CN109447653A - A kind of IC card encryption method, device, terminal and storage medium - Google Patents

A kind of IC card encryption method, device, terminal and storage medium Download PDF

Info

Publication number
CN109447653A
CN109447653A CN201811326513.6A CN201811326513A CN109447653A CN 109447653 A CN109447653 A CN 109447653A CN 201811326513 A CN201811326513 A CN 201811326513A CN 109447653 A CN109447653 A CN 109447653A
Authority
CN
China
Prior art keywords
card
identification information
information
block
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811326513.6A
Other languages
Chinese (zh)
Other versions
CN109447653B (en
Inventor
谢响环
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG QEAZEN ELECTRONICS TECHNOLOGY Co Ltd
Original Assignee
GUANGDONG QEAZEN ELECTRONICS TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG QEAZEN ELECTRONICS TECHNOLOGY Co Ltd filed Critical GUANGDONG QEAZEN ELECTRONICS TECHNOLOGY Co Ltd
Priority to CN201811326513.6A priority Critical patent/CN109447653B/en
Publication of CN109447653A publication Critical patent/CN109447653A/en
Application granted granted Critical
Publication of CN109447653B publication Critical patent/CN109447653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to IC card field of encryption, a kind of IC card encryption method, device, terminal and storage medium are provided, for solving the problems, such as that encrypting IC card is easily unauthorized copying.A kind of IC card encryption method, device, terminal and storage medium provided by the invention, comprising: obtain the identification information in IC card;The identification information for the IC card that will acquire is matched with the identification information of storage;If matching is unsuccessful, send a warning message;If successful match, new identification information is generated;By in new update of identification information to IC card, and the identification information updated storage.To an identification information is added in IC card, it can effectively prevent card and be replicated, even if being replicated, as long as copy card can not be used again after former card user uses once;Or after copy card use, original card be can not be used again, and therefore, the quantity of card is still controllable.

Description

A kind of IC card encryption method, device, terminal and storage medium
Technical field
The present invention relates to IC card field of encryption, and in particular to a kind of IC card encryption method, device, terminal and storage medium.
Background technique
IC card (Integrated Circuit Card, integrated circuit card), also referred to as smart card (Smart card), wisdom Card (Intelligent card), microcircuit card (Microcircuit card) or chip card etc..It is by a microelectronics Chip insertion meets in the card base of 7816 standard of ISO, is made into card form.Communication modes between IC card and reader can be with It is contact, is also possible to contactless.IC card is divided into Contact Type Ic Card, non-contact IC and double interfaces according to communication interface Block (being provided simultaneously with contact and contactless communication interface).
The advantages that IC card is due to its intrinsic information security, easy to carry, fairly perfect standardization, authentication, The fields such as bank, telecommunications, public transport, parking lot management are just more and more applied, such as China second-generation identity card, the electricity of bank Sub- wallet, the SIM cards of mobile phones of telecommunications, the bus card of public transport, subway card all exist for collecting the parking card etc. of parking fee It plays an important role in people's daily life.
Existing encrypting IC card, especially access card are easy to be replicated privately by user by personal equipment, cause to be difficult to Management, therefore, how effectively card inside information to be prevented to be replicated, or effectively identify the card being replicated be IC card application field urgently Technical problem to be solved.
Summary of the invention
Present invention solves the technical problem that the problem of being easily unauthorized copying for encrypting IC card, provides a kind of IC card encryption side Method, device, terminal and storage medium.
In order to solve the above technical problem, the present invention provides technical solution are as follows:
A kind of IC card encryption method, device, terminal and storage medium, comprising: obtain the identification information in IC card;It will acquire The identification information of IC card is matched with the identification information of storage;If matching is unsuccessful, if sending a warning message successful match, Generate new identification information;By in new update of identification information to IC card, and the identification information updated storage.
It is not the encryption information directly read in card when user card punching, but first transfers the identification information in card, identifies Information matches can successfully be decrypted;And after passing through the verifying of identification information by the card that regular channel obtains, system A new identification information can be regenerated.
To an identification information is added in IC card, it can effectively prevent card and be replicated, even if being replicated, as long as former card is used After family uses once, copy card be can not be used again;Or after copy card use, original card be can not be used again, therefore, card Quantity be still controllable.
Preferably, after the identification information for the IC card that will acquire is matched with the identification information of storage further include: if matching Success, obtains the chip information of IC card;Authorized chip information is transferred, the chip information for the IC card that will acquire is the same as authorized Chip information matched;If successful match, the information being verified is issued;If match cognization is sent a warning message, mention Show that the IC card is unauthorized.Chip information is obtained again after obtaining identification information, if chip information mismatches, can not also be added It is close;The IC card that a part of chip information, which can be effectively prevented, to be re-write is made into copy card.
Preferably, the identification information storage is in the unencryption sector of IC card.The 0th piece of 0 sector of IC card is general Can not be written into, and other block some be storage encryption information, some is not stored information, identification information It is stored in the sector of unencryption.
Preferably, the identification information storage is in any one or more blocks of the not stored Encryption Algorithm of IC card.Mark The content of information should not be too many, the memory capacity of occupancy be also not easy it is too big, be merely stored in a block can more quickly complete it is whole A process;The level of encryption that identification information can effectively be improved is stored in multiple pieces.
Preferably, the IC includes 64 blocks altogether, and number is respectively 0 ~ 63, and wherein m block is used to store encryption information, The encryption information is stored in 1 ~ 63 wherein in m block;Wherein n block unencryption, the identification information storage is in n block In one of them;Before the identification information of the IC card that will acquire is matched with the identification information of storage, further includes: The number i of the block of storage identification information is obtained, the number stored with before is compared;If number is consistent, the IC card that will acquire Identification information with storage identification information matched;If number is inconsistent, send a warning message.Before first time is verified, Not only be stored with identification information, the number of the block where identification information can also be stored in systems, therefore, can by Number with block carries out pre-authentication, effective exclusive segment unauthorized card, or effectively to exclude certain copy modes more low Bad card.
Preferably, after the new identification information of the generation, further includes: by a block j of identification information storage to IC card In, store the number j of the block.Updated mark can be stored into another block, be can be further improved so anti-multiple The effect of system.
Preferably, the block i and block j belongs to n unencryption block, the i ≠ j.Identification information before and after swiping the card is deposited Storage can effectively improve anti-copying effect in different blocks.
A kind of IC card encryption device, including data obtaining module, matching module, information generating module, information updating module, Memory module;The function of the data obtaining module are as follows: obtain the identification information in IC card;The function of the matching module It can are as follows: the identification information for the IC card that will acquire is matched with the identification information of storage;If matching is unsuccessful, letter is given a warning Breath;If successful match, the instruction for generating new identification information is issued;The function of the information generating module are as follows: generate new Identification information;The function of the information updating module are as follows: by new update of identification information to IC card, and update storage Identification information;The data obtaining module is connected with matching module, and the matching module is connected with information generating module, The information generating module is connected with information updating module, and the memory module connects with matching module and information updating module It connects.For realizing the encryption method of IC card, which can quickly realize the reading of identification information, match and re-write.
A kind of IC card ciphering terminal, including one or more processors;And storage device, for storing one or more Program;When one or more programs are executed by the one or more processors, so that the one or more Processor realizes the IC card encryption method.For realizing the terminal of IC card encryption method.
A kind of storage medium of IC card encryption, for storing one or more programs, for realizing in such as claim 1 ~ 7 Described in any item methods.The storage medium for storing the IC card encryption method, can be applied to other equipment.
Compared with prior art, the device have the advantages that are as follows: to adding an identification information, Ke Yiyou in IC card Effect prevents card to be replicated, even if being replicated, as long as copy card can not be used again after former card user uses once;Or After copy card use, original card be can not be used again, and therefore, the quantity of card is still controllable.
In the prior art, encryption information is only generally stored in IC card, is also only the verification to encryption information when swiping the card, as long as Replicate encryption information;And an identification information is also stored in the IC card of the application, before checking encryption information, first Row verification identification information updates a new identification information again later, and the identification information of which is dynamic, and the mark is believed The time that the small volume of breath, verifying or update not will lead to verifying of swiping the card increases, therefore the technical solution of the application can Effectively to prevent IC from being replicated privately and the usage experience of user will not be changed.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of IC card encryption method.
Fig. 2 is a kind of flow diagram of the another embodiment of IC card encryption method.
Fig. 3 is a kind of flow diagram of the another embodiment of IC card encryption method.
Fig. 4 is a kind of flow diagram of the another embodiment of IC card encryption method.
Fig. 5 is a kind of a kind of flow diagram of embodiment of IC card encryption device.
Fig. 6 is a kind of flow diagram of the another embodiment of IC card encryption device.
Specific embodiment
Following implementation column is to further explanation of the invention, is not limitation of the present invention.
In some embodiments of the present application, a kind of IC card encryption method, as shown in Figure 1, comprising: obtain in IC card Identification information;The identification information for the IC card that will acquire is matched with the identification information of storage;If matching is unsuccessful, police is issued If accusing information successful match, new identification information is generated;By in new update of identification information to IC card, and the mark updated storage Know information.
It is not the encryption information directly read in card when user card punching, but first transfers the identification information in card, identifies Information matches can successfully be decrypted;And after passing through the verifying of identification information by the card that regular channel obtains, system A new identification information can be regenerated.
To an identification information is added in IC card, it can effectively prevent card and be replicated, even if being replicated, as long as former card is used After family uses once, copy card be can not be used again;Or after copy card use, original card be can not be used again, therefore, card Quantity be still controllable.
In other embodiments of the application, as shown in Fig. 2, mark of the identification information for the IC card that will acquire with storage After information is matched further include: if successful match, obtain the chip information of IC card;Authorized chip information is transferred, it will The chip information of the IC card of acquisition is matched with authorized chip information;If successful match, the letter being verified is issued Breath;If match cognization is sent a warning message, prompt the IC card unauthorized.
Chip information is obtained again after obtaining identification information, if chip information mismatches, can not also be encrypted;It can be effective The IC card for preventing a part of chip information from can not re-write is made into copy card.
In other embodiments of the application, the identification information storage is in the unencryption sector of IC card.
The 0th piece of 0 sector of IC card can not be generally written into, and other block some be storage encryption information, Some is not stored information, and identification information storage is in the sector of unencryption.
In other embodiments of the application, any of the identification information storage in the not stored Encryption Algorithm of IC card In a or multiple piece.
The content of identification information should not be too many, and the memory capacity of occupancy is also not easy too greatly, and being merely stored in a block can be more Quickly complete whole flow process;The level of encryption that identification information can effectively be improved is stored in multiple pieces.
In other embodiments of the application, the IC includes 64 blocks altogether, and number is respectively 0 ~ 63, and wherein m For block for storing encryption information, the encryption information is stored in 1 ~ 63 wherein in m block;Wherein n block unencryption, it is described One of them of identification information storage in n block;Identification information of the identification information of the IC card that will acquire with storage Before being matched, further includes: obtain the number i of the block of storage identification information, the number stored with before is compared;If compiling Number consistent, the identification information for the IC card that will acquire is matched with the identification information of storage;If number is inconsistent, give a warning Information.
Further, as shown in figure 3, the identification information of the IC card that will acquire is the same as the identification information progress stored Before matching, further includes: obtain the number i of the block of storage identification information, the number stored with before is compared;If number one It causes, the identification information for the IC card that will acquire is matched with the identification information of storage;If number is inconsistent, send a warning message.
Before first time is verified, it is not only stored with identification information, can also be stored with where identification information in systems Therefore the number of block can carry out pre-authentication by the number of match block, effective exclusive segment unauthorized card, or effectively Ground excludes the more inferior card of certain copy modes.
In other embodiments of the application, after the new identification information of the generation, further includes: by identification information It stores in a block j of IC card, stores the number j of the block.
Updated mark can be stored into another block, can be further improved the effect of anti-copying in this way.
The block i and block j belongs to n unencryption block, the i ≠ j.
Identification information storage before and after swiping the card can effectively improve anti-copying effect in different blocks.
In other embodiments of the application, as shown in figure 4, the number i of block where obtaining the identification information in IC card; The number stored with before is compared;If number is inconsistent, send a warning message;If number is consistent, the mark in IC card is obtained Know information, the identification information for the IC card that will acquire is matched with the identification information of storage;If matching is unsuccessful, letter is given a warning Breath;If successful match, new identification information is generated;By in a block j of identification information storage to IC card, the number of the block is stored J, the i ≠ j;Obtain the chip information of IC card;Authorized chip information is transferred, the chip information for the IC card that will acquire is same Authorized chip information is matched;If successful match, the information being verified is issued;If match cognization gives a warning letter Breath, prompts the IC card unauthorized.
In some embodiments of the present application, a kind of IC card encryption device, as shown in figure 5, include data obtaining module, With module, information generating module, information updating module, memory module;The function of the data obtaining module are as follows: obtain IC Identification information in card;The function of the matching module are as follows: identification information of the identification information for the IC card that will acquire with storage It is matched;If matching is unsuccessful, send a warning message;If successful match, the instruction for generating new identification information is issued;Institute The function for the information generating module stated are as follows: generate new identification information;The function of the information updating module are as follows: will be new In update of identification information to IC card, and the identification information updated storage;The data obtaining module is connected with matching module, The matching module is connected with information generating module, and the information generating module is connected with information updating module, described Memory module is connected with matching module with information updating module.
For realizing the encryption method of IC card, the device can quickly realize identification information reading, matching with again Write-in.
In other embodiments of the application, the IC card encryption device further include: authorization message matching module, institute The function for the authorization message matching module stated are as follows: transfer authorized chip information, the same quilt of the chip information for the IC card that will acquire The chip information of authorization is matched;If successful match, the information being verified is issued;If match cognization gives a warning letter Breath, prompts the IC card unauthorized;
The authorization message matching module is connected with matching module.
Chip information is obtained again after obtaining identification information, if chip information mismatches, can not also be encrypted;It can be effective The IC card for preventing a part of chip information from can not re-write is made into copy card.
In other embodiments of the application, the encryption device further includes that number information obtains module and number letter Matching module is ceased, the number information obtains the function of module are as follows: deposit together in the identification information of the IC card that will acquire Before the identification information of storage is matched, the number i of the block of storage identification information is obtained
The function of the number information matching module are as follows: the number that the number information that will acquire is stored with before is compared; If number is consistent, the identification information for the IC card that will acquire is matched with the identification information of storage;If number is inconsistent, issue Warning message.
The IC includes 64 blocks altogether, and number is respectively 0 ~ 63, and wherein m block is described for storing encryption information Encryption information is stored in 1 ~ 63 wherein in m block;Wherein n block unencryption, its in n block of the identification information storage In one;Before first time is verified, it is not only stored with identification information, the block that can also be stored in systems where identification information Number therefore can carry out pre-authentication by the number of match block, effective exclusive segment unauthorized card, or effectively Exclude the more inferior card of certain copy modes.
In other embodiments of the application, the encryption device further includes identification information distribution module, described The function of identification information distribution module are as follows: after the new identification information of the generation, by one of identification information storage to IC card In block j, the number j of the block is stored.
Updated mark can be stored into another block, can be further improved the effect of anti-copying in this way.
In other embodiments of the application, after identification information distribution module distributes new identification information: the block i Belong to n unencryption block, the i ≠ j with block j.
Identification information storage before and after swiping the card can effectively improve anti-copying effect in different blocks.
In other embodiments of the application, as shown in fig. 6, the number information obtains module with number information It is connected with module, number information matching module is connected with data obtaining module, and data obtaining module is connected with matching module, matching Module is connected with information generating module, and the information generating module is connected with identification information distribution module, the mark letter It ceases distribution module to connect with information updating module, the information updating module is connected with authorization message matching module, described Information updating module is connected with memory module, and the memory module obtains module, matching module and authorization letter with number information Cease matching module connection.
Connection encryption device according to figure 6, workflow are as follows: the volume of block where obtaining the identification information in IC card Number i;The number stored with before is compared;If number is inconsistent, send a warning message;If number is consistent, obtain in IC card Identification information, the identification information of the IC card that will acquire matched with the identification information of storage;If matching is unsuccessful, police is issued Accuse information;If successful match, new identification information is generated;By in a block j of identification information storage to IC card, the block is stored Number j, the i ≠ j;Obtain the chip information of IC card;Authorized chip information is transferred, the chip letter for the IC card that will acquire Breath is matched with authorized chip information;If successful match, the information being verified is issued;If match cognization, police is issued Information is accused, prompts the IC card unauthorized.
A kind of IC card ciphering terminal, including one or more processors;And storage device, for storing one or more Program;When one or more programs are executed by the one or more processors, so that the one or more Processor realizes IC card optimization method as described above.
For realizing the terminal of IC card encryption method.
A kind of IC card encryption storage medium, for storing one or more programs, for realizing method as described above.
The storage medium for storing the IC card encryption method, can be applied to other equipment.
Above-listed detailed description is illustrating for possible embodiments of the present invention, and above embodiments are not to limit this The scope of the patents of invention, all equivalence enforcements or change without departing from carried out by the present invention, is intended to be limited solely by the scope of the patents of this case.

Claims (10)

1. a kind of IC card encryption method characterized by comprising obtain the identification information in IC card;The IC card that will acquire Identification information is matched with the identification information of storage;If matching is unsuccessful, send a warning message;If successful match, generate New identification information;By in new update of identification information to IC card, and the identification information updated storage.
2. a kind of IC card encryption method according to claim 1, which is characterized in that the identification information for the IC card that will acquire is same After the identification information of storage is matched further include: if successful match, obtain the chip information of IC card;Transfer authorized core The chip information of piece information, the IC card that will acquire is matched with authorized chip information;If successful match, verifying is issued By information;If match cognization is sent a warning message, prompt the IC card unauthorized.
3. a kind of IC card encryption method according to claim 1, which is characterized in that the identification information storage is in IC card Unencryption sector in.
4. a kind of IC card encryption method according to claim 1, which is characterized in that the identification information storage is in IC card In any one or more blocks of not stored Encryption Algorithm.
5. a kind of IC card encryption method according to claim 4, which is characterized in that the IC card chip includes 64 altogether Block, number are respectively 0 ~ 63, and wherein for m block for storing encryption information, the encryption information is stored in the wherein m of block 1 ~ 63 In a block;Wherein n block unencryption, one of them of the identification information storage in n block;It is described to will acquire Before the identification information of IC card is matched with the identification information of storage, further includes: the number i of the block of storage identification information is obtained, The number stored with before is compared;If number is consistent, the identification information of the IC card that will acquire with storage identification information into Row matching;If number is inconsistent, send a warning message.
6. a kind of IC card encryption method according to claim 1, which is characterized in that the new identification information of the generation Afterwards, further includes: by a block j of identification information storage to IC card, store the number j of the block.
7. a kind of IC card encryption method according to claim 4 ~ 6, which is characterized in that the block i and block j belongs to n Unencryption block, the i ≠ j.
8. a kind of IC card encryption device, which is characterized in that including data obtaining module, matching module, information generating module, information Update module, memory module;The function of the data obtaining module are as follows: obtain the identification information in IC card;? Function with module are as follows: the identification information for the IC card that will acquire is matched with the identification information of storage;If matching is unsuccessful, hair Warning message out;If successful match, the instruction for generating new identification information is issued;The function of the information generating module are as follows: Generate new identification information;The function of the information updating module are as follows: by new update of identification information to IC card, and more The identification information newly stored;The data obtaining module is connected with matching module, and the matching module generates mould with information Block connection, the information generating module are connected with information updating module, the memory module with matching module and information more New module connection.
9. a kind of IC card ciphering terminal, which is characterized in that including one or more processors;And storage device, for storing One or more programs;When one or more programs are executed by the one or more processors, so that described One or more processors realize IC card encryption method as claimed in any one of claims 1 to 7.
10. a kind of IC card encrypts storage media, which is characterized in that for storing one or more programs, wanted for realizing such as right Method described in asking any one of 1 ~ 7.
CN201811326513.6A 2018-11-08 2018-11-08 IC card encryption method, device, terminal and storage medium Active CN109447653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811326513.6A CN109447653B (en) 2018-11-08 2018-11-08 IC card encryption method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811326513.6A CN109447653B (en) 2018-11-08 2018-11-08 IC card encryption method, device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN109447653A true CN109447653A (en) 2019-03-08
CN109447653B CN109447653B (en) 2021-12-28

Family

ID=65552523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811326513.6A Active CN109447653B (en) 2018-11-08 2018-11-08 IC card encryption method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN109447653B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112016336A (en) * 2020-08-19 2020-12-01 日立楼宇技术(广州)有限公司 Method, device, equipment and storage medium for detecting copy card
CN113808339A (en) * 2021-09-17 2021-12-17 中国银行股份有限公司 Self-service system and verification method of self-service equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040193818A1 (en) * 2003-03-31 2004-09-30 Fujitsu Limited Memory device, memory access limiting system, and memory access method
CN101377822A (en) * 2007-09-02 2009-03-04 黄长生 Copying-proof card system
CN106096475A (en) * 2016-06-03 2016-11-09 广州日滨科技发展有限公司 Card Reader treating method and apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040193818A1 (en) * 2003-03-31 2004-09-30 Fujitsu Limited Memory device, memory access limiting system, and memory access method
CN101377822A (en) * 2007-09-02 2009-03-04 黄长生 Copying-proof card system
CN106096475A (en) * 2016-06-03 2016-11-09 广州日滨科技发展有限公司 Card Reader treating method and apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112016336A (en) * 2020-08-19 2020-12-01 日立楼宇技术(广州)有限公司 Method, device, equipment and storage medium for detecting copy card
CN112016336B (en) * 2020-08-19 2024-01-02 日立楼宇技术(广州)有限公司 Method, device, equipment and storage medium for detecting copy card
CN113808339A (en) * 2021-09-17 2021-12-17 中国银行股份有限公司 Self-service system and verification method of self-service equipment

Also Published As

Publication number Publication date
CN109447653B (en) 2021-12-28

Similar Documents

Publication Publication Date Title
US6886753B2 (en) Dual-purpose portable card, a communication system, a communication method, a terminal apparatus, and a computer-readable record medium recording a program
CN103001773B (en) Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC)
US20140258132A1 (en) System and method for secure electronic transaction
CN105205508A (en) Self-service card issuing machine for intelligent card
CN101729502A (en) Method and system for distributing key
CN101595488A (en) Be used for content is tied to the method and apparatus of independent storage arrangement
CN103530785A (en) Double anti-counterfeiting system and method based on near field communication (NFC) function
WO2015154595A1 (en) One-time pad authentication system based on closed-loop authentication theory and internet
CN105405012A (en) Smart IC card and payment processing method
CN103297236A (en) User identity verification and authorization system
CN113450092A (en) Block chain network-based article safe and efficient transaction method, system and storage medium
CN109447653A (en) A kind of IC card encryption method, device, terminal and storage medium
CN101866411A (en) Security certification and encryption method and system of multi-application noncontact-type CPU card
CN108241880A (en) A kind of real-time card sending system
CN205015906U (en) Anti -fake verification system of electron certificate
CN207251631U (en) A kind of follow-on SIM card and mobile terminal and identification system
CN203104483U (en) Fingerprint authentication platform and NFC application terminal
KR100848791B1 (en) Tag data recording and obtaining method which security verification are capable, tag data recording and obtaining apparatus
CN102651079A (en) IC (integrated circuit) card management method occupying memory space for a short time and IC card management system
CN201946038U (en) Security certificate device of internet-banking remote payment based on dual-interface safety smart card
CN106855923A (en) A kind of electronic installation based on biological identification technology
CN104951823A (en) Composite card management method and system
CN211827307U (en) Double-encryption electronic tag
CN104954135A (en) Anti-copy anti-counterfeiting electronic tag authentication method
CN107645679B (en) Production method and system of card-free condition receiving system of set top box

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant