CN110808949B - Campus one-card system and method thereof - Google Patents
Campus one-card system and method thereof Download PDFInfo
- Publication number
- CN110808949B CN110808949B CN201910903114.XA CN201910903114A CN110808949B CN 110808949 B CN110808949 B CN 110808949B CN 201910903114 A CN201910903114 A CN 201910903114A CN 110808949 B CN110808949 B CN 110808949B
- Authority
- CN
- China
- Prior art keywords
- card
- data
- user
- mobile phone
- data transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/0772—Physical layout of the record carrier
- G06K19/07732—Physical layout of the record carrier the record carrier having a housing or construction similar to well-known portable memory devices, such as SD cards, USB or memory sticks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a campus one-card system and a method thereof.A campus one-card is provided with a data transmission interface and is matched with a corresponding external detachable data transmission interface, a data transmission line and a user mobile phone for use, so that data in a one-card chip can be backed up to a cloud in advance in an encryption manner; once the one-card is lost, after logging in a cloud terminal in a mobile phone authentication mode, transmitting corresponding encrypted data from the cloud terminal to a new blank one-card chip, and quickly completing the completion of the one-card completion; meanwhile, the campus card is also provided with a timing updating module, and the campus card is connected with a mobile phone terminal of a user through a corresponding data transmission interface and can perform timing updating setting on the card system; once the card cannot be updated within the preset time, the card automatically fails, and the phenomenon of falsely picking and stealing after the card is lost or stolen can be effectively prevented.
Description
Technical Field
The invention relates to the technical field of all-purpose card devices, in particular to a campus all-purpose card system and a campus all-purpose card method.
Background
The one-card is to realize intelligent management of different functions on the same card, and is essentially a set of special information management system consisting of cards, card reading equipment and management software. The core content of the method is to utilize a specific physical medium, namely a card, to realize the standardization and automation of information resource management from the generation, collection, transmission to the summary analysis of business data.
With the continuous enhancement of the modernization direction awareness of school management, computer management systems based on card application have become increasingly popular, and it is common for students to hold traditional multiple cards and different certificates. However, with the development of the management function of various cards, due to the limitation of the traditional card function, the students often need to be issued with multiple cards to meet the management needs, such as student cards, book cards, medical history cards, chest cards, dining consumption cards, boarding cards, etc., which not only increases the management cost, but also increases the difficulty for each student to manage their own cards, and sometimes even "cards are mostly affected".
In order to solve the problems, the smart campus card can be used for completing various functions through one card. For example, a smart campus one-card system proposed in chinese patent application CN201910169341.4 combines with a school smart campus cloud platform, and integrates with systems of various schools and departments to get through an information barrier, thereby realizing campus card functions covering various aspects of school life, meeting requirements of school management and services more, facilitating school management, reducing school management cost, and enabling students to pass through the campus conveniently. However, although the convenience of the user is provided by one card, on one hand, the more functions of the card, the more supporting devices are required, and the popularization cost is increased. On the other hand, the risk to the user is also increased, for example, in case a card is lost or stolen, the user is almost tricky.
In view of this, the chinese patent application with application number CN201810997515.1 proposes a campus card device for preventing from dropping and losing. The Chinese invention patent application publication with publication number CN108985428A discloses an anti-theft campus card-through device, which can alarm in a buzzer or vibration mode when an existing card-through device is far away from a card holder by adding a distance sensor and the buzzer in a card-through system, so as to inform the card holder of the situation that the card is far away from the card holder in time. However, this type of alarm or notification can only be effected when the user is aware of it, and in special cases, such as where the card is placed deep inside a drawer or in an inner layer of a book or is inadvertently dropped into a corner, the alarm or notification is not useful. At the moment, once the card is lost, the user not only suffers possible property loss, but also needs to wait for a long time for the user to report the loss and rework because the conventional one-card is specially customized, and great inconvenience is brought to learning and life.
In view of the above, the prior art is obviously inconvenient and disadvantageous in practical use, and needs to be improved.
Disclosure of Invention
In order to solve the technical problem, the invention provides a campus card with a data transmission interface and a using method thereof. Compared with the traditional one-card mentioned in the prior art, the campus one-card provided by the invention can be used for backing up data in the one-card chip to the cloud in advance in an encryption manner by being provided with the data transmission interface. Once the all-purpose card is lost, after the all-purpose card logs in the cloud in a mobile phone authentication mode, corresponding encrypted data are transmitted from the cloud to a new all-purpose card chip, and the completion of the all-purpose card can be completed quickly. Meanwhile, the campus card provided by the invention is also provided with a timing updating module (updating timer), and the campus card can be connected with a mobile phone terminal of a user through a corresponding data transmission interface to perform timing updating setting on the card system. Once the authorized user cannot update the card after the preset time, the card automatically fails, and the phenomenon of falsely claiming and stealing after the card is lost or stolen can be effectively prevented.
In one aspect of the invention, a campus card system is provided. The campus card system may include a campus card device equipped with a data transmission interface. In some examples, a campus card device includes: the data transmission interface card slot is arranged at the first edge of the shell of the all-purpose card device; the data storage chip is arranged on the inner side of the second edge of the shell of the all-purpose card device; and a detachable data transmission interface.
In some examples, the data transmission interface includes a first upper surface layer, a second lower surface layer, and an interface layer connecting the first upper surface layer and the second lower surface layer. The inner sides of the first upper surface layer and the second lower surface layer are respectively provided with a data communication line connected to the interface layer, and one end of the first upper surface layer is connected with one end of the second lower surface layer through the interface layer, so that a hollow structure is formed between the first upper surface layer and the second lower surface layer. Through the hollow structure, the data transmission interface is detachably butted to the data transmission interface clamping groove of the all-purpose card device. Through the arrangement, the data stored in the data storage chip of the all-purpose card can be acquired through the external detachable data transmission interface on the basis of not changing the structure of the all-purpose card.
In the invention, the data storage chip is an anti-disassembly Internet of things chip, and the anti-disassembly Internet of things chip is failed if the anti-disassembly Internet of things chip is directly installed again after being assembled successfully for the first time. And the mobile terminal cannot be used unless the mobile terminal is connected to the authenticated mobile terminal for authentication through the data line connected with the interface layer. Through the arrangement, the problems of impersonation and embezzlement after the all-purpose card is lost can be prevented, and the benefit of a user is protected to the maximum extent; meanwhile, the user can conveniently recover the data in time after the card is lost carelessly or is reported to be lost, and the card is not required to be reproduced for a long time.
In some examples, the first edge of the housing of the campus card-through device of the present invention is provided with an external memory card slot inside, for embedding an external memory data card with a data storage function, such as an expandable general data memory card. Therefore, the campus card can be used as a mobile data storage device, similar to a U disk and a flash memory device. The data storage requirement of the campus user is considered, and the arrangement can improve the enthusiasm of the user for using the all-purpose card; meanwhile, due to the fact that the card is actively used all the time, the loss probability of the card is reduced.
It is worth pointing out that the external memory card slot is arranged inside the first edge of the shell because a data transmission interface card slot is arranged on the first edge of the shell of the one-card device, and at least one data memory chip is arranged inside the second edge of the shell of the one-card device. The first and second edges may be opposite or may be adjacent. Therefore, the data stored in the built-in external memory data card with the data storage function of the one-card can be acquired through the external detachable data transmission interface. Similarly, data can be transmitted to the cloud backup, and even if the one-card is lost, the data cannot be lost.
10. The second aspect of the invention discloses a use method of the campus card. The campus card is matched with a corresponding external detachable data transmission interface, a corresponding data transmission line and a corresponding user mobile phone for use. The method may include:
s1: after the campus card-through device is applied for the first time, connecting the hollow structure of the data transmission interface to a data transmission interface card slot at the first edge of the shell of the card-through device, connecting one end of a data transmission line to an interface layer of the data transmission interface, and connecting the other end of the data transmission line to a mobile phone of a user;
s2: comparing the authentication information of the mobile phone of the user with the user authentication information which is acquired through the data transmission line and stored in the data storage chip of the one-card-through device, and entering the next step if the authentication information of the mobile phone of the user is consistent with the user authentication information stored in the data storage chip of the one-card-through device; otherwise, prompting that the authentication information of the mobile phone of the user is wrong and cannot be connected, and exiting the method;
s3: backing up data information stored in the data storage chip of the one-card-through device and/or data information stored in an external storage data card to a cloud end through the mobile phone of the user or to a terminal local storage space of the mobile phone of the user; and
s4: judging whether the current time is close to a preset updating time period of the all-purpose card device, if so, updating the all-purpose card device through the mobile phone of the user, and resetting an updating timer of the all-purpose card device.
In some examples, the data information stored in the data storage chip of the one-card can be divided into at least two parts. And part of the data information stored in the data storage chip is user authentication information. The part of information can be basic personal information of a user of the all-purpose card device, and comprises information such as names, mobile phone numbers, school numbers, passwords and the like. This information is stored in encrypted form as a separate part in the data storage chip. Once the one-card and the mobile phone are detected to be in a data connection state, the encrypted information is transmitted to the mobile phone terminal and is compared with the mobile phone authentication information input by the current mobile phone user. It is noted that in this process, the user authentication information stored as a separate part in the data storage chip in encrypted form is not visible to the current handset user. The comparison process is carried out in the background by the system. Once the mobile phone receives the encrypted information, the mobile phone user is prompted to input corresponding mobile phone authentication information, and then the comparison process is started. And only after the current user inputs correct mobile phone authentication information and the comparison is passed, the data in the card can be continuously read, otherwise, the connection is terminated.
In some examples, the one-card device further comprises an update timer for setting an update time period of the one-card. For example, the one-card system can be updated and set at regular time, and once the one-card system cannot be updated after the preset time is exceeded, the one-card system automatically fails, so that the phenomenon of falsely picking and stealing after the one-card system is lost or stolen can be effectively prevented. It should be noted that the update operation can only be performed by the user himself, and the update time period can also be adjusted by the user according to the time. Therefore, once the all-purpose card is not used for a long time, the all-purpose card is automatically in a failure state. And not used for a long time, there may be various reasons, such as the user leaves the school on long vacation, but leaves the card in the dormitory; or the card is lost. At the moment, the card automatically fails because the card is not updated for a long time; once the user needs to start using, only the card needs to be activated again, the card data is acquired by connecting the mobile phone with the data line and the card can be used only after the authentication is successful, and the safety is effectively guaranteed. In addition, the arrangement is particularly convenient for the situation that the user finds out after the card is lost and the card is busy. Of course, according to the technical scheme of the application, the all-purpose card can be directly made up without losing the all-purpose card device, and the following method is specifically referred to.
As a further innovation of the invention, the method can also process the condition that the card is added after being lost, and the method comprises the following steps:
b1: after the one-card is applied again, connecting the hollow structure of the data transmission interface to a data transmission interface card slot at the first edge of the shell of the one-card device, connecting one end of the data transmission line to an interface layer of the data transmission interface, and connecting the other end of the data transmission line to a mobile phone of a user;
b2: judging whether the mobile phone of the user receives the prompt message within a preset time period, and if not, entering the next step; otherwise, quitting;
in the reissuing method, the one-card which is applied for again is an empty card, and no data is contained in the card, so that after the empty card is connected with the mobile phone, no data can be transmitted to the mobile phone, and no prompt exists; if the prompt is given, the card is not an empty card;
combining the previous method of first claiming a card, if the card is not an empty card, after the mobile phone is connected, once the one-card and the mobile phone are detected to be in a data connection state, the encrypted information is transmitted to the mobile phone terminal, and the encrypted information is compared with the mobile phone authentication information input by the current mobile phone user, namely once the mobile phone receives the encrypted information, the current mobile phone user is prompted to input the corresponding mobile phone authentication information, so that the comparison process is started;
therefore, the step ensures that the newly repaired card is a blank card of the new card;
b3: transmitting the one-card data stored in the local storage space of the mobile phone to the one-card storage space through a data line; or, downloading the data of the one-card through the cloud and then transmitting the data to the storage space of the one-card.
Therefore, by adopting the complementary processing method, after the user loses the card, the complementary processing process of one card can be quickly completed only by applying a blank card without waiting.
Meanwhile, even if the original lost card is found back after the card is newly handled, the user does not need to worry about repetition because only the original card needs to be left unused and is not updated.
The production and manufacture of the blank card can be realized through a customized production line, and the large-scale production is facilitated, so that the one-card system can be popularized on a large scale.
Certainly, the innovation point of the invention is that when the one-card data stored in the cloud or the mobile phone storage space is transmitted to the one-card storage space, the one-card data is stored in a storage mode suitable for a one-card scheme, and the innovation point includes that:
(1) the user authentication information in the one-card data is separately stored and encrypted, so that after storage, once the one-card and the mobile phone are detected to be in a data connection state, the encrypted information is transmitted to the mobile phone terminal;
(2) and storing other data except the user authentication information in the one-card separately, so that the data can be transmitted only after the user mobile phone authentication information is matched with the user authentication information after the data is stored.
In summary, the one-card device and the use method thereof provided by the invention completely change the use mode of the traditional one-card in the prior art, so that a user can not worry about the problem that the card is lost or is not used for a long time, and can not endure long-time rework waiting after the card is lost. According to the technical scheme, the campus card is provided with the data transmission interface, and the campus card can be matched with the corresponding external detachable data transmission interface, the corresponding data transmission line and the corresponding user mobile phone for use, so that data in the card chip can be backed up to the cloud in advance in an encryption mode; once the one-card is lost, after logging in the cloud in a mobile phone authentication mode, transmitting corresponding encrypted data from the cloud to a new one-card chip, and quickly completing the completion of the one-card completion; meanwhile, the campus card is also provided with a timing updating module, and the campus card is connected with a mobile phone terminal of a user through a corresponding data transmission interface and can perform timing updating setting on the card system; once the card cannot be updated within the preset time, the card automatically fails, and the phenomenon of falsely picking and stealing after the card is lost or stolen can be effectively prevented.
Further advantages of the present invention will be further apparent from the detailed description of the preferred embodiments in conjunction with the drawings.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a structural diagram of a campus card device according to an embodiment of the present invention
FIG. 2 is a perspective view of a campus card device according to an embodiment of the present invention
FIG. 3 is a perspective view of a data interface of a campus card device according to an embodiment of the present invention
FIG. 4 is a flowchart of a method for using the campus card of the present invention
FIG. 5 is a flow chart of a method for providing a campus card service according to the present invention
DETAILED DESCRIPTION OF EMBODIMENT (S) OF INVENTION
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
Referring to fig. 1, a campus card-through device (1) comprises at least one data transmission interface card slot (3) disposed at a first edge (21) of a housing (2) of the card-through device, and at least one data storage chip (4) disposed inside a second edge (22) of the housing (2) of the card-through device;
wherein the first edge (21) and the second edge (22) are different edges of the all-purpose card shell in opposite positions. By the configuration, the subsequent separate storage of the data of the one-card is safer and more operable.
Further referring to fig. 2, the data transmission interface card slot (3) is a card slot formed by a moderate inward recess of the opened first edge; in fig. 2, only the inward recessed portion of the upper surface of the one-card is shown, and in fact, the inward recessed portion is also provided at the corresponding position on the lower surface of the one-card, and the two recessed portions together form the data transmission interface card slot (3), so as to facilitate the direct insertion of the data interface, as shown by the arrow in fig. 1.
It should be noted that, in fig. 2, the thickness of the one-card is shown enlarged for the display.
Referring to fig. 4, the campus card device is further configured with a detachable data transmission interface (5), where the data transmission interface (5) includes a first upper surface layer (51), a second lower surface layer (52), and an interface layer (53) connecting the first upper surface layer and the second lower surface layer; the inner sides of the first upper surface layer (51) and the second lower surface layer (52) are respectively provided with a data communication line connected to the interface layer; one end (511) of the first upper surface layer (51) and one end (521) of the second lower surface layer (52) are connected through the interface layer (53), so that a hollow structure (54) is formed between the first upper surface layer (51) and the second lower surface layer (52), and the data transmission interface (5) can be detachably butted to the data transmission interface card slot (3) of the all-purpose card device through the hollow structure (54);
through the arrangement, the data stored in the data storage chip of the one-card can be acquired through the external detachable data transmission interface on the basis of not changing the structure of the one-card; the interface layer can be connected with a data line and connected to the mobile terminal through the data line, so that corresponding chip data are acquired and transmitted to the cloud for storage;
further referring to fig. 1, an external memory card slot (6) is arranged on the inner side of the first edge of the housing of the campus card-through device, and is used for internally storing an external memory data card with a data storage function.
Therefore, the campus card can be used as a mobile data storage device, similar to a U disk and a flash memory device. The data storage requirement of the campus user is considered, and the arrangement can improve the enthusiasm of the user for using the all-purpose card; meanwhile, the loss probability of the card is reduced due to the fact that the card is actively used all the time; the card is required to be used at any moment, and once the card is lost, a user can find the card in time, so that corresponding measures are not delayed to be taken.
It is worth pointing out that the external memory card slot is arranged inside the first edge of the shell because a data transmission interface card slot is arranged on the first edge of the shell of the one card-through device and at least one data memory chip is arranged inside the second edge of the shell of the one card-through device; therefore, the data stored in the built-in external memory data card with the data storage function of the one-card can be acquired through the external detachable data transmission interface; and the data can also be transmitted to the cloud backup, so that even if the all-purpose card is lost, the data cannot be lost.
Referring to fig. 4, a flowchart of a method for using the campus card is shown. The flow chart embodies the process of cloud backup of identity authentication and data transmission after a user applies for a one-card for the first time, and mainly comprises the following steps:
s1: after the all-purpose card is applied for the first time, connecting the hollow structure of the data transmission interface to a data transmission interface card slot at the first edge of the shell of the all-purpose card device, connecting one end of the data transmission line to an interface layer of the data transmission interface, and connecting the other end of the data transmission line to a mobile phone of a user;
s2: comparing the mobile phone authentication information of the user with the user authentication information, which is stored in the data storage chip, of the one-card acquired through the data transmission line, and entering a data cloud backup process if the mobile phone authentication information of the user and the user authentication information are consistent; otherwise, prompting the user that the authentication information of the mobile phone is wrong, the mobile phone cannot be connected and quits;
in a specific implementation, the data information stored in the data storage chip of the one-card is divided into at least two parts, one part is user authentication information, the part of information is basic personal use information of a one-card user, and the information comprises information such as name, mobile phone number, school number and password, and is stored in the data storage chip as a single part in an encrypted form. Once the one-card and the mobile phone are detected to be in a data connection state, the encrypted information is transmitted to the mobile phone terminal and is compared with the mobile phone authentication information input by the current mobile phone user;
the other part of information is stored as another part, and is allowed to be read only after the comparison authentication is passed;
it should be noted that in this process, the user authentication information stored in the data storage chip as a separate part in an encrypted form is invisible to the current mobile phone user, and the comparison process is performed in the background by the system; once the mobile phone receives the encryption information, prompting the current mobile phone user to input corresponding mobile phone authentication information, thereby starting a comparison process;
only after the current user inputs correct mobile phone authentication information and the comparison is passed, other part of data in the one-card can be continuously read, otherwise, the connection is terminated;
s3: backing up data information stored in the data storage chip by the one-card and/or data information stored in a built-in external memory data card with a data storage function to a cloud end or a local storage space of a mobile phone terminal by a user mobile phone;
s4: and judging whether the current time is close to a preset updating time period of the one-card, if so, updating the one-card through the mobile phone, and resetting an updating timer.
As an advantage different from the prior art, the one-card device further comprises an update timer for setting an update time period of the one-card. Updating and setting the one-card system at regular time; once the card cannot be updated within the preset time, the card automatically fails, and the phenomenon of falsely picking and stealing after the card is lost or stolen can be effectively prevented.
It should be noted that the update operation can only be performed by the user himself, and the update time period can also be adjusted by the user according to the time. Therefore, once the all-purpose card is not used for a long time, the all-purpose card is automatically in a failure state; and not used for a long time, there may be various reasons, such as the user leaves the school on long vacation, but leaves the card in the dormitory; or the card is lost. At the moment, the card automatically fails because the card is not updated for a long time; once the user needs to start using, only the card needs to be activated again, the card data is acquired by connecting the mobile phone with the data line and the card can be used only after the authentication is successful, and the safety is effectively guaranteed.
In one embodiment, the update time period is 12 hours, for example, the user may update the mobile phone once by the way when returning to the dormitory for rest, for example, when playing the mobile phone;
if the updating is not carried out after the preset time, the one-card is automatically invalid, which means that the data of the one-card chip cannot be read in a wireless mode, for example, the one-card chip cannot be consumed by swiping a card; however, if the user is connected with the mobile phone through the data line of the data interface and the authentication is passed, the data can still be read normally and reactivated.
Referring to fig. 5, the present embodiment provides a flowchart of a method for replying a one-card, including the following steps:
b1: after the one-card is applied again, connecting the hollow structure of the data transmission interface to a data transmission interface card slot at the first edge of the shell of the one-card device, connecting one end of the data transmission line to an interface layer of the data transmission interface, and connecting the other end of the data transmission line to a mobile phone of a user;
b2: judging whether the mobile phone of the user receives the prompt message within a preset time period, and if not, entering the next step; otherwise, quitting;
in the reissuing method of the embodiment, the one-card which is applied for again is an empty card, and no data is contained in the empty card, so that no data can be transmitted to the mobile phone after the empty card is connected with the mobile phone, and no prompt exists; if the prompt is given, the card is not an empty card;
as can be seen by combining with the flowchart of the method for initially claiming the card, if the card is not an empty card, after the mobile phone is connected, once the one-card and the mobile phone are detected to be in a data connection state, the encrypted information is transmitted to the mobile phone terminal, and is compared with the mobile phone authentication information input by the current mobile phone user, i.e. once the mobile phone receives the encrypted information, the current mobile phone user is prompted to input the corresponding mobile phone authentication information, so that the comparison process is started;
therefore, the step ensures that the newly repaired card is a blank card of the new card;
b3: transmitting the one-card data stored in the local storage space of the mobile phone to the one-card storage space through a data line; or, downloading the data of the one-card through the cloud and then transmitting the data to the storage space of the one-card.
Therefore, by adopting the complementary processing method, after the user loses the card, the complementary processing process of one card can be quickly completed only by applying a blank card without waiting. The production and manufacture of the blank card can be realized through a customized production line, and the large-scale production is facilitated, so that the one-card system can be popularized on a large scale.
In this embodiment, the method further comprises the steps of:
b4: and setting the updating time period of the one-card, so that the card is ensured to be updated in a preset time period.
Certainly, in another embodiment, the data backed up to the cloud by the user already contains the update time period setting data of the all-purpose card, and after the update time period setting data is transmitted to the all-purpose card, the setting of the update time period of the update timer of the all-purpose card is automatically completed.
In this embodiment, when the data transmission that will save the card that passes through in high in the clouds or cell-phone memory space to the memory space that the card passes through, go on through the memory mode that is fit for the all-purpose card scheme, include:
(1) the user authentication information in the one-card data is separately stored and encrypted, so that after storage, once the one-card and the mobile phone are detected to be in a data connection state, the encrypted information is transmitted to the mobile phone terminal;
(2) and storing other data except the user authentication information in the one-card separately, so that the data can be transmitted only after the user mobile phone authentication information is matched with the user authentication information after the data is stored.
In summary, the one-card device and the use method thereof provided by the invention completely change the use mode of the traditional one-card in the prior art, so that a user can not worry about the problem that the card is lost or is not used for a long time, and can not endure long-time rework waiting after the card is lost. According to the technical scheme, the campus card is provided with the data transmission interface, and the campus card can be matched with the corresponding external detachable data transmission interface, the corresponding data transmission line and the corresponding user mobile phone for use, so that data in the card chip can be backed up to the cloud in advance in an encryption mode; once the one-card is lost, after logging in the cloud in a mobile phone authentication mode, transmitting corresponding encrypted data from the cloud to a new one-card chip, and quickly completing the completion of the one-card completion; meanwhile, the campus card is also provided with a timing updating module, and the campus card is connected with a mobile phone terminal of a user through a corresponding data transmission interface and can perform timing updating setting on the card system;
once the card cannot be updated within the preset time, the card automatically fails, and the phenomenon of falsely picking and stealing after the card is lost or stolen can be effectively prevented; the problem of repeated card recovery of the original card after the card is lost and a new card is repaired can be prevented.
While preferred embodiments of the present invention have been shown and described herein, it will be obvious to those skilled in the art that such embodiments are provided by way of example only. Numerous modifications, changes, and substitutions will now occur to those skilled in the art without departing from the invention. It should be understood that various alternatives to the embodiments of the invention described herein may be employed in practicing the invention. It is intended that the following claims define the scope of the invention and that methods and structures within the scope of these claims and their equivalents be covered thereby.
Claims (9)
1. A campus card-through system, comprising a campus card-through device (1) equipped with a data transmission interface, said campus card-through device (1) comprising:
at least one data transmission interface card slot (3) arranged at a first edge (21) of a shell (2) of the all-purpose card device (1);
at least one data storage chip (4) arranged inside a second edge (22) of the housing (2) of the one-card device (1); and
a detachable data transmission interface (5),
wherein the data transmission interface (5) comprises a first upper surface layer (51), a second lower surface layer (52) and an interface layer (53) connecting the first upper surface layer (51) and the second lower surface layer (52),
wherein, the inner sides of the first upper surface layer (51) and the second lower surface layer (52) are respectively provided with a data communication line to be connected with the interface layer (53), one end (511) of the first upper surface layer (51) and one end (521) of the second lower surface layer (52) are connected through the interface layer (53), so that a hollow structure (54) is formed between the first upper surface layer (51) and the second lower surface layer (52),
wherein, the data transmission interface (5) is detachably butted on the data transmission interface card slot (3) of the all-purpose card device (1) through the hollow structure (54).
2. The campus card-through system according to claim 1, wherein an external memory card slot (6) is disposed inside the first edge (21) of the housing (2) of the campus card-through device (1) for accommodating an external memory data card with data storage function.
3. The campus card system of claim 1, wherein the at least one data storage chip (4) is a tamper-resistant chip of the internet of things.
4. The campus card system of claim 1, further comprising an update timer configured to set an update time period of the card-through device (1).
5. A method of using the campus card system of any of claims 1-4, the method comprising:
s1: after the campus card-through device is applied for the first time, connecting the hollow structure of the data transmission interface to a data transmission interface card slot at the first edge of the shell of the card-through device, connecting one end of a data transmission line to an interface layer of the data transmission interface, and connecting the other end of the data transmission line to a mobile phone of a user;
s2: comparing the authentication information of the mobile phone of the user with the user authentication information which is acquired through the data transmission line and stored in the data storage chip of the one-card-through device, and entering the next step if the authentication information of the mobile phone of the user is consistent with the user authentication information stored in the data storage chip of the one-card-through device; otherwise, prompting that the authentication information of the mobile phone of the user is wrong and cannot be connected, and exiting the method;
s3: backing up data information stored in the data storage chip of the one-card-through device and/or data information stored in an external storage data card to a cloud end through the mobile phone of the user or to a terminal local storage space of the mobile phone of the user; and
s4: judging whether the current time is close to a preset updating time period of the all-purpose card device, if so, updating the all-purpose card device through the mobile phone of the user, and resetting an updating timer of the all-purpose card device.
6. A method of using the campus card system of any of claims 1-4, the method comprising:
b1: after the all-purpose card device is applied again, connecting the hollow structure of the data transmission interface to a data transmission interface card slot at the first edge of the shell of the all-purpose card device, connecting one end of a data transmission line to an interface layer of the data transmission interface, and connecting the other end of the data transmission line to a mobile phone of a user;
b2: judging whether the mobile phone of the user receives the prompt message within a preset time period, and entering the next step if the mobile phone of the user does not receive the prompt message; otherwise, exiting the method; and
b3: transmitting one-card data stored in a local storage space of the mobile phone of the user to the data storage chip of the one-card device through the data line; or downloading the data of the all-purpose card through a cloud end, and then transmitting the data of the all-purpose card to the data storage chip of the all-purpose card device.
7. The method of claim 6, wherein said step B3 further comprises:
and encrypting and storing the user authentication information in the one-card data separately, and once detecting that the one-card device and the mobile phone of the user are in a data connection state, starting to transmit the encrypted information to the mobile phone of the user.
8. The method of claim 6, wherein said step B3 further comprises:
and storing other data except the user authentication information in the one-card device separately, and reading the other data except the user authentication information only after the authentication information of the mobile phone of the user is matched with the user authentication information in the one-card data.
9. The method of claim 6, further comprising:
b4: and setting the update time period of the update timer of the all-purpose card device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910903114.XA CN110808949B (en) | 2019-09-24 | 2019-09-24 | Campus one-card system and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910903114.XA CN110808949B (en) | 2019-09-24 | 2019-09-24 | Campus one-card system and method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110808949A CN110808949A (en) | 2020-02-18 |
CN110808949B true CN110808949B (en) | 2020-07-24 |
Family
ID=69487787
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910903114.XA Active CN110808949B (en) | 2019-09-24 | 2019-09-24 | Campus one-card system and method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110808949B (en) |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200627241A (en) * | 2005-01-20 | 2006-08-01 | Avermedia Tech Inc | Computer interface card |
US7315458B1 (en) * | 2006-08-24 | 2008-01-01 | Inventec Corporation | Fixing mechanism for fixing a functional extension card to a mechanical frame |
CN203311427U (en) * | 2013-05-22 | 2013-11-27 | 中山市汉仁电子有限公司 | Intelligent card identification system applied in identification field |
CN204833359U (en) * | 2015-06-08 | 2015-12-02 | 俎阿倩 | Campus card system design based on aptiq uses and NFC technique |
CN106779689A (en) * | 2017-01-08 | 2017-05-31 | 广东工业大学 | Credit payment application process based on all-in-one campus card |
CN108053200A (en) * | 2017-12-28 | 2018-05-18 | 新开普电子股份有限公司 | City one-card manages system |
CN208624011U (en) * | 2018-08-03 | 2019-03-19 | 上海习瑜自动化科技有限公司 | A kind of Suspensible all-purpose card device housings |
CN109447876A (en) * | 2018-10-16 | 2019-03-08 | 湖北三峡云计算中心有限责任公司 | A kind of burgher card system |
CN110084725A (en) * | 2019-03-27 | 2019-08-02 | 张香宁 | A kind of Intelligent campus Student Information Management System based on cloud platform |
-
2019
- 2019-09-24 CN CN201910903114.XA patent/CN110808949B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN110808949A (en) | 2020-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101429563B1 (en) | Method and apparatus for unlocking operating system | |
US20200082656A1 (en) | Fingerprint recognition and nfc-based unlocking method and system using mobile terminal | |
US9544279B2 (en) | Authentication for application | |
US8151319B2 (en) | Authentication of devices in a wireless network | |
CN102693381B (en) | Method, device and system for anti-theft of portable computer equipment | |
US8364857B2 (en) | Wireless modem with CPU and auxiliary processor that shifts control between processors when in low power state while maintaining communication link to wireless network | |
CA2811659C (en) | Method and apparatus for differentiated access control | |
EP1901577B1 (en) | Apparatus and method for controlling bluetooth in portable terminal | |
US20190163931A1 (en) | Devices, systems, and methods for securely storing and managing sensitive information | |
CN103188377B (en) | A kind of anti-theft method for mobile terminal and theft preventing mobile terminal | |
US20060186199A1 (en) | Apparatus for authorising access to an electronic device | |
CN101155212A (en) | Method for limiting use of mobile terminal | |
CN103581441A (en) | Mobile terminal tracking anti-theft system and method | |
CN101640881A (en) | Method and system for remote control and mobile terminal | |
WO2018064638A1 (en) | Mobile communications device with managed swap of exclusive features | |
CN114756849B (en) | Method and device for verifying personal identification number PIN code | |
CN110808949B (en) | Campus one-card system and method thereof | |
JP2009159564A (en) | Controller of communication equipment, communication equipment, and communication system using the controller and communication equipment | |
JP2005301454A (en) | User identification system and charger/radio ic chip reader | |
CN101163289A (en) | Method of limiting use region of mobile terminal | |
JP2008048082A (en) | Cell phone unit and program | |
WO2017197689A1 (en) | Sim card processing method and apparatus, terminal, and esam chip | |
CN107613493A (en) | Intelligent terminal and its antitheft method, the device with store function | |
CN110826658A (en) | Intercity all-purpose card system universal for multiple cities | |
US11861028B2 (en) | Devices, systems, and methods for securely storing and managing sensitive information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |