IC-card identification memory storage with expansion interface
Technical field
The utility model relates to a kind of IC-card and IC-card card reader arrangement, especially a kind of discriminating, memory storage that has the IC-card of computer general-purpose standard interface.Belong to computer peripheral.
Background technology
Integrated circuit card is made up of one or more integrated circuit (IC) chip, and is packaged into and is convenient to the card that people carry; Have temporary transient or nonvolatil data storage capacities, its content can read or supply inter-process, judgement for the outside; Have logic and mathematical operation processing power, be used to discern the information that provides with response external and the processing demands of chip itself.IC-card is as integrated circuit card, a kind of along with development of semiconductor and society arise at the historic moment to improving day by day of requirements such as Information Security, have the integrated circuit (IC) chip of microprocessor and mass storage etc. and be flush-mounted in the card of making on the substrate such as plastics.Because IC-card has adopted current state-of-the-art semiconductor fabrication and information security technology, therefore IC-card has following four characteristics with respect to the jig of other kind: 1, memory capacity is big: there are storeies such as RAM, ROM, EEPROM its inside, and memory capacity can be from several bytes to several megabyte.Can store various information such as literal, sound, figure, image on the card.2, safe: IC-card is implemented its security strategy from several aspects such as hardware and softwares, can control card in the access features of zones of different.Itself has security password memory card, if attempt illegally it to be carried out data access then the card self-destruction, promptly can not read and write.3, not high to network requirement: the safe reliability of IC-card makes its real-time, susceptibility to computer network in application require to reduce, and very meets current national conditions, helps using in the not high environment of network quality.
Because the reliability and the security of integrated circuit card, the use of IC-card is more and more universal, the trace of all visible IC-card from financial product to the personal consumption product, therefore, under the situation that the IC-card consumption increases year by year, PC will become unavoidable trend with combining of IC-card; In like manner, the demand of IC-card card reader also will increase day by day.Because existing computing machine is the not setting of IC-card card reader in a large number, but original computing machine can't use IC as its discriminating means.In addition, the communication port on the computer body is limited, and the increasing of the kind of available data input, mode, tend to occur the interface of computing machine by absorb, some external units can't be communicated by letter with it, can only insert use in turn, perhaps can't directly connect at all.
Summary of the invention
The purpose of this utility model is to provide a kind of IC-card identification memory storage with expansion interface, it has the general-purpose interface with computer-directed communications, utilize IC cryptographic capabilities height, and, improve safe and secret management expectancy widely as the authority recognition that computing machine uses.
Another purpose of the present utility model is to provide a kind of IC-card identification memory storage with expansion interface, which is provided with an above multi-purpose computer communication interface, has interface conversion and extended capability.
A purpose more of the present utility model is to provide a kind of IC-card identification memory storage with expansion interface, and its memory storage can have non-volatile flash memory, has big storage space, and can be used as the memory storage of information such as recording user daily record.
For achieving the above object, the utility model is achieved through the following technical solutions:
A kind of IC-card identification memory storage with expansion interface, it comprises IC-card and IC-card deck, wherein said deck output terminal is provided with the standard interface that is connected with computing machine, input end is provided with the computer standard interface on the deck body, and this interface is more than one, and the internal circuit cooperation is provided with change-over circuit.
The communication interface of input end is RS-232 or com port or IEEE1394 or USB or PS/2 or Parallel Port/IEEE-1284 on the described deck body.
The communication interface of output terminal is RS-232 or com port or IEEE1394 or USB or PS/2 or Parallel Port/IEEE-1284 on the described deck body.
Inside is connected with Nonvolatile memory devices on the described deck body, for example flash memory (FLASH).
According to the technique scheme analysis as can be known, the utlity model has following advantage:
1, the utility model is IC card product and PC or the convenient easy-to-use communication bridge of similar service end equipment foundation, utilizes IC cryptographic capabilities height, and as the authority recognition that computing machine uses, improves safe and secret management expectancy widely.
2, because IC-card and deck are integrated device, so utilize the higher cryptographic capabilities of IC-card, the utility model during as recognition device, can directly be plugged on computing machine by the general-purpose interface on it, and not need to change the interface structure of original computing machine.
3, communication mode is compatible strong.This device increases the general-purpose interface of a plurality of expansions, for example utilizes RS-232, com port, and IEEE1394, USB, PS/2 reaches interfaces such as Parallel Port/IEEE-1284.Be like this communication interface of computing machine itself all occupied or, the interface of this device is occupied, the user can selectivity uses other communication device interfaces on the utility model.Therefore, the utility model can also make the main process equipment of part communication interface deficiency have unnecessary communication interface to use for other equipment, also can change the interface of various different communication modes.
Description of drawings
Fig. 1 is a kind of example structure synoptic diagram of the utility model;
Fig. 2 constitutes block diagram for the utility model;
Fig. 3 is the utility model Card Reader circuit theory diagrams;
Fig. 4 is one of the utility model interface section circuit theory diagrams;
Fig. 5 is two of the utility model interface section circuit theory diagrams.
Embodiment
Referring to Fig. 1,2 and 3, the utility model is a kind of IC-card identification memory storage with expansion interface, and it comprises IC-card 7 and IC-card deck 1, and wherein the mode that combines with card reader 1 of IC-card 7 is packaged type (can substitute mode).Can increase the dirigibility that this product uses like this, can provide the user to substitute identification IC voluntarily, make things convenient for user's conversion identity with move mode.Be connected with PC by communication interface 2, the process exchanges data authenticates and reaches authentication, also can realize the function of data encryption and computing machine guard.
The IC kind has non-encrypted memory card (Memory Card), encrypted memory card (SecurityCard), and smart card (CPU Card) and radio-frequency card (RFID), above IC all can use card reader reading of data data.Card reader with can PC standard communication interface such as USB interface be arranged in order to the communication interface of linking up with PC after IC combines, serial port (Serial Port), parallel port (Parallel port), also can use non-PC standard interface such as Compact Flash interface, Secure Digital Memory Card interface (SD) ... wait the memory card communication interface.Particularly, referring to accompanying drawing 4, be the circuit theory diagrams of USB interface.5V power voltage supply (USB interface); USB D-and the D+ signal transmission data of putting in a good word for, D+ has pull-up resistor to VCC, can be identified after allowing equipment plug computer.And this principle of work meets fully, do according to the USB specification; Remaining INTERFACE interface by that analogy; Because of USB TRANSCEIVER/RECEIVER has done in the IC, so do not have on the circuit diagram " PORT TRANSCEIVERR " and " RECEIVER ", direct and the MICROCONTROLLER communication of this USBTRANSCEIVER/RECEIVER meeting transmits, receives computer data; Controller then is the form (meeting ISO 7618) that form is changed into IC-card, does the action that writes, reads.
In identification, the user only need use standard interface just can carry out identity validation and communication with PC, and it is safer to allow data on PC system or the Internet maintain secrecy, and need not add peripheral equipments such as card reader.In identification IC, owing to possess certain storage volume, and the data confidentiality is high, so can be in order to store relatively crypticity data, can preserve or in order to do the higher authentication of privacy degrees in order to data are done, can guarantee so that data information is stored in can be not stolen among the IC.
Be the characteristic of fixed equipment when using by the utility model; this product also can be used on the computing machine guard function; as long as the utility model exists; just allow the user to carry out certain operation or login; enter the higher state of degree of protection immediately in case equipment is removed, or stop the use of PC or server device immediately.When not plugging the utility model, PC can't start or part software and program can't be carried out, other people enter the computer system user without permission except the guard lock prevention of performance computer, also can be used as the computer service recorder, the everything after can be used for recording user and logining.
The implementation of system can be divided into two kinds according to different stratum:
Be used with BIOS: equipment includes single group or multiple cipher, password can use or optional one simultaneously: fixed password: be device id, BIOS reads internal memory identity validation data of the present utility model by the standard device agreement behind POST, the just bootable normal boot-strap program that enters of back PC is consistent with BIOS bist data storehouse.Can change password: the user can be stored in the password of liking in the utility model, storing media can be storing media among the IC-card IC, or among the Flash or EEPROM that add, after PC power source is opened, BIOS can require the user to input password automatically, enter the normal boot-strap program after being proved to be successful, the user can change password by BIOS interface or built-in application program.
Equipment uses separately: when equipment does not use with the BIOS collocation, then need cooperate driver and application program to realize the computer lock function under operating system, the computer lock cipher then stores storing media among the IC-card IC, or among the Flash or EEPROM that add, after operating system is loaded
The user uses this machine for the first time, come enciphered data in the fetch equipment by application program or driver, the user experience card is for obtaining this machine rights of using after me, whether PC can check the utility model to insert before each action and whether institute's input validation data conforms to, then open if yes user's rights of using, otherwise forbid that the user continues to use this machine again.The mode of forbidding can be cuts off all communication port functions, ex.Serial port, the USB mouth, the PS/2 mouth, Parallel Port... nullifies this machine user and logins, the user if desire to login once more need the correct Windows of input to access to your password and insert the utility model after, the input proper password obtains to use right.
System closing.If the user has installed at this machine and has overdrived, after each operating system starts, system can access the inquiry window automatically, allow user's input data also compare, then open if yes user's rights of using, if otherwise forbid that the user continues to use this machine again, the mode of forbidding can be cuts off all communication port functions, ex.Serial port, the USB mouth, the PS/2 mouth, Parallel Port... nullifies this machine user and logins, the user if desire to login once more need the correct Windows of input to access to your password and insert the utility model after, the input proper password obtains to use right.
Shown in Fig. 1,2,4, the utility model can optionally add storing media increases storage volume, and increases the product functions of use, and the function of mobile storage is provided.The for example alternative storing media that adds has flash memory (Flash Memory) U4, U7, read-only memory (ROM), storing medias such as EEPROM.
Referring to Fig. 1,2,5, the utility model can add the function of expanding communication interface on existing IC card reader body 1, just provide more than one a plurality of interface again by this body, uses for other same communication interfacing equipments.Specifically as shown in Figure 1, the interface on the body 13,4,5.If be equipped with change-over circuit simultaneously, can increase different types of interface, as add USB interface, IEEE-1394 interface etc., thus make a plurality of equipment can being connected by a general interface and computing machine.
It should be noted last that, above embodiment is only unrestricted in order to explanation the utility model, although the utility model is had been described in detail with reference to preferred embodiment, those of ordinary skill in the art is to be understood that, can make amendment or be equal to replacement the utility model, and not breaking away from spirit and scope of the present utility model, it all should be encompassed in the middle of the claim scope of the present utility model.