CN109447653A - A kind of IC card encryption method, device, terminal and storage medium - Google Patents
A kind of IC card encryption method, device, terminal and storage medium Download PDFInfo
- Publication number
- CN109447653A CN109447653A CN201811326513.6A CN201811326513A CN109447653A CN 109447653 A CN109447653 A CN 109447653A CN 201811326513 A CN201811326513 A CN 201811326513A CN 109447653 A CN109447653 A CN 109447653A
- Authority
- CN
- China
- Prior art keywords
- card
- identification information
- information
- block
- storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to IC card field of encryption, a kind of IC card encryption method, device, terminal and storage medium are provided, for solving the problems, such as that encrypting IC card is easily unauthorized copying.A kind of IC card encryption method, device, terminal and storage medium provided by the invention, comprising: obtain the identification information in IC card;The identification information for the IC card that will acquire is matched with the identification information of storage;If matching is unsuccessful, send a warning message;If successful match, new identification information is generated;By in new update of identification information to IC card, and the identification information updated storage.To an identification information is added in IC card, it can effectively prevent card and be replicated, even if being replicated, as long as copy card can not be used again after former card user uses once;Or after copy card use, original card be can not be used again, and therefore, the quantity of card is still controllable.
Description
Technical field
The present invention relates to IC card field of encryption, and in particular to a kind of IC card encryption method, device, terminal and storage medium.
Background technique
IC card (Integrated Circuit Card, integrated circuit card), also referred to as smart card (Smart card), wisdom
Card (Intelligent card), microcircuit card (Microcircuit card) or chip card etc..It is by a microelectronics
Chip insertion meets in the card base of 7816 standard of ISO, is made into card form.Communication modes between IC card and reader can be with
It is contact, is also possible to contactless.IC card is divided into Contact Type Ic Card, non-contact IC and double interfaces according to communication interface
Block (being provided simultaneously with contact and contactless communication interface).
The advantages that IC card is due to its intrinsic information security, easy to carry, fairly perfect standardization, authentication,
The fields such as bank, telecommunications, public transport, parking lot management are just more and more applied, such as China second-generation identity card, the electricity of bank
Sub- wallet, the SIM cards of mobile phones of telecommunications, the bus card of public transport, subway card all exist for collecting the parking card etc. of parking fee
It plays an important role in people's daily life.
Existing encrypting IC card, especially access card are easy to be replicated privately by user by personal equipment, cause to be difficult to
Management, therefore, how effectively card inside information to be prevented to be replicated, or effectively identify the card being replicated be IC card application field urgently
Technical problem to be solved.
Summary of the invention
Present invention solves the technical problem that the problem of being easily unauthorized copying for encrypting IC card, provides a kind of IC card encryption side
Method, device, terminal and storage medium.
In order to solve the above technical problem, the present invention provides technical solution are as follows:
A kind of IC card encryption method, device, terminal and storage medium, comprising: obtain the identification information in IC card;It will acquire
The identification information of IC card is matched with the identification information of storage;If matching is unsuccessful, if sending a warning message successful match,
Generate new identification information;By in new update of identification information to IC card, and the identification information updated storage.
It is not the encryption information directly read in card when user card punching, but first transfers the identification information in card, identifies
Information matches can successfully be decrypted;And after passing through the verifying of identification information by the card that regular channel obtains, system
A new identification information can be regenerated.
To an identification information is added in IC card, it can effectively prevent card and be replicated, even if being replicated, as long as former card is used
After family uses once, copy card be can not be used again;Or after copy card use, original card be can not be used again, therefore, card
Quantity be still controllable.
Preferably, after the identification information for the IC card that will acquire is matched with the identification information of storage further include: if matching
Success, obtains the chip information of IC card;Authorized chip information is transferred, the chip information for the IC card that will acquire is the same as authorized
Chip information matched;If successful match, the information being verified is issued;If match cognization is sent a warning message, mention
Show that the IC card is unauthorized.Chip information is obtained again after obtaining identification information, if chip information mismatches, can not also be added
It is close;The IC card that a part of chip information, which can be effectively prevented, to be re-write is made into copy card.
Preferably, the identification information storage is in the unencryption sector of IC card.The 0th piece of 0 sector of IC card is general
Can not be written into, and other block some be storage encryption information, some is not stored information, identification information
It is stored in the sector of unencryption.
Preferably, the identification information storage is in any one or more blocks of the not stored Encryption Algorithm of IC card.Mark
The content of information should not be too many, the memory capacity of occupancy be also not easy it is too big, be merely stored in a block can more quickly complete it is whole
A process;The level of encryption that identification information can effectively be improved is stored in multiple pieces.
Preferably, the IC includes 64 blocks altogether, and number is respectively 0 ~ 63, and wherein m block is used to store encryption information,
The encryption information is stored in 1 ~ 63 wherein in m block;Wherein n block unencryption, the identification information storage is in n block
In one of them;Before the identification information of the IC card that will acquire is matched with the identification information of storage, further includes:
The number i of the block of storage identification information is obtained, the number stored with before is compared;If number is consistent, the IC card that will acquire
Identification information with storage identification information matched;If number is inconsistent, send a warning message.Before first time is verified,
Not only be stored with identification information, the number of the block where identification information can also be stored in systems, therefore, can by
Number with block carries out pre-authentication, effective exclusive segment unauthorized card, or effectively to exclude certain copy modes more low
Bad card.
Preferably, after the new identification information of the generation, further includes: by a block j of identification information storage to IC card
In, store the number j of the block.Updated mark can be stored into another block, be can be further improved so anti-multiple
The effect of system.
Preferably, the block i and block j belongs to n unencryption block, the i ≠ j.Identification information before and after swiping the card is deposited
Storage can effectively improve anti-copying effect in different blocks.
A kind of IC card encryption device, including data obtaining module, matching module, information generating module, information updating module,
Memory module;The function of the data obtaining module are as follows: obtain the identification information in IC card;The function of the matching module
It can are as follows: the identification information for the IC card that will acquire is matched with the identification information of storage;If matching is unsuccessful, letter is given a warning
Breath;If successful match, the instruction for generating new identification information is issued;The function of the information generating module are as follows: generate new
Identification information;The function of the information updating module are as follows: by new update of identification information to IC card, and update storage
Identification information;The data obtaining module is connected with matching module, and the matching module is connected with information generating module,
The information generating module is connected with information updating module, and the memory module connects with matching module and information updating module
It connects.For realizing the encryption method of IC card, which can quickly realize the reading of identification information, match and re-write.
A kind of IC card ciphering terminal, including one or more processors;And storage device, for storing one or more
Program;When one or more programs are executed by the one or more processors, so that the one or more
Processor realizes the IC card encryption method.For realizing the terminal of IC card encryption method.
A kind of storage medium of IC card encryption, for storing one or more programs, for realizing in such as claim 1 ~ 7
Described in any item methods.The storage medium for storing the IC card encryption method, can be applied to other equipment.
Compared with prior art, the device have the advantages that are as follows: to adding an identification information, Ke Yiyou in IC card
Effect prevents card to be replicated, even if being replicated, as long as copy card can not be used again after former card user uses once;Or
After copy card use, original card be can not be used again, and therefore, the quantity of card is still controllable.
In the prior art, encryption information is only generally stored in IC card, is also only the verification to encryption information when swiping the card, as long as
Replicate encryption information;And an identification information is also stored in the IC card of the application, before checking encryption information, first
Row verification identification information updates a new identification information again later, and the identification information of which is dynamic, and the mark is believed
The time that the small volume of breath, verifying or update not will lead to verifying of swiping the card increases, therefore the technical solution of the application can
Effectively to prevent IC from being replicated privately and the usage experience of user will not be changed.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of IC card encryption method.
Fig. 2 is a kind of flow diagram of the another embodiment of IC card encryption method.
Fig. 3 is a kind of flow diagram of the another embodiment of IC card encryption method.
Fig. 4 is a kind of flow diagram of the another embodiment of IC card encryption method.
Fig. 5 is a kind of a kind of flow diagram of embodiment of IC card encryption device.
Fig. 6 is a kind of flow diagram of the another embodiment of IC card encryption device.
Specific embodiment
Following implementation column is to further explanation of the invention, is not limitation of the present invention.
In some embodiments of the present application, a kind of IC card encryption method, as shown in Figure 1, comprising: obtain in IC card
Identification information;The identification information for the IC card that will acquire is matched with the identification information of storage;If matching is unsuccessful, police is issued
If accusing information successful match, new identification information is generated;By in new update of identification information to IC card, and the mark updated storage
Know information.
It is not the encryption information directly read in card when user card punching, but first transfers the identification information in card, identifies
Information matches can successfully be decrypted;And after passing through the verifying of identification information by the card that regular channel obtains, system
A new identification information can be regenerated.
To an identification information is added in IC card, it can effectively prevent card and be replicated, even if being replicated, as long as former card is used
After family uses once, copy card be can not be used again;Or after copy card use, original card be can not be used again, therefore, card
Quantity be still controllable.
In other embodiments of the application, as shown in Fig. 2, mark of the identification information for the IC card that will acquire with storage
After information is matched further include: if successful match, obtain the chip information of IC card;Authorized chip information is transferred, it will
The chip information of the IC card of acquisition is matched with authorized chip information;If successful match, the letter being verified is issued
Breath;If match cognization is sent a warning message, prompt the IC card unauthorized.
Chip information is obtained again after obtaining identification information, if chip information mismatches, can not also be encrypted;It can be effective
The IC card for preventing a part of chip information from can not re-write is made into copy card.
In other embodiments of the application, the identification information storage is in the unencryption sector of IC card.
The 0th piece of 0 sector of IC card can not be generally written into, and other block some be storage encryption information,
Some is not stored information, and identification information storage is in the sector of unencryption.
In other embodiments of the application, any of the identification information storage in the not stored Encryption Algorithm of IC card
In a or multiple piece.
The content of identification information should not be too many, and the memory capacity of occupancy is also not easy too greatly, and being merely stored in a block can be more
Quickly complete whole flow process;The level of encryption that identification information can effectively be improved is stored in multiple pieces.
In other embodiments of the application, the IC includes 64 blocks altogether, and number is respectively 0 ~ 63, and wherein m
For block for storing encryption information, the encryption information is stored in 1 ~ 63 wherein in m block;Wherein n block unencryption, it is described
One of them of identification information storage in n block;Identification information of the identification information of the IC card that will acquire with storage
Before being matched, further includes: obtain the number i of the block of storage identification information, the number stored with before is compared;If compiling
Number consistent, the identification information for the IC card that will acquire is matched with the identification information of storage;If number is inconsistent, give a warning
Information.
Further, as shown in figure 3, the identification information of the IC card that will acquire is the same as the identification information progress stored
Before matching, further includes: obtain the number i of the block of storage identification information, the number stored with before is compared;If number one
It causes, the identification information for the IC card that will acquire is matched with the identification information of storage;If number is inconsistent, send a warning message.
Before first time is verified, it is not only stored with identification information, can also be stored with where identification information in systems
Therefore the number of block can carry out pre-authentication by the number of match block, effective exclusive segment unauthorized card, or effectively
Ground excludes the more inferior card of certain copy modes.
In other embodiments of the application, after the new identification information of the generation, further includes: by identification information
It stores in a block j of IC card, stores the number j of the block.
Updated mark can be stored into another block, can be further improved the effect of anti-copying in this way.
The block i and block j belongs to n unencryption block, the i ≠ j.
Identification information storage before and after swiping the card can effectively improve anti-copying effect in different blocks.
In other embodiments of the application, as shown in figure 4, the number i of block where obtaining the identification information in IC card;
The number stored with before is compared;If number is inconsistent, send a warning message;If number is consistent, the mark in IC card is obtained
Know information, the identification information for the IC card that will acquire is matched with the identification information of storage;If matching is unsuccessful, letter is given a warning
Breath;If successful match, new identification information is generated;By in a block j of identification information storage to IC card, the number of the block is stored
J, the i ≠ j;Obtain the chip information of IC card;Authorized chip information is transferred, the chip information for the IC card that will acquire is same
Authorized chip information is matched;If successful match, the information being verified is issued;If match cognization gives a warning letter
Breath, prompts the IC card unauthorized.
In some embodiments of the present application, a kind of IC card encryption device, as shown in figure 5, include data obtaining module,
With module, information generating module, information updating module, memory module;The function of the data obtaining module are as follows: obtain IC
Identification information in card;The function of the matching module are as follows: identification information of the identification information for the IC card that will acquire with storage
It is matched;If matching is unsuccessful, send a warning message;If successful match, the instruction for generating new identification information is issued;Institute
The function for the information generating module stated are as follows: generate new identification information;The function of the information updating module are as follows: will be new
In update of identification information to IC card, and the identification information updated storage;The data obtaining module is connected with matching module,
The matching module is connected with information generating module, and the information generating module is connected with information updating module, described
Memory module is connected with matching module with information updating module.
For realizing the encryption method of IC card, the device can quickly realize identification information reading, matching with again
Write-in.
In other embodiments of the application, the IC card encryption device further include: authorization message matching module, institute
The function for the authorization message matching module stated are as follows: transfer authorized chip information, the same quilt of the chip information for the IC card that will acquire
The chip information of authorization is matched;If successful match, the information being verified is issued;If match cognization gives a warning letter
Breath, prompts the IC card unauthorized;
The authorization message matching module is connected with matching module.
Chip information is obtained again after obtaining identification information, if chip information mismatches, can not also be encrypted;It can be effective
The IC card for preventing a part of chip information from can not re-write is made into copy card.
In other embodiments of the application, the encryption device further includes that number information obtains module and number letter
Matching module is ceased, the number information obtains the function of module are as follows: deposit together in the identification information of the IC card that will acquire
Before the identification information of storage is matched, the number i of the block of storage identification information is obtained
The function of the number information matching module are as follows: the number that the number information that will acquire is stored with before is compared;
If number is consistent, the identification information for the IC card that will acquire is matched with the identification information of storage;If number is inconsistent, issue
Warning message.
The IC includes 64 blocks altogether, and number is respectively 0 ~ 63, and wherein m block is described for storing encryption information
Encryption information is stored in 1 ~ 63 wherein in m block;Wherein n block unencryption, its in n block of the identification information storage
In one;Before first time is verified, it is not only stored with identification information, the block that can also be stored in systems where identification information
Number therefore can carry out pre-authentication by the number of match block, effective exclusive segment unauthorized card, or effectively
Exclude the more inferior card of certain copy modes.
In other embodiments of the application, the encryption device further includes identification information distribution module, described
The function of identification information distribution module are as follows: after the new identification information of the generation, by one of identification information storage to IC card
In block j, the number j of the block is stored.
Updated mark can be stored into another block, can be further improved the effect of anti-copying in this way.
In other embodiments of the application, after identification information distribution module distributes new identification information: the block i
Belong to n unencryption block, the i ≠ j with block j.
Identification information storage before and after swiping the card can effectively improve anti-copying effect in different blocks.
In other embodiments of the application, as shown in fig. 6, the number information obtains module with number information
It is connected with module, number information matching module is connected with data obtaining module, and data obtaining module is connected with matching module, matching
Module is connected with information generating module, and the information generating module is connected with identification information distribution module, the mark letter
It ceases distribution module to connect with information updating module, the information updating module is connected with authorization message matching module, described
Information updating module is connected with memory module, and the memory module obtains module, matching module and authorization letter with number information
Cease matching module connection.
Connection encryption device according to figure 6, workflow are as follows: the volume of block where obtaining the identification information in IC card
Number i;The number stored with before is compared;If number is inconsistent, send a warning message;If number is consistent, obtain in IC card
Identification information, the identification information of the IC card that will acquire matched with the identification information of storage;If matching is unsuccessful, police is issued
Accuse information;If successful match, new identification information is generated;By in a block j of identification information storage to IC card, the block is stored
Number j, the i ≠ j;Obtain the chip information of IC card;Authorized chip information is transferred, the chip letter for the IC card that will acquire
Breath is matched with authorized chip information;If successful match, the information being verified is issued;If match cognization, police is issued
Information is accused, prompts the IC card unauthorized.
A kind of IC card ciphering terminal, including one or more processors;And storage device, for storing one or more
Program;When one or more programs are executed by the one or more processors, so that the one or more
Processor realizes IC card optimization method as described above.
For realizing the terminal of IC card encryption method.
A kind of IC card encryption storage medium, for storing one or more programs, for realizing method as described above.
The storage medium for storing the IC card encryption method, can be applied to other equipment.
Above-listed detailed description is illustrating for possible embodiments of the present invention, and above embodiments are not to limit this
The scope of the patents of invention, all equivalence enforcements or change without departing from carried out by the present invention, is intended to be limited solely by the scope of the patents of this case.
Claims (10)
1. a kind of IC card encryption method characterized by comprising obtain the identification information in IC card;The IC card that will acquire
Identification information is matched with the identification information of storage;If matching is unsuccessful, send a warning message;If successful match, generate
New identification information;By in new update of identification information to IC card, and the identification information updated storage.
2. a kind of IC card encryption method according to claim 1, which is characterized in that the identification information for the IC card that will acquire is same
After the identification information of storage is matched further include: if successful match, obtain the chip information of IC card;Transfer authorized core
The chip information of piece information, the IC card that will acquire is matched with authorized chip information;If successful match, verifying is issued
By information;If match cognization is sent a warning message, prompt the IC card unauthorized.
3. a kind of IC card encryption method according to claim 1, which is characterized in that the identification information storage is in IC card
Unencryption sector in.
4. a kind of IC card encryption method according to claim 1, which is characterized in that the identification information storage is in IC card
In any one or more blocks of not stored Encryption Algorithm.
5. a kind of IC card encryption method according to claim 4, which is characterized in that the IC card chip includes 64 altogether
Block, number are respectively 0 ~ 63, and wherein for m block for storing encryption information, the encryption information is stored in the wherein m of block 1 ~ 63
In a block;Wherein n block unencryption, one of them of the identification information storage in n block;It is described to will acquire
Before the identification information of IC card is matched with the identification information of storage, further includes: the number i of the block of storage identification information is obtained,
The number stored with before is compared;If number is consistent, the identification information of the IC card that will acquire with storage identification information into
Row matching;If number is inconsistent, send a warning message.
6. a kind of IC card encryption method according to claim 1, which is characterized in that the new identification information of the generation
Afterwards, further includes: by a block j of identification information storage to IC card, store the number j of the block.
7. a kind of IC card encryption method according to claim 4 ~ 6, which is characterized in that the block i and block j belongs to n
Unencryption block, the i ≠ j.
8. a kind of IC card encryption device, which is characterized in that including data obtaining module, matching module, information generating module, information
Update module, memory module;The function of the data obtaining module are as follows: obtain the identification information in IC card;?
Function with module are as follows: the identification information for the IC card that will acquire is matched with the identification information of storage;If matching is unsuccessful, hair
Warning message out;If successful match, the instruction for generating new identification information is issued;The function of the information generating module are as follows:
Generate new identification information;The function of the information updating module are as follows: by new update of identification information to IC card, and more
The identification information newly stored;The data obtaining module is connected with matching module, and the matching module generates mould with information
Block connection, the information generating module are connected with information updating module, the memory module with matching module and information more
New module connection.
9. a kind of IC card ciphering terminal, which is characterized in that including one or more processors;And storage device, for storing
One or more programs;When one or more programs are executed by the one or more processors, so that described
One or more processors realize IC card encryption method as claimed in any one of claims 1 to 7.
10. a kind of IC card encrypts storage media, which is characterized in that for storing one or more programs, wanted for realizing such as right
Method described in asking any one of 1 ~ 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811326513.6A CN109447653B (en) | 2018-11-08 | 2018-11-08 | IC card encryption method, device, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811326513.6A CN109447653B (en) | 2018-11-08 | 2018-11-08 | IC card encryption method, device, terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109447653A true CN109447653A (en) | 2019-03-08 |
CN109447653B CN109447653B (en) | 2021-12-28 |
Family
ID=65552523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811326513.6A Active CN109447653B (en) | 2018-11-08 | 2018-11-08 | IC card encryption method, device, terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109447653B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112016336A (en) * | 2020-08-19 | 2020-12-01 | 日立楼宇技术(广州)有限公司 | Method, device, equipment and storage medium for detecting copy card |
CN113808339A (en) * | 2021-09-17 | 2021-12-17 | 中国银行股份有限公司 | Self-service system and verification method of self-service equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040193818A1 (en) * | 2003-03-31 | 2004-09-30 | Fujitsu Limited | Memory device, memory access limiting system, and memory access method |
CN101377822A (en) * | 2007-09-02 | 2009-03-04 | 黄长生 | Copying-proof card system |
CN106096475A (en) * | 2016-06-03 | 2016-11-09 | 广州日滨科技发展有限公司 | Card Reader treating method and apparatus |
-
2018
- 2018-11-08 CN CN201811326513.6A patent/CN109447653B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040193818A1 (en) * | 2003-03-31 | 2004-09-30 | Fujitsu Limited | Memory device, memory access limiting system, and memory access method |
CN101377822A (en) * | 2007-09-02 | 2009-03-04 | 黄长生 | Copying-proof card system |
CN106096475A (en) * | 2016-06-03 | 2016-11-09 | 广州日滨科技发展有限公司 | Card Reader treating method and apparatus |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112016336A (en) * | 2020-08-19 | 2020-12-01 | 日立楼宇技术(广州)有限公司 | Method, device, equipment and storage medium for detecting copy card |
CN112016336B (en) * | 2020-08-19 | 2024-01-02 | 日立楼宇技术(广州)有限公司 | Method, device, equipment and storage medium for detecting copy card |
CN113808339A (en) * | 2021-09-17 | 2021-12-17 | 中国银行股份有限公司 | Self-service system and verification method of self-service equipment |
Also Published As
Publication number | Publication date |
---|---|
CN109447653B (en) | 2021-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6886753B2 (en) | Dual-purpose portable card, a communication system, a communication method, a terminal apparatus, and a computer-readable record medium recording a program | |
CN103001773B (en) | Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC) | |
US20140258132A1 (en) | System and method for secure electronic transaction | |
CN105205508A (en) | Self-service card issuing machine for intelligent card | |
CN101729502A (en) | Method and system for distributing key | |
CN101595488A (en) | Be used for content is tied to the method and apparatus of independent storage arrangement | |
CN103530785A (en) | Double anti-counterfeiting system and method based on near field communication (NFC) function | |
WO2015154595A1 (en) | One-time pad authentication system based on closed-loop authentication theory and internet | |
CN105405012A (en) | Smart IC card and payment processing method | |
CN103297236A (en) | User identity verification and authorization system | |
CN113450092A (en) | Block chain network-based article safe and efficient transaction method, system and storage medium | |
CN109447653A (en) | A kind of IC card encryption method, device, terminal and storage medium | |
CN101866411A (en) | Security certification and encryption method and system of multi-application noncontact-type CPU card | |
CN108241880A (en) | A kind of real-time card sending system | |
CN205015906U (en) | Anti -fake verification system of electron certificate | |
CN207251631U (en) | A kind of follow-on SIM card and mobile terminal and identification system | |
CN203104483U (en) | Fingerprint authentication platform and NFC application terminal | |
KR100848791B1 (en) | Tag data recording and obtaining method which security verification are capable, tag data recording and obtaining apparatus | |
CN102651079A (en) | IC (integrated circuit) card management method occupying memory space for a short time and IC card management system | |
CN201946038U (en) | Security certificate device of internet-banking remote payment based on dual-interface safety smart card | |
CN106855923A (en) | A kind of electronic installation based on biological identification technology | |
CN104951823A (en) | Composite card management method and system | |
CN211827307U (en) | Double-encryption electronic tag | |
CN104954135A (en) | Anti-copy anti-counterfeiting electronic tag authentication method | |
CN107645679B (en) | Production method and system of card-free condition receiving system of set top box |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |