CN105279531B - Demonstration method, device and system for preventing chip card information from being stolen - Google Patents

Demonstration method, device and system for preventing chip card information from being stolen Download PDF

Info

Publication number
CN105279531B
CN105279531B CN201510627478.1A CN201510627478A CN105279531B CN 105279531 B CN105279531 B CN 105279531B CN 201510627478 A CN201510627478 A CN 201510627478A CN 105279531 B CN105279531 B CN 105279531B
Authority
CN
China
Prior art keywords
chip card
card
data acquisition
user data
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510627478.1A
Other languages
Chinese (zh)
Other versions
CN105279531A (en
Inventor
杨卿
单好奇
李均
付杰
郭怡婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qax Technology Group Inc
Beijing Qihoo Technology Co Ltd
Original Assignee
Qax Technology Group Inc
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qax Technology Group Inc, Beijing Qihoo Technology Co Ltd filed Critical Qax Technology Group Inc
Priority to CN201510627478.1A priority Critical patent/CN105279531B/en
Publication of CN105279531A publication Critical patent/CN105279531A/en
Application granted granted Critical
Publication of CN105279531B publication Critical patent/CN105279531B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Credit Cards Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a demonstration method, a demonstration device and a demonstration system for preventing chip card information from being stolen, relates to the technical field of telecommunication, and aims to protect the safety of user data in a chip card. The method of the invention comprises the following steps: the card reader sends a data acquisition instruction to a first chip card which is not protected by electromagnetic isolation in a communication range in a wireless mode; receiving a data acquisition response returned by the first chip card in a wireless mode, wherein the data acquisition response carries user data stored in a first chip card chip; outputting the user data; sending a data acquisition instruction to a second chip card protected by electromagnetic isolation within a communication range in a wireless mode; and waiting for the data acquisition response returned by the second chip card. The invention is mainly used for disclosing and demonstrating the scanning comparison process of the protected chip card and the unprotected chip card.

Description

Demonstration method, device and system for preventing chip card information from being stolen
Technical Field
The invention relates to the technical field of telecommunication, in particular to a demonstration method, a demonstration device and a demonstration system for preventing chip card information from being stolen.
Background
The chip Card is also called an ID Card, an IC Card, and a Smart Card (Smart Card), and is a plastic Card embedded with a microprocessor chip, and a Random Access Memory (RAM) and a microprocessor are disposed on the chip for storing user data of a user and performing data interaction with a Card reader. When the chip card approaches the card reader, the chip card receives Radio Frequency current transmitted by the card reader in a Radio Frequency (RF) mode without contacting the card reader so as to supply power to a built-in microprocessor, and therefore user data stored in the RAM can be transmitted to the card reader in a Radio Frequency signal mode. Since the chip card can perform non-contact communication with a card reader within a certain distance, the chip card is widely applied to the fields of identity authentication, fund transaction and the like. The bus card, the bank card, the identity card, the entrance guard card and the like which are commonly used in daily life are the chip cards.
In the use of chip cards, the inventors have found that: the chip card has the characteristic of non-contact communication, so that inoculated soil is provided for the breeding of illegal activities. The lawbreaker can scan the chip card carried by the user through the portable card reader under the condition of not contacting the body of the user, and steal the user data of the user. In a practical scene, a passerby A places a wallet provided with a bank card in a trouser pocket, and a lawbreaker B sweeps the position of the trouser pocket of the passerby A through a card reader disguised as a handheld mobile device when passing by the passerby A, so that user data such as deposit balance, transaction records and the like in the bank card can be stolen within a few seconds. In daily life, the illegal action usually occurs in public places such as stations, downtown and the like, and the committing means is hidden and quick and is not easy to be perceived by parties. How to prevent an unauthorized card reader from stealing user data in a chip card has become a big problem for information security protection.
Disclosure of Invention
The invention provides a demonstration method, a demonstration device and a demonstration system for preventing chip card information from being stolen, which can block wireless communication connection between a chip card and an unauthorized card reader and effectively protect the safety of user data in the chip card.
In order to achieve the above object, in one aspect, the present invention provides a demonstration method for preventing chip card information from being stolen, the method comprising:
the card reader sends a data acquisition instruction to a first chip card which is not protected by electromagnetic isolation in a communication range in a wireless mode;
receiving a data acquisition response returned by the first chip card in a wireless mode, wherein the data acquisition response carries user data stored in a first chip card chip;
outputting the user data;
sending a data acquisition instruction to a second chip card protected by electromagnetic isolation within a communication range in a wireless mode;
and waiting for the data acquisition response returned by the second chip card.
In another aspect, the present invention provides a demonstration apparatus for preventing the stealing of chip card information, the apparatus comprising:
the sending unit is used for sending a data acquisition instruction to a first chip card which is not protected by electromagnetic isolation in a communication range in a wireless mode;
the receiving unit is used for receiving a data acquisition response returned by the first chip card in a wireless mode, wherein the data acquisition response carries user data stored in a chip of the first chip card;
an output unit configured to output the user data received by the receiving unit;
the sending unit is also used for sending a data acquisition instruction to a second chip card protected by electromagnetic isolation in a communication range in a wireless mode;
the receiving unit is also used for waiting for the data acquisition response returned by the second chip card.
In yet another aspect, the present invention provides a demonstration system for preventing the stealing of chip card information, the system comprising: the card reader, the first chip card, the second chip card and the protection body; the protection body is made of a material with an electromagnetic isolation function and used for performing electromagnetic isolation protection on the second chip card, and the protection body shields, covers or wraps the second chip card;
the card reader is used for sending a data acquisition instruction to the first chip card which is not protected by electromagnetic isolation in a communication range in a wireless mode;
the first chip card is used for responding to the data acquisition instruction, adding the user data stored in the first chip card chip into a data acquisition response, and sending the data acquisition response to the card reader in a wireless mode;
the card reader is also used for receiving the data acquisition response returned by the first chip card in a wireless mode and outputting the user data in the data acquisition response;
the card reader is also used for sending a data acquisition command to the second chip card protected by electromagnetic isolation in a communication range in a wireless mode and waiting for a data acquisition response returned by the second chip card.
The demonstration method, the demonstration device and the demonstration system for preventing the chip card information from being stolen can respectively scan the first chip card which is not protected by the electromagnetic isolation and the second chip card which is protected by the electromagnetic isolation through the card reader. The first chip card which is not protected by the electromagnetic isolation returns a data acquisition response carrying user data to the card reader based on the normal wireless communication connection established with the card reader; the second chip card protected by the electromagnetic isolation cannot receive the data acquisition instruction sent by the card reader due to the electromagnetic isolation, and cannot send any response message to the card reader. Compared with the prior art, the invention can block the wireless communication connection between the chip card and the unauthorized card reader by adding the electromagnetic isolation protection mode to the chip card, thereby effectively protecting the safety of the user data in the chip card.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart of a demonstration method for preventing chip card information from being stolen according to an embodiment of the invention;
FIG. 2 is a flow chart of another demonstration method for preventing chip card information from being stolen according to the embodiment of the invention;
FIG. 3 is a block diagram showing a demonstration apparatus for preventing chip card information theft according to an embodiment of the present invention;
FIG. 4 is a block diagram showing another demonstration apparatus for preventing chip card information theft according to the embodiment of the invention;
fig. 5 shows a schematic diagram of a demonstration system for preventing chip card information from being stolen according to an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In order to solve the problem that an unauthorized card reader steals user data in a chip card, one embodiment of the present invention provides a demonstration method for preventing the chip card information from being stolen, as shown in fig. 1, the method includes:
101. the card reader sends a data acquisition instruction to a first chip card which is not protected by electromagnetic isolation in a communication range in a wireless mode.
As a comparison demonstration of acquiring the user data of the chip cards in the state without electromagnetic isolation protection and in the state with electromagnetic isolation protection, the card reader firstly scans the first chip card without electromagnetic isolation protection, sends a data acquisition instruction to the first chip card in a wireless mode and requests to acquire the user data stored in the RAM of the chip of the first chip card.
102. The card reader receives a data acquisition response returned by the first chip card in a wireless mode.
After receiving the data acquisition instruction, the first chip card generates a data acquisition response through a microprocessor in the chip, and adds the user data stored in the RAM to the data acquisition response. And then, returning a data acquisition response carrying the user data to the card reader in the same wireless mode.
In this embodiment, the communication interaction between the card reader and the chip card is mainly used for demonstration purposes and is not necessary to use real user data. The present embodiment does not limit the content, format or size of the user data stored in the first chip card.
103. The card reader outputs user data.
And after the data acquisition response is obtained, the card reader acquires the user data carried in the data acquisition response and outputs the user data to the peripheral equipment for display. In practical applications, the output form of the user data includes, but is not limited to, audio output or image output, and correspondingly, the peripheral device as the data output device may be a speaker or a display.
In this embodiment, the purpose of displaying the user data is to perform verification demonstration on the user data successfully acquired by the card reader, and the specific content of the user data has no practical significance.
104. And the card reader sends a data acquisition instruction to a second chip card protected by electromagnetic isolation in a communication range in a wireless mode.
The second chip card protected by electromagnetic isolation is a chip card which is shielded or wrapped by a material with electromagnetic isolation function. And as comparison with the first chip card, the card reader further scans a second chip card protected by electromagnetic isolation, and also sends a data acquisition instruction to the second chip card in a wireless mode to request to acquire the user data in the RAM of the second chip card chip.
In this embodiment, the electromagnetic isolation protection can block the wireless communication connection between the chip card and the card reader, and the purpose of scanning the second chip card is to demonstrate that the card reader cannot acquire the user data in the chip card protected by the electromagnetic isolation. Whether the demonstration purpose is to acquire the user data or not, the demonstration is performed on the premise that the user data is stored in the second chip card. Similar to the first chip card, the user data in the second chip card has no practical significance, and the embodiment does not limit the content, format and size of the user data in the second chip card, and does not limit the user data in the second chip card to be the same as the user data in the first chip card.
105. The card reader waits for a data acquisition response returned by the second chip card.
Due to effective electromagnetic isolation protection, wireless communication connection between the second chip card and the card reader is blocked, so that the second chip card cannot receive a data acquisition instruction sent by the card reader and naturally cannot return a data acquisition response to the card reader. The reader is continuously in a state of waiting for a response and no user data can be output for presentation.
It should be noted that the embodiment focuses on comparison demonstration of scanning the first chip card and the second chip card, and the form of electromagnetic isolation protection is not specifically limited. In practical application, a passive protective body with a physical form can be adopted, and the second chip card is protected through the electromagnetic isolation characteristic of the material of the protective body. For example, the protection body can be a protection card which has the same size as or slightly larger than a standard chip card, and the two protection cards are respectively shielded on two sides of the chip card to carry out electromagnetic protection on the chip card; alternatively, the protective body may be a hard or form-changeable protective sleeve capable of wrapping the chip card, and the chip card may be accommodated in the protective sleeve to electromagnetically protect the chip card. The present embodiment does not specifically limit the form and material of the protective member for achieving electromagnetic isolation by its own material. In addition, in practical application, a protective body without physical form can be adopted, for example, interference electromagnetic waves capable of surrounding a chip card are emitted through an active device to form a protective electromagnetic field, and wireless communication connection is blocked. For the protection body that realizes electromagnetic isolation by emitting the interference electromagnetic wave, the present embodiment does not limit specific parameters such as the frequency, amplitude, power, and emission direction of the emission interference electromagnetic wave.
In order to ensure the confidence of the comparison result, the control variable principle should be followed as much as possible in practical application. For example, in the present embodiment, the first chip card and the second chip card should be the same in structure, material, communication standard used, etc., and scan separately with the same card reader, except that the second chip card is protected by electromagnetic isolation.
The above alignment demonstration shows that: the electromagnetic isolation protection can effectively block the wireless communication connection between the second chip card and the card reader, so that the card reader cannot acquire the user data of the second chip card; for the first chip card which is not protected by the electromagnetic isolation, the card reader can acquire the user data in the chip according to a conventional implementation mode, and in some unauthorized scenes, the latter mode can cause the leakage of the privacy information of the user and threaten the safety of the user data.
As mentioned above, the scanning of the first chip card and the second chip card is for comparison demonstration purposes, and therefore there is no need to strictly limit the scanning sequence. In this embodiment, the execution sequence for sequentially scanning the first chip card and the second chip card is only one implementation manner, and in practical application, the step 104 and the step 105 may be executed to scan the second chip card first, and then the step 101 to the step 103 may be executed to scan the first chip card; or in the case of multiple homogeneous card readers, the first chip card and the second chip card may be scanned simultaneously, and the order of scanning the chip cards in this embodiment is not limited to practical applications.
The demonstration method for preventing the chip card information from being stolen provided by the embodiment can respectively scan the first chip card which is not protected by the electromagnetic isolation and the second chip card which is protected by the electromagnetic isolation through the card reader. The first chip card which is not protected by the electromagnetic isolation returns a data acquisition response carrying user data to the card reader based on the normal wireless communication connection established with the card reader; the second chip card protected by the electromagnetic isolation cannot receive the data acquisition instruction sent by the card reader due to the electromagnetic isolation, and cannot send any response message to the card reader. Compared with the prior art, the embodiment can block the wireless communication connection between the chip card and the unauthorized card reader by adding the electromagnetic isolation protection mode to the chip card, thereby effectively protecting the safety of user data in the chip card.
Further, as a refinement of the method shown in fig. 1, another embodiment of the present invention further provides a demonstration method for preventing stealing of chip card information. As shown in fig. 2, the method includes:
201. and carrying out initialization setting on the card reader.
Before the card reader is used for scanning the chip card, the parameter setting of the card reader is firstly needed, and the parameter setting comprises the steps of setting the communication standard, the working frequency, the readable chip card type, whether the automatic card searching mode is started, the power supply voltage, the used data interface, the communication speed, the maximum power consumption, the card reading distance and the like of the card reader.
Illustratively, when scanning the bank card by the handheld reader, the reader chooses to adopt ISO7816 and emv (europay Mastercard and visa) standards, the working frequency is set to 125kHz, the readable chip card types include Mifare, UltraLight and the like, the automatic card searching mode is started, the communication rate is set to 4.8-115.2Kbps, the maximum power consumption is set to 70mA, and the card reading distance is 100 mm.
202. And setting the working mode of the card reader according to the communication standard used by the first chip card and the second chip card.
The purpose of setting the operating mode of the card reader is to ensure that the chip card and the card reader communicate using the same standard and the same frequency. Usually, the communication standard used by the chip card when it leaves the factory is already set by the chip manufacturer, and the communication frequency is determined by the characteristics of the LC oscillating circuit in the chip, so the setting of the operating mode of the card reader in this step is actually the selection of the card reader for the chip card meeting the communication requirement.
Specifically, the chip card is close to the card reader, the card reader emits radio frequency current to the chip card, and if the chip card can receive the radio frequency current and respond to the card reader, the fact that the chip card and the card reader use the same communication frequency is indicated. For the communication standard, after receiving the radio frequency current, the LC resonant circuit inside the chip card oscillates and powers up, and the card reader enters an atr (answer to reset) state to wait for receiving the response information of the chip card. The chip card responds to the ATR state of the card reader, the communication standard used by the chip card is sent to the card reader, and the card reader compares and judges whether the communication standard is consistent with the communication standard used by the chip card. If the two are consistent, the card reader returns to an available state to perform subsequent card reading operation; if the two are not consistent, the card reader returns to an error reporting state, and the chip card is deactivated.
203. The card reader writes user data into the first chip card and the second chip card respectively in a wireless mode.
Since it is subsequently necessary to demonstrate the reading of user data from the chip cards, the user data is written to the first chip card and the second chip card during the initialization of the chip cards.
It should be noted that if the demonstration is performed using a chip card actually used in real life, the execution of this step may be omitted because the user data is already stored in the chip card.
204. The card reader sends a data acquisition instruction to a first chip card which is not protected by electromagnetic isolation in a communication range in a wireless mode.
In this embodiment, the card reader and the chip card communicate with each other by using a Radio Frequency Identification (RFID) technology. In practical applications, Near Field Communication (NFC) technology belonging to the RFID category may also be used for implementation.
The data acquisition command sent by the card reader to the first chip card is essentially radio frequency current. After receiving the radio frequency current, the LC resonance circuit in the first chip card generates resonance, so that the capacitance in the resonance circuit generates charge. The charge is transferred to another capacitor for storage by a capacitor-connected electronic pump. When the charge accumulated in the other capacitor reaches a certain level (typically 2V), the capacitor can be used as a power supply to power the microprocessor.
205. The card reader receives a data acquisition response returned by the first chip card in a wireless mode, and the data acquisition response carries user data stored in the first chip card chip.
The data acquisition response is essentially the user data returned by the first chip card to the card reader. The microprocessor on the chip card obtains user data from the RAM in a power supply state, codes the data, modulates the data into a radio frequency signal and sends the radio frequency signal to the card reader.
206. And the card reader performs format analysis on the data acquisition response through a preset decoding protocol to acquire user data.
The card reader receives a radio frequency signal sent by a first chip card through a radio frequency coil, demodulates the radio frequency signal to obtain user data in a digital form, and then performs format analysis on the user data through a preset decoding protocol (for example, a Manchester encoding and decoding protocol which is consistent with a protocol used by chip card side encoding) to obtain the user data. In this embodiment, the card reader decodes the information using a TLV (Type, Length, Value) protocol in a Basic Encoding rule (BER for short).
207. The card reader outputs user data.
In this embodiment, the card reader may output the user data in different forms. Specifically, the method comprises the following steps: when the card reader is arranged in the handheld equipment comprising the display screen, the card reader can output user data to the display screen which is integrally designed with the card reader through an internal data interface; when the card reader is only an independent card reading device, the card reader can output the user data to a device independent of the card reader, such as a computer, a projector, etc., through an external data interface.
In one implementation of this embodiment, to facilitate the chip card scanning demonstration in a meeting place, the card reader may output the user data to a large Screen (Big Screen) for display through an external data interface. The large screen is a large screen in a direct-view color television or a rear projection type projection television with the diagonal size of more than 40 inches.
It should be noted that, when a chip card of a real user is used for demonstration, in order to protect data privacy of the user, the card reader needs to perform privacy protection processing on key information in user data. Specifically, after receiving the user data, the card reader searches for key information, such as the name of the card holder, the account balance, and the like, according to a format protocol adopted by the data, and outputs and displays the key information after replacing the key information with meaningless characters (such as "#" or "#").
208. And the card reader sends a data acquisition instruction to a second chip card protected by electromagnetic isolation in a communication range in a wireless mode.
After the user data in the first chip card is successfully acquired and displayed, the card reader further scans the second chip card for comparison. Due to the electromagnetic isolation protection, the second chip card cannot receive radio frequency current sent by the card reader, so that the resonance of the LC resonance circuit cannot be excited, and the microprocessor in the second chip cannot send user data stored in the RAM to the outside under the condition that no capacitor supplies power.
209. The card reader waits for a data acquisition response returned by the second chip card.
And the card reader is in a state of waiting for response indefinitely because the user data sent by the second chip card cannot be received, and no user data is displayed in the display screen. Thus, the chip card protected by the electromagnetic isolation can effectively prevent an unauthorized card reader from stealing user data.
Further, in an implementation manner of this embodiment, to increase the speed of the demonstration, the card reader may negotiate a custom data format protocol with the chip card in advance, and the protocol may specify that the chip card returns only a small amount of key information with a high sensitivity to the card reader, thereby reducing the data transmission amount between the chip card and the card reader and increasing the scanning speed of the chip card. In actual tests for scanning bank cards, it has been proved that when the bank card is only required to return key information such as the name of the card holder, the number of the bank card and the balance of the account to the card reader, but not required to return a transaction record, the time consumed for reading the card can be shortened from the original 2 to 3 seconds to 0.3 second.
In the following, an application scenario of the present invention is given:
in a certain large exhibition, a presenter randomly selects an audience as a presentation object, and a wallet for storing a bank card is placed in a trouser pocket of the audience. The presenter uses the card reader to scan at a position 300mm away from the trousers pocket of the audience and makes a short stop, and the card reader reads the user data in the bank card in the wallet. And the card reader transmits the read user data to the projector through a wireless communication means, and the projector projects and displays the user data on the meeting place screen. The participating audience can clearly see the user data subjected to partial privacy protection processing, such as the name "liu" of the card holder, the number "666611111100" of the bank card, and partial transaction records, from the large screen of the venue.
Then, the demonstrator guides the audience to take out the bank card from the wallet, and the audience checks whether the bank card number displayed on the meeting place screen is consistent with the card number recorded on the bank card.
Then, the presenter guides the audience to put the bank card into the soft card sleeve with electromagnetic isolation protection, puts the bank card wrapped by the soft card sleeve back into the wallet, and puts the wallet into the trousers pocket again. At this time, the presenter scans and keeps staying at a position 300mm away from the trousers pocket of the audience using the card reader. The card reader can not obtain the user data returned by the bank card, so that the information of the bank card is not displayed on the meeting place screen. The demonstrator changes the orientation angle of the card reader and the distance between the card reader and the trouser pocket of the audience by adjusting the position of the card reader, no bank card information is still displayed on the meeting place large screen, and the demonstration process is finished.
Further, as an implementation of the method shown in fig. 1 and fig. 2, another embodiment of the present invention further provides a demonstration apparatus for preventing stealing of chip card information, the apparatus being located in a card reader or being independent of the card reader but having a data interaction relationship with the card reader. As shown in fig. 3, the apparatus includes: a transmitting unit 31, a receiving unit 32, and an output unit 33; wherein,
a sending unit 31, configured to send a data acquisition instruction to a first chip card that is not protected by electromagnetic isolation in a communication range in a wireless manner;
a receiving unit 32, configured to receive a data acquisition response returned by the first chip card in a wireless manner, where the data acquisition response carries user data stored in a chip of the first chip card;
an output unit 33 for outputting the user data received by the receiving unit 32;
the sending unit 31 is further configured to send a data acquisition instruction to a second chip card protected by electromagnetic isolation within a communication range in a wireless manner;
the receiving unit 32 is also arranged to wait for a data acquisition response to be returned by the second chip card.
Further, as shown in fig. 4, the apparatus further includes:
the setting unit 34 is configured to perform initialization setting on the card reader before the sending unit 31 sends the data obtaining instruction to the first chip card without electromagnetic isolation protection in the communication range in a wireless manner.
Further, the setting unit 34 is configured to:
and setting the working mode of the card reader according to the communication standard used by the first chip card and the second chip card.
Further, as shown in fig. 4, the apparatus further includes:
the writing unit 35 is used for writing user data into the first chip card and the second chip card respectively in a wireless mode.
Further, as shown in fig. 4, the apparatus further includes:
a decoding unit 36, configured to perform format parsing on the data acquisition response received by the receiving unit 32 through a preset decoding protocol before the output unit 33 outputs the user data, so as to obtain the user data.
Further, as shown in fig. 4, the output unit 33 includes:
the first output module 331 is configured to output the user data to a display screen integrally designed with the card reader for display.
Further, as shown in fig. 4, the output unit 33 includes:
and a second output module 332 for outputting the user data to a device independent of the card reader for display.
Further, the second output module is used for outputting the user data to a large screen for displaying.
Further, the wireless system used by the transmitting unit 31 and the receiving unit 32 is a radio frequency identification RFID system.
Further, as an implementation of the method shown in fig. 1 and fig. 2, another embodiment of the present invention further provides a demonstration system for preventing chip card information from being stolen. As shown in fig. 5, the system includes: a card reader 51, a first chip card 52, a second chip card 53, and a protective body 54; wherein, the card reader 51 comprises the device shown in fig. 3 or fig. 4, or is independent of the device but has a data interaction relationship with the device; the protective body 54 is made of a material with an electromagnetic isolation function and is used for performing electromagnetic isolation protection on the second chip card 53, and the protective body 54 shields, covers or wraps the second chip card 53;
the card reader 51 is used for sending a data acquisition instruction to a first chip card 52 which is not protected by electromagnetic isolation in a communication range in a wireless mode;
the first chip card 52 is used for responding to the data acquisition instruction, adding the user data stored in the chip of the first chip card 52 into the data acquisition response, and sending the data acquisition response to the card reader 51 in a wireless mode;
the card reader 51 is further configured to receive a data acquisition response returned by the first chip card 52 in a wireless manner, and output user data in the data acquisition response;
the card reader 51 is also used for sending a data acquisition command to the second chip card 53 protected by electromagnetic isolation within the communication range in a wireless mode and waiting for a data acquisition response returned by the second chip card 53.
It should be noted that the protective body 54 shown in fig. 5 is a protective cover for covering the second chip card 53, and the second chip card 53 is shown in a dotted line in fig. 5 to indicate that the second chip card 53 is covered in the protective cover. The dashed lines indicate that the second chip card 53 does not represent any differences of the second chip card 53 with respect to the first chip card 52. Of course, the protection body 54 shown in fig. 5 is only one implementation, and in practical applications, the protection body 54 may be a sleeve body or a card body having other shapes, or even a protection layer without a specific shape, which is not limited in this embodiment.
The demonstration device and the demonstration system for preventing the chip card information from being stolen can respectively scan a first chip card which is not protected by electromagnetic isolation and a second chip card which is protected by the electromagnetic isolation through a card reader. The first chip card which is not protected by the electromagnetic isolation returns a data acquisition response carrying user data to the card reader based on the normal wireless communication connection established with the card reader; the second chip card protected by the electromagnetic isolation cannot receive the data acquisition instruction sent by the card reader due to the electromagnetic isolation, and cannot send any response message to the card reader. Compared with the prior art, the embodiment can block the wireless communication connection between the chip card and the unauthorized card reader by adding the electromagnetic isolation protection mode to the chip card, thereby effectively protecting the safety of user data in the chip card.
It should be noted that, the embodiments of the present invention are described with a scheme taking a chip card as an example, and in practical applications, the present invention is applicable to all cards storing personal information of a user and having a wireless communication function, such as an ID card, an IC card, or a smart card.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It will be appreciated that the relevant features of the method and apparatus described above are referred to one another. In addition, "first", "second", and the like in the above embodiments are for distinguishing the embodiments, and do not represent merits of the embodiments.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components in the title of the invention (e.g., means for determining the level of links within a web site) in accordance with embodiments of the invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (19)

1. A demonstration method for preventing the theft of chip card information, the method comprising:
the card reader sends a data acquisition instruction to a first chip card which is not protected by electromagnetic isolation in a communication range in a wireless mode;
receiving a data acquisition response returned by the first chip card in a wireless mode, wherein the data acquisition response carries user data stored in a first chip card chip;
outputting the user data;
sending a data acquisition instruction to a second chip card protected by electromagnetic isolation in a communication range in a wireless mode, wherein the second chip card protected by electromagnetic isolation is a chip card surrounded by interference electromagnetic waves emitted by an active device with an electromagnetic isolation function;
waiting for a data acquisition response returned by the second chip card;
the card reader negotiates with the first chip card and the second chip card in advance to obtain a self-defined data format protocol, and the data format protocol can stipulate that the first chip card and the second chip card only return a small amount of key information with higher sensitivity to the card reader.
2. The method of claim 1, wherein prior to said wirelessly sending a data acquisition instruction to a first chip card within a communication range that is not protected by electromagnetic isolation, the method further comprises:
and carrying out initialization setting on the card reader.
3. The method of claim 2, further comprising:
and setting the working mode of the card reader according to the communication standard used by the first chip card and the second chip card.
4. The method of claim 3, further comprising:
and respectively writing user data into the first chip card and the second chip card in a wireless mode.
5. The method of claim 1, wherein prior to said outputting said user data, said method further comprises:
and carrying out format analysis on the data acquisition response through a preset decoding protocol to obtain the user data.
6. The method of claim 1, wherein the outputting the user data comprises:
and outputting the user data to a display screen which is integrally designed with the card reader for display.
7. The method of claim 1, wherein the outputting the user data comprises:
and outputting the user data to a device independent of the card reader for display.
8. The method of claim 7, wherein outputting the user data to a device separate from the card reader for display comprises:
and outputting the user data to a large screen for display.
9. The method of claim 1, wherein the wireless mode is a Radio Frequency Identification (RFID) mode.
10. A presentation device for preventing the theft of chip card information, the device comprising:
the sending unit is used for sending a data acquisition instruction to a first chip card which is not protected by electromagnetic isolation in a communication range in a wireless mode;
the receiving unit is used for receiving a data acquisition response returned by the first chip card in a wireless mode, wherein the data acquisition response carries user data stored in a chip of the first chip card;
an output unit configured to output the user data received by the receiving unit;
the sending unit is also used for sending a data acquisition instruction to a second chip card protected by electromagnetic isolation in a communication range in a wireless mode, wherein the second chip card protected by electromagnetic isolation is a chip card surrounded by interference electromagnetic waves emitted by an active device with an electromagnetic isolation function;
the receiving unit is also used for waiting for a data acquisition response returned by the second chip card;
the card reader negotiates with the first chip card and the second chip card in advance to obtain a self-defined data format protocol, and the data format protocol can stipulate that the first chip card and the second chip card only return a small amount of key information with higher sensitivity to the card reader.
11. The apparatus of claim 10, further comprising:
and the setting unit is used for carrying out initialization setting on the card reader before the sending unit sends a data acquisition command to the first chip card which is not protected by electromagnetic isolation in the communication range in a wireless mode.
12. The apparatus according to claim 11, wherein the setting unit is configured to:
and setting the working mode of the card reader according to the communication standard used by the first chip card and the second chip card.
13. The apparatus of claim 12, further comprising:
and the writing unit is used for respectively writing user data into the first chip card and the second chip card in a wireless mode.
14. The apparatus of claim 10, further comprising:
and the decoding unit is used for carrying out format analysis on the data acquisition response received by the receiving unit through a preset decoding protocol before the output unit outputs the user data to obtain the user data.
15. The apparatus of claim 10, wherein the output unit comprises:
and the first output module is used for outputting the user data to a display screen which is integrally designed with the card reader for display.
16. The apparatus of claim 10, wherein the output unit comprises:
and the second output module is used for outputting the user data to equipment independent of a card reader for display.
17. The apparatus of claim 16, wherein the second output module is configured to output the user data to a large screen for display.
18. The apparatus according to any one of claims 10 to 17, wherein the wireless system used by the transmitting unit and the receiving unit is a Radio Frequency Identification (RFID) system.
19. A presentation system for preventing the theft of chip card information, the system comprising: the card reader, the first chip card, the second chip card and the protection body; the protection body is an active device made of a material with an electromagnetic isolation function and used for performing electromagnetic isolation protection on the second chip card, and interference electromagnetic waves emitted by the protection body surround the second chip card;
the card reader is used for sending a data acquisition instruction to the first chip card which is not protected by electromagnetic isolation in a communication range in a wireless mode;
the first chip card is used for responding to the data acquisition instruction, adding the user data stored in the first chip card chip into a data acquisition response, and sending the data acquisition response to the card reader in a wireless mode;
the card reader is also used for receiving the data acquisition response returned by the first chip card in a wireless mode and outputting the user data in the data acquisition response;
the card reader is also used for sending a data acquisition command to the second chip card protected by electromagnetic isolation in a communication range in a wireless mode and waiting for a data acquisition response returned by the second chip card;
the card reader negotiates with the first chip card and the second chip card in advance to obtain a self-defined data format protocol, and the data format protocol can stipulate that the first chip card and the second chip card only return a small amount of key information with higher sensitivity to the card reader.
CN201510627478.1A 2015-09-28 2015-09-28 Demonstration method, device and system for preventing chip card information from being stolen Active CN105279531B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510627478.1A CN105279531B (en) 2015-09-28 2015-09-28 Demonstration method, device and system for preventing chip card information from being stolen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510627478.1A CN105279531B (en) 2015-09-28 2015-09-28 Demonstration method, device and system for preventing chip card information from being stolen

Publications (2)

Publication Number Publication Date
CN105279531A CN105279531A (en) 2016-01-27
CN105279531B true CN105279531B (en) 2020-02-14

Family

ID=55148512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510627478.1A Active CN105279531B (en) 2015-09-28 2015-09-28 Demonstration method, device and system for preventing chip card information from being stolen

Country Status (1)

Country Link
CN (1) CN105279531B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111626070A (en) * 2020-05-12 2020-09-04 贵州国卫信安科技有限公司 Safety consciousness teaching equipment for preventing sensitive data of bank card from being stolen

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6121544A (en) * 1998-01-15 2000-09-19 Petsinger; Julie Ann Electromagnetic shield to prevent surreptitious access to contactless smartcards
CN2400838Y (en) * 1999-12-01 2000-10-11 王秋勇 Multi-functional magnetic card protecting sleeve
CN1412091A (en) * 2001-10-19 2003-04-23 李志强 Antimagnetic and electric radiation resistant card protecting cover
CN2684280Y (en) * 2003-10-08 2005-03-09 王淼 Magnetic card safety protection cover
CN2795955Y (en) * 2005-04-22 2006-07-12 上海复旦微电子股份有限公司 Non-contact type IC card shielding device
CN1841413A (en) * 2005-03-29 2006-10-04 富士通株式会社 Tag testing device, tag testing method, and tag testing program
CN200969107Y (en) * 2006-10-27 2007-10-31 华工科技产业股份有限公司 Certificate with RFID chip for preventing information from being stolen
CN101253750A (en) * 2005-06-24 2008-08-27 维萨美国股份有限公司 Apparatus and method to electromagnetically shield portable consumer devices
CN101468567A (en) * 2007-12-28 2009-07-01 上海华虹集成电路有限责任公司 Electronic passport capable of preventing being read through stealing

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6121544A (en) * 1998-01-15 2000-09-19 Petsinger; Julie Ann Electromagnetic shield to prevent surreptitious access to contactless smartcards
CN2400838Y (en) * 1999-12-01 2000-10-11 王秋勇 Multi-functional magnetic card protecting sleeve
CN1412091A (en) * 2001-10-19 2003-04-23 李志强 Antimagnetic and electric radiation resistant card protecting cover
CN2684280Y (en) * 2003-10-08 2005-03-09 王淼 Magnetic card safety protection cover
CN1841413A (en) * 2005-03-29 2006-10-04 富士通株式会社 Tag testing device, tag testing method, and tag testing program
CN2795955Y (en) * 2005-04-22 2006-07-12 上海复旦微电子股份有限公司 Non-contact type IC card shielding device
CN101253750A (en) * 2005-06-24 2008-08-27 维萨美国股份有限公司 Apparatus and method to electromagnetically shield portable consumer devices
CN200969107Y (en) * 2006-10-27 2007-10-31 华工科技产业股份有限公司 Certificate with RFID chip for preventing information from being stolen
CN101468567A (en) * 2007-12-28 2009-07-01 上海华虹集成电路有限责任公司 Electronic passport capable of preventing being read through stealing

Also Published As

Publication number Publication date
CN105279531A (en) 2016-01-27

Similar Documents

Publication Publication Date Title
CN103907328B (en) A kind of user authen method of site resource
US9304555B2 (en) Magnetically coupling radio frequency antennas
US8490872B2 (en) Light-powered smart card for on-line transaction processing
US8783578B2 (en) Dynamic display information card
US20090096580A1 (en) Secure authentication
US9165295B2 (en) Automated card information exchange pursuant to a commercial transaction
CN106896994A (en) A kind of frame display methods and device
US8532619B2 (en) System for authorizing the use of communication devices by proximity
US20070226501A1 (en) Non-contact type semiconductor device, mobile terminal device, and communication system
CN111860020A (en) Service processing method, device and equipment
CN103839313A (en) Access control system
TW201942794A (en) Two-dimensional code display and identification method and device
EP2911088B1 (en) Method and apparatus for displaying biometric information
US20100277279A1 (en) Rfid privacy protection method and apparatus
CN107403119B (en) Smart card information reading method and device
US20150178530A1 (en) Information processing system and information processing method
KR20080023712A (en) Nfc function control device for mobile terminal having id card and nfc chip
Shariati et al. Investigating NFC technology from the perspective of security, analysis of attacks and existing risk
CN105279531B (en) Demonstration method, device and system for preventing chip card information from being stolen
KR20200093585A (en) Integrator of identification device
KR101437049B1 (en) Secure Digital system using Near Field Communication, pair system making a pair with the secure digital system, and providing method thereof
KR101426223B1 (en) Method for checking confidential information using smartcard and smart terminal, and computer-readable recording medium for the same
US9419687B1 (en) Intermediate frequency broadcast of emulated passive RFID signal from a computing device
US11741331B1 (en) Electronic tag with two scanning modalities
CN106897641A (en) A kind of frame display methods and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Applicant after: QAX Technology Group Inc.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Applicant before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant