operation information to obtain verification data, and can also encrypt the smart card operation information to obtain verification data.
- Direct processing is simple, processing speed is high; encryption processing is more secure.
- the processing module 302 can obtain the verification data by one of the following methods:
- the processing module 302 is configured to process the smart card operation information, obtain the first verification data, and the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time. Processing is performed to obtain second verification data, wherein a combination of the first verification data and the second verification data is used as verification data.
- the processing module 302 is configured to process the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, to obtain the verification data.
- the processing module 302 is configured to encrypt the smart card operation information, obtain the first verification data, and the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction.
- the time is subjected to encryption processing to obtain second verification data, wherein a combination of the first verification data and the second verification data is used as verification data.
- the smart card operation information can be encrypted, and the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time are not encrypted, or the smart card operation information is not performed.
- Encryption processing encrypting the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, as long as the subsequent processed data can be verified.
- the processing module 302 is configured to encrypt the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time to obtain the verification data.
- the encryption processing in the third or fourth mode of the processing module 302 for obtaining the verification data may be any of the following:
- the processing module 302 is configured to operate the smart card at least Perform MAC calculations
- the processing module 302 is configured to perform HASH calculation on at least the smart card operation information
- the processing module 302 is configured to perform at least signature calculation on the smart card operation information.
- the smart card generates verification data according to the smart card operation information of the smart card, thereby preventing the user information from being stolen, improving the security of the smart card, and ensuring the security of the user information and the property.
- the smart card 30 of the present invention may further include a determining module 304.
- the determining module 304 determines whether the operation request is a pre-stored target request, and if the operation request is a target request, the processing module is instructed.
- the at least 302 processing the smart card operation information by using the verification data generation strategy. This increases the processing speed of the business using the smart card.
- the working mode of the smart card of the present invention may include a communication connection mode of the smart card, the communication connection mode of the smart card includes a contactless communication connection mode and/or a contact communication connection mode, and the contact communication connection mode includes a mode of communication connection through the chip and/or Or a mode of communication connection through a magnetic stripe.
- FIG. 4 is a flowchart showing a method for responding to an operation request.
- an operation request response method of the present invention includes:
- the method for outputting the verification data by the smart card using the above steps S201 to S204 outputs at least the verification data; details are not described herein again.
- Step S205 The terminal acquires the verification data, and sends at least the operation request and the verification data to the background system server.
- the terminal may be an ATM machine, a POS machine, a smart phone or a tablet computer or a PC connected to the card reader, Any type of terminal such as a smartphone or tablet or PC connected to the antenna.
- Step S206 After receiving the verification data and the operation request, the background system server verifies the verification data, and after the verification is passed, performs a process of responding to the operation request.
- the background system server may be a server of the bank to implement related services of the bank, or may be a server of a third party, such as a bus card server. As long as it can achieve various types of business closely related to user information
- the servers can all be the backend system servers of the present invention.
- the background system server may perform the following methods according to the communication connection mode of the smart card indicated by the smart card mode factor or the object type connected to the smart card according to the smart card mode factor. Verify the data to verify:
- the background system server obtains the communication mode of the terminal; and obtains the same target policy as the verification data generation strategy acquired by the smart card, and uses the target policy to verify the communication mode of the terminal, generates the first verification information, and performs the first verification.
- the information is compared with the verification data corresponding to the smart card mode factor in the verification data; if the first verification information is the same as the verification data corresponding to the smart card mode factor in the verification data, the verification is passed; otherwise, the verification fails .
- Terminal is
- the communication mode of the terminal acquired by the background system server is the contact communication mode. Therefore, the background system server verification verification data cannot pass, and the security of the user information is ensured.
- the background system server obtains the object type of the terminal, and uses the target to verify the communication mode information of the terminal, and generates second verification information; Comparing the second verification information with the verification data corresponding to the object type connected to the smart card in the verification data; if the second verification information is the same as the verification data corresponding to the object type of the smart card connection in the verification data, The verification passes; otherwise, the verification does not pass.
