CN204965479U - Financial IC -card of intelligence - Google Patents

Financial IC -card of intelligence Download PDF

Info

Publication number
CN204965479U
CN204965479U CN201520714363.1U CN201520714363U CN204965479U CN 204965479 U CN204965479 U CN 204965479U CN 201520714363 U CN201520714363 U CN 201520714363U CN 204965479 U CN204965479 U CN 204965479U
Authority
CN
China
Prior art keywords
card
self
destruction
safety chip
environmental sensor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201520714363.1U
Other languages
Chinese (zh)
Inventor
苗欣
夏舒畅
黄权
马震伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Synodata Security Technology Co Ltd
Original Assignee
Hangzhou Synodata Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Synodata Security Technology Co Ltd filed Critical Hangzhou Synodata Security Technology Co Ltd
Priority to CN201520714363.1U priority Critical patent/CN204965479U/en
Application granted granted Critical
Publication of CN204965479U publication Critical patent/CN204965479U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Credit Cards Or The Like (AREA)

Abstract

The utility model provides a financial IC -card of intelligence, including the card body, be packaged with on the card body can received the abnormal signal post -trigger or from line trig self -destruction internal data and write down the self -destruction reason security chip, be used for the data interaction and realize 7816 interfaces, power management, paper battery, environmental sensor, the defence layer that external power used, the security chip that the self -destruction was all triggered when receiving its abnormal signal on environmental sensor and defence layer is connected, environmental sensor and security chip all are connected with the paper battery of inside power supply usefulness, security chip with give its normal mode power supply and rather than the 7816 interface connection of data interaction, the paper battery is to its 7816 interface connection who charges during in proper order with the power management going on its charging process managing, external power. The utility model provides high financial IC -card of intelligence's security performance, it is multiple functional.

Description

A kind of intelligent finance IC-card
Technical field
The utility model relates to a kind of intelligent finance IC-card.
Background technology
From in Dec, 2005, since industrial and commercial bank releases domestic leader's financial IC card, financial IC card is rapidly grown up under the dual power-assisted of government and market.Central Bank announces on July 19th, 2012, and on January 1st, 2013 rises, and national commercial bank all will issue financial IC card.By the first half of the year in 2012, the accumulative distribution financial IC card more than 4,500 ten thousand in the whole nation, comparatively increase by 2,070 ten thousand the end of the year 2011, amplification reached 85%, realizes financial IC card in increment hair fastener accounting more than 15% before the end of the year.In March, 2011, Central Bank starts bank's magnetic stripe card to IC-card migration work comprehensively.According to the timetable of Central Bank, work, agriculture, in, build, hand over and promote trade and investment, the state-owned large row such as Postal Savings bank gets off the ground financial IC card.Social security card merges with financial IC card, estimates that " 12 " period is by distribution 800,000,000 financial IC cards.
The profile of financial IC card is similar to magnetic stripe card, and different places is the medium that data store.Magnetic stripe card stores information by the changes of magnetic field of magnetic stripe on card, and financial IC card is then carry out storing data information by the integrated circuit (IC) chip embedded in card.Compared with traditional magnetic stripe card, financial IC card has more obvious advantage:
1, the revolutionary advantage of one card for multiple uses is possessed.The memory capacity of financial IC card is hundreds of times of conventional magnetic stripe card, implantable more application program, such as social security, public transport, retail, hospital, self-service ticket and sell goods.Thus financial IC card is widely used each area of collaboration except bank, really realize " one card for multiple uses, all-purpose card are capable ".
2, level security is good.Compare magnetic stripe card, financial IC card possesses very strong anti-attack ability, is difficult to be replicated and forgery.
3, " dodge and pay " quick consumption.Be different from traditional magnetic stripe card and can only have an account, electronic cash account (i.e. " stored value card ") in IC card chip, can also be increased, the account remaining sum upper limit 1000 yuan, realize off line by " dodge and pay " and consume fast.
As computer can suffer attack, CPU card is as the same.In February, 2010, the researchist of Cambridge University finds a considerable safety leak of EMV standard, assailant can utilize this leak to initiate man-in-the-middle attack, communication information between terminal and IC-card is tackled and distorted, cause input any PIN(PIN (Personal Identification Number), the i.e. daily said personal identification number of people) this IC-card can be used.Specifically, assailant is by " go-between " of use electronic equipment as payment terminal and card sending mechanism background system, stop background system PIN being sent to card sending mechanism, and the response of " PIN verification correct " is sent to terminal, so just make non-holder put through deal when not knowing the true off line PIN of card.
Britain carries out bank card chip migration country the earliest, is also implement one of the fastest country.Britain, promoting early stage (before 2005) of this work, uses static data certification (SDA) means to carry out off line certification in offline transaction always.Although the degree of safety of SDA exceeds a lot than magnetic stripe, criminal's molecule is still easy to obtain account data and bank's digital signature to make pseudo-the card, and the risk of off-line trading is still very high.Along with contactless payment application and the offline transaction such as small amount payment application increasing, the domestic pseudo-card fraud loss of Britain is not well contained.Within 2004, the domestic pseudo-card fraud loss amount of money of Britain is still up to 1.06 hundred million pounds, has hit the enthusiasm that financial IC card work is carried out by Britain.
The safety of existing ordinary financial IC-card is from bottom to top, and from the chip hardware safety of bottom, to the chip operating system safety in middle layer, until the application safety of the superiors, its large area is inactive area.
Current financial IC card, has had very large security improvement relative to traditional magnetic stripe card, but still there is certain problem, and the shortcoming of existence is as follows:
1, because current IC-card is a completely passive device, therefore when there is no externally fed, any attack cannot be tackled.
2, when needs are discarded, even if the mode by cutting card, also cannot ensure that the interior data of card are effectively eliminated, as long as the storage area of safety chip inside is not destroyed, information just still exists.
3, after being attacked, particularly under off line certification mode (such as Countries and area is cross-border use time) attack occur after, be difficult to review assailant.
Summary of the invention
The utility model provides high, the multiple functional intelligent finance IC-card of a kind of security performance.
The technical solution adopted in the utility model is:
A kind of intelligent finance IC-card, comprise card body, it is characterized in that: described card body is packaged with and can triggers after receiving abnormal signal or trigger self-destruction internal data voluntarily and record the safety chip of self-destruction reason, for data interaction and 7816 interfaces realizing externally fed, power management, paper battery, environmental sensor, defence layer, described environmental sensor is all connected with the safety chip triggering self-destruction when receiving its abnormal signal with defence layer, described environmental sensor, defence layer and safety chip all with in-line power with paper battery be connected, described safety chip is powered with giving its normal mode and is connected with 7816 interfaces of its data interaction, described paper battery successively with the power management that its charging process is managed, during externally fed, 7816 interfaces of its charging are connected.Safety chip of the present utility model is as main logic unit, realize safety applications and safe storage function, it possesses self-destroying function, and when the transmitting-receiving of defence layer signal is inconsistent or environmental sensor receives abnormal signal, safety chip opens self-destroying function, destroy whole sensitive data, record self-destruction reason, also can the function of initiatively triggering secure chip self-destroying, initiatively destroyed sensitive data, record self-destruction reason, improves the security performance of intelligent finance IC-card.And 7816 interface and safety chip can form traditional financial IC card, realize the general application of financial IC card, when having externally fed, chip operation, based on externally fed, is operated in normal mode.When departing from externally fed, paper battery can be powered to environmental sensor and safety chip, ensures that card still can be on the defensive when not having externally fed, multiple functional.The utility model can be charged to paper battery by 7816 interfaces, charging process is by power management management and control, can charge to paper battery in the process of swiping the card in any main frame contact in practical application, such as, operate in ATM, POS, paper battery can normally be played a role.
Further, described defence layer is many metal line, and it covers upper and lower and the surrounding of protected circuit, and its signal transmitting terminal and signal receiving end link together.When the transmitting-receiving of signal transmitting terminal and signal receiving end is inconsistent, the random signal as defence layer occurs and the safety chip of comparer can open self-destroying function, destroys whole sensitive data, records self-destruction reason.
Further, described environmental sensor is arranged on card major or safety chip inside, and it comprises temperature sensor, visible light sensor, UV sensor, radiation sensor.When environmental sensor receives abnormal signal, the safety chip as the signal receiver of environmental sensor can open self-destroying function, destroys whole sensitive data, record self-destruction reason.
Further, described safety chip is provided with low-power consumption mode.When paper battery is powered, adopting low-power consumption mode, realizing the defense function when not having externally fed.
The beneficial effects of the utility model:
1, double intrusive mood, the protection that intrusive mood is attacked, increases the difficulty to hardware attack.
The self-destruction that 2, can be triggered by software, increases software attacks difficulty.
3, when discarded card, user can trigger self-destruction by cutting card, prevents sensitive data from revealing.
4, also security protection can be carried out to card when there is no externally fed.
5, assailant can be traced according to the information retained during self-destruction after being attacked.
6, after self-destruction, as long as card complete (not being subject to hardware attack), just can pass through card issuer reset information, reactivate, without the need to fabrication again.
7, after (being subject to software attacks) part self-destruction, not affecting other functions and using.
8, to the paper battery charging in card while using card in contact terminal.
Accompanying drawing explanation
Fig. 1 is structural representation of the present utility model.
Fig. 2 be of the present utility model under fire time tupe schematic diagram.
Embodiment
Below in conjunction with specific embodiment, the utility model is further described, but the utility model is not confined to these embodiments.One skilled in the art would recognize that the utility model covers all alternativess, improvement project and the equivalents that may comprise in Claims scope.
With reference to Fig. 1, a kind of intelligent finance IC-card, comprise card body 1, described card body 1 is packaged with and can triggers after receiving abnormal signal or trigger self-destruction internal data voluntarily and record the safety chip 5 of self-destruction reason, for data interaction and 7816 interfaces 7 realizing externally fed, power management 2, paper battery 3, environmental sensor 4, defence layer 6, described environmental sensor 4 is all connected with the safety chip 5 triggering self-destruction when receiving its abnormal signal with defence layer 6, described environmental sensor 4, defence layer 6 and safety chip 5 all with in-line power with paper battery 3 be connected, described safety chip 5 is powered with giving its normal mode and is connected with 7816 interfaces 7 of its data interaction, described paper battery 3 successively with the power management 2 that its charging process is managed, during externally fed, 7816 interfaces 7 of its charging are connected.Safety chip 5 of the present utility model is as main logic unit, realize safety applications and safe storage function, it possesses self-destroying function, and when defence layer 6 signal transmitting and receiving is inconsistent or environmental sensor 4 receives abnormal signal, safety chip 5 opens self-destroying function, destroy whole sensitive data, record self-destruction reason, also can the function of initiatively triggering secure chip 5 self-destruction, initiatively destroyed sensitive data, record self-destruction reason, improves the security performance of intelligent finance IC-card.And 7816 interface 7 and safety chip 5 can form traditional financial IC card, realize the general application of financial IC card, when having externally fed, chip operation, based on externally fed, is operated in normal mode.When departing from externally fed, paper battery 3 can be powered to environmental sensor 4 and safety chip 5, ensures that card still can be on the defensive when not having externally fed, multiple functional.The utility model can be charged to paper battery 3 by 7816 interfaces 7, charging process is by power management 2 management and control, can charge to paper battery in the process of swiping the card in any main frame contact in practical application, such as, operate in ATM, POS, paper battery 3 can normally be played a role.
Defend layer 6 to be many metal line described in the present embodiment, it covers upper and lower and the surrounding of protected circuit, and its signal transmitting terminal and signal receiving end link together.When the transmitting-receiving of signal transmitting terminal and signal receiving end is inconsistent, the random signal as defence layer 6 occurs and the safety chip 5 of comparer can open self-destroying function, destroys whole sensitive data, records self-destruction reason.
Environmental sensor 4 described in the present embodiment is arranged on card major 1 or safety chip 5 inside, and it comprises temperature sensor, visible light sensor, UV sensor, radiation sensor etc.When environmental sensor 4 receives abnormal signal, the safety chip 5 as the signal receiver of environmental sensor 4 can open self-destroying function, destroys whole sensitive data, record self-destruction reason.
Described in the present embodiment, safety chip 5 is provided with low-power consumption mode.When paper battery 3 is powered, adopting low-power consumption mode, realizing the defense function when not having externally fed.
The utility model has the repertoire the same with ordinary financial IC-card and feature; The inner paper battery 3 that uses is powered, and for defending layer 6 input, environmental sensor 4 works and the function such as card self-destruction; Use defence layer 6 and environmental sensor 4, for intrusion detection, triggering secure chip 5 self-destruction when being subject to intrusive mood or half intrusive mood attacks, protection sensitive data does not leak; Application and operating system can triggering secure chip 5 self-destructions, protect sensitive data not leak.
The self-destroying function of the utility model safety chip 5 is as follows:
1, start safety chip 5 self-destroying function and can delete the part or all of sensitive data preserved in chip.Its objective is and prevent assailant from obtaining and analyze sensitive data, although financial IC card internal security chip all have employed data encryption at present, do not get rid of the possibility be cracked future.
2, reason during 5 self-destruction of record security chip.Its objective is and keep the scene intact, record by the reason of attacking, such as by attack application, the time, event and assailant's (if main frame) information, review and tracing assailant for problem.
3, part self-destroying function (self-destruction classification).According to by the different modes attacked, adopt different self-destruction strategies, the self-destruction strategy of software attacks can realize customization by amendment application and operating system.Such as: when assailant is only for an application, then the data that this application of self-destruction is relevant, when assailant's directtissima hardware, then self-destruction total data.Its objective is under the prerequisite preventing leaking data, do not affect other and do not attacked the normal use of application.Such as: electronic cash application (such as stored value card), by after attack self-destruction, does not affect the function of financial IC card debit/credit, do not affect the function of other electronic cash application (such as mass transit card) yet.
Concrete processing procedure when the utility model is under attack is as shown in Figure 2:
1, when the attack of assailant from outside directly to application, application can find and triggering secure chip 5 self-destroying function.
2, when assailant is attacked application by illegal application attack, application can find and triggering secure chip 5 self-destroying function.
3, when assailant is attacked operating system by illegal application, operating system can find and triggering secure chip self-destroying function.
4, when assailant directly attacks operating system from outside, operating system can find and triggering secure chip 5 self-destroying function.
5, when assailant directly carries out the attack of intrusive mood/half intrusive mood from outside to hardware, environmental sensor 4 and defence layer 6 can find and triggering secure chip 5 self-destroying function.
Wherein attack software and mainly refer to that assailant accesses or distort sensitive data or the data without operating right by the mode directly or indirectly (illegally applied).Mainly rely on application itself and operating system to detect to the detection of this kind of attack, and trigger the self-destruction of different stage according to the Different Strategies formulated in application or operating system.Hardware attack mainly refers to assailant's directtissima card hardware, by opening the mode of encapsulation directtissima safety chip itself, the full detail that chip internal stores can be obtained in theory, therefore when environmental sensor or defence layer detect attack, start five-star self-destruction, sensitive informations all in chip is destroyed.

Claims (4)

1. an intelligent finance IC-card, comprise card body, it is characterized in that: described card body is packaged with and can triggers after receiving abnormal signal or trigger self-destruction internal data voluntarily and record the safety chip of self-destruction reason, for data interaction and 7816 interfaces realizing externally fed, power management, paper battery, environmental sensor, defence layer, described environmental sensor is all connected with the safety chip triggering self-destruction when receiving its abnormal signal with defence layer, described environmental sensor, defence layer and safety chip all with in-line power with paper battery be connected, described safety chip is powered with giving its normal mode and is connected with 7816 interfaces of its data interaction, described paper battery successively with the power management that its charging process is managed, during externally fed, 7816 interfaces of its charging are connected.
2. a kind of intelligent finance IC-card as claimed in claim 1, it is characterized in that: described defence layer is many metal line, it covers upper and lower and the surrounding of protected circuit, and its signal transmitting terminal and signal receiving end link together.
3. a kind of intelligent finance IC-card as claimed in claim 1, is characterized in that: described environmental sensor is arranged on card major or safety chip inside, and it comprises temperature sensor, visible light sensor, UV sensor, radiation sensor.
4. a kind of intelligent finance IC-card as described in one of claim 1 ~ 3, is characterized in that: described safety chip is provided with low-power consumption mode.
CN201520714363.1U 2015-09-16 2015-09-16 Financial IC -card of intelligence Active CN204965479U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201520714363.1U CN204965479U (en) 2015-09-16 2015-09-16 Financial IC -card of intelligence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201520714363.1U CN204965479U (en) 2015-09-16 2015-09-16 Financial IC -card of intelligence

Publications (1)

Publication Number Publication Date
CN204965479U true CN204965479U (en) 2016-01-13

Family

ID=55060530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201520714363.1U Active CN204965479U (en) 2015-09-16 2015-09-16 Financial IC -card of intelligence

Country Status (1)

Country Link
CN (1) CN204965479U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108205633A (en) * 2016-12-20 2018-06-26 华大半导体有限公司 Prevent the method and system that chip is stolen
CN108470407A (en) * 2018-04-19 2018-08-31 深圳鼎智通讯股份有限公司 The method of POS machine Network Intrusion record
CN109241786A (en) * 2018-10-08 2019-01-18 赵建和 A kind of independent flash card
CN109994134A (en) * 2019-04-04 2019-07-09 上海威固信息技术股份有限公司 It is a kind of can Blasting destruction single-chip solid state hard disk

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108205633A (en) * 2016-12-20 2018-06-26 华大半导体有限公司 Prevent the method and system that chip is stolen
CN108470407A (en) * 2018-04-19 2018-08-31 深圳鼎智通讯股份有限公司 The method of POS machine Network Intrusion record
CN109241786A (en) * 2018-10-08 2019-01-18 赵建和 A kind of independent flash card
CN109994134A (en) * 2019-04-04 2019-07-09 上海威固信息技术股份有限公司 It is a kind of can Blasting destruction single-chip solid state hard disk
CN109994134B (en) * 2019-04-04 2024-02-09 上海威固信息技术股份有限公司 Single-chip solid state disk capable of being destroyed in blasting mode

Similar Documents

Publication Publication Date Title
Ganji et al. Credit card fraud detection using anti-k nearest neighbor algorithm
CN204965479U (en) Financial IC -card of intelligence
US6068184A (en) Security card and system for use thereof
RU2691590C2 (en) Systems and methods of replacing or removing secret information from data
US20060032909A1 (en) System and method for providing database security measures
US20130085887A1 (en) Method and system for financial card transaction verification
CN102509394A (en) Multi-account management system based on IC (identification card) and identification password combined login
CN102737310A (en) Payment system and payment method based on contactless smart card
CN104867009A (en) Intelligent card, quota control system thereof, and quota control method thereof
CN104978597A (en) Electronic circuit chip for RFID tag with read-only-once functionality
Chauhan et al. A review paper on cryptocurrency & portfolio management
US20220138758A1 (en) Secure and safe method to disabling payment functionality on lost or stolen transaction cards
CN102663863B (en) Financial POS system capable of resisting channel Trojan attack and anti-attack realization method thereof
US20200387765A1 (en) Security Measures in Relation to Data Tags and Contactless Cards
CN110310108A (en) A kind of band tears the self-destructed New Hardware wallet of machine open
CN201892965U (en) Bank card
CN103164728A (en) IC (Integrated Circuit) card of loading fingerprint authentication function
CN110310104A (en) A kind of self-distroyable disposable hardware wallet
CN103679936A (en) Bank card capable of controlling other bank cards
JP2899464B2 (en) Electronic asset data transfer method
CN203118024U (en) IC card with fingerprint authentication function
CN103903136A (en) Payment method and system based on real-time identity authentication
Markantonakis et al. Overview of security threats for smart cards in the public transport industry
CN109558928A (en) Visual intelligent card based on domestic mechanism of communicating with code telegram
CN210721719U (en) Financial payment terminal with high safe reliability

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant