Smart Card Network Client Solution Analysis

Smart cards, with their own advantages, have become the best customer-end solutions in the world for commercial network security communications. However, they have not solved the problem of how to connect a card reader to every PC. . With the accumulation of its own IC card technology and active exploration of e-commerce, Watchdog has solved the combination of smart cards and e-commerce very well. The seamless connection between the IC card and the browser is realized. The certificate stored on the smart card enables the cardholder's identity to be authenticated, and the customer's digital signature is directly signed at each purchase. Xiang Xiang is as follows.

(a) The role of TimeCOS/PK

The smart card has a microprocessor (CPU) and a rewritable memory unit (EEPROM), and has an operating system and a file management system. Holding the company for many years engaged in the research and development of smart cards, has the world's most advanced, domestic first-class smart card technology and products, has launched a proprietary RSA encryption algorithm within the card hardware, high-speed completion of the signature, authentication, encryption, decryption and other operations . The use of smart cards has unique advantages that other methods have:

1. Store important user information, including certificates, keys, passwords, and personal information, on the smart card;

2. The encryption process can be completed in the card. The information such as the personal key used for encryption is not allowed to be read from the card, thereby maximizing the security of the communication;

3. The contents of each smart card are unique, irreplaceable, and have the significance of representing the user's identity. Provide manageability for operational safety;

4. The owner of the smart card can conveniently carry it, and can go to any place where a computer with a reader is connected to complete the e-commerce operation, which is not only safe but also more convenient than other methods;

5. In addition, it has significant advantages such as fast calculation speed, favorable for the confidentiality of the algorithm, and the same smart card can be used with a variety of communication software and application software.

(B) Smart Card Security Communication Suite 1.

The network client security communication suite is a set of support systems that can be used with Netscape or IE browsers to enhance the security of the user end, and assist in completing network security communications based on international standard protocols such as SSL and S/MIME. It consists of the following parts:

1) The card reader is connected to the computer through a 9-pin serial interface or a keyboard socket;

2). Smart card, watch the company's TimeCOS/PK card, with RSA coprocessor;

3). Connect the software, complete the interface of the smart card and the interface with the browser, complete the calculation, processing and operation tasks of the secure communication;

4). User tools, complete verification, modify user PIN, check the information stored in the smart card, automatically detect or manually set the reader port (COM port) and other functions;

5). Documentation and user manual.

2. The main features of the system are as follows:

Highly secure, supports the use of 1024/2048-bit RSA public key algorithm;

Fully implement the secure communication functions supported by SSL and S/MIME protocols, including receiving and storing certificates, digital signature/authentication, and data encryption/decryption processing;

Using a standard interface to achieve a seamless connection to the browser, in the process of communication fully follow the browser's original secure communication operation process;

The use of an encrypted reader to complete the secure deposit of the payment code (MAC) and the user's signature;

This system uses a highly modular design. Ensure the support of smart card product upgrades and support the customization of the system according to user needs.

3, working principle:

The suite's software is the core part of the system. It completes the operations of the reader, the operation of the card, the interface with the browser, and the task of assisting the browser in completing various secure communications. The main tasks accomplished by this software module are:

Generate a user key pair or control card to generate a key within it and securely store the 1024/2048 user key in the card;

Complete download, storage, management and use of user certificates in secure communications;

Use the user private key to complete the signature and encryption calculation of the RSA algorithm in the card;

Use user keys to complete RSA authentication and decryption calculations;

Complete the check of the user PIN password;

In the process of secure communication, it cooperates with the browser to complete other functions, such as internal self-test process, detecting the status of the card, promptly giving information, and so on.

(c) Secure Card Operating System TimeCOS/PK

In summary, due to the intervention of the smart card, the security protection of the network user has all been transferred to the smart card. In addition to the PIN password management, it is the security strength of the card operating system.

TimeCOS/PK is based on TimeCOSV2.X version, combined with the requirements of e-commerce, strengthens the application of public key cryptosystem, makes full use of the coprocessor on the chip, and can quickly complete the signature, authentication, encryption and decryption of RSA algorithm. The operation has the key to generate functions in the card, and at the same time retains the functions of China's financial IC card specification. Features are as follows:

Full compliance with China's financial integrated circuit specifications;

Supports asymmetric cryptographic algorithms, which can perform RSA, FAC algorithm signature, authentication, encryption, and decryption operations within the card;

· Paired keys required to support RSA and FAC algorithms are generated within the card;

Support line encryption, line protection function, prevent communication data from being illegally stolen or tampered;

· To meet individual requirements, this version of TimeCOS has the ability to delete, modify, and add certain features based on the user's specific requirements;

Supports multiple applications on a single card and can create up to three levels of directories;

Supports SingleDES, TripleDES algorithm, can automatically select the SingleDES, TripleDES algorithm according to the length of the key;

· With anti-plugging function, the card content can be automatically restored when the card is pulled out abnormally during the transaction processing;

Support electronic wallet function, wallet size can be set by the user;

Support for a variety of file types, including binary files, fixed-length log files, variable-length log files, loop files, wallet files;

Support ISO7816-3T=0 (character transmission) and T=1 (block transmission) communication protocol;

Support multiple rate selections, support different communication speeds such as 9600bps, 19200bps, 38400bps, 76800bps;

Support multiple capacity options, selectable 8K, 16K byte EEPROM space;

· High work efficiency, TRIPLEDES calculation time 16ms, RSA algorithm signature time 268ms, RSA algorithm, authentication time 18ms electronic wallet transaction time 80ms, consumer transaction time 103ms.

(d), application methods and prospects

In general, the application of smart card-based network client suites can be divided into two categories: user-independent use and organized use. User-independent use means that the individual purchases a suite and autonomously selects CA-Certificate Authorities and selects objects for secure communication.

Organized use refers to the use of TimeCOS/PK cards and suites to their users at the center of an e-commerce center, banking service network, or secure communications network. The certificate used may be issued by a certificate system established by the center according to its own policies, or a certificate issued by a third-party CA may be used. The user key can be pre-written to the card when needed. The user certificate can also be pre-written to the card and then sent to the user.

The application of smart cards and secure communication suites will surely further promote the development of e-commerce with its unique security and convenience, which will contribute to the application and realization of real and complete e-commerce.

UVC Lamp

UVC lamp 253.7nm, different type. quartz material .

Uvc Lamp,Uv Germicidal Bulb,Uv Germicidal Lamp,Uvc Tube

Changxing leboom lighting product CO.Ltd. , https://www.leboomuvd.com