- the object type of the terminal is a type of terminal such as a terminal having an ATM, a terminal being a POS, and a terminal being a smart phone connected to a card reader.
- the verification data output by the smart card includes the type of the second stealing terminal, but the fake card
- the connected terminal is an ATM machine.
- the object type of the terminal acquired by the background server is an ATM machine, the verification cannot pass, and the security of the user information is ensured.
- FIG. 5 is a schematic structural diagram of an operation request response system.
- the operation request response system of the present invention includes: a terminal 40, a background system server 50, and the smart card 30 shown in FIG. 3, wherein the smart card 30 is the smart card. 30, therefore, I will not repeat them here. Only the terminal 40 and the background system server 50 will be described below.
- the terminal 40 obtains the verification data output by the smart card 30, and sends at least the operation request and the verification data to the background system server 50;
- the background system server 50 includes a receiving module 501, a verification module 502, and an execution module 503;
- the receiving module 501 is configured to receive the verification data and the operation request sent by the terminal 40.
- the verification module 502 is configured to verify the verification data after receiving the verification data and the operation request by the receiving module 501;
- the execution module 503 is configured to execute a process of responding to the operation request after the verification module passes the verification.
- the background system server 50 may respectively adopt a communication connection mode of the smart card indicated by the smart card mode factor or an object type connected to the smart card according to the smart card mode factor, respectively The method performs verification on the verification data.
- the background system server 50 may further include an obtaining module 504:
- the obtaining module 504 is configured to obtain the communication mode of the terminal 40; and obtain the same target policy as the verification data generation policy acquired by the smart card; the verification module 502 is further configured to use the target policy to verify the communication mode of the terminal, and generate the first a check information, comparing the first check information with the check data corresponding to the smart card mode factor in the check data, if the first check information and the check data corresponding to the smart card mode factor in the check data are the same, The verification passes; otherwise, the verification does not pass.
- the acquisition module 504 of the background system server 50 is configured to acquire the object type of the terminal, and the verification module 502 is further configured to utilize the target-to-terminal communication.
- the mode information is verified, the second check information is generated, and the second check information is compared with the check data corresponding to the object type connected to the smart card in the check data, if the second check information and the check data are If the verification data corresponding to the object type of the smart card connection is the same, the verification is passed; otherwise, the verification fails.
- the background system server performs the process of responding to the operation request after verifying the verification data, thereby preventing the user information from being stolen, improving the security of the smart card, and ensuring User information and property security.
- the present invention is only a simple division of the function modules in the smart card and the background system server, but is not limited to the above division.
- the functions performed by the modules of the smart card and the background system server of the present invention may also be divided into several sub-modules to perform correlation.
- the processing module of the smart card can be divided into the processing of the first processing sub-module performing mode 1, the processing of the second processing sub-module performing the second mode, etc.; the verification module of the background system server can be divided into the first verification sub-module pair
- the smart card mode factor is verified in the communication connection mode of the indicated smart card, and the second verification submodule verifies the smart card mode factor when indicating the type of the object connected to the smart card; in addition, each of the smart card and the background system server of the present invention Modules can also be integrated into one module to perform related functions and the like. Any solution using the present invention should be within the scope of the present invention.
- the invention also provides a smart card system, and the smart card system adopts the above verification data output method,
- the description of the smart card system includes: a communication interface and a smart card chip, wherein
- the communication interface is configured to obtain an operation request, and output verification data after the smart card chip obtains the verification data; the smart card chip is configured to acquire, after the operation interface obtains the operation request, the smart card operation information of the smart card, the smart card
- the operation information includes at least the smart card mode factor, the smart card mode factor is used to indicate the working mode of the smart card, and the verification data generation policy is acquired, and the smart card operation information is performed by using the verification data generation policy. Processing, get the verification data.
- the smart card chip can obtain the verification data by one of the following methods:
- the smart card chip processes the smart card operation information, obtains the first verification data, and processes the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time.
- a second check data is obtained, wherein a combination of the first check data and the second check data is used as check data.
- the smart card chip processes the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, and obtains the verification data.
- Method 3 The smart card chip encrypts the smart card operation information, obtains the first verification data, and encrypts the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time. Processing, obtaining second verification data, wherein a combination of the first verification data and the second verification data is used as verification data.
- the smart card operation information can be encrypted, and the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time are not encrypted, or the smart card operation information is not performed. Encryption processing, encrypting the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, as long as the subsequent processed data can be verified.
- Method 4 The smart card chip encrypts the smart card operation information, the electronic passbook balance, the electronic passbook online transaction serial number, the transaction amount, the transaction type identifier, the terminal number, the transaction date, and the transaction time, and obtains the verification data.
- the encryption processing in the third or fourth mode of the smart card chip may be any of the following: if the verification data generation policy is a MAC calculation policy, the smart card chip performs MAC calculation on at least the smart card operation information;
- the smart card chip performs at least HASH calculation on the smart card operation information
- the smart card chip performs at least signature on the smart card operation information. Count.
- the smart card system generates verification data according to the smart card operation information of the smart card, thereby preventing user information from being stolen, improving the security of the smart card, and ensuring the security of the user information and property.
- the smart card chip of the present invention determines whether the operation request is a pre-stored target request after the communication interface obtains the operation request, and if the operation request is the target request, the smart card operation information is processed at least by using the verification data generation policy. . Thereby improving the processing speed of the business using the smart card.
- the working mode of the smart card of the present invention may include a communication connection mode of the smart card, the communication connection mode of the smart card includes a contactless communication connection mode and/or a contact communication connection mode, and the contact communication connection mode includes a mode of communication connection through the chip and/or Or a mode of communication connection through a magnetic stripe.
- the smart card operation information may further include: a random number and/or a transaction count value.
- the present invention also provides an operation request response computer system, including: a terminal, a background system server, and the above-mentioned smart card system. Since the smart card system is the smart card system described above, it will not be described herein. The following only describes the terminal and the backend system server.
- the terminal acquires the verification data output by the smart card system, and sends at least the operation request and the verification data to the background system server;
- the background system server includes a communication module and a background system server CPU;
- the communication module receives the verification data and the operation request sent by the terminal;
- the background system server CPU verifies the verification data after the communication module receives the verification data and the operation request, and executes the process of responding to the operation request after the verification module passes the verification.
- the background system server CPU may respectively adopt a communication connection mode of the smart card indicated by the smart card mode factor, or an object type connected to the smart card according to the smart card mode factor, respectively
- the method performs verification on the verification data.
- the background system server CPU also acquires the communication mode of the terminal; and acquires the same target policy as the verification data generation policy acquired by the smart card system, and uses the target policy to communicate with the terminal. Performing a check to generate a first check information, and comparing the first check information with the check data corresponding to the smart card mode factor in the check data, if the first check information corresponds to the smart card mode factor in the check data If the verification data is the same, the verification is passed; otherwise, the verification fails.
- the background system server CPU also acquires the object type of the terminal, and uses the target to verify the communication mode information of the terminal to generate the second verification information. And comparing the second verification information with the verification data corresponding to the object type of the smart card connected to the verification data If the second verification information is the same as the verification data corresponding to the object type of the smart card in the verification data, the verification is passed; otherwise, the verification fails.
- the background system server performs the process of responding to the operation request after verifying the verification data, thereby preventing the user information from being stolen and improving the security of the smart card. Guarantee the safety of user information and property.
- a computer readable medium comprising computer instructions that, when executed, cause the verification data output method or the operation request response method to be performed.
- Any process or method description in the flowcharts or otherwise described herein may be understood to represent a module, segment or portion of code that includes one or more executable instructions for implementing the steps of a particular logical function or process.
- the scope of the preferred embodiments of the invention includes additional implementations, in which the functions may be performed in a substantially simultaneous manner or in an opposite order depending on the functions involved, in the order shown or discussed. It will be understood by those skilled in the art to which the embodiments of the present invention pertain.
- portions of the invention may be implemented in hardware, software, firmware or a combination thereof.
- multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
- a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented with any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
- each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
- the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
- the integrated modules, if implemented in the form of software functional modules and sold or used as separate products, may also be stored in a computer readable storage medium.
- the above-mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2016524667A JP6236151B2 (ja) | 2013-07-10 | 2014-07-04 | スマートカード、検証データの出力方法、操作要求への応答方法およびシステム |
US14/903,159 US20160328712A1 (en) | 2013-07-10 | 2014-07-04 | Smart card method for outputting validation data and method for responding to operation request |
EP14823389.3A EP3021296A4 (en) | 2013-07-10 | 2014-07-04 | Smart card, verification data outputting method, and operation request responding method and system |
US16/444,250 US11151574B2 (en) | 2013-07-10 | 2019-06-18 | Smart card, method for outputting validation data, and method for responding to operation request |
Applications Claiming Priority (12)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310289064.3A CN103839322B (zh) | 2013-07-10 | 2013-07-10 | 智能卡及校验数据输出方法、操作请求响应方法及系统 |
CN201320410015.6U CN203503004U (zh) | 2013-07-10 | 2013-07-10 | 智能卡 |
CN201310289064.3 | 2013-07-10 | ||
CN201310289162.7 | 2013-07-10 | ||
CN201310289234.8A CN103839324B (zh) | 2013-07-10 | 2013-07-10 | 智能卡及校验数据输出方法、操作请求响应方法及系统 |
CN201310289234.8 | 2013-07-10 | ||
CN201320410015.6 | 2013-07-10 | ||
CN201310289150.4 | 2013-07-10 | ||
CN201310289150.4A CN103839335B (zh) | 2013-07-10 | 2013-07-10 | 处理信息的方法和系统 |
CN201310289162.7A CN103839323B (zh) | 2013-07-10 | 智能卡及校验数据输出方法、操作请求响应方法及系统 | |
CN201310300386.3 | 2013-07-17 | ||
CN201310300386.3A CN103839330B (zh) | 2013-07-17 | 2013-07-17 | 智能卡及操作请求输出方法、操作请求响应方法及系统 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/903,159 A-371-Of-International US20160328712A1 (en) | 2013-07-10 | 2014-07-04 | Smart card method for outputting validation data and method for responding to operation request |
US16/444,250 Division US11151574B2 (en) | 2013-07-10 | 2019-06-18 | Smart card, method for outputting validation data, and method for responding to operation request |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015003587A1 true WO2015003587A1 (zh) | 2015-01-15 |
Family
ID=52279356
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/081700 WO2015003585A1 (zh) | 2013-07-10 | 2014-07-04 | 智能卡及操作请求输出方法、操作请求响应方法及系统 |
PCT/CN2014/081705 WO2015003587A1 (zh) | 2013-07-10 | 2014-07-04 | 智能卡及校验数据输出方法、操作请求响应方法及系统 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/081700 WO2015003585A1 (zh) | 2013-07-10 | 2014-07-04 | 智能卡及操作请求输出方法、操作请求响应方法及系统 |
Country Status (4)
Country | Link |
---|---|
US (2) | US20160328712A1 (zh) |
EP (1) | EP3021296A4 (zh) |
JP (1) | JP6236151B2 (zh) |
WO (2) | WO2015003585A1 (zh) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101226657A (zh) * | 2007-01-17 | 2008-07-23 | 株式会社日立制作所 | 结算终端和ic卡 |
CN101432778A (zh) * | 2006-02-23 | 2009-05-13 | 巴克利斯银行公开有限公司 | Pin服务 |
CN101729643A (zh) * | 2010-01-19 | 2010-06-09 | 任军亮 | Ic卡或磁卡的防盗加密方法 |
CN203503004U (zh) * | 2013-07-10 | 2014-03-26 | 天地融科技股份有限公司 | 智能卡 |
CN103839322A (zh) * | 2013-07-10 | 2014-06-04 | 天地融科技股份有限公司 | 智能卡及校验数据输出方法、操作请求响应方法及系统 |
CN103839323A (zh) * | 2013-07-10 | 2014-06-04 | 天地融科技股份有限公司 | 智能卡及校验数据输出方法、操作请求响应方法及系统 |
CN103839330A (zh) * | 2013-07-17 | 2014-06-04 | 天地融科技股份有限公司 | 智能卡及操作请求输出方法、操作请求响应方法及系统 |
CN103839335A (zh) * | 2013-07-10 | 2014-06-04 | 天地融科技股份有限公司 | 处理信息的方法和系统 |
CN103839324A (zh) * | 2013-07-10 | 2014-06-04 | 天地融科技股份有限公司 | 智能卡及校验数据输出方法、操作请求响应方法及系统 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5721781A (en) * | 1995-09-13 | 1998-02-24 | Microsoft Corporation | Authentication system and method for smart card transactions |
KR101053185B1 (ko) * | 2005-02-24 | 2011-08-01 | 삼성전자주식회사 | 스마트 카드 및 그것의 혼합모드 제어방법 |
JP4770255B2 (ja) * | 2005-04-26 | 2011-09-14 | 大日本印刷株式会社 | Icカード、および、icカードに実装されるコマンドの処理方法 |
US7818264B2 (en) * | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
JP4640451B2 (ja) * | 2008-06-06 | 2011-03-02 | ソニー株式会社 | 接触・非接触複合icカード、通信方法、プログラム及び通信システム |
JP4834748B2 (ja) * | 2009-03-10 | 2011-12-14 | 株式会社東芝 | 情報記憶媒体、媒体認証機器、媒体認証システム、及びicカード |
US20100312709A1 (en) * | 2009-06-05 | 2010-12-09 | Dynamic Card Solutions International | Payment application pin data self-encryption |
US8533123B2 (en) * | 2010-12-13 | 2013-09-10 | Magtek, Inc. | Systems and methods for conducting contactless payments using a mobile device and a magstripe payment card |
CN102118250A (zh) * | 2011-01-10 | 2011-07-06 | 上海众人网络安全技术有限公司 | 一种基于双界面智能卡的动态密码认证系统及方法 |
TW201314579A (zh) * | 2011-09-26 | 2013-04-01 | Anica Corp | 智慧卡及其通訊方法 |
KR101339016B1 (ko) * | 2012-12-28 | 2013-12-09 | 에이큐 주식회사 | 보안코드를 저장하고 있는 금융카드를 이용한 금융거래 시스템 및 그 방법 |
-
2014
- 2014-07-04 WO PCT/CN2014/081700 patent/WO2015003585A1/zh active Application Filing
- 2014-07-04 US US14/903,159 patent/US20160328712A1/en not_active Abandoned
- 2014-07-04 JP JP2016524667A patent/JP6236151B2/ja active Active
- 2014-07-04 WO PCT/CN2014/081705 patent/WO2015003587A1/zh active Application Filing
- 2014-07-04 EP EP14823389.3A patent/EP3021296A4/en not_active Ceased
-
2019
- 2019-06-18 US US16/444,250 patent/US11151574B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101432778A (zh) * | 2006-02-23 | 2009-05-13 | 巴克利斯银行公开有限公司 | Pin服务 |
CN101226657A (zh) * | 2007-01-17 | 2008-07-23 | 株式会社日立制作所 | 结算终端和ic卡 |
CN101729643A (zh) * | 2010-01-19 | 2010-06-09 | 任军亮 | Ic卡或磁卡的防盗加密方法 |
CN203503004U (zh) * | 2013-07-10 | 2014-03-26 | 天地融科技股份有限公司 | 智能卡 |
CN103839322A (zh) * | 2013-07-10 | 2014-06-04 | 天地融科技股份有限公司 | 智能卡及校验数据输出方法、操作请求响应方法及系统 |
CN103839323A (zh) * | 2013-07-10 | 2014-06-04 | 天地融科技股份有限公司 | 智能卡及校验数据输出方法、操作请求响应方法及系统 |
CN103839335A (zh) * | 2013-07-10 | 2014-06-04 | 天地融科技股份有限公司 | 处理信息的方法和系统 |
CN103839324A (zh) * | 2013-07-10 | 2014-06-04 | 天地融科技股份有限公司 | 智能卡及校验数据输出方法、操作请求响应方法及系统 |
CN103839330A (zh) * | 2013-07-17 | 2014-06-04 | 天地融科技股份有限公司 | 智能卡及操作请求输出方法、操作请求响应方法及系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3021296A4 * |
Also Published As
Publication number | Publication date |
---|---|
US20160328712A1 (en) | 2016-11-10 |
US11151574B2 (en) | 2021-10-19 |
EP3021296A4 (en) | 2017-03-29 |
US20190303936A1 (en) | 2019-10-03 |
JP2016526736A (ja) | 2016-09-05 |
EP3021296A1 (en) | 2016-05-18 |
WO2015003585A1 (zh) | 2015-01-15 |
JP6236151B2 (ja) | 2017-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101802682B1 (ko) | 장치를 사용자 계정에 링크하는 시스템 및 방법 | |
CN103888436B (zh) | 用户认证的方法和装置 | |
CN102088353B (zh) | 基于移动终端的双因子认证方法及系统 | |
US11636478B2 (en) | Method of performing authentication for a transaction and a system thereof | |
CN104079562B (zh) | 一种基于支付终端的安全认证方法及相关装置 | |
EP2991263B1 (en) | Offline pin authentication method and system for ic card | |
CN107784499B (zh) | 近场通信移动终端的安全支付系统及方法 | |
US20100235900A1 (en) | Efficient two-factor authentication | |
KR101856682B1 (ko) | 엔티티의 인증 방법 및 장치 | |
WO2014187210A1 (zh) | 一种电子签名令牌私钥的备份方法和系统 | |
WO2014194730A1 (zh) | 处理操作请求的方法及系统 | |
CN106027250A (zh) | 一种身份证信息安全传输方法及系统 | |
CN111031535A (zh) | 一种用于智能卡系统的安全通信方法及系统 | |
CN101425901A (zh) | 一种在处理终端中用于对用户身份验证的控制方法及装置 | |
WO2014187208A1 (zh) | 一种备份电子签名令牌中私钥的方法和系统 | |
CN106022140B (zh) | 身份证读取方法和系统 | |
CN104636681B (zh) | 一种用于钞票存储数据的安全传输方法及装置 | |
WO2015003587A1 (zh) | 智能卡及校验数据输出方法、操作请求响应方法及系统 | |
CN103888259B (zh) | 一种用户身份识别卡 | |
CN103839335B (zh) | 处理信息的方法和系统 | |
KR20140007628A (ko) | 모바일 계좌이체 검증처리 방법 | |
KR20230024327A (ko) | 보안 요소와 모바일 장치의 종단간 보안 페어링 | |
CN113891321A (zh) | 基于时空演化的nfc中继攻击判定、安全认证系统及方法 | |
CN112348497A (zh) | 一种基于数字货币支付的指纹卡系统及其交易方法 | |
KR20140007630A (ko) | 아이씨 칩 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14823389 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14903159 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2016524667 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014823389 Country of ref document: EP |