CN103281172A - Pooling communication method between highway electronic prepaid card and encryption machine - Google Patents

Pooling communication method between highway electronic prepaid card and encryption machine Download PDF

Info

Publication number
CN103281172A
CN103281172A CN2013101752398A CN201310175239A CN103281172A CN 103281172 A CN103281172 A CN 103281172A CN 2013101752398 A CN2013101752398 A CN 2013101752398A CN 201310175239 A CN201310175239 A CN 201310175239A CN 103281172 A CN103281172 A CN 103281172A
Authority
CN
China
Prior art keywords
encryption
byte
data
encryption equipment
thread
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101752398A
Other languages
Chinese (zh)
Other versions
CN103281172B (en
Inventor
战庆书
伞洪亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TIANJIN TIANAN YIHE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
TIANJIN TIANAN YIHE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TIANJIN TIANAN YIHE INFORMATION TECHNOLOGY Co Ltd filed Critical TIANJIN TIANAN YIHE INFORMATION TECHNOLOGY Co Ltd
Priority to CN201310175239.8A priority Critical patent/CN103281172B/en
Publication of CN103281172A publication Critical patent/CN103281172A/en
Application granted granted Critical
Publication of CN103281172B publication Critical patent/CN103281172B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a pooling communication method between a highway electronic prepaid card and an encryption machine. The pooling communication method comprises the steps of defining a basic format of return data of the encryption machine, and defining a buffer area through the basic format; establishing a connecting pool object factory, an assembling thread and a reading thread by a server, verifying original data through the connecting pool object factory, putting the verified original data into the buffer area of the encryption machine in a message way through the assembling thread, and returning to an index of the buffer area; reading messages in the buffer area by the encryption machine, writing encrypted data according to the basic format, and transmitting the encrypted data into the buffer area according to the index; and reading the encrypted data in the buffer area by the server, transmitting the encrypted data to a card reader, sending the encrypted data to the highway electronic prepaid card by the card reader after the card reader receives the encrypted data, and calculating by the highway electronic prepaid card according to the encrypted data. According to the pooling communication method disclosed by the invention, the encryption effectiveness is increased, a system resource is prevented from being unused, and the working efficiency is increased.

Description

Pond communication means between highway electric prepaid card and the encryption equipment
Technical field
The present invention relates to the communications field, relate in particular to the pond communication means between a kind of highway electric prepaid card and the encryption equipment.
Background technology
The use of highway prepaid card has been the trend of following expressway tol lcollection, make that the electronic transaction data volume is increasing, application program needs the thousands of concurrency of the processing of real-time online, therefore needs to improve computations efficient, rationally utilizes the encryption equipment resource.
In the prior art, being generally alternately between highway prepaid card and the encryption equipment: set up to link → send encrypted instruction → wait fixed time → read → close from buffering area and be connected.If it is too short that the stand-by period of encryption equipment arranges, it is complete to cause reading data; If it is longer that the stand-by period of encryption equipment arranges, can cause resource idle in a large number again, and each encryption all need reconnect; If the service concurrence amount increases suddenly, may surpass the restriction of encryption equipment linking number, can't operate as normal.
Summary of the invention
The invention provides the pond communication means between a kind of highway electric prepaid card and the encryption equipment, this method has been avoided the idle of system resource, has improved operating efficiency, sees for details hereinafter and describes:
Pond communication means between a kind of highway electric prepaid card and the encryption equipment, described method comprises:
The basic format of definition encryption equipment return data is by described basic format definition buffering area;
Card reader reads initial data from the highway electric prepaid card, and with described original data transmissions to server;
Described server is created the connection pool object factory, is assembled thread and read thread, by described connection pool object factory described initial data is verified, and the initial data after will verifying by described assembling thread puts into the buffering area of described encryption equipment with the form of message, returns the index of described buffer area;
Described encryption equipment reads the message in the buffer area, writes according to described basic format and encrypts the back data, and described encryption back data are transferred in the described buffering area according to index;
Described server reads described encryption back data from described buffering area, and transfer to described card reader, described card reader receives described encryption back data and is sent to described highway electric prepaid card, and described highway electric prepaid card calculates according to described encryption back data.
The process of the basic format of described definition encryption equipment return data is specially:
First and second bytes are combined into an integer as the length n of encryption equipment return data;
Third and fourth byte is as return type;
The the 5th and the 6th byte is as return results, and result phase ' 0 ' ' 0 ' expression is encrypted successfully;
Encrypted result length is n-6 byte.
Described process by basic format definition buffering area is specially:
The design buffering area is byte[X] [Y], every return results is planned agreement of each row of buffer area as delegation:
Byte[i] [0] and byte[i] length of store byte in [1];
Byte[i] [2] and byte[i] storage encryption return type in [3] ' M ' and ' H ';
Byte[i] [4] and byte[i] [5] middle storage return results state, ' 0 ' ' 0 ' expression is encrypted successfully;
Byte[i] [6]--byte[i] [Y] middle storage encryption content.
Described server is created the connection pool object factory, is assembled thread and read thread, by described connection pool object factory described initial data is verified, and the initial data after will verifying by described assembling thread puts into the buffering area of described encryption equipment with the form of message, and the process of returning the index of described buffer area is specially:
1) the described connection pool object factory of definition and described encryption equipment communication, and create described connection pool object factory;
Creating described connection pool object factory comprises: formation object, activation object, destruction object and identifying object;
2) generate communication object in the described connection pool object factory by described formation object, after described communication object is used, by the described communication object of described activation object activation;
3) ask from described connection pool object factory, to get access to described communication object at every turn after, by described identifying object described communication object is linked checking, if return results is correct, then proceed cryptographic operation, otherwise, destroy described communication object by described destruction object, and obtain new communication object and link checking again;
4) the described assembling thread of definition, described composition thread are used for forming and sending message assembling by the initial data of checking, put in the buffering area of described encryption equipment;
5) described encryption equipment returns the described server of being indexed to of buffering area, defines the described thread that reads, and the described thread that reads is used for reading described encryption back data according to described index from buffering area.
Described encryption equipment reads the message in the buffer area, writes according to described basic format and encrypts the back data, and described encryption back data are specially according to the process that index transfers in the described buffering area:
Fill the first six byte, to obtain the length n-6 of subsequent byte, judge that according to preset rules whether the message that receives makes a mistake, and then thoroughly abandons this communication object if mistake has taken place; Described encryption back data are transferred in the buffering area according to described index.
Described preset rules is: the length as a result of computations, and can not be greater than the data length n of definition; The resultant content that encryption equipment returns is a complete array.
Described method also comprises: when described read the thread wait timeout after, described server can wake the described thread that reads of outside wait timeout earlier up, the described thread that reads obtains described encryption back data again.
Described method also comprises: when described encryption back data were not read in described server timeout, the described thread that reads was destroyed described communication object by described destruction object.
Described method also comprises: close whole service the time, the described thread that reads is closed destruction to all communication objects of setting up by described destruction object.
The beneficial effect of technical scheme provided by the invention is: by the connection pool object factory that basic format, buffering area, the server of the present invention's definition are created the needs ciphered data is handled, get access to data encrypted, data also finally transfer to the highway electric prepaid card after the server reading encrypted, the present invention has improved the validity of encrypting, and avoided the idle of system resource, improved operating efficiency.Checking by experiment, this method is when 1000 data of concurrent processing, and maximum duration only needs 2 seconds times spent; Must wait for 0.5 second with original each request and compare, improve hundreds of times of efficient, satisfy the multiple needs in the practical application.
Description of drawings
Fig. 1 be the highway electric prepaid card with encryption equipment between the block diagram of communicating by letter;
Fig. 2 is the flow chart of the pond communication means between a kind of highway electric prepaid card and the encryption equipment;
Fig. 3 is the communication scheme between highway electric prepaid card and the encryption equipment;
Fig. 4 is the design sketch of l-G simulation test.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, below embodiment of the present invention is described further in detail.
For fear of leaving unused of system resource, increase work efficiency, the embodiment of the invention provides the pond communication means between a kind of highway electric prepaid card and the encryption equipment, be that prepaid card in use needs to carry out read-write operation by the card machine, in order to guarantee the safety of storage data in the card, need carry out cipher key calculation by encryption equipment, after the calculating, result of calculation is turned back to card by the card machine, thereby realize that whole card data is revised or the consumption of card such as supplements with money at operation, referring to Fig. 1, Fig. 2 and Fig. 3, see for details hereinafter and describe:
101: the basic format of definition encryption equipment return data, by basic format definition buffering area;
This step is specially:
1) first and second bytes are combined into an integer as the length n of encryption equipment return data;
Total data length is: byte 8 bits 0xFFFF (16 the system)=65535(decimal system), and namely FF is shifted by height, that is: and first byte is most-significant byte, and second byte is least-significant byte, realizes the length of data, (byte[0] ﹠amp; 0xFF00)〉〉 8, (byte[1] ﹠amp; 0x00FF).
2) third and fourth byte is as return type;
During practical application, each encryption equipment can corresponding return type, the encryption equipment return type difference of different manufacturers, and the encryption equipment that the embodiment of the invention adopts is: based on the big instruction set of the China of SJL06 cipher machine, relate to when calculating the MAC value, the resultative construction of encryption equipment output is table 1:
Table 1
Domain output Length Type Content
Answer back code 2 A MH
Error code 2 H 00 expression is correct
MAC 1-8 B ?
By table 1 as can be seen A be printable character; B is any character, 0x00-0xFF; H is hexadecimal character ' 0 ’ – ' F ', and the return type of encryption equipment is MH, and the embodiment of the invention does not limit the return type of encryption equipment.
3) the 5th and the 6th byte is as return results;
' 0 ' ' 0 ' expression of the 5th and the 6th result phase that byte is returned is encrypted successfully, other return results for example: ' 0 ' ' 1 ', ' 1 ' ' 0 ' and ' 1 ' ' 1 ' all the expression encryption get nowhere.
Be in the data finally returned of encryption equipment, preceding 6 byte representation basic formats, encrypted result length is n-6 byte, when data length and preceding 6 bytes are all correct, the enciphered data success is returned in expression.
4) basic format according to the encryption equipment return data defines buffering area.
This step is specially: the design buffering area is byte[X] [Y], this buffering area can be stored many return results simultaneously, and every return results is planned agreement of each row of buffer area as delegation:
Byte[i] [0] and byte[i] length of store byte in [1];
Byte[i] [2] and byte[i] storage encryption return type in [3] ' M ' and ' H ';
Byte[i] [4] and byte[i] [5] middle storage return results state, ' 0 ' ' 0 ' expression is encrypted successfully;
Byte[i] [6]--byte[i] [Y] middle storage encryption content.
102: card reader reads initial data from the highway electric prepaid card, and with original data transmissions to server;
Being operating as of this step is conventionally known to one of skill in the art, determines that by each card reader itself embodiment of the invention does not limit this.
103: server is created the connection pool object factory, is assembled thread and read thread, by the connection pool object factory initial data is verified, and put into the buffering area of encryption equipment, the index index in return cache district by the initial data of assembling thread after will verifying with the form of message;
In order after overtime, not process, and guarantee under the situation of not closing connection that again subsequent request returns result accurately, for each communication object Socket provides one to read thread and go to read data, strictly hold data format, and the form of data with strictness write in the buffering area.
1) the connection pool object factory of definition and encryption equipment communication, and create the connection pool object factory;
Formation object makeObject(), activate object activateObject, destroy object destroyObject and identifying object validateObject realize management to communication object Socket by the connection pool object factory, create the connection pool object factory and comprise:.
Wherein, formation object makeObject() be when system starts, the connection pool degree of depth according to definition, program automatically and encryption equipment communicate, for example generated communication object socket(: formation object makeObject() can be used as machine in the connection pool object factory, by this machine, just can make communication object socket); In object-oriented language, the present invention has defined a complete connection pool object simultaneously, and the core of this connection pool object is communication object socket, the object properties of activation is arranged simultaneously, destroy object properties, identifying object attribute etc.
Communication object Socket has two attributes to be respectively: normal operation level line parameter and maximum operation level line parameter, and wherein, normal operation level line parameter acquiescence is created the quantity of communication object Socket in connection pool; The quantity of the extendible communication object to greatest extent of maximum operation level line parameter Socket provides standby for interim request concurrency increases.
Under the normal condition, communication object socket in the connection pool object factory can meet the demands, in the time of the more communication object socket of temporary needs, can create the communication object of (quantity-normal quantity to greatest extent), after finishing using, discharge resource by destroying object destroyObject.
2) after the communication object Socket in the connection pool object factory was used, this communication object Socket was activated;
Prevent in the practical application that a plurality of threads from holding a communication object Socket simultaneously, guaranteed that by activation manipulation other threads can't use the communication object Socket that has activated.
3) ask from the connection pool object factory, to get access to communication object socket at every turn after, socket links checking to communication object, if return results is correct, then proceed cryptographic operation, otherwise, destroy the connection pool object, and obtain new object and link checking again;
Wherein, when using each communication object socket, still normal survival is effective in the connection pool object factory in order to guarantee communication object socket, by checking validateObject method, whether communication object socket survived verify, the rule of checking is: communication object socket and encryption equipment are carried out the heartbeat checking, send the heartbeat identifying code that 16 0(encryption equipments of link identifying code are supported): 0000000000000000, if communication object socket return results is normal, proceed cryptographic operation; Otherwise stop this communication object socket by destroying object destroyObject, and obtain new communication object socket and link checking again.
4) definitions section wiring journey is formed thread and is used for forming and sending message assembling by the initial data of checking, puts in the buffering area of encryption equipment;
Aforesaid operations makes after calculative request visit, does not need this request to communicate with encryption equipment at once, but after the submission of the content of request, waits for that reading thread notifies this request, thereby can increase work efficiency.Because after the each request of tradition, set up Socket communication, need wait then, this wait can only be set to regular length, and in the Practical Calculation process, according to the type of service of calculating, the load of encryption equipment, these stand-by period are inequality, there is no need to carry out the regular time wait, thereby expended the wait resource of encryption equipment.
5) encryption equipment returns buffering area byte[index] index index to server, thread is read in definition, reads thread and is used for the data after the buffering area reading encrypted according to index index.
Just can arrive under the assigned indexes of buffering area by this operations server, by reading the data after the thread reading encrypted, avoid the waste of resource.
104: encryption equipment reads the message in the buffer area, writes according to basic format and encrypts the back data, will encrypt the back data and transfer in the buffering area according to call number;
A unlimited circulation namely is set, and each circulation is next byte[i] padding data, this step is specially:
Fill the first six byte, to obtain the length n-6 of subsequent byte, judge that according to preset rules whether the message that receives dislocation or mistake take place, and then thoroughly abandon this connection if mistake has taken place; To encrypt the back data transfers in the buffering area according to call number.
Preset rules is: 1, the length as a result of computations, and can not be greater than the data length n of definition; 2, the resultant content that returns of encryption equipment is a complete array (whether encryption equipment result of calculation is filled correct, do not need to consider).
Wherein, dislocation described above refers to: in calculating in concurrent processing, can only be according to byte[2] whether ' M ', byte[3] ' H ' come the verification memory location correct, influences whole result.
105: server data after the reading encrypted from buffering area, and transfer to data card, data card receive encrypts the back data and is sent to the highway electric prepaid card, and the highway electric prepaid card calculates according to encrypting the back data.
For example: the electronics prepaid card of highway use at present is a kind of CPU card, uses the key management based on decentralized algorithm, namely deposits female key in the encryption equipment, when card issuing was initialized, female key used decentralized algorithm, and according to card number, calculate a sub-key, be put in the card.
When needs are operated card, such as: A information is write in the card, at this moment, need be writing the card time, writing card data, card number and card and automatically generate information such as random number and send in the encryption equipment, encryption equipment calculates according to these information, generate a MAC sign indicating number, turn back in the card, card equally also can be according to sub-key, above-mentioned content is calculated, also can obtain a MAC sign indicating number, if these 2 MAC sign indicating numbers are identical, the legal writing operation that allows to carry out is described.
When the back of encryption data are arranged in the buffer area, read the byte[that thread can go to obtain appointment in the buffer area by index index], obtain and encrypt the back data, and return the character string of encryption after the verification effective length.Wherein, after reading the thread wait timeout, server can wake the thread that reads of outside wait timeout earlier up, reads thread and obtains encryption back data again.
This method is come the verification effective length according to data length and the first six digits of definition, encryption equipment is stored in result of calculation in the buffer memory of n-6, byte[when appointment in the buffer area] during greater than n-6, show that the byte of storing in the buffer area is illegal, non-valid data result.
When server timeout not after the reading encrypted during data, when namely having long-time untreated index, read thread and can destroy this communication object Socket, guarantee that the communication object Socket in the connection pool object factory always is in metastable state.
During specific implementation, in order to discharge resource, this method also comprises: when closing whole service, all communication object socket that set up are closed destruction, discharge resource.
Wherein, the embodiment of the invention does not limit the type of highway electric prepaid card, card reader, server and encryption equipment, all can as long as can finish the device of above-mentioned functions.
Verify highway electric prepaid card that the embodiment of the invention provides and the feasibility of the pond communication means between the encryption equipment with concrete test below, see for details hereinafter and describe:
In experiment, hardware as required: space flight gold card card machine * 3, common highway electric payment prepaid card * 3, China big encryption equipment * 1, application server * 1, operation PC*3 etc. test hardware, and equipment is combined into the LAN environment that interconnects.
In the environment of experiment, in order to realize the effect of concurrent processing, also need the simulation program of the automatic read-write card operation of a cover, this program has realized the card machine on every operation PC is carried out automatic read-write operation, and record each read-write content, and generating data report, concrete experiment is as follows:
1) use simulation program, every card is write application, and the data of record application and the result data that returns, the operation of every card 1000 times, and record and preserve data, but reference table 1;
2) simulation program reads the data of table 1, and calls application service behind 1000 operation applications realizing every card, calculates, and result of calculation is recorded to the MAC value of table 1;
3) in this service of calling encryption equipment of 3000 times of operation, use be that thread pool operation pond quantity is 500, maximum upper limit is 1000 simulation test, the program running memory is adjusted into 4G;
4) total running time and the single time distribution situation of record can be with reference to figure 4.
5) simulation program is according to the encryption equipment result calculated, according to order, writing operation successively, write card after, the content that Card Reader, and record again reads is filled up to and reads result items (only listing several times, The results of data processing describes) in the table 2.
Table 2
Figure BDA00003182657700071
Figure BDA00003182657700081
By table 2 and Fig. 4 as can be seen, card reader is carried out concurrent reading to card and is obtained result of calculation, and by test program, these result of calculations are submitted to connection pool service in the server, the connection pool service will the concurrent calculating that is submitted to realization data result in the encryption equipment of data to be calculated.By table 2 as can be seen, each result calculated is accurately, has realized the successful writing operation to card.
As seen in Figure 4, in the request of carrying out 3000 times is calculated, calculate the number of times finished in the 20ms greatly about 1500 times, calculate about 40ms finish greatly about 1200 times, 60ms in 80ms, greatly about about 200 times, 80ms above about 100 times.Result of calculation by Fig. 4 distributes, and has illustrated that server satisfies processing requirements in processing procedure.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the invention described above embodiment sequence number does not represent the quality of embodiment just to description.
The above only is preferred embodiment of the present invention, and is in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1. the pond communication means between a highway electric prepaid card and the encryption equipment is characterized in that described method comprises:
The basic format of definition encryption equipment return data is by described basic format definition buffering area;
Card reader reads initial data from the highway electric prepaid card, and with described original data transmissions to server;
Described server is created the connection pool object factory, is assembled thread and read thread, by described connection pool object factory described initial data is verified, and the initial data after will verifying by described assembling thread puts into the buffering area of described encryption equipment with the form of message, returns the index of described buffer area;
Described encryption equipment reads the message in the buffer area, writes according to described basic format and encrypts the back data, and described encryption back data are transferred in the described buffering area according to index;
Described server reads described encryption back data from described buffering area, and transfer to described card reader, described card reader receives described encryption back data and is sent to described highway electric prepaid card, and described highway electric prepaid card calculates according to described encryption back data.
2. the pond communication means between a kind of highway electric prepaid card according to claim 1 and the encryption equipment is characterized in that, the process of the basic format of described definition encryption equipment return data is specially:
First and second bytes are combined into an integer as the length n of encryption equipment return data;
Third and fourth byte is as return type;
The the 5th and the 6th byte is as return results, and result phase ' 0 ' ' 0 ' expression is encrypted successfully;
Encrypted result length is n-6 byte.
3. the pond communication means between a kind of highway electric prepaid card according to claim 2 and the encryption equipment is characterized in that, described process by basic format definition buffering area is specially:
The design buffering area is byte[X] [Y], every return results is planned agreement of each row of buffer area as delegation:
Byte[i] [0] and byte[i] length of store byte in [1];
Byte[i] [2] and byte[i] storage encryption return type in [3] ' M ' and ' H ';
Byte[i] [4] and byte[i] [5] middle storage return results state, ' 0 ' ' 0 ' expression is encrypted successfully;
Byte[i] [6]--byte[i] [Y] middle storage encryption content.
4. the pond communication means between a kind of highway electric prepaid card according to claim 3 and the encryption equipment, it is characterized in that, described server is created the connection pool object factory, is assembled thread and read thread, by described connection pool object factory described initial data is verified, and the initial data after will verifying by described assembling thread puts into the buffering area of described encryption equipment with the form of message, and the process of returning the index of described buffer area is specially:
1) the described connection pool object factory of definition and described encryption equipment communication, and create described connection pool object factory;
Creating described connection pool object factory comprises: formation object, activation object, destruction object and identifying object;
2) generate communication object in the described connection pool object factory by described formation object, after described communication object is used, by the described communication object of described activation object activation;
3) ask from described connection pool object factory, to get access to described communication object at every turn after, by described identifying object described communication object is linked checking, if return results is correct, then proceed cryptographic operation, otherwise, destroy described communication object by described destruction object, and obtain new communication object and link checking again;
4) the described assembling thread of definition, described composition thread are used for forming and sending message assembling by the initial data of checking, put in the buffering area of described encryption equipment;
5) described encryption equipment returns the described server of being indexed to of buffering area, defines the described thread that reads, and the described thread that reads is used for reading described encryption back data according to described index from buffering area.
5. the pond communication means between a kind of highway electric prepaid card according to claim 4 and the encryption equipment, it is characterized in that, described encryption equipment reads the message in the buffer area, write encryption back data according to described basic format, described encryption back data be specially according to the process that index transfers in the described buffering area:
Fill the first six byte, to obtain the length n-6 of subsequent byte, judge that according to preset rules whether the message that receives makes a mistake, and then thoroughly abandons this communication object if mistake has taken place; Described encryption back data are transferred in the buffering area according to described index.
6. the pond communication means between a kind of highway electric prepaid card according to claim 5 and the encryption equipment is characterized in that described preset rules is:
The length as a result of computations can not be greater than the data length n of definition; The resultant content that encryption equipment returns is a complete array.
7. the pond communication means between a kind of highway electric prepaid card according to claim 5 and the encryption equipment is characterized in that described method also comprises:
When described read the thread wait timeout after, described server can wake the described thread that reads of outside wait timeout earlier up, the described thread that reads obtains described encryption back data again.
8. the pond communication means between a kind of highway electric prepaid card according to claim 5 and the encryption equipment is characterized in that described method also comprises:
When described encryption back data were not read in described server timeout, the described thread that reads was destroyed described communication object by described destruction object.
9. the pond communication means between a kind of highway electric prepaid card according to claim 5 and the encryption equipment is characterized in that described method also comprises:
Close whole service the time, the described thread that reads is closed destruction to all communication objects of setting up by described destruction object.
CN201310175239.8A 2013-05-13 2013-05-13 Pond communication means between highway electric prepaid card and encryption equipment Active CN103281172B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310175239.8A CN103281172B (en) 2013-05-13 2013-05-13 Pond communication means between highway electric prepaid card and encryption equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310175239.8A CN103281172B (en) 2013-05-13 2013-05-13 Pond communication means between highway electric prepaid card and encryption equipment

Publications (2)

Publication Number Publication Date
CN103281172A true CN103281172A (en) 2013-09-04
CN103281172B CN103281172B (en) 2016-03-02

Family

ID=49063632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310175239.8A Active CN103281172B (en) 2013-05-13 2013-05-13 Pond communication means between highway electric prepaid card and encryption equipment

Country Status (1)

Country Link
CN (1) CN103281172B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318287A (en) * 2014-11-04 2015-01-28 南京联创科技集团股份有限公司 Subsection inheriting method of service unification between isomerism IC card systems
CN107783819A (en) * 2017-10-30 2018-03-09 郑州云海信息技术有限公司 A kind of storage method, device and the medium of virtual link relation
CN108228338A (en) * 2016-12-22 2018-06-29 北京视联动力国际信息技术有限公司 One kind regards networked resources management method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050033689A1 (en) * 2001-07-10 2005-02-10 American Express Travel Related Services Company, Inc. A system and method for dynamic fob synchronization and personalization
CN101042736A (en) * 2006-03-24 2007-09-26 中国银联股份有限公司 Smart card and method for accessing objects in smart card
CN201355520Y (en) * 2008-11-21 2009-12-02 陈洪 Vehicle supervising system based on electronic identification
WO2011034244A1 (en) * 2009-09-18 2011-03-24 한국건설교통기술평가원 Key card for compatible transportation card and operating method of key card for transportation card
CN102521745A (en) * 2011-12-05 2012-06-27 天津市通卡公用网络系统有限公司 Online card selling method for cross-platform smart card
CN102663473A (en) * 2012-04-25 2012-09-12 山东神思电子技术股份有限公司 Method for realizing chip operating system (COS) safety mechanism of intelligent card

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050033689A1 (en) * 2001-07-10 2005-02-10 American Express Travel Related Services Company, Inc. A system and method for dynamic fob synchronization and personalization
CN101042736A (en) * 2006-03-24 2007-09-26 中国银联股份有限公司 Smart card and method for accessing objects in smart card
CN201355520Y (en) * 2008-11-21 2009-12-02 陈洪 Vehicle supervising system based on electronic identification
WO2011034244A1 (en) * 2009-09-18 2011-03-24 한국건설교통기술평가원 Key card for compatible transportation card and operating method of key card for transportation card
CN102521745A (en) * 2011-12-05 2012-06-27 天津市通卡公用网络系统有限公司 Online card selling method for cross-platform smart card
CN102663473A (en) * 2012-04-25 2012-09-12 山东神思电子技术股份有限公司 Method for realizing chip operating system (COS) safety mechanism of intelligent card

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318287A (en) * 2014-11-04 2015-01-28 南京联创科技集团股份有限公司 Subsection inheriting method of service unification between isomerism IC card systems
CN108228338A (en) * 2016-12-22 2018-06-29 北京视联动力国际信息技术有限公司 One kind regards networked resources management method and system
CN107783819A (en) * 2017-10-30 2018-03-09 郑州云海信息技术有限公司 A kind of storage method, device and the medium of virtual link relation

Also Published As

Publication number Publication date
CN103281172B (en) 2016-03-02

Similar Documents

Publication Publication Date Title
CA2056440C (en) System for transferring data using electronic cards
CN102377566B (en) Security processing device and system for electric meter data
CN103973431B (en) A kind of AES parallelization implementation methods based on OpenCL
CN109615351A (en) SIM card, terminating machine and digital currency managing system
CN104463001A (en) Method for independently generating and storing encrypted digital currency private key and device for bearing encrypted digital currency private key
CN104917614A (en) Bidirectional verification method and device of intelligent card and acceptance terminal
CN103023657B (en) Security verification system based on distributed network transaction
CN102693385A (en) Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN1954345B (en) Smart card data transaction system and method for providing storage and transmission security
CN108833361A (en) A kind of identity identifying method and device based on virtual account
CN104281272B (en) Password Input processing method and processing device
CN110061967A (en) Business datum providing method, device, equipment and computer readable storage medium
CN104484628B (en) It is a kind of that there is the multi-application smart card of encrypting and decrypting
CN108460875A (en) A kind of entrance guard authentication method and device based on dynamic two-dimension code
CN108268799A (en) Data query system and method, storage medium, terminal
CN103281172A (en) Pooling communication method between highway electronic prepaid card and encryption machine
CN103905197B (en) A kind of method that SIM card and external equipment are bound and verified
CN103862879A (en) Ink box chip and ink box employing same
CN109977702A (en) A kind of FPGA device encrypted authentication system and method based on DS2432 chip
CN109302286A (en) A kind of generation method of Fido device keys index
CN109039613A (en) A kind of quantum key distribution system and method
CN101369891A (en) Dynamic cipher authentication method and double-matrix dynamic password card
CN109598137B (en) Method and system for safely processing data
CN202600714U (en) Embedded terminal based on SD (Secure Digital) trusted computing module
CN1567323A (en) Security measure management method of prepay IC card meter based on ESAM module

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant