CN112801653A - Card anti-theft method and device, electronic equipment and storage medium - Google Patents
Card anti-theft method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN112801653A CN112801653A CN202011634610.9A CN202011634610A CN112801653A CN 112801653 A CN112801653 A CN 112801653A CN 202011634610 A CN202011634610 A CN 202011634610A CN 112801653 A CN112801653 A CN 112801653A
- Authority
- CN
- China
- Prior art keywords
- card
- dynamic code
- server
- swiping
- card swiping
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/354—Card activation or deactivation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/407—Cancellation of a transaction
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the application discloses a card anti-theft swiping method and device, electronic equipment and storage equipment, wherein the card anti-theft swiping method comprises the following steps: receiving a card swiping request, wherein the card swiping request carries a first dynamic code and a card account number which are generated based on the card swiping times; comparing the first dynamic code with a second dynamic code stored in the server; if the first dynamic code and a second dynamic code stored in the server do not meet preset similar conditions, rejecting the card swiping request and locking the card account; when the legal card is stolen and swiped by the illegal card for many times and the legal card is swiped again, the difference value between the first dynamic code carried by the card swiping request and the second dynamic code stored in the server is large, so that when the first dynamic code and the second dynamic code stored in the server are compared and do not meet the preset condition, the card swiping request is rejected in time, the card account number is locked, the safety of the card is improved, the risk that the card is stolen and swiped is reduced, and the fund loss is reduced.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a card anti-theft method and device, electronic equipment and a storage medium.
Background
With the development of the internet and the e-commerce industry, the equipment for acquiring the entity card and obtaining the copied card becomes simpler, the occurrence frequency of the illegally copied card is higher, the entity card anti-theft swiping face a stricter test, the existing entity card anti-theft swiping scheme lacks higher security and has high supervision difficulty, and therefore a device for preventing the entity card from being stolen, which can improve the security and is easy to manage, is needed.
Disclosure of Invention
The disclosure provides a card anti-swipe method and apparatus, an electronic device, and a storage medium.
According to a first aspect of embodiments of the present disclosure, embodiments of the present disclosure provide a card anti-swipe method, including: receiving a card swiping request, wherein the card swiping request carries a first dynamic code and a card account number which are generated based on the card swiping times;
comparing the first dynamic code with a second dynamic code stored in the server;
and if the first dynamic code and the second dynamic code stored in the server do not meet the preset similar condition, rejecting the card swiping request and locking the card account number.
Optionally, the method further comprises:
if the first dynamic code and the second dynamic code meet the preset similar condition, responding to the card swiping request;
updating the second dynamic code stored by the server according to the total card swiping times of the card account;
and sending the second dynamic code to the card sending the card swiping request.
Optionally, the first dynamic code and the second dynamic code each include: a first portion and a second portion; the second part is dynamically generated according to the card swiping times;
the first dynamic code and the second dynamic code stored in the server do not meet preset similar conditions, and the method comprises the following steps:
and if the first part of the first dynamic code is the same as the first part of the second dynamic code, the difference value between the second part of the first dynamic code and the second part of the second dynamic code is larger than a preset value.
Optionally, the method further comprises:
if the first dynamic code and the second dynamic code stored in the server do not meet the preset similar condition, an updating instruction is received;
and updating the first part in the second dynamic code corresponding to the card account according to the updating instruction to obtain a third dynamic code corresponding to the card account.
Optionally, the updating, according to the update instruction, a first part in a second dynamic code corresponding to the card account to obtain a third dynamic code corresponding to the card account includes:
verifying the user identity information of the card account according to the updating instruction;
after the user identity information passes verification, updating a first part in a second dynamic code corresponding to the card account to obtain a third dynamic code corresponding to the card account;
and issuing the third dynamic code to the card sending the updating instruction.
According to a second aspect of embodiments of the present disclosure, there is provided a card anti-swipe method, the method including: reading a card account number and a first dynamic code in the card based on card swiping operation; wherein the first dynamic code is generated based on a first dynamic code generated based on the number of times of card swiping;
sending a card swiping request carrying the card account number of the card and the first dynamic code;
receiving a rejection response sent when the first dynamic code and a second dynamic code stored in the server do not meet a preset similar condition;
and refusing the card swiping operation according to the refusing response.
Optionally, the method further comprises:
receiving a card locking indication sent when the first dynamic code and a second dynamic code stored in the server do not meet a preset similar condition;
and locking the card according to the card locking indication.
Optionally, the first dynamic code and the second dynamic code stored by the server each include: a first portion and a second portion;
the method further comprises the following steps:
sending an updating instruction based on the unlocking operation of the card;
receiving a write-in instruction returned according to the updating instruction; the writing instruction carries a third dynamic code which is generated based on the first part in the second dynamic code and corresponds to the card account number;
and writing the third dynamic code into a card triggering the sending of the updating instruction.
Optionally, obtaining user identity information carried by the update instruction;
the receiving of the write command returned according to the update command includes:
and receiving a card writing instruction returned after the user identity information passes the verification.
Optionally, the method further comprises:
receiving a card swiping instruction issued by the server when the first dynamic code and the second dynamic code meet the preset similar condition and an updated second dynamic code generated by the server based on the card swiping times after the card is updated; executing the card swiping operation according to the card swiping instruction;
and writing the updated second dynamic code into the card.
According to a third aspect of the embodiments of the present disclosure, an embodiment of the present disclosure provides a card anti-swipe protection device, including:
the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving a card swiping request, and the card swiping request carries a first dynamic code and a card account number which are generated based on card swiping times;
the comparison module is used for comparing the first dynamic code with a second dynamic code stored in the server;
and the control module is used for refusing the card swiping request and locking the card account if the first dynamic code and the second dynamic code stored in the server do not meet the preset similar condition.
According to a fourth aspect of the embodiments of the present disclosure, there is provided a card swipe prevention apparatus, including:
according to a fourth aspect of embodiments of the present disclosure, there is provided an electronic apparatus, comprising:
the reading module is used for reading a card account number and a first dynamic code in the card based on card swiping operation; wherein the first dynamic code is generated based on a first dynamic code generated based on the number of times of card swiping;
the sending module is used for sending a card swiping request carrying the card account number of the card and the first dynamic code;
the receiving module is used for receiving a refusal response sent when the first dynamic code and a second dynamic code stored in the server do not meet a preset similar condition;
and the control module is used for refusing the card swiping operation according to the refusing response.
According to a fifth aspect of embodiments of the present disclosure, there is provided an electronic device including:
a memory;
and the processor is connected with the memory and used for realizing the steps in the method provided by the first aspect or the second aspect of the embodiment of the disclosure by storing the computer execution instructions stored by the memory.
According to a sixth aspect of embodiments of the present disclosure, embodiments of the present disclosure provide a computer storage medium having stored thereon the computer-executable instructions; the computer-executable instructions, when executed by a processor, enable the implementation of the steps in the method provided by the first aspect or the second aspect of the embodiments of the present disclosure.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: the card anti-theft swiping method of the embodiment of the disclosure comprises the following steps: receiving a card swiping request, wherein the card swiping request carries a first dynamic code and a card account number which are generated based on the card swiping times; comparing the first dynamic code with a second dynamic code stored in the server; if the first dynamic code and a second dynamic code stored in the server do not meet preset similar conditions, rejecting the card swiping request and locking the card account; when the legal card is embezzled by the illegal card for a plurality of times and then is swiped again, the first dynamic code carried by the swiping request and the second dynamic code stored in the server do not meet the preset similar condition, so that when the first dynamic code and the second dynamic code stored in the server do not meet the preset condition, the swiping request is rejected in time and the card account number is locked, the safety of the card is improved, the risk of embezzled card is reduced, and the loss of funds, points or credit value and the like is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
FIG. 1 is a schematic flow chart illustrating a card swipe protection method according to an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart illustrating a card swipe protection method according to an embodiment of the present disclosure;
FIG. 3 is a schematic flow chart illustrating a card swipe protection method according to an embodiment of the present disclosure;
FIG. 4 is a schematic flow chart illustrating a card swipe protection method according to an embodiment of the present disclosure;
FIG. 5 is a flowchart illustrating a card swipe protection method according to an embodiment of the present disclosure;
FIG. 6 is a schematic flow chart of a card anti-skimming device according to an embodiment of the present disclosure;
fig. 7 is a schematic flowchart of a card anti-theft device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with embodiments of the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the disclosed embodiments, as detailed in the appended claims.
Referring to fig. 1, a first aspect of the embodiments of the present disclosure provides a card anti-swipe method, applied to a server, where the method includes the following steps:
step S101, receiving a card swiping request, wherein the card swiping request carries a first dynamic code and a card account number which are generated based on the card swiping times;
step S102, comparing the first dynamic code with a second dynamic code stored in the server;
step S103, if the first dynamic code and the second dynamic code stored in the server do not meet preset similar conditions, rejecting the card swiping request and locking the card account.
In this embodiment of the present disclosure, in step S101, the server may obtain the first dynamic code and the card account number of the card based on the card swiping request; in step S102, the first dynamic code is compared with the second dynamic code stored in the server, so as to determine whether the card is a legal card in time; in step S103, if the first dynamic code and the second dynamic code stored in the server do not satisfy the preset similar condition, the card swiping request is rejected and the card account is locked, and if the first dynamic code and the second dynamic code stored in the server do not satisfy the similar condition due to illegal card swiping, the card swiping request is rejected and the card account is locked, so that the card is prevented from being illegally swiped, the security of the card is improved, and the card account is directly locked by the server, so that the server can easily manage the card.
Referring to fig. 2, in the embodiment of the present disclosure, the card swipe protection method further includes:
step S1041, if the first dynamic code and the second dynamic code satisfy the preset similar condition, responding to the card swiping request;
step S1042, updating the second dynamic code stored in the server according to the total card swiping times of the card account;
and step S1043, sending the second dynamic code to the card sending the card swiping request.
In the embodiment of the present disclosure, after step S1041, step S1042 indicates that the server may update the second dynamic code according to the total card swiping time, and only after the card swiping is successful, the second dynamic code is updated, and step S1042 is performed, so that the correctness of the card swiping time record may be ensured.
In an embodiment of the present disclosure, the first dynamic code and the second dynamic code each include: a first portion and a second portion; the second part is dynamically generated according to the card swiping times;
the first dynamic code and the second dynamic code stored in the server do not meet preset similar conditions, and the method comprises the following steps:
and if the first part of the first dynamic code is the same as the first part of the second dynamic code, the difference value between the second part of the first dynamic code and the second part of the second dynamic code is larger than a preset value.
In the embodiment of the present disclosure, the first part is not dynamically generated according to the number of times of card swiping, but is a fixed number segment, and the first dynamic code and the second dynamic code are equally divided into two parts, so that when comparing the first dynamic code and the second dynamic code, two comparisons can be performed, the comparison steps are increased, and the possibility of the card being safely used is further improved.
Referring to fig. 3, in the embodiment of the present disclosure, the card swipe protection method further includes:
step S1051, if the first dynamic code and the second dynamic code stored in the server do not meet the preset similar condition, an updating instruction is received;
step S1052, updating the first part in the second dynamic code corresponding to the card account according to the update instruction, to obtain a third dynamic code corresponding to the card account.
In this disclosure, if the first dynamic code and the second dynamic code stored in the server do not satisfy the preset similar condition, the user holds the card to the card center to unlock, and the server receives the update instruction to update the first part in the second dynamic code corresponding to the card account, so as to obtain a third dynamic code corresponding to the card account. At this time, since the first part of the first dynamic code in the other illegal cards is not changed, when the card swiping request of the illegal card is received, the first part of the first dynamic code in the illegal card is not consistent with the first part of the updated second dynamic code any more, the illegal card is permanently refused to swipe the card swiping request, and meanwhile, the use of the updated legal card is not influenced.
In the embodiment of the disclosure, the first part is a part which can be changed only when the card account is unlocked, but the first part of the illegal card has no permission to be changed, so that the security of the legal card can be guaranteed.
In this embodiment of the present disclosure, in the method for preventing card from being swiped illegally, the step S1052 further includes:
verifying the user identity information of the card account according to the updating instruction;
after the user identity information passes verification, updating a first part in a second dynamic code corresponding to the card account to obtain a third dynamic code corresponding to the card account;
and issuing the third dynamic code to the card sending the updating instruction.
In an embodiment of the present disclosure, the user identity information includes, but is not limited to:
an identification number;
photo information;
a cell phone number.
The corresponding method for verifying the user identity information of the card account comprises the following steps:
information verification through swiping an identity card by a user or inputting an identity card number by the user;
verifying a face recognition mode;
and according to the mobile phone number, sending a verification short message to the mobile phone corresponding to the mobile phone number for verification.
In the embodiment of the disclosure, the update instruction can be further executed only in an authentication manner, which is beneficial to ensuring the security of the card account.
In the embodiment of the present disclosure, the third dynamic code is issued to the card that sends the update instruction. This makes the first part of the dynamic code of the card and illegal card no longer consistent, making the current illegal card permanently unusable.
In the embodiment of the present disclosure, after the legal card obtains the third dynamic code, if an illegal card is copied, the above steps are repeated.
Referring to fig. 4, a first aspect of the embodiments of the present disclosure provides a card-swiping prevention method applied to a card swipe machine, where the method includes the following steps:
step S201, reading a card account number and a first dynamic code in a card based on card swiping operation; wherein the first dynamic code is generated based on a first dynamic code generated based on the number of times of card swiping;
step S202, sending a card swiping request carrying the card account number of the card and the first dynamic code;
step S203, receiving a rejection response sent when the first dynamic code and a second dynamic code stored in the server do not meet a preset similar condition;
and step S204, refusing the card swiping operation according to the refusing response.
In the embodiment of the disclosure, after the sensor in the card swiping machine senses the card swiping operation, the sensor reads the card account number and the first dynamic code in the card.
In an embodiment of the present disclosure, in step S202, the swipe machine sends a swipe request to the server.
In the embodiment of the present disclosure, in step S203 and step S204, when the rejection response is received, the card swiping operation is rejected. The response can be refused in time, the account security is provided, and the fund loss caused by embezzlement of illegal cards is avoided as much as possible.
In an embodiment of the disclosure, the method further comprises the steps of:
step S2051, receiving a card locking instruction sent when the first dynamic code and the second dynamic code stored in the server do not satisfy a preset similar condition;
and step S2052, locking the card according to the card locking instruction.
In the disclosed embodiment, the manner of locking the card includes but is not limited to:
the card swiping machine writes a locking mark into the card, and after the card is locked in this way, when the card touches the card swiping machine, the card swiping machine only needs to directly read the locking mark in the card, and does not need to inquire whether the card account number is locked or not from a server. The work flow of the card swiping machine can be simplified.
In the disclosed embodiment, the card may not be locked, and whenever a sensor in the swipe machine senses contact of the card, a server is queried whether the card account number is locked.
In an embodiment of the present disclosure, the first dynamic code and the second dynamic code stored by the server each include: a first portion and a second portion;
the method further comprises the following steps:
sending an updating instruction based on the unlocking operation of the card;
receiving a write-in instruction returned according to the updating instruction; the writing instruction carries a third dynamic code which is generated based on the first part in the second dynamic code and corresponds to the card account;
and writing the third dynamic code into a card triggering the sending of the updating instruction.
In the embodiment of the present disclosure, when the card is unlocked, the locking mark in the card is deleted corresponding to the locking of the card.
In an embodiment of the disclosure, the method further comprises:
acquiring user identity information carried by the updating instruction;
the receiving of the write command returned according to the update command includes:
and receiving a card writing instruction returned after the user identity information passes the verification.
In the embodiment of the disclosure, the card writing instruction after the updating instruction can be further executed only in an authentication manner, which is beneficial to ensuring the security of the card account.
In an embodiment of the disclosure, the method further comprises: receiving a card swiping instruction issued by the server when the first dynamic code and the second dynamic code meet the preset similar condition and an updated second dynamic code generated by the server based on the card swiping times after the card is updated; executing the card swiping operation according to the card swiping instruction;
and writing the updated second dynamic code into the card.
In the embodiment of the disclosure, the card swiping machine writes the updated second dynamic code into the card, and after the card swiping operation is successfully executed, the updated second dynamic code is written into the first dynamic code in the card, so that the correctness of the card swiping time record can be ensured.
In this embodiment of the disclosure, after responding to the card swiping request, the server may update the first dynamic code stored in the second dynamic code according to the total card swiping times of the card account, and write the second dynamic code into the first dynamic code in the card.
In this embodiment of the present disclosure, before sending the card swiping request, the card swiping machine may update the first dynamic code, for example, add 1 to the first dynamic code, and send the card swiping request carrying the first dynamic code to the server, where at this time, the updated first dynamic code is greater than the second dynamic code stored in the server by 1, and the server compares whether the values of the updated first dynamic code minus 1 and the second dynamic code stored in the server are consistent.
In this embodiment, the card swiping machine may update the first dynamic code before sending the card swiping request, for example, add 1 to the first dynamic code, and the server also updates the second dynamic code synchronously when receiving the card swiping request, for example, add 1 to the second dynamic code, and then compare the updated first dynamic code with the updated second dynamic code.
In the embodiments of the present disclosure, regarding the updating of the first dynamic code, the updating of the second dynamic code, and the comparison of the first dynamic code and the second dynamic code, the above-described embodiments may be arbitrarily combined on the basis of compliance logic, and the embodiments of the present disclosure are not limited thereto.
In the embodiment of the disclosure, a mode of comparing a first dynamic code with a second dynamic code stored in a server is adopted, if the first dynamic code and the second dynamic code stored in the server do not meet preset similar conditions, the card swiping request is rejected and the card account number is locked, so that card swiping requests of a legal card and an illegal card corresponding to the card account number are rejected, at the moment, the card can be prevented from being illegally swiped, the safety of the card is improved, and the server directly locks the card account number at a server side, so that the management of the card is easy; after the server refuses the card swiping request and locks the card account number, the difference value of the comparison between the first dynamic code and the second dynamic code stored by the server represents the transaction number of the stolen card swiping, so that the transaction number of the stolen card swiping can be clearly known.
The following examples are provided in connection with the above embodiments:
example 1: example 1 provides a card swipe prevention method, the method comprising:
data initialization: the data initialization comprises: campus IC card initialization and database data initialization.
The campus IC card initialization comprises the following steps: writing an IC card unique card number (hereinafter, referred to as card sum) and an initial dynamic code 10000000001 (hereinafter, referred to as sign1) into the campus IC card;
the database initialization includes: the database writes the initialization dynamic code 10000000001 (hereinafter referred to as sign2) and the abnormal dynamic code 0 (hereinafter referred to as sign 3).
Normal card swiping of a legal card:
the logic of normal card swiping of the legal card is as follows: a legal user holds a legal card and normally swipes the card to a consumer machine, the consumer machine writes a new sign1 value into the card as original sing1+1 after acquiring the card cardNum and sign1 of the legal card, the consumer machine transmits the new sign1 value to a database server through a network, compares the sign1 (front 3 bits) with the sign2 (front 3 bits) number segment value in the database, subtracts 1 from the sign1 (rear 8 bits) by the number of strokes of 1 and sign2 (rear 8 bits) after the number segments are consistent, and swipes the card and consumes successfully through verification logic after the number segments are consistent.
Locking legal card and illegal card:
at some point, one (or more) illegal cards are copied from a legal card (e.g., sign1 ═ 10000000002), and both cardNum and sign1 of the illegal card are identical to the legal card. Then the illegal card is successfully consumed on a consumer machine one or more times (example 5 times), at this time, sign1 of the illegal card is 10000000007, sign2 in a database is 10000000007, and sign3 is 0; a legal user holds a legal card (sign1 is 10000000002), new sign1 is 10000000003 written in the consumer for consumption, the card number is compared with sign2 in a database, the system judges that the number segments 100 are consistent and the transaction number is inconsistent, illegal card embezzlement wind control is triggered, the card number cardNum is locked and cannot be traded, 5 transaction records of the transaction number between 1 and 1 minus sign1 and sign2 are obtained, the system judges that the 5 transaction records are illegal transactions, and the legal card and all illegal cards cannot be normally used at the moment.
Unlocking the card:
and after the legal user finds that the legal card is locked and cannot transact, the legal user holds the legal card to the card service center for unlocking. The card service center administrator writes a new number segment (example 101) + the original transaction number into the card to form a new sign1, writes the sign2 value in the database into the sign3, updates the new sign1 to the singing 2, and modifies the state of the card to be normal. At this time, sign1 of the legal card is 10100000003, sign2 of the database is 10100000003, sign3 is 10000000003, and sign1 of the illegal card is 10000000007.
The illegal card is locked continuously:
after the legal user holds the legal card to unlock, sign1 of the legal card can pass the verification of normal consumption. The number segment 100 of the illegal card is inconsistent with the number segment 101 in the database, and the wind control is triggered to directly prompt that the illegal card cannot consume normally. The frequent card swiping behavior of the illegal card can not cause the locking of the legal card.
As shown in fig. 5, the card usage flow is as follows:
student card swiping (online consumption);
the consumer machine obtains card information (card number/stroke number), if the network connection is abnormal, the card cannot be written;
if the network connection is normal, the consumption machine writes a new stroke number (the stroke number is added with 1) into the card, and if the new stroke number fails to be written, the consumption machine prompts: please swipe the card again;
if the new stroke number is successfully written, sending a consumption request to a server;
the server processes the consumption information, and if the consumption stroke number is detected to be abnormal, the server processes the consumption information;
if the number of consumption strokes is normal, the server returns a consumption result, if the network is overtime, the consumption machine does not display the consumption result, and then the last order with successful consumption can be inquired through a page turning up and down button on the machine;
if the network is not overtime, the consumption machine successfully receives the consumption result;
and the consumer machine displays the consumption result.
In an example of the present disclosure: the number segment with fixed number of bits + the number of card swiping times with fixed or non-fixed number of bits are used as dynamic codes (the length of the number segment and the length of the number of card swiping times can be expanded according to business requirements), for example, the three-bit number segment 100+ the fixed 8-bit number of card swiping times 00000001 are combined into the dynamic code 10000000001. Under the condition that the normally used card is not copied, the database server records two dynamic codes, namely an initial dynamic code 10000000001 (sign 2 for short) and an abnormal dynamic code 0 (sign 3 for short). Swiping a card on a consumer machine, writing a new dynamic code 10000000002 (rule: number field is unchanged, card swiping times +1, sign1 for short) into the campus IC card by the consumer machine, simultaneously transmitting the card number and the sign1 to a database server, and judging whether the stolen swiping and the number of the stolen swiping strokes and the fund information exist by the database server through checking the values of the sign1, the sign2 and the sign 3.
By combining the above embodiments or examples, the user can clearly inquire the number of times that the legal card is stolen by the illegal card, and since the dynamic code set in the card includes the front fixed number segment and the rear transaction number segment, after the legal card is locked, the front fixed number segment in the legal card is changed, so that no matter how many original illegal cards can be accurately locked and cannot be consumed, and the malicious stealing behavior of the original illegal card cannot cause the legal card to be locked. And if the changed legal card is copied to be an illegal card again, circulating the operation.
In the embodiment of the present disclosure, with reference to fig. 6, there is further provided an anti-swipe card apparatus 300, which is characterized in that the anti-swipe card apparatus includes:
the receiving module 301 is configured to receive a card swiping request, where the card swiping request carries a first dynamic code and a card account number that are generated based on card swiping times;
a comparison module 302, configured to compare the first dynamic code with a second dynamic code stored in the server;
the control module 303 is configured to reject the card swiping request and lock the card account if the first dynamic code and the second dynamic code stored in the server do not satisfy a preset similar condition.
In an embodiment of the present disclosure, in conjunction with fig. 7, there is also provided an electronic device 400, including:
the reading module 401 is used for reading a card account number and a first dynamic code in the card based on card swiping operation; wherein the first dynamic code is generated based on a first dynamic code generated based on the number of times of card swiping;
the communication module 402 is configured to send a card swiping request carrying the card account number of the card and the first dynamic code;
the communication module 402 is further configured to receive a rejection response sent when the first dynamic code and the second dynamic code stored in the server do not satisfy a preset similar condition;
a control module 403, configured to reject the card swiping operation according to the rejection response.
In an embodiment of the present disclosure, there is also provided an electronic device, including:
a memory;
and the processor is connected with the memory and used for realizing the steps in the card anti-theft swiping method in the embodiment by storing the computer execution instructions stored in the memory.
The memory may be a variety of storage devices including computer storage media, which may be non-transitory storage media.
The processor may be various types of processors, such as a central processing unit, a microprocessor, a programmable array, or digital signal processing, among others.
In an embodiment of the present disclosure, there is also provided a computer storage medium storing the computer-executable instructions; after being executed by the processor, the computer-executable instructions can implement the steps of the card swiping prevention method in the above embodiment.
The computer storage medium may include a non-transitory storage medium, such as flash memory (flash) or the like.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media capable of storing program codes, such as a removable Memory device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, and an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (14)
1. A card swipe prevention method, comprising:
receiving a card swiping request, wherein the card swiping request carries a first dynamic code and a card account number which are generated based on the card swiping times;
comparing the first dynamic code with a second dynamic code stored in the server;
and if the first dynamic code and the second dynamic code stored in the server do not meet the preset similar condition, rejecting the card swiping request and locking the card account number.
2. The method of claim 1, further comprising:
if the first dynamic code and the second dynamic code meet the preset similar condition, responding to the card swiping request;
updating the second dynamic code stored by the server according to the total card swiping times of the card account;
and sending the second dynamic code to the card sending the card swiping request.
3. The card swipe protection method according to claim 1 or 2, wherein the first dynamic code and the second dynamic code each include: a first portion and a second portion; the second part is dynamically generated according to the card swiping times;
the first dynamic code and the second dynamic code stored in the server do not meet preset similar conditions, and the method comprises the following steps:
and if the first part of the first dynamic code is the same as the first part of the second dynamic code, the difference value between the second part of the first dynamic code and the second part of the second dynamic code is larger than a preset value.
4. The card swipe protection method according to claim 2,
the method further comprises the following steps:
if the first dynamic code and the second dynamic code stored in the server do not meet the preset similar condition, an updating instruction is received;
and updating the first part in the second dynamic code corresponding to the card account according to the updating instruction to obtain a third dynamic code corresponding to the card account.
5. The card swipe protection method according to claim 4, wherein the updating, according to the update instruction, the first part in the second dynamic code corresponding to the card account to obtain a third dynamic code corresponding to the card account includes:
verifying the user identity information of the card account according to the updating instruction;
after the user identity information passes verification, updating a first part in a second dynamic code corresponding to the card account to obtain a third dynamic code corresponding to the card account;
and issuing the third dynamic code to the card sending the updating instruction.
6. A card swipe prevention method, comprising:
reading a card account number and a first dynamic code in the card based on card swiping operation; wherein the first dynamic code is generated based on a first dynamic code generated based on the number of times of card swiping;
sending a card swiping request carrying the card account number of the card and the first dynamic code;
receiving a rejection response sent when the first dynamic code and a second dynamic code stored in the server do not meet a preset similar condition;
and refusing the card swiping operation according to the refusing response.
7. The card swipe protection method according to claim 6,
the method further comprises the following steps:
receiving a card locking indication sent when the first dynamic code and a second dynamic code stored in the server do not meet a preset similar condition;
and locking the card according to the card locking indication.
8. The card swipe protection method according to claim 6 or 7,
the first dynamic code and the second dynamic code stored by the server each comprise: a first portion and a second portion;
the method further comprises the following steps:
sending an updating instruction based on the unlocking operation of the card;
receiving a write-in instruction returned according to the updating instruction; the writing instruction carries a third dynamic code which is generated based on the first part in the second dynamic code and corresponds to the card account number;
and writing the third dynamic code into a card triggering the sending of the updating instruction.
9. The method of claim 8, further comprising:
acquiring user identity information carried by the updating instruction;
the receiving of the write command returned according to the update command includes:
and receiving a card writing instruction returned after the user identity information passes the verification.
10. The card swipe protection method according to claim 8,
the method further comprises the following steps:
receiving a card swiping instruction issued by the server when the first dynamic code and the second dynamic code meet the preset similar condition and an updated second dynamic code generated by the server based on the card swiping times after the card is updated; executing the card swiping operation according to the card swiping instruction;
and writing the updated second dynamic code into the card.
11. The utility model provides a card theftproof device that swipes, its characterized in that, card theftproof device includes:
the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving a card swiping request, and the card swiping request carries a first dynamic code and a card account number which are generated based on card swiping times;
the comparison module is used for comparing the first dynamic code with a second dynamic code stored in the server;
and the control module is used for refusing the card swiping request and locking the card account if the first dynamic code and the second dynamic code stored in the server do not meet the preset similar condition.
12. An electronic device, characterized in that the electronic device comprises:
the reading module is used for reading a card account number and a first dynamic code in the card based on card swiping operation; wherein the first dynamic code is generated based on a first dynamic code generated based on the number of times of card swiping;
the communication module is used for sending a card swiping request carrying the card account number of the card and the first dynamic code;
the communication module is also used for receiving a refusal response sent when the first dynamic code and a second dynamic code stored in the server do not meet a preset similar condition;
and the control module is used for refusing the card swiping operation according to the refusing response.
13. An electronic device, comprising:
a memory;
a processor coupled to the memory for enabling implementation of the method of any one of claims 1 to 5 or 6 to 10 by storing computer-executable instructions stored by the memory.
14. A computer storage medium having stored thereon the computer-executable instructions; the computer executable instructions, when executed by a processor, are capable of implementing the method of any one of claims 1 to 5 or 6 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011634610.9A CN112801653A (en) | 2020-12-31 | 2020-12-31 | Card anti-theft method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011634610.9A CN112801653A (en) | 2020-12-31 | 2020-12-31 | Card anti-theft method and device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112801653A true CN112801653A (en) | 2021-05-14 |
Family
ID=75808550
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011634610.9A Pending CN112801653A (en) | 2020-12-31 | 2020-12-31 | Card anti-theft method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112801653A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4455484A (en) * | 1974-01-08 | 1984-06-19 | Whitehead Edwin N | Identification card which is magnetically coded to prevent counterfeiting |
CN1617555A (en) * | 2003-11-10 | 2005-05-18 | 北京握奇数据系统有限公司 | Anti-cloning method for SIM card |
CN101159040A (en) * | 2007-08-14 | 2008-04-09 | 殷育东 | Recognition card with variable feature code |
CN104754574A (en) * | 2013-12-26 | 2015-07-01 | 中国移动通信集团公司 | SIM card, anti-cloning method thereof and device |
CN105912964A (en) * | 2016-04-08 | 2016-08-31 | 厦门科安达智能科技有限公司 | Device starting method employing mutual authentication between IC reading head device and IC card dynamic code |
CN106355120A (en) * | 2016-08-31 | 2017-01-25 | 湖南财政经济学院 | Method and device for preventing magnetic card information from being copied |
CN106898062A (en) * | 2015-12-21 | 2017-06-27 | 广州科升信息科技有限公司 | The M1 toll bars lock control and its method of a kind of anti-copying |
CN107341534A (en) * | 2017-07-18 | 2017-11-10 | 南京唯捷豪信息科技有限公司 | A kind of electronic card copy prevention method, device and management server |
CN108280504A (en) * | 2017-01-06 | 2018-07-13 | 广州市西迈信息科技有限公司 | The anti-copying encrypted method of access control system IC card |
-
2020
- 2020-12-31 CN CN202011634610.9A patent/CN112801653A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4455484A (en) * | 1974-01-08 | 1984-06-19 | Whitehead Edwin N | Identification card which is magnetically coded to prevent counterfeiting |
CN1617555A (en) * | 2003-11-10 | 2005-05-18 | 北京握奇数据系统有限公司 | Anti-cloning method for SIM card |
CN101159040A (en) * | 2007-08-14 | 2008-04-09 | 殷育东 | Recognition card with variable feature code |
CN104754574A (en) * | 2013-12-26 | 2015-07-01 | 中国移动通信集团公司 | SIM card, anti-cloning method thereof and device |
CN106898062A (en) * | 2015-12-21 | 2017-06-27 | 广州科升信息科技有限公司 | The M1 toll bars lock control and its method of a kind of anti-copying |
CN105912964A (en) * | 2016-04-08 | 2016-08-31 | 厦门科安达智能科技有限公司 | Device starting method employing mutual authentication between IC reading head device and IC card dynamic code |
CN106355120A (en) * | 2016-08-31 | 2017-01-25 | 湖南财政经济学院 | Method and device for preventing magnetic card information from being copied |
CN108280504A (en) * | 2017-01-06 | 2018-07-13 | 广州市西迈信息科技有限公司 | The anti-copying encrypted method of access control system IC card |
CN107341534A (en) * | 2017-07-18 | 2017-11-10 | 南京唯捷豪信息科技有限公司 | A kind of electronic card copy prevention method, device and management server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60316498T2 (en) | Smart card, portable terminal and access control method | |
JPH0296872A (en) | Confirming system for rightness of transaction | |
US20080120726A1 (en) | External storage device | |
US20210201294A1 (en) | Bank card privacy information hiding method, bank card and computer readable storage medium | |
CN109753837B (en) | Anti-copying and anti-tampering method for IC card | |
EP4435701A2 (en) | Biometric override for incorrect failed authorization | |
TW202040462A (en) | Payee identity verification method and device | |
CN104282098B (en) | The making out an invoice and copy tax process upgrade method of a kind of tax-controlling device | |
CN100535937C (en) | Method and system for user authentication in a digital communication system | |
CN108122111B (en) | Secure payment method, device, storage medium and computer equipment | |
CN112801653A (en) | Card anti-theft method and device, electronic equipment and storage medium | |
JP2007072777A (en) | Transaction system | |
TWM633896U (en) | Financial Data Authorization Device | |
CN115375300A (en) | IC card, operation method thereof and operation method of card reader | |
JP7203615B2 (en) | Magnetic stripe auto-repair system | |
JP6330293B2 (en) | Identification information management apparatus, identification information management method, and program | |
US20200342460A1 (en) | User identity verification | |
JP2001126040A (en) | System and method for authenticating user of ic card and recording medium recording decision program of authentication method in system | |
CN101304316B (en) | Method for improving identification authentication security based on password card | |
CN112926992B (en) | Risk control method and device for order receiving service | |
US11620648B2 (en) | Payment method and system through generation of one-time payment-only number of real card linked with application | |
CN113469677B (en) | DESFire card data safety read-write method and device | |
CN112954677B (en) | Password verification method, device, equipment and computer readable storage medium | |
CN101304317B (en) | Method for improving identification authentication security based on password card | |
CN113383527B (en) | Method for authenticating terminal user on trusted device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |