The core principle of the operation of the non-touched IC card is the mechanism of the three times of identification. In the 16 sectors, the key and the control for storage and access of each sector are independent. With the key generated by the Crypto-1 privacy encryption algorithm, the location of the keys and the table of the control to storage and access are given beforehand. The Crypto-1 privacy encryption algorithm can be used to manage the information of the non-touched IC card by C# calling code in the managed execution environment or DLL calling code in the unmanaged execution environment. As a conclusion, the technical monopoly can be broke down by feasible methods.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.