CN109447653B - IC card encryption method, device, terminal and storage medium - Google Patents

IC card encryption method, device, terminal and storage medium Download PDF

Info

Publication number
CN109447653B
CN109447653B CN201811326513.6A CN201811326513A CN109447653B CN 109447653 B CN109447653 B CN 109447653B CN 201811326513 A CN201811326513 A CN 201811326513A CN 109447653 B CN109447653 B CN 109447653B
Authority
CN
China
Prior art keywords
card
information
identification information
matching
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811326513.6A
Other languages
Chinese (zh)
Other versions
CN109447653A (en
Inventor
谢响环
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Qeazen Electronic Technology Co ltd
Original Assignee
Guangdong Qeazen Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Qeazen Electronic Technology Co ltd filed Critical Guangdong Qeazen Electronic Technology Co ltd
Priority to CN201811326513.6A priority Critical patent/CN109447653B/en
Publication of CN109447653A publication Critical patent/CN109447653A/en
Application granted granted Critical
Publication of CN109447653B publication Critical patent/CN109447653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of IC card encryption, and provides an IC card encryption method, an IC card encryption device, an IC card encryption terminal and a storage medium, which are used for solving the problem that an encrypted IC card is easy to be copied without authorization. The invention provides an IC card encryption method, an IC card encryption device, a terminal and a storage medium, wherein the IC card encryption device comprises the following steps: acquiring identification information in the IC card; matching the acquired identification information of the IC card with the stored identification information; if the matching is unsuccessful, warning information is sent out; if the matching is successful, generating new identification information; the new identification information is updated into the IC card, and the stored identification information is updated. The IC card is added with identification information, so that the card can be effectively prevented from being copied, and even if the card is copied, the copied card can not be used again as long as the original card user uses the card once; or after the copy card is used, the original card cannot be used again, so that the number of cards is still controllable.

Description

IC card encryption method, device, terminal and storage medium
Technical Field
The invention relates to the field of IC card encryption, in particular to an IC card encryption method, an IC card encryption device, a terminal and a storage medium.
Background
An IC Card (Integrated Circuit Card), also called Smart Card (Smart Card), Smart Card (Intelligent Card), Microcircuit Card (Microcircuit Card) or microchip Card, etc. A microelectronic chip is embedded into a card base conforming to the ISO 7816 standard to be made into a card form. The communication mode between the IC card and the reader/writer may be a contact type or a non-contact type. The IC card is classified into a contact type IC card, a noncontact type IC and a dual interface card (having both contact and noncontact type communication interfaces) according to the communication interface.
Because of the inherent advantages of information security, portability, relatively perfect standardization and the like, IC cards are increasingly used in the fields of identity authentication, banks, telecommunications, public transportation, parking lot management and the like, such as second-generation identity cards, electronic purses of banks, SIM cards of telecommunications mobile phones, bus cards and subway cards of public transportation, parking cards for collecting parking fees and the like, and all play an important role in daily life of people.
The existing encrypted IC card, especially the entrance guard card, is easily copied privately by a user through personal equipment, which results in difficult management, so how to effectively prevent the information in the card from being copied or effectively identify the copied card is a technical problem to be solved urgently in the field of IC card application.
Disclosure of Invention
The invention solves the technical problem that an encrypted IC card is easy to be copied without authorization, and provides an IC card encryption method, an IC card encryption device, a terminal and a storage medium.
In order to solve the technical problems, the technical scheme provided by the invention is as follows:
an IC card encryption method, device, terminal and storage medium, comprising: acquiring identification information in the IC card; matching the acquired identification information of the IC card with the stored identification information; if the matching is unsuccessful, sending out warning information, and if the matching is successful, generating new identification information; the new identification information is updated into the IC card, and the stored identification information is updated.
When a user swipes a card, the encrypted information in the card is not directly read, but the identification information in the card is firstly called, and the identification information can be decrypted if the identification information is successfully matched; after the card acquired through a regular channel passes the verification of the identification information, the system can regenerate a new identification information.
The IC card is added with identification information, so that the card can be effectively prevented from being copied, and even if the card is copied, the copied card can not be used again as long as the original card user uses the card once; or after the copy card is used, the original card cannot be used again, so that the number of cards is still controllable.
Preferably, matching the acquired identification information of the IC card with the stored identification information further includes: if the matching is successful, obtaining the chip information of the IC card; calling authorized chip information, and matching the obtained chip information of the IC card with the authorized chip information; if the matching is successful, sending information that the verification is passed; if the IC card is matched and identified, warning information is sent out to prompt that the IC card is not authorized. Acquiring chip information after acquiring the identification information, wherein if the chip information is not matched, encryption cannot be performed; an IC card in which a part of chip information cannot be rewritten can be effectively prevented from being made into a copy card.
Preferably, the identification information is stored in an unencrypted sector of the IC card. The 0 th block of the 0 sector of the IC card cannot be written in general, and the other blocks store encrypted information in part and unencrypted information in part, and identification information is stored in the unencrypted sector.
Preferably, the identification information is stored in any one or more blocks of the IC card that do not store the encryption algorithm. The content of the identification information is not too much, the occupied storage capacity is not too large, and the whole process can be completed more quickly by only storing the identification information in one block; the encryption degree of the identification information can be effectively improved by storing the identification information in a plurality of blocks.
Preferably, the IC comprises 64 blocks with serial numbers of 0-63, wherein m blocks are used for storing encryption information, and the encryption information is stored in 1-63 m blocks; wherein n blocks are unencrypted, said identification information being stored in one of the n blocks; before matching the acquired identification information of the IC card with the stored identification information, the method further comprises the following steps: acquiring the number i of the block storing the identification information, and comparing the number i with the number stored previously; if the serial numbers are consistent, matching the acquired identification information of the IC card with the stored identification information; if the numbers are not consistent, warning information is sent out. Before the first verification, the identification information is stored, and the serial number of the block where the identification information is located can be stored in the system, so that the pre-verification can be performed by matching the serial numbers of the blocks, partial unauthorized cards can be effectively eliminated, or certain cards with lower copying modes can be effectively eliminated.
Preferably, after generating the new identification information, the method further includes: the identification information is stored in a block j of the IC card, and the number j of the block is stored. The updated identification can be stored in another block, which can further improve the copy protection effect.
Preferably, the block i and the block j belong to n unencrypted blocks, and i ≠ j. The identification information before and after swiping the card is stored in different blocks, so that the anti-copy effect can be effectively improved.
An IC card encryption device comprises an information acquisition module, a matching module, an information generation module, an information updating module and a storage module; the information acquisition module has the functions of: acquiring identification information in the IC card; the matching module has the functions of: matching the acquired identification information of the IC card with the stored identification information; if the matching is unsuccessful, warning information is sent out; if the matching is successful, sending an instruction for generating new identification information; the information generation module has the functions of: generating new identification information; the information updating module has the functions of: updating the new identification information into the IC card and updating the stored identification information; the information acquisition module is connected with the matching module, the matching module is connected with the information generation module, the information generation module is connected with the information updating module, and the storage module is connected with the matching module and the information updating module. The device can rapidly realize reading, matching and rewriting of the identification information.
An IC card encryption terminal includes one or more processors; and storage means for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the IC card encryption method. A terminal for implementing an IC card encryption method.
An IC card encrypted storage medium storing one or more programs for implementing the method of any one of claims 1 to 7. The storage medium storing the IC card encryption method can be applied to other devices.
Compared with the prior art, the invention has the beneficial effects that: the IC card is added with identification information, so that the card can be effectively prevented from being copied, and even if the card is copied, the copied card can not be used again as long as the original card user uses the card once; or after the copy card is used, the original card cannot be used again, so that the number of cards is still controllable.
In the prior art, only encrypted information is generally stored in an IC card, and only the encrypted information is checked when the IC card is swiped, so that the encrypted information can be copied; the IC card of the application also stores identification information, the identification information is checked in advance before the encryption information is checked, and then a new identification information is updated, the identification information of the mode is dynamic, the size of the identification information is small, and the time for card swiping verification cannot be increased when the identification information is verified or updated, so that the technical scheme of the application can effectively prevent the IC from being copied privately and the use experience of a user cannot be changed.
Drawings
Fig. 1 is a flow chart illustrating an IC card encryption method.
Fig. 2 is a flowchart illustrating another embodiment of an IC card encryption method.
Fig. 3 is a flowchart illustrating another embodiment of an IC card encryption method.
Fig. 4 is a flowchart illustrating another embodiment of an IC card encryption method.
Fig. 5 is a flowchart illustrating an embodiment of an IC card encryption apparatus.
Fig. 6 is a flowchart illustrating another embodiment of an IC card encryption apparatus.
Detailed Description
The following examples are further illustrative of the present invention and are not intended to be limiting thereof.
In some embodiments of the present application, an IC card encryption method, as shown in fig. 1, includes: acquiring identification information in the IC card; matching the acquired identification information of the IC card with the stored identification information; if the matching is unsuccessful, sending out warning information, and if the matching is successful, generating new identification information; the new identification information is updated into the IC card, and the stored identification information is updated.
When a user swipes a card, the encrypted information in the card is not directly read, but the identification information in the card is firstly called, and the identification information can be decrypted if the identification information is successfully matched; after the card acquired through a regular channel passes the verification of the identification information, the system can regenerate a new identification information.
The IC card is added with identification information, so that the card can be effectively prevented from being copied, and even if the card is copied, the copied card can not be used again as long as the original card user uses the card once; or after the copy card is used, the original card cannot be used again, so that the number of cards is still controllable.
In other embodiments of the present application, as shown in fig. 2, matching the acquired identification information of the IC card with the stored identification information further includes: if the matching is successful, obtaining the chip information of the IC card; calling authorized chip information, and matching the obtained chip information of the IC card with the authorized chip information; if the matching is successful, sending information that the verification is passed; if the IC card is matched and identified, warning information is sent out to prompt that the IC card is not authorized.
Acquiring chip information after acquiring the identification information, wherein if the chip information is not matched, encryption cannot be performed; an IC card in which a part of chip information cannot be rewritten can be effectively prevented from being made into a copy card.
In other embodiments of the present application, the identification information is stored in an unencrypted sector of the IC card.
The 0 th block of the 0 sector of the IC card cannot be written in general, and the other blocks store encrypted information in part and unencrypted information in part, and identification information is stored in the unencrypted sector.
In other embodiments of the present application, the identification information is stored in any one or more blocks of the IC card that do not store the encryption algorithm.
The content of the identification information is not too much, the occupied storage capacity is not too large, and the whole process can be completed more quickly by only storing the identification information in one block; the encryption degree of the identification information can be effectively improved by storing the identification information in a plurality of blocks.
In other embodiments of the present application, the IC includes 64 blocks, which are numbered 0 to 63, wherein m blocks are used for storing the encryption information, and the encryption information is stored in 1 to 63 of the m blocks; wherein n blocks are unencrypted, said identification information being stored in one of the n blocks; before matching the acquired identification information of the IC card with the stored identification information, the method further comprises the following steps: acquiring the number i of the block storing the identification information, and comparing the number i with the number stored previously; if the serial numbers are consistent, matching the acquired identification information of the IC card with the stored identification information; if the numbers are not consistent, warning information is sent out.
Further, as shown in fig. 3, before matching the acquired identification information of the IC card with the stored identification information, the method further includes: acquiring the number i of the block storing the identification information, and comparing the number i with the number stored previously; if the serial numbers are consistent, matching the acquired identification information of the IC card with the stored identification information; if the numbers are not consistent, warning information is sent out.
Before the first verification, the identification information is stored, and the serial number of the block where the identification information is located can be stored in the system, so that the pre-verification can be performed by matching the serial numbers of the blocks, partial unauthorized cards can be effectively eliminated, or certain cards with lower copying modes can be effectively eliminated.
In other embodiments of the present application, after generating the new identification information, the method further includes: the identification information is stored in a block j of the IC card, and the number j of the block is stored.
The updated identification can be stored in another block, which can further improve the copy protection effect.
And the block i and the block j belong to n unencrypted blocks, and i is not equal to j.
The identification information before and after swiping the card is stored in different blocks, so that the anti-copy effect can be effectively improved.
In other embodiments of the present application, as shown in fig. 4, a number i of a block where identification information in an IC card is located is obtained; comparing with the number stored before; if the serial numbers are not consistent, warning information is sent out; if the serial numbers are consistent, acquiring identification information in the IC card, and matching the acquired identification information of the IC card with the stored identification information; if the matching is unsuccessful, warning information is sent out; if the matching is successful, generating new identification information; storing identification information into a block j of the IC card, and storing the serial number j of the block, wherein i is not equal to j; acquiring chip information of the IC card; calling authorized chip information, and matching the obtained chip information of the IC card with the authorized chip information; if the matching is successful, sending information that the verification is passed; if the IC card is matched and identified, warning information is sent out to prompt that the IC card is not authorized.
In some embodiments of the present application, an IC card encryption apparatus, as shown in fig. 5, includes an information acquisition module, a matching module, an information generation module, an information update module, and a storage module; the information acquisition module has the functions of: acquiring identification information in the IC card; the matching module has the functions of: matching the acquired identification information of the IC card with the stored identification information; if the matching is unsuccessful, warning information is sent out; if the matching is successful, sending an instruction for generating new identification information; the information generation module has the functions of: generating new identification information; the information updating module has the functions of: updating the new identification information into the IC card and updating the stored identification information; the information acquisition module is connected with the matching module, the matching module is connected with the information generation module, the information generation module is connected with the information updating module, and the storage module is connected with the matching module and the information updating module.
The device can rapidly realize reading, matching and rewriting of the identification information.
In other embodiments of the present application, the IC card encryption apparatus further includes: the authorization information matching module has the functions of: calling authorized chip information, and matching the obtained chip information of the IC card with the authorized chip information; if the matching is successful, sending information that the verification is passed; if the IC card is matched and identified, warning information is sent out to prompt that the IC card is not authorized;
the authorization information matching module is connected with the matching module.
Acquiring chip information after acquiring the identification information, wherein if the chip information is not matched, encryption cannot be performed; an IC card in which a part of chip information cannot be rewritten can be effectively prevented from being made into a copy card.
In other embodiments of the present application, the encryption apparatus further includes a serial number information obtaining module and a serial number information matching module, where the serial number information obtaining module has the functions of: before the obtained identification information of the IC card is matched with the stored identification information, the number i of the block storing the identification information is obtained
The function of the number information matching module is as follows: comparing the acquired number information with the number stored previously; if the serial numbers are consistent, matching the acquired identification information of the IC card with the stored identification information; if the numbers are not consistent, warning information is sent out.
The IC comprises 64 blocks in total, and the serial numbers of the blocks are 0-63 respectively, wherein m blocks are used for storing encryption information, and the encryption information is stored in 1-63 m blocks; wherein n blocks are unencrypted, said identification information being stored in one of the n blocks; before the first verification, the identification information is stored, and the serial number of the block where the identification information is located can be stored in the system, so that the pre-verification can be performed by matching the serial numbers of the blocks, partial unauthorized cards can be effectively eliminated, or certain cards with lower copying modes can be effectively eliminated.
In other embodiments of the present application, the encryption apparatus further includes an identification information distribution module, and the identification information distribution module functions as: after generating new identification information, storing the identification information in a block j of the IC card, and storing the number j of the block.
The updated identification can be stored in another block, which can further improve the copy protection effect.
In other embodiments of the present application, after the identification information allocating module allocates the new identification information: and the block i and the block j belong to n unencrypted blocks, and i is not equal to j.
The identification information before and after swiping the card is stored in different blocks, so that the anti-copy effect can be effectively improved.
In other embodiments of the present application, as shown in fig. 6, the number information obtaining module is connected to the number information matching module, the number information matching module is connected to the information obtaining module, the information obtaining module is connected to the matching module, the matching module is connected to the information generating module, the information generating module is connected to the identification information distributing module, the identification information distributing module is connected to the information updating module, the information updating module is connected to the authorization information matching module, the information updating module is connected to the storage module, and the storage module is connected to the number information obtaining module, the matching module and the authorization information matching module.
According to the connection encryption device shown in fig. 6, the work flow is as follows: acquiring the serial number i of a block where identification information in the IC card is located; comparing with the number stored before; if the serial numbers are not consistent, warning information is sent out; if the serial numbers are consistent, acquiring identification information in the IC card, and matching the acquired identification information of the IC card with the stored identification information; if the matching is unsuccessful, warning information is sent out; if the matching is successful, generating new identification information; storing identification information into a block j of the IC card, and storing the serial number j of the block, wherein i is not equal to j; acquiring chip information of the IC card; calling authorized chip information, and matching the obtained chip information of the IC card with the authorized chip information; if the matching is successful, sending information that the verification is passed; if the IC card is matched and identified, warning information is sent out to prompt that the IC card is not authorized.
An IC card encryption terminal includes one or more processors; and storage means for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the IC card optimization method as described above.
A terminal for implementing an IC card encryption method.
An IC card encrypted storage medium for storing one or more programs for implementing the method as described above.
The storage medium storing the IC card encryption method can be applied to other devices.
The above detailed description is specific to possible embodiments of the present invention, and the above embodiments are not intended to limit the scope of the present invention, and all equivalent implementations or modifications that do not depart from the scope of the present invention should be included in the present claims.

Claims (8)

1. An IC card encryption method, comprising:
acquiring identification information in the IC card;
the identification information is stored in any one or more blocks of the IC card which do not store the encryption algorithm;
acquiring the number i of the block storing the identification information, and comparing the number i with the number stored previously;
if the serial numbers are not consistent, warning information is sent out;
if the serial numbers are consistent with each other,
matching the acquired identification information of the IC card with the stored identification information;
if the matching is unsuccessful, warning information is sent out;
if the matching is successful, generating new identification information;
updating the new identification information into the IC card, and updating the stored identification information: the IC card comprises 64 blocks, the serial numbers of the 64 blocks are respectively 0-63, wherein m blocks are used for storing encryption information, and the encryption information is stored in 1-63 m blocks; wherein the n blocks are unencrypted, said identification information being stored in one of the n blocks.
2. The IC card encryption method according to claim 1, wherein matching the acquired identification information of the IC card with the stored identification information further comprises:
if the matching is successful, obtaining the chip information of the IC card;
calling authorized chip information, and matching the obtained chip information of the IC card with the authorized chip information;
if the matching is successful, sending information that the verification is passed;
if the IC card is matched and identified, warning information is sent out to prompt that the IC card is not authorized.
3. An IC card encryption method according to claim 1, wherein said identification information is stored in an unencrypted sector of the IC card.
4. The IC card encryption method according to claim 1, further comprising, after generating the new identification information:
the identification information is stored in a block j of the IC card, and the number j of the block is stored.
5. An IC card encryption method according to claim 4, characterized in that said block i and block j belong to n unencrypted blocks, said i ≠ j.
6. An IC card encryption device is characterized by comprising an information acquisition module, a matching module, an information generation module, an information updating module, a storage module, a serial number information acquisition module and a serial number information matching module;
the information acquisition module has the functions of: acquiring identification information in the IC card;
the matching module has the functions of: matching the acquired identification information of the IC card with the stored identification information; if the matching is unsuccessful, warning information is sent out; if the matching is successful, sending an instruction for generating new identification information;
the information generation module has the functions of: generating new identification information;
the information updating module has the functions of: updating the new identification information into the IC card and updating the stored identification information;
the information acquisition module is connected with the matching module, the matching module is connected with the information generation module, the information generation module is connected with the information updating module, and the storage module is connected with the matching module and the information updating module;
the function of the number information acquisition module is as follows: before matching the obtained identification information of the IC card with the stored identification information, obtaining the number i of a block storing the identification information;
the function of the number information matching module is as follows: comparing the acquired number information with the number stored previously;
if the serial numbers are consistent, matching the acquired identification information of the IC card with the stored identification information;
if the serial numbers are not consistent, warning information is sent out;
the IC comprises 64 blocks in total, and the serial numbers of the blocks are 0-63 respectively, wherein m blocks are used for storing encryption information, and the encryption information is stored in 1-63 m blocks; wherein the n blocks are unencrypted, said identification information being stored in one of the n blocks.
7. An IC card encryption terminal comprising one or more processors; and storage means for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the IC card encryption method according to any one of claims 1 to 5.
8. An IC card encrypted storage medium storing one or more programs for implementing the method of any one of claims 1 to 5.
CN201811326513.6A 2018-11-08 2018-11-08 IC card encryption method, device, terminal and storage medium Active CN109447653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811326513.6A CN109447653B (en) 2018-11-08 2018-11-08 IC card encryption method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811326513.6A CN109447653B (en) 2018-11-08 2018-11-08 IC card encryption method, device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN109447653A CN109447653A (en) 2019-03-08
CN109447653B true CN109447653B (en) 2021-12-28

Family

ID=65552523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811326513.6A Active CN109447653B (en) 2018-11-08 2018-11-08 IC card encryption method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN109447653B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112016336B (en) * 2020-08-19 2024-01-02 日立楼宇技术(广州)有限公司 Method, device, equipment and storage medium for detecting copy card
CN113808339A (en) * 2021-09-17 2021-12-17 中国银行股份有限公司 Self-service system and verification method of self-service equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101377822A (en) * 2007-09-02 2009-03-04 黄长生 Copying-proof card system
CN106096475A (en) * 2016-06-03 2016-11-09 广州日滨科技发展有限公司 Card Reader treating method and apparatus

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004303092A (en) * 2003-03-31 2004-10-28 Fujitsu Ltd Memory device, memory access restriction system and memory access method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101377822A (en) * 2007-09-02 2009-03-04 黄长生 Copying-proof card system
CN106096475A (en) * 2016-06-03 2016-11-09 广州日滨科技发展有限公司 Card Reader treating method and apparatus

Also Published As

Publication number Publication date
CN109447653A (en) 2019-03-08

Similar Documents

Publication Publication Date Title
CN101154251B (en) Information privacy management system based on radio frequency recognition and method thereof
CN100438409C (en) Intelligent card with financial-transaction message processing ability and its method
US7287165B2 (en) IC card, portable terminal, and access control method
KR101330867B1 (en) Authentication method for payment device
WO2016160816A1 (en) Smart data cards that enable the performance of various functions upon activation/authentication by a user's fingerprint, oncard pin number entry, and/or by facial recognition of the user, or by facial recognition of a user alone, including an automated changing security number that is displayed on a screen on a card's surface following an authenticated biometric match
CN102291717B (en) Data protection method and terminal
EP2048594A1 (en) Method for communication, communication device and secure processor
CN103955975A (en) Cellphone-based dynamic two-dimension code access control system
CN101520854B (en) Smart memory card, data safety control system and method thereof
CN109447653B (en) IC card encryption method, device, terminal and storage medium
CN103345601A (en) Identity recording and verification system based on radio frequency
CN101990029A (en) Mobile interactive system and application method and related equipment thereof
CN103297236B (en) Subscriber authentication authoring system
CN103812649A (en) Method and system for safety access control of machine-card interface, and handset terminal
CN102867157A (en) Mobile terminal and data protecting method
EP2048591A1 (en) Method for communication, communication device and secure processor
US20130262879A1 (en) Secure type storage device and information security system
CN109753837B (en) Anti-copying and anti-tampering method for IC card
CN1370311A (en) Card memory appts.
CN109447029B (en) Electronic identity card photo generation system and method
CN102651079B (en) IC (integrated circuit) card management method occupying memory space for a short time and IC card management system
CN104462893A (en) Method and device for managing multiple SE modules
CN103336977A (en) Vehicle electronic information card safety protection system and method
CN102184317A (en) Resident medical data mobile storage device and implementation method thereof
CN104462926A (en) Intelligent card identity recognition method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant