CN101159040A - Recognition card with variable feature code - Google Patents

Recognition card with variable feature code Download PDF

Info

Publication number
CN101159040A
CN101159040A CNA2007101429866A CN200710142986A CN101159040A CN 101159040 A CN101159040 A CN 101159040A CN A2007101429866 A CNA2007101429866 A CN A2007101429866A CN 200710142986 A CN200710142986 A CN 200710142986A CN 101159040 A CN101159040 A CN 101159040A
Authority
CN
China
Prior art keywords
card
code
identification
identification card
variable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101429866A
Other languages
Chinese (zh)
Inventor
殷育东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2007101429866A priority Critical patent/CN101159040A/en
Publication of CN101159040A publication Critical patent/CN101159040A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Credit Cards Or The Like (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to a safety-related authentication ID card. The present ID card employs the only identification code which can be easily counterfeited to form a counterfeit card, resulting in low safety. The inventive ID card adopts a variable identification code, so that the original card and the counterfeit card are excluded to each other and a system refuses or locks a counterfeit card, thereby improving safety of the ID card. The feature codes of the ID card are composed of two parts: a fixed code and a variable code. The fixed code is the only defined one for a certain ID card. The variable code is variable for a certain ID card, and a new variable code can be generated randomly during each application of a user and is stored in the system for being used as the identification code for accessing into the system. The identification card, a card reader and relative computer data treatment software form an ID card system having variable code. The technique can be widely used in door control system, and fields related to safety such as bank.

Description

The identification card of tool variable feature code
One technical field
The present invention relates to the authentication identification certificate relevant with safety.
Two background technologies
Identification card has following a few class at present.One class is a bar code card, and its feature identification sign indicating number is made up of the numeric string that bar code or the contained information translation of character become.Two classes are magnetic card, and its feature identification sign indicating number is made up of the character string that becomes attached to the contained information translation of the magnetic stripe on the physical medium.Three class bio-identification cards, its feature identification sign indicating number is made up of the character string that people's physical trait converts to.Four classes be intellective IC card as identification card, its feature identification sign indicating number is stored in the integrated circuit (IC) chip that is embedded on the plastic substrate.Five classes are light-card, and its feature identification sign indicating number is made up of the numeric string that the contained reflected light information of hole groove on the card converts to.
The condition code of above identification card is fixed specific identification card.
Bar code card is simple for production, and cost is lower, but bar code card in information can not rewrite, be easy to duplicate poor safety performance.Delineation may influence identification on card.There is certain problem in reliability.The Card read/write of magnetic card is easily simple relatively, and easy to use, cost is low, but be easy to duplicate, poor safety performance needs password or signature with further affirmation identity usually in application, the physical damnification of magnetic card can influence identification in addition, and there is certain problem in reliability.The light-card cost is low, is replicated the possibility that causes loss of data with physical damnification but also have.The bio-identification card, the recognition feature sign indicating number is unique, the security performance height, but in identifying, require the individual play to conform to the standard, physical trait can not have damage, thereby recognition efficiency is low.There is certain problem in reliability.Intellective IC card is as the ID card, security performance height, but fabrication complexity, and the relative bar code card of the cost of manufacture of card, magnetic card is higher.Be stuck in and cause in the chip data destroyed in the environment of strong magnetic, forceful electric power, high temperature.During the card curved transitions, may cause the fracture of card interior loop solder joint, thereby cause card to lose efficacy.The wearing and tearing that frequent plug causes on read write line of contact-type IC-card cause loose contact in addition, thereby may cause data transmission fault.Non-contact IC card may be subjected to environmental interference and fails in the communication of some occasions.There is certain problem in reliability.
In sum, the high security of present identification card and high reliability and low cost of manufacture still can not be implemented in a kind of card system simultaneously.
Three summary of the invention
Technical matters to be solved by this invention is: designs a kind of authentication card system, is stuck in this system and can not be replicated,, can not use even be replicated, or very fast by system lock, the security that improves the card system.
The present invention uses the variable code system, and the feature identification sign indicating number of card is variable.All can generate new random character identification code after being stuck in each use, so card is as long as using, just can not be replicated basically.Even be replicated, because Zhen Ka and pseudo-card are to repel mutually, system can very fast lockout issue card.Compare with current bar code card and magnetic card, security of system has basic lifting, and the cost of manufacture of card and bar code card etc. are close.Simultaneously for the identification card that is formed the particular geometric figure by hole, the color of card reader background is a geometric actual color on the identification card, thereby can not influence geometric figure on the card to the delineation of identification card, has improved the reliability of identification card.
The variable code authentication card system is made of variable code identification card, card reader, computer application software and computing machine.
The variable code identification card is divided into three types according to the generation method of variable code: graphics card, magnetic card and light-card.
1) graphics card
The variable code of graphics card is made up of the geometric figure of one group of difformity on the physical medium and color.Identification card forms with metal or plastic or other material processing and fabricating, is rectangular thin shape object.The fixed code part of card goes up spray strip font code or character by card, and also the mode of available punching forms required graphic feature.The variable code part of card is one group of movably elongated member composition.
The number of member G is designated as N.The physical form of N member is identical.The top and bottom of single member are designated as S and P respectively.Face S is parallel with the top and bottom of card respectively with P.Face S is the identical rectangle of size with P.Rectangular width is designated as A.Member is arranged in order.The long limit of the direction of arranging and the top S (or face P) of single object is vertical.Face S is identical with color on the P.The gray-scale value of this color should should have bigger difference with the gray-scale value of the color of corresponding background in the card reader.By machinery control, make that the distance between two members is the integral multiple of A.Member wide be to move in the groove of L.L also is the integral multiple of A.If L is 2NA.Regarding 2N to groove as wide is the grid of A.Have member in each grid, also may not have member.Have the state of member to be designated as 1, do not have the state of member to be designated as 0, then the arrangement of the member in the groove constitutes a 2N bit.Can generate new scale-of-two ordered series of numbers by the distance that changes between the member.See Fig. 1.
The graphics card card reader is made of the mechanical component of the member spread pattern of camera and variable code part that can the randomly changing card.See Fig. 2 and Fig. 3.
2) magnetic card
The variable code of magnetic card is made up of magnetic stripe on the physical medium.Identification card is an information carrier by the magnetic stripe that adheres on the PVC card, and three tracks are arranged on the magnetic stripe.Preceding two tracks are a read track, and the 3rd tracks is the read-write magnetic track.Write the fixedly identification code of card at article one magnetic track or second magnetic track.Write variable code at the 3rd magnetic track.
Card reader is common magnetic card read write line.
3) light-card
The light-card variable code is made up of the optical information of physical medium institute imprinting.Two groups of data are arranged on the CD, and one group is fixed code, and one group is variable code.
Card reader is common CD-ROM (read-write type).
Four description of drawings
Fig. 1 is the planimetric map of graphics card.Here Ka surface and member all are white.G is a member, moves in the groove of activity.F represents the cavity.BBFFBBBFBFFBB is a fixed code.GFGGGFF is a variable code.
Fig. 2 is a graphics card card reader planimetric map.C is a graphics card.N is the variable code part, is positioned at the front end of card.M is the fixed code part, is positioned at the rear end of card.Arrow is represented into card direction.
Fig. 3 is graphics card card reader side figure.D is for advancing bayonet socket, and CM is a camera.V is a mechanical hook-up, changes the arrangement of member.S and P are respectively the end face and the bottom surface of card reader.The bottom surface is a black.
Fig. 4 is magnetic card and light-card system flow block diagram.
Fig. 5 is a graphics card system flow block diagram.
Five technology implementation modes
After the computing machine of card reader and the software that deal with data is installed is connected, just can carry out identification.
Below in conjunction with the example that graphics card uses, the technology implementation mode of demonstration variable code authentication card system.
At first, allot the identification card C that definite fixed code and variable code are arranged, and fixed code and variable code typing are stored in the database of software systems according to user A application.Here the fixed code of distributing to user A should be to determine with unique for authentication card system, and variable identification code is abundant big random number (binary numbers more than ten).
After graphics card inserts card reader, experience three processes.The one, enter card reader to generating the new variable code last stage, the 2nd, generate the new variable code stage, the 3rd, generate after the new variable code to withdrawing from into the card reader stage.After card inserted card reader, camera began to catch image.With the real-time processing image information of application software in the computing machine that card reader is connected.At first transfer image to gray-scale map.In system, analyze every two field picture, determine that two field picture belongs to phase one or phase III.To the dot structure analysis of the image of phase one, will obtain the condition code of card.Compare with the identification code of storing in the system, determine whether to be legal users.Pixel analysis to the image of phase III will obtain the new feature sign indicating number of card, and be stored in the database of system, the identifying code that enters next time as card.In subordinate phase, the mechanical part of card reader has changed the arrangement mode of the variable code member partly of card, forms new figure, thereby new sign indicating number generates.Figure five
If user A holds identification card C (establishing fixed code is M) and carves at a time to be become to block D by bootlegging after T (establishing variable code at this moment is N) uses, following two kinds of possibilities then can appear.The one, card D uses prior to card C at a certain moment H of T after the moment, inserts card reader.Because card D has legal identification code (comprising fixed code M and variable code N), system will confirm holder's legal identity, allow the holder further to operate, and the variable identification code that change blocks D before moving back card, become P by N, simultaneously this variable code P is deposited in system database, as the card C of tool fixed code M and the variable code of blocking D.The use of card C will be illegal (variable code mistake) by system lock behind moment H, and holder A will not be allowed to further operation.Because the holder A of card C is a validated user, so A will report to the police, the variable code that the keeper will block C reinitializes, and card D is with locked.Second kind of situation is that card C uses prior to card D at a certain moment H of T after the moment.Then the use of card D will be illegal (variable code mistake) by system lock behind moment H, because the holder of card D is illegal user, so the keeper will report to the police.
In above example, the use meeting that can find to duplicate card is very fast by system lock or refusal.For gate control system, because the use of identification card is frequent, hardly may be so duplicate card by system authentication.
The technology implementation of magnetic card and light-card and the difference of graphics card are the mode that variable code produces.
After magnetic card inserted card reader, card reader read the information of three magnetic tracks, obtains the fixed code and the variable code of card, and and system database in fixed code and variable code relatively, determine whether to be validated user.After the affirmation, system generates a random number, and this random number is write magnetic track, after the success of affirmation write information, then this random number is deposited in the system database, as the new variable code of magnetic card.
After light-card inserted card reader, CD-ROM read information, with obtaining the condition code of card, comprised fixed code and variable code.And and system database in fixed code and variable code relatively, determine whether to be validated user.After the affirmation, system generates a random number, and writes light-card.Data verification, confirm the write information success after, then this random number is deposited in the system database in the identifying code that enters next time as card with fixed code.
The magnetic card of tool variable code is the same with the graphics card system with the light-card system very fast locking to duplicate card, thereby improves the security of system.

Claims (9)

1. on identification card, generate variable identification code.Identification code is made up of the character string of information translation contained on following three kinds of physical mediums: the geometric figure of one group of difformity and color is formed on the identification card, and the magnetic signal of the magnetic stripe on the identification card is formed, and the groove of one group of reflected light signal is formed on the identification card.It is characterized in that: two group codes are arranged on the identification card, and one group is the sign indicating number (being designated as A) that immobilizes, and one group is variable code (being designated as B).
2. generate variable code B method 1 according to right 1.It is characterized in that: variable code is made up of the geometric figure of one group of difformity and color.The use of each card is stuck in geometric shape of randomly changing and color in the card reader, and the software processes in image process and the joining computing machine of card reader converts numeral to, and is stored in the database, forms the new variable code B of card.
3. generate variable code B method 2 according to right 1.It is characterized in that: variable code is made up of a certain read-write contained information of magnetic track S in the magnetic stripe, the use of each card, by with the joining computing machine of card reader in software generate random number, and in the magnetic card read write line, this random number is write magnetic track S, as new variable code, and be stored in the database.
4. generate variable code B method 3 according to right 1.It is characterized in that: variable code is made up of the groove of one group of reflected light signal on the identification card. the use of each card, by with the joining computing machine of card reader in software generate random number, and with imprinting on identification card, generate new variable code, and be stored in the database.
5. according to the identification card of right 2 design.It is characterized in that: two groups of geometric figures are arranged on the identification card, and wherein set of diagrams shape can randomly changing shape and color.
6. according to the identification card of right 5 design.It is characterized in that: the different permutation and combination by the card upper member realize that figure changes.
7. according to the identification card of right 2 and right 5 designs.It is characterized in that: the geometric figure on the identification card is made up of hole.
8. according to the identification card of right 2 design.It is characterized in that: the magnetic stripe on the identification card has three magnetic tracks, and wherein at least one magnetic track is read-write, is used for generating and reading variable identification code.
9. according to the identification card of right 2 design.It is characterized in that: two groups of grooves are arranged on the identification card.Wherein one group is used to generate fixed code, and one group can be added new groove, generate new variable code when each the use.
CNA2007101429866A 2007-08-14 2007-08-14 Recognition card with variable feature code Pending CN101159040A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101429866A CN101159040A (en) 2007-08-14 2007-08-14 Recognition card with variable feature code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101429866A CN101159040A (en) 2007-08-14 2007-08-14 Recognition card with variable feature code

Publications (1)

Publication Number Publication Date
CN101159040A true CN101159040A (en) 2008-04-09

Family

ID=39307126

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101429866A Pending CN101159040A (en) 2007-08-14 2007-08-14 Recognition card with variable feature code

Country Status (1)

Country Link
CN (1) CN101159040A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102298677A (en) * 2011-08-29 2011-12-28 瑞斯康达科技发展股份有限公司 Protection method and device for stack overflow
CN102761871A (en) * 2012-08-02 2012-10-31 李凯 Method for preventing fake device during other party identity authentication of wireless communication devices
CN106355120A (en) * 2016-08-31 2017-01-25 湖南财政经济学院 Method and device for preventing magnetic card information from being copied
CN112801653A (en) * 2020-12-31 2021-05-14 湖南强智科技发展有限公司 Card anti-theft method and device, electronic equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102298677A (en) * 2011-08-29 2011-12-28 瑞斯康达科技发展股份有限公司 Protection method and device for stack overflow
CN102761871A (en) * 2012-08-02 2012-10-31 李凯 Method for preventing fake device during other party identity authentication of wireless communication devices
CN106355120A (en) * 2016-08-31 2017-01-25 湖南财政经济学院 Method and device for preventing magnetic card information from being copied
CN106355120B (en) * 2016-08-31 2018-08-14 湖南财政经济学院 A kind of method and apparatus for preventing card information to be replicated
CN112801653A (en) * 2020-12-31 2021-05-14 湖南强智科技发展有限公司 Card anti-theft method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN102163291B (en) Laser marking multi-encrypted two-dimensional code fingerprint anti-counterfeit authentication method and system
Zanetti et al. Tailing RFID Tags for Clone Detection.
EP2081135B2 (en) Contactless data carrier
CN105023163B (en) A kind of anti-counterfeiting system and method based on chaos graph label
CN107169776A (en) Product certification method for anti-counterfeit based on block chain technology
CN104166871B (en) Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips
CN102968654A (en) Method and system for producing information recognizable by naked eyes in plane of two-dimensional (2D) code and 2D code
CN105871424B (en) RFID groups verification method based on ECC
CN103794135A (en) Mark formed by dot matrixes and two-dimensional code and generation and identification method of mark
CN101593265A (en) Antiforge system based on radio-frequency (RF) identification
CN101286203A (en) Chip-free quasi RFID multiple verification low cost encrypted EPC composite label and system
CN101159040A (en) Recognition card with variable feature code
WO1998057299A1 (en) Document with an authentication feature
CN104527535A (en) Automobile license plate with encrypted QR two-dimensional code
CN105389708A (en) Anti-counterfeiting method based on combination of digital watermark and two-dimensional code and verification method thereof
CN101667247A (en) Method for anti-counterfeiting metal parts
CN103106560A (en) Anti-fake management method of seal of internet of things
CN1329859C (en) Document anti-fake and system thereof
CN107316072A (en) Dimension code anti-counterfeit method, anti-counterfeit authentication method and the false proof device of offline synchronization
CN101364272B (en) Magnetic read-write and network feedback technology for flimsiness digital watermarking for printed matter
CN116091087A (en) Quantum encryption anti-counterfeiting tracing method and terminal based on blockchain and NFC
CN202694381U (en) Dynamic two-dimensional code conversion system for electronic labels
CN104091191A (en) Fast and effective anti-fake identifying method
CN107844820A (en) A kind of dimension code anti-counterfeit method for metalwork
CN110232579A (en) A kind of certified products package anti-counterfeiting method and system based on discontinuous bar code adhesive tape

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication