Abstract:
The invention provides a working key generation method and device and a computer readable storage medium, and belongs to the technical field of information security. The method comprises the following steps: the terminal receiving an operation instruction sent by an upper computer, obtaining a working key purpose and a working key algorithm according to the operation instruction, setting the working key purpose as a first purpose by the terminal, generating derived data according to the first purpose, a master key identifier, a first numerical value and a master key algorithm, determining the length of a working key according to the working key algorithm, obtaining data in a working key buffer area as a key, generating the working key according with the length of the working key according to the key and the derived data, executing corresponding operation according to the operation instruction and the working key, and returning an operation result to the upper computer. Compared with an encryption scheme in the prior art, the method provided by the invention is safer and wider in application range.
Abstract:
The present application presents a method and an apparatus for synchronizing time by parsing satellite navigation data. A service application obtains current time of a system and caches it as a first time variable, receives and parses the satellite navigation data to obtain all character strings, obtains a character string as a current character string to be processed, determines a type of a system protocol identifier, if it is a preset system protocol identifier, converts a time field of the current character string to be processed into a local time zone time value for storing, obtains the current time and stores it as a second time variable, obtains a first time compensation value according to the first and second time variables, obtains satellite navigation time according to the first time compensation value and the maximum local time zone time value and sets system time as satellite navigation time.
Abstract:
A method for concluding electronic contracts and a server, comprising: a server receiving a contract file sent by a first client, converting said contract file into a contract image, and generating a contract identifier associated with said contract file and said contract image, then sending said contract identifier and said contract image to said first client; the server receiving the contract identifier, signing location information and signatory identity information sent by the first client, and sending said contract identifier, and the contract image and signing location information associated with the contract identifier to a second client; the server receiving said contract identifier and signature image sent by the second client, and writing the signature image into the contract file associated with said contract identifier according to said signing location information. By means of the present invention, signing electronic contracts avoids the issue of time and place constraints, is convenient and quick, and reduces the waste of resources, resulting in an indisputable signature.
Abstract:
Provided is a method for manufacturing a smart card, comprising: mounting a secure chip (230) on a modular circuit board (210) to obtain a secure chip module, one layer of the modular circuit board (210) being provided with a plurality of contact points (220) insulated from each other; planting a solder ball (240) on the secure chip solder pad (311) of the main circuit board (300); according to the position of the secure chip solder pad (311) on the main circuit board (300), milling out a groove (800) on the substrate on which the main circuit board (300) is packed, such that the solder ball (240) on the secure chip solder pad (311) is visible at the bottom of the groove (800); packing the secure chip module into the groove (800), and by means of the solder ball (240) on the secure chip solder pad (311), mounting the secure chip module onto the main circuit board (300). The method reduces the restrictions to the wiring of the main circuit board caused by the contact points on the surface of the smart card, thus improving the quality of the wiring of the main circuit board; furthermore, electronic circuit-level expansion may be performed on the contact point module and the secure chip, increasing the scalability of the smart card.
Abstract:
A work method for a smart key device. A host machine acquires data from a trusted server via a browser and then transmits the data to a smart key device; the smart key device performs a signing operation when the data transmitted by the host machine is received and when a user confirmed by pressing a key and then returns a signing result to the host machine; and the host machine transmits data returned by the smart key device to the trusted server to verify the validity of the smart key device. This implements rapid authentication of user identity, thus allowing highly efficient, secure, and expedited online transactions.
Abstract:
A method for generating off-line authentication credentials by an intelligent card. The method comprises: the card receiving a command sent by a terminal, determining the type of the command, and if the command is a Get Processing Option command, processing the command to obtain a second credential and returning the second credential to the terminal; if the command is an internal authentication command, processing the command to obtain a third credential and returning the third credential to the terminal; if the command is an application cryptogram command, first determining the type of the command, and if the command is a first application cryptogram command, processing the command to obtain a corresponding credential and returning the corresponding credential to the terminal; and if the command is a second application cryptogram command, processing the command to obtain a corresponding credential and returning the corresponding credential to the terminal. By means of the present invention, dynamic data can participate in authentication of the intelligent card, the card is prevented from being copied on the basis that static data is not tampered, and use security of the intelligent card is improved.
Abstract:
A method for realizing secure communication, comprises: Step 1, a card reader is powered on, determine a system working mode, perform an apple device verification and execute Step 2 if the system working mode is apple mode; execute Step 2 if the system working mode is USB mode; Step 2, wait for receiving an instruction, determine a first preset byte of the instruction, perform corresponding operation if the first preset byte is a first preset value; decrypt the instruction according to an initial encryption key, a key serial number and an algorithm corresponding to an algorithm flag, send the decrypted instruction to a card and execute Step 3 if the first preset byte is a second preset value; Step 3, when data returned by the card is received, the key serial number is updated, the algorithm according to the algorithm flag, the initial encryption key and the updated key serial number are configured to encrypt the data returned by the card, send the encrypted data to an upper computer via a corresponding interface according to the system working mode. According to the present invention, after a key agreement between the card reader and the upper computer, the key is updated, data is encrypted or decrypted by the updated key to improve safety of data communication.
Abstract:
A working method of a smart key device, in which it includes: power on the smart key device; the smart key device reads Bluetooth module parameters, and determines whether the Bluetooth module parameters are read successfully, if the parameters are read successfully, switch the Bluetooth module to connection state, and execute a next step; if the parameters are not read successfully, execute the next step directly; the smart key device determines whether working voltage is lower than a preset value, if yes, prompt low voltage state, and the device is turned off after a first preset time; if no, the device tests working voltage and waits for an interrupt trigger signal; when the device receives the interrupt trigger signal, enter corresponding interruption according to the interrupt trigger signal, after execute corresponding interrupt processing, exit corresponding interruption and continue to test the working voltage. The present invention can unify interfaces of mobile devices, so as to make mobile payment safer and more convenient.
Abstract:
The present invention belongs to the field of intelligent cards, and disclosed is a method for managing an application on a card. The method comprises: after receiving data sent by a running environment, a card content management module checking a card state; when the card state is not a first preset state or a second preset state, checking the received data; and when the received data meets a preset format, continuing to receive the data sent by the running environment to obtain a complete command, and performing a corresponding command to implement an association of applications on a card. The beneficial effects of the present invention are to provide a method for managing an application on a card, so that loading, installation, update, personalization, and deletion of an application on the card can be implemented.
Abstract:
Disclosed is a method for implementing precomputation of a large number in an embedded system. A modulo module, a modulo adding module, and a Montgomery modular multiplier are invoked according to a data format of a modulus length and a value of each data bit of a binary number corresponding to the modulus length, to perform an iterative operation, so that a precomputation result of a large number can be obtained when the modulus length is an arbitrary value, thereby improving the data processing speed.