CN117113445B - Information sharing method for smart card data terminal system - Google Patents

Information sharing method for smart card data terminal system Download PDF

Info

Publication number
CN117113445B
CN117113445B CN202311121100.5A CN202311121100A CN117113445B CN 117113445 B CN117113445 B CN 117113445B CN 202311121100 A CN202311121100 A CN 202311121100A CN 117113445 B CN117113445 B CN 117113445B
Authority
CN
China
Prior art keywords
data
outside
transmitted
cavity
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311121100.5A
Other languages
Chinese (zh)
Other versions
CN117113445A (en
Inventor
王美霞
居小琴
姚培华
施炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Vocational and Technical Shipping College
Original Assignee
Jiangsu Vocational and Technical Shipping College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Vocational and Technical Shipping College filed Critical Jiangsu Vocational and Technical Shipping College
Priority to CN202311121100.5A priority Critical patent/CN117113445B/en
Publication of CN117113445A publication Critical patent/CN117113445A/en
Application granted granted Critical
Publication of CN117113445B publication Critical patent/CN117113445B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of digital information transmission, in particular to an information sharing method of a data terminal system of an intelligent card. The method comprises the following steps: when the smart card is connected with external equipment, the external equipment transmits data to the smart card, and the smart card firstly reads and identifies the data transmitted by the external equipment; after the smart card reads and identifies the data transmitted from the outside, the identified data is checked and connected; when the smart card is connected with the outside, distinguishing the data transmitted from the outside, and operating according to the data transmitted from the outside; according to the invention, through the data transition of the data cavity to the external connection, when viruses exist in the data transmitted by the external connection or the data transmitted by the external connection actively reads the data in the intelligent card, the data cavity performs a space buffer to the data transmitted by the external connection, so that the data in the intelligent card is not attacked, and the use safety of the intelligent card is ensured.

Description

Information sharing method for smart card data terminal system
Technical Field
The invention relates to the technical field of digital information transmission, in particular to an information sharing method of a data terminal system of an intelligent card.
Background
Smart cards are a generic term for plastic cards (typically the size of a credit card) with a microchip embedded therein. The smart card needs to interact with data through a reader-writer. The smart card is equipped with a CPU, RAM and I/O, and can process a large amount of data by itself without interfering with the operation of the host CPU. With the development of society, the types of smart cards used are increasing, so that a hybrid smart card is provided, and functions of various smart cards are integrated into a whole, so that the use of users is facilitated.
When the smart card is connected with external data together, when viruses exist in the external connection data, the internal data of the smart card are easy to damage, so that the internal data of the smart card are lost, the smart card cannot be used normally, and meanwhile, the internal data of the smart card are easy to be read by the external data with viruses, so that the internal data of the smart card are read, and the loss is caused for a user of the smart card.
Disclosure of Invention
The invention aims to provide a smart card data terminal system information sharing method for solving the problems in the background technology.
In order to achieve the above object, the present invention provides a method for sharing information of a data terminal system of a smart card, which comprises the following steps:
s1, when a smart card is connected with external equipment, the external equipment transmits data to the smart card, and the smart card firstly reads and identifies the data transmitted from the external equipment and judges the security of the external data transmission;
the data identification of the external transmission comprises the following steps:
receiving data transmitted from the outside:
a special data cavity is arranged in the intelligent card to temporarily store data transmitted from the outside, and the data transmitted from the outside is checked in the data cavity;
after the data cavity is checked with external data, identifying the data temporarily stored in the data cavity;
classifying the identified data according to the identified data category;
transmitting a signal connection request to a position storing information of the category according to the category of the data classification completion;
s2, after the smart card reads and identifies the data transmitted from the outside, the identified data is checked and connected, meanwhile, the data transmitted from the outside is distinguished, the type of the signal is determined, and the operation is performed according to the data transmitted from the outside;
the steps of data transmission and reading for external transmission are as follows:
the position for storing the category information is connected with the request sent by the data cavity;
the position for storing the information of the category is transmitted to the data cavity along the channel from which the request is transmitted to the reverse transmission key, and is matched and connected with the data transmitted from the outside;
the external transmission data and the key connection comprise two cases;
case one: when the data transmitted from the outside and the key are matched, the data cavity transmits the signal of the matched key to the position of storing the information along the channel of the key transmission;
and a second case: when the data transmitted from the outside is not successfully matched with the key, the data transmitted from the outside is repeatedly matched with the key, and when the verification reaches the preset times, the external signal is removed, so that the external signal is disconnected with the smart card, and the information in the smart card is protected;
when the key is successfully connected with the data transmitted from the outside, the information to be read is collected in the smart card according to the information to be read of the data transmitted from the outside and is copied in the data cavity;
and S3, transmitting the data stored in the data cavity along a channel transmitted in from the outside, and storing the data to be input into the smart card.
As a further improvement of the present solution, when recognizing data temporarily stored in the data cavity, the following gestures exist:
posture one: the data transmitted from outside is to read a certain item of information from the inside of the intelligent card, and at the moment, a request is sent to the position where the information is stored;
posture II: the data transmitted from outside is to key in a certain item of information into the smart card, and at this time, the key-in information is checked.
As a further improvement of the technical scheme, when the data transmitted from the outside are identified, two categories are included;
the first type is that when the data transmitted from the outside is a piece of information in the intelligent card, the information collected in the intelligent card is transmitted to the data cavity, and the information is transmitted out along a channel in which the data is transmitted from the outside;
and when the data transmitted from the outside is input into a certain information to the smart card, checking the input request, and storing and recording the input data.
As a further improvement of the technical scheme, the information typing in the category two comprises the following steps:
performing key connection on a request needing to key information;
after the key connection is completed, storing information to be typed in a data cavity;
copying the information entered in the data cavity after determining that the entered information is secure data, and storing the copied information in a location in the smart card where the information is stored;
information about such data entry, time of entry, and location record of such data entry.
As a further improvement of the technical scheme, when the data transmitted from the outside is temporarily stored in the data cavity, the data transmitted from the outside is monitored, and whether the data transmitted from the outside has a diffusion phenomenon is observed, which is as follows:
case one: the data transmitted from the outside are in the data cavity, are not aggressive and are not diffused in the data cavity, and at the moment, the data transmitted from the outside are subjected to signal identification;
and a second case: the data transmitted from the outside are diffused in the data cavity, temporary data in the data cavity are continuously phagocytized, and the data transmitted from the outside are removed through signal removal.
As a further improvement of the present technical solution, the method for detecting data diffusion is a space-limited method, which includes the following steps:
(1) the data cavity divides the space for temporarily storing the data transmitted from the outside into the data cavity according to the size of the data transmitted from the outside;
(2) the data transmitted from the outside temporarily stored in the prescribed range in the data cavity is stored in the divided storage space and spread in the prescribed storage space;
(3) when the diffusion speed of the externally transmitted data in the specified storage space is less than or equal to the specified speed, defining the externally transmitted data as non-invasive data at the moment;
(4) when the speed of diffusion of the externally transmitted data in the prescribed storage space is greater than the prescribed speed, the externally transmitted data is defined as aggressive data at this time.
As a further improvement of the present technical solution, the algorithm for detecting data diffusion is as follows:
wherein ρ is the data diffusion rate, D is the number of the initial occupied space of the data, L is the number of the occupied space of the data at a certain time, T is the time from D to L of the number of the space of the data, and η is the coefficient of the data diffusion.
As a further improvement of the technical scheme, the key matching method comprises the following steps:
the first step: the key command data sent from S2.2 is transmitted to the inside of the data cavity and matched with the data transmitted from the outside;
and a second step of: matching the key command data with the character segments in the same information segment of the data transmitted from the outside, and temporarily storing the matched character segments after the matching is completed;
and a third step of: and reading according to the character segment which is matched, if the character segment can be read, finishing the matching, and if the character segment can not be read, failing to match.
As a further improvement of the technical scheme, the signal rejection method comprises the following steps:
1. when the problem of data transmitted from the outside or incorrect data matching is determined, generating a signal for rejecting the data transmitted from the outside, and transmitting the rejected signal to the inside of the data cavity;
2. the removed signals entering the data cavity are received by the position, in the data cavity, for temporarily storing the externally transmitted data, the data cavity deletes the externally transmitted data, and the receiving of the external signals is stopped.
As a further improvement of the technical scheme, the calculation method for dividing the temporary storage space of the data cavity for external transmission data is as follows:
L S =INT((L-1)/(S*C)+1)*S*C
wherein L is S S is the number of sectors of each cluster of a data cavity, and L is the data length of external transmission; c is the number of bytes per sector and INT is the rounding symbol.
Compared with the prior art, the invention has the beneficial effects that:
1. in the information sharing method of the smart card data terminal system, the data connected to the outside is temporarily stored through the set data cavity, and the data cavity is used for transition when the data is transmitted, so that when viruses exist in the data transmitted from the outside or the data transmitted from the outside actively reads the data in the smart card, the data transmitted from the outside is buffered by the data cavity, the data in the smart card is not attacked, and the use safety of the smart card is ensured.
2. In the intelligent card data terminal system information sharing method, when the data transmitted from the outside and the intelligent card are matched for a plurality of times and cannot pass through, the data transmitted from the outside and connected with the intelligent card are removed, so that the connection between the intelligent card and the outside is disconnected, and the data in the intelligent card is prevented from being read in the process of being connected with the outside.
3. In the information sharing method of the data terminal system of the smart card, the time of entering data and the unit where the data is entered are recorded, when the later entered data is in doubt, the information stored in the smart card is conveniently connected with the entered unit, and the communication of the entered data is conveniently carried out.
Drawings
FIG. 1 is an overall block diagram of embodiment 1;
fig. 2 is a block diagram of information identification of embodiment 1;
FIG. 3 is a transmission read block diagram of embodiment 1;
FIG. 4 is a block diagram of information entry/transmission according to embodiment 1;
FIG. 5 is a block diagram of information entry according to example 1;
fig. 6 is an overall flow block diagram of embodiment 1.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the description of the present invention, it should be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the apparatus or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention.
Example 1
The invention provides a smart card data terminal system information sharing method, please refer to fig. 1-6, which comprises the following steps:
s1, when a smart card is connected with external equipment, the external equipment transmits data to the smart card, and the smart card firstly reads and identifies the data transmitted from the external equipment and judges the security of the external data transmission;
the data identification of the external transmission comprises the following steps:
receiving data transmitted from the outside:
a special data cavity is arranged in the intelligent card to temporarily store data transmitted from the outside, and the data transmitted from the outside is checked in the data cavity;
after the data cavity is checked with external data, identifying the data temporarily stored in the data cavity;
classifying the identified data according to the identified data category;
transmitting a signal connection request to a position storing information of the category according to the category of the data classification completion;
s2, after the smart card reads and identifies the data transmitted from the outside, the identified data is checked and connected, meanwhile, the data transmitted from the outside is distinguished, the type of the signal is determined, and the operation is performed according to the data transmitted from the outside;
the steps of data transmission and reading for external transmission are as follows:
the position for storing the category information is connected with the request sent by the data cavity;
the position for storing the information of the category is transmitted to the data cavity along the channel from which the request is transmitted to the reverse transmission key, and is matched and connected with the data transmitted from the outside;
the external transmission data and the key connection comprise two cases;
case one: when the data transmitted from the outside and the key are matched, the data cavity transmits the signal of the matched key to the position of storing the information along the channel of the key transmission;
and a second case: when the data transmitted from the outside is not successfully matched with the key, the data transmitted from the outside is repeatedly matched with the key, and when the verification reaches the preset times, the external signal is removed, so that the external signal is disconnected with the smart card, and the information in the smart card is protected;
when the key is successfully connected with the data transmitted from the outside, the information to be read is collected in the smart card according to the information to be read of the data transmitted from the outside and is copied in the data cavity;
and S3, transmitting the data stored in the data cavity along a channel transmitted in from the outside, and storing the data to be input into the smart card.
Further, when recognizing data temporarily stored in the data cavity, the following gestures exist:
posture one: the data transmitted from outside is to read a certain item of information from the inside of the intelligent card, and at the moment, a request is sent to the position where the information is stored;
posture II: the data transmitted from outside is to key in a certain item of information into the smart card, and at this time, the key-in information is checked.
Specifically, when identifying the data transmitted from the outside, the data comprises two categories;
the first type is that when the data transmitted from the outside is a piece of information in the intelligent card, the information collected in the intelligent card is transmitted to the data cavity, and the information is transmitted out along a channel in which the data is transmitted from the outside;
and when the data transmitted from the outside is input into a certain information to the smart card, checking the input request, and storing and recording the input data.
In addition, the information typing in category two includes the steps of:
performing key connection on a request needing to key information;
after the key connection is completed, storing information to be typed in a data cavity;
copying the information entered in the data cavity after determining that the entered information is secure data, and storing the copied information in a location in the smart card where the information is stored;
information about such data entry, time of entry, and location record of such data entry.
Further, when the data transmitted from the outside is temporarily stored in the data cavity, the data transmitted from the outside is monitored, and whether the data transmitted from the outside has a diffusion phenomenon is observed, which is as follows:
case one: the data transmitted from the outside are in the data cavity, are not aggressive and are not diffused in the data cavity, and at the moment, the data transmitted from the outside are subjected to signal identification;
and a second case: the data transmitted from the outside are diffused in the data cavity, temporary data in the data cavity are continuously phagocytized, and the data transmitted from the outside are removed through signal removal.
The method for detecting data diffusion is a space limiting method, and comprises the following steps:
(1) the data cavity divides the space for temporarily storing the data transmitted from the outside into the data cavity according to the size of the data transmitted from the outside;
(2) the data transmitted from the outside temporarily stored in the prescribed range in the data cavity is stored in the divided storage space and spread in the prescribed storage space;
(3) when the diffusion speed of the externally transmitted data in the specified storage space is less than or equal to the specified speed, defining the externally transmitted data as non-invasive data at the moment;
(4) when the speed of diffusion of the externally transmitted data in the prescribed storage space is greater than the prescribed speed, the externally transmitted data is defined as aggressive data at this time.
Specifically, the algorithm for detecting data diffusion is as follows:
wherein ρ is the data diffusion rate, D is the number of the initial occupied space of the data, L is the number of the occupied space of the data at a certain time, T is the time from D to L of the number of the space of the data, and η is the coefficient of the data diffusion.
Further, the key matching method is as follows:
the first step: the key command data sent from S2.2 is transmitted to the inside of the data cavity and matched with the data transmitted from the outside;
and a second step of: matching the key command data with the character segments in the same information segment of the data transmitted from the outside, and temporarily storing the matched character segments after the matching is completed;
and a third step of: and reading according to the character segment which is matched, if the character segment can be read, finishing the matching, and if the character segment can not be read, failing to match.
Specifically, the signal rejection method is as follows:
1. when the problem of data transmitted from the outside or incorrect data matching is determined, generating a signal for rejecting the data transmitted from the outside, and transmitting the rejected signal to the inside of the data cavity;
2. the removed signals entering the data cavity are received by the position, in the data cavity, for temporarily storing the externally transmitted data, the data cavity deletes the externally transmitted data, and the receiving of the external signals is stopped.
In addition, the calculation method for dividing the temporary storage space of the external transmission data by the data cavity is as follows:
L S =INT((L-1)/(S*C)+1)*S*C
wherein L is S S is the number of sectors of each cluster of a data cavity, and L is the data length of external transmission; c is the number of bytes per sector and INT is the rounding symbol.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the above-described embodiments, and that the above-described embodiments and descriptions are only preferred embodiments of the present invention, and are not intended to limit the invention, and that various changes and modifications may be made therein without departing from the spirit and scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (10)

1. A method for sharing information of a data terminal system of a smart card comprises the following steps:
s1, when a smart card is connected with external equipment, the external equipment transmits data to the smart card, and the smart card firstly reads and identifies the data transmitted from the external equipment and judges the security of the external data transmission;
the data identification of the external transmission comprises the following steps:
receiving data transmitted from the outside:
a special data cavity is arranged in the intelligent card to temporarily store data transmitted from the outside, and the data transmitted from the outside is checked in the data cavity;
after the data cavity is checked with external data, identifying the data temporarily stored in the data cavity;
classifying the identified data according to the identified data category;
transmitting a signal connection request to a position storing information of the category according to the category of the data classification completion;
s2, after the smart card reads and identifies the data transmitted from the outside, the identified data is checked and connected, meanwhile, the data transmitted from the outside is distinguished, the type of the signal is determined, and the operation is performed according to the data transmitted from the outside;
the steps of data transmission and reading for external transmission are as follows:
the position for storing the category information is connected with the request sent by the data cavity;
the position for storing the information of the category is transmitted to the data cavity along the channel from which the request is transmitted to the reverse transmission key, and is matched and connected with the data transmitted from the outside;
the external transmission data and the key connection comprise two cases;
case one: when the data transmitted from the outside and the key are matched, the data cavity transmits the signal of the matched key to the position of storing the information along the channel of the key transmission;
and a second case: when the data transmitted from the outside is not successfully matched with the key, the data transmitted from the outside is repeatedly matched with the key, and when the verification reaches the preset times, the external signal is removed, so that the external signal is disconnected with the smart card, and the information in the smart card is protected;
when the key is successfully connected with the data transmitted from the outside, the information to be read is collected in the smart card according to the information to be read of the data transmitted from the outside and is copied in the data cavity;
and S3, transmitting the data stored in the data cavity along a channel transmitted in from the outside, and storing the data to be input into the smart card.
2. The smart card data terminal system information sharing method of claim 1, wherein: when recognizing data temporarily stored in the data cavity, the following gestures exist:
posture one: the data transmitted from outside is to read a certain item of information from the inside of the intelligent card, and at the moment, a request is sent to the position where the information is stored;
posture II: the data transmitted from outside is to key in a certain item of information into the smart card, and at this time, the key-in information is checked.
3. The smart card data terminal system information sharing method of claim 1, wherein: when the data transmitted from the outside are identified, the data comprise two categories;
the first type is that when the data transmitted from the outside is a piece of information in the intelligent card, the information collected in the intelligent card is transmitted to the data cavity, and the information is transmitted out along a channel in which the data is transmitted from the outside;
and when the data transmitted from the outside is input into a certain information to the smart card, checking the input request, and storing and recording the input data.
4. A smart card data terminal system information sharing method as claimed in claim 3, wherein: the information typing in category two comprises the following steps:
performing key connection on a request needing to key information;
after the key connection is completed, storing information to be typed in a data cavity;
copying the information entered in the data cavity after determining that the entered information is secure data, and storing the copied information in a location in the smart card where the information is stored;
information about such data entry, time of entry, and location record of such data entry.
5. The smart card data terminal system information sharing method of claim 1, wherein: when the data transmitted from the outside is temporarily stored in the data cavity, the data transmitted from the outside is monitored, and whether the data transmitted from the outside has a diffusion phenomenon or not is observed, wherein the situation is as follows:
case one: the data transmitted from the outside are in the data cavity, are not aggressive and are not diffused in the data cavity, and at the moment, the data transmitted from the outside are subjected to signal identification;
and a second case: the data transmitted from the outside are diffused in the data cavity, temporary data in the data cavity are continuously phagocytized, and the data transmitted from the outside are removed through signal removal.
6. The smart card data terminal system information sharing method of claim 5, wherein: the method for detecting data diffusion is a space limiting method, and comprises the following steps:
(1) the data cavity divides the space for temporarily storing the data transmitted from the outside into the data cavity according to the size of the data transmitted from the outside;
(2) the data transmitted from the outside temporarily stored in the prescribed range in the data cavity is stored in the divided storage space and spread in the prescribed storage space;
(3) when the diffusion speed of the externally transmitted data in the specified storage space is less than or equal to the specified speed, defining the externally transmitted data as non-invasive data at the moment;
(4) when the speed of diffusion of the externally transmitted data in the prescribed storage space is greater than the prescribed speed, the externally transmitted data is defined as aggressive data at this time.
7. The smart card data terminal system information sharing method of claim 6, wherein: the algorithm for detecting data diffusion is as follows:
wherein ρ is the data diffusion rate, D is the number of the initial occupied space of the data, L is the number of the occupied space of the data at a certain time, T is the time from D to L of the number of the space of the data, and η is the coefficient of the data diffusion.
8. The smart card data terminal system information sharing method of claim 1, wherein: the key matching method comprises the following steps:
the first step: the key command data sent from the information storage position is transmitted to the inside of the data cavity and matched with the data transmitted from the outside;
and a second step of: matching the key command data with the character segments in the same information segment of the data transmitted from the outside, and temporarily storing the matched character segments after the matching is completed;
and a third step of: and reading according to the character segment which is matched, if the character segment can be read, finishing the matching, and if the character segment can not be read, failing to match.
9. The smart card data terminal system information sharing method of claim 1, wherein: the signal rejection method comprises the following steps:
1. when the problem of data transmitted from the outside or incorrect data matching is determined, generating a signal for rejecting the data transmitted from the outside, and transmitting the rejected signal to the inside of the data cavity;
2. the removed signals entering the data cavity are received by the position, in the data cavity, for temporarily storing the externally transmitted data, the data cavity deletes the externally transmitted data, and the receiving of the external signals is stopped.
10. The smart card data terminal system information sharing method of claim 1, wherein: the calculation method for dividing the temporary storage space of the data cavity for external transmission data comprises the following steps:
L S =INT((L-1)/(S*C)+1)*S*C
wherein L is S S is the number of sectors of each cluster of a data cavity, and L is the data length of external transmission; c is the number of bytes per sector and INT is the rounding symbol.
CN202311121100.5A 2023-09-01 2023-09-01 Information sharing method for smart card data terminal system Active CN117113445B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311121100.5A CN117113445B (en) 2023-09-01 2023-09-01 Information sharing method for smart card data terminal system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311121100.5A CN117113445B (en) 2023-09-01 2023-09-01 Information sharing method for smart card data terminal system

Publications (2)

Publication Number Publication Date
CN117113445A CN117113445A (en) 2023-11-24
CN117113445B true CN117113445B (en) 2024-02-09

Family

ID=88801878

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311121100.5A Active CN117113445B (en) 2023-09-01 2023-09-01 Information sharing method for smart card data terminal system

Country Status (1)

Country Link
CN (1) CN117113445B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056077A (en) * 2009-10-29 2011-05-11 中国移动通信集团公司 Method and device for applying smart card by key
CN106130730A (en) * 2016-06-21 2016-11-16 中国银联股份有限公司 The data sharing method of a kind of smart card and smart card
CN108696361A (en) * 2018-04-24 2018-10-23 北京小米移动软件有限公司 Configuration method, generation method and the device of smart card

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1796388A1 (en) * 2005-12-12 2007-06-13 Advanced Digital Broadcast S.A. Smart card with data storage, set-top box, portable player for operating smart card with data storage and method for manufacturing smart card with data storage
US8413906B2 (en) * 2011-05-22 2013-04-09 King Saud University Countermeasures to secure smart cards
WO2015053537A1 (en) * 2013-10-07 2015-04-16 주식회사 대동 Slim-type smart card key of vehicle and control method therefor

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056077A (en) * 2009-10-29 2011-05-11 中国移动通信集团公司 Method and device for applying smart card by key
CN106130730A (en) * 2016-06-21 2016-11-16 中国银联股份有限公司 The data sharing method of a kind of smart card and smart card
CN108696361A (en) * 2018-04-24 2018-10-23 北京小米移动软件有限公司 Configuration method, generation method and the device of smart card

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于JAAS和智能卡的通用身份认证模块的实现;曾海;中国防伪报道;37-40 *

Also Published As

Publication number Publication date
CN117113445A (en) 2023-11-24

Similar Documents

Publication Publication Date Title
CN109886697B (en) Operation determination method and device based on expression group and electronic equipment
CN108922074A (en) Without card withdrawal method, apparatus, computer equipment and storage medium
US20220164423A1 (en) Method and apparatus for user recognition
CN103632401A (en) Transportation non-contact chip card toll equipment with identity identification function
CN105095944A (en) Anti-theft bank card and ATM bank card swiping anti-theft method
US20060253710A1 (en) Biometric information recognition credit card system and credit card scanner
CN117113445B (en) Information sharing method for smart card data terminal system
US20030159052A1 (en) Security system and security inspection method using physical information stored in storage medium
CN107633625B (en) Self-service transaction reminding method and device and terminal equipment
US20010019302A1 (en) Data converter
CN105427480A (en) Teller machine based on image analysis
JP2003500781A (en) Method and apparatus for storing and retrieving a PIN code
JPS62212781A (en) Personal identification system
KR100991883B1 (en) Smart card system for fingerprinting congnition and control method thereof
JPH02249062A (en) Individual identifying system
CN201226167Y (en) POS terminal
US7433501B2 (en) Biometric identification method and device adapted to verification on chip cards
CN201689479U (en) Identity authenticating device of fingerprint radio frequency IC card
CN105096190A (en) Intelligent card locking method and apparatus
JP2007323116A (en) Card-less settlement terminal equipment, card-less settlement host, and card-less settlement system
US20220366028A1 (en) Method and sysem for fingerprint verification and enrollment with secure storage of templates
CN108920920A (en) Fingerprint input method and device, computer installation and computer readable storage medium
CN113553888B (en) Personnel identity verification method, device, equipment and storage medium
US11727097B2 (en) Dual fingerprint sensor credentialing
KR102138659B1 (en) Smart credit card and settlement system to recognize fingerprints

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant