TW201816729A - System and method for detecting and deactivating illegal access control card detecting and reading a card swiping frequency field of an access control card with an access control machine in order to check if the numerical value of the card swiping frequency field is regularly accumulated or not - Google Patents

System and method for detecting and deactivating illegal access control card detecting and reading a card swiping frequency field of an access control card with an access control machine in order to check if the numerical value of the card swiping frequency field is regularly accumulated or not Download PDF

Info

Publication number
TW201816729A
TW201816729A TW105134495A TW105134495A TW201816729A TW 201816729 A TW201816729 A TW 201816729A TW 105134495 A TW105134495 A TW 105134495A TW 105134495 A TW105134495 A TW 105134495A TW 201816729 A TW201816729 A TW 201816729A
Authority
TW
Taiwan
Prior art keywords
card
access control
blacklist
module
identification information
Prior art date
Application number
TW105134495A
Other languages
Chinese (zh)
Other versions
TWI606424B (en
Inventor
陳培誠
Original Assignee
中華電信股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中華電信股份有限公司 filed Critical 中華電信股份有限公司
Priority to TW105134495A priority Critical patent/TWI606424B/en
Application granted granted Critical
Publication of TWI606424B publication Critical patent/TWI606424B/en
Publication of TW201816729A publication Critical patent/TW201816729A/en

Links

Abstract

This invention provides a system and a method for detecting and deactivating an illegal access control card. A card swiping frequency field of the access control card is detected and read with an access control machine, such that a numerical value of the card swiping frequency field of the access control card is accumulated by the access control machine and is then rewritten and stored into the card swiping frequency field of the access control card, and then, an updated numerical value of the card swiping frequency field contained in card swiping information of the access control card is returned to an access control management module by the access control machine so as to be saved, whereby the access control management module can check whether the numerical value of the card swiping frequency field of the data and the numerical value of the card swiping frequency field of former card swiping data are regularly accumulated or not so as to judge whether the access control card is copied and is blacklisted or not, and the access control machine rewrites and deletes an identification information field of a blacklist card when the blacklist card is reused, so that the card cannot be used.

Description

偵測及停用非法門禁卡片之系統與方法    System and method for detecting and deactivating illegal access control cards   

本發明係為門禁卡片,特別為一種利用檢查該筆資料的刷卡次數欄位數值與前次刷卡資料的刷卡次數欄位數值之邏輯,以偵測及停用非法門禁卡片之系統與方法。 The present invention is an access control card, in particular, a system and method for detecting and deactivating an illegal access control card by using logic of checking the field value of the number of card swipes of the data and the value field of the previous card swipes.

目前門禁卡片防偽技術多朝加解密讀取卡片內容、多重認證或門禁卡實體加上防偽材料的方向發展,但對於非法門禁卡並無防備機制。此外,利用歷史比對的方式針對物品識別碼的重複可能進行分析,但無法適用於門禁卡片於同一門禁點重複感應的情境。 At present, access control card anti-counterfeiting technology is mostly developed in the direction of encryption and decryption to read card content, multiple authentication or access control card entities plus anti-counterfeiting materials, but there is no defense mechanism for illegal access control cards. In addition, the historical identification method may be used to analyze the repetition of the item identification code, but it cannot be applied to the situation where the access card is repeatedly sensed at the same access point.

現有技術中,利用行為模型訓練及感應路徑分析偵測可疑偽造門禁卡片。但此方法還要再經使用者本人確認,才能判定有複製/偽造卡,對於經常要出入不同處所門禁管制點,軌跡不固定的使用者而言,顯然會造成困擾。 In the prior art, suspicious counterfeit access control cards are detected using behavior model training and sensing path analysis. However, this method needs to be confirmed by the user before it can be judged that there is a copy / counterfeit card. It will obviously cause confusion for users who often have access to different locations and access control points with unstable trajectories.

由此可見,上述習用方式仍有系統可用性差,實非一便捷而容易廣泛應用之設計,亟待加以改良。 It can be seen that the above-mentioned conventional methods still have poor system availability, which is not a convenient and easy-to-use design that needs to be improved.

本案發明人鑑於上述習用方式所衍生的各項缺點,乃亟思加以改良創新,並經多年苦心孤詣潛心研究後,終於成功研發完成本件 偵測及停用非法門禁卡片之系統與方法。 In view of the various shortcomings derived from the above-mentioned conventional methods, the inventor of this case has been eager to improve and innovate. After years of painstaking research, he finally successfully developed the system and method for detecting and deactivating illegal access control cards.

本發明提供一種偵測及停用非法門禁卡片之系統,主要包含門禁卡、門禁機、門禁管理模組,其中門禁卡更包含識別資訊欄及刷卡次數欄。門禁機更包含卡片資訊讀取模組係讀取門禁卡之識別資訊欄及刷卡次數欄,黑名單比對模組比對識別資訊欄是否符合卡片黑名單,欄位回寫模組係將刷卡次數寫入刷卡次數欄,以及上傳模組將識別資訊欄及刷卡次數欄。門禁管理模組更包含黑名單產生模組,係產生卡片黑名單,資料庫儲存卡片黑名單,並利用黑名單下載模組將卡片黑名單下載至黑名單比對模組,異常偵測模組係比對門禁卡之識別資訊欄及刷卡次數欄。 The invention provides a system for detecting and deactivating an illegal access control card, which mainly includes an access control card, an access control machine, and an access control management module. The access control card further includes an identification information column and a card swipe number column. The access control machine also includes a card information reading module that reads the identification information column of the access card and the number of swipes. The blacklist comparison module compares the identification information column with the card blacklist. The field write-back module reads the card. The number of times is written into the number of times of swiping card, and the upload module will identify the information column and the number of times of swiping card. The access control management module also includes a blacklist generation module, which generates a card blacklist, stores the card blacklist in the database, and uses the blacklist download module to download the card blacklist to the blacklist comparison module, and the abnormality detection module. It compares the identification information column of the access card and the number of swipes.

本發明提供一種偵測及停用非法門禁卡片之方法,其步驟包含:門禁機係用卡片資訊讀取模組讀取門禁卡之識別資訊欄及刷卡次數欄;門禁機之黑名單比對模組係比對識別資訊欄及卡片黑名單,若識別資訊欄符合卡片黑名單,欄位回寫模組則刪除識別資訊欄之內容,若識別資訊欄不符合卡片黑名單,欄位回寫模組則將刷卡次數累加寫入刷卡次數欄並開門;以及門禁機之上傳模組將門禁卡之識別資訊欄、刷卡次數欄以及刷卡時間,上傳至門禁管理模組之資料庫儲存。 The invention provides a method for detecting and deactivating an illegal access control card. The steps include: the access control machine uses a card information reading module to read the identification information column of the access control card and the number of swipes; the blacklist comparison mode of the access control machine The system compares the identification information column and the card blacklist. If the identification information column matches the card blacklist, the field writeback module deletes the content of the identification information column. If the identification information column does not match the card blacklist, the field is written back to the template. The group writes the number of card swipes into the card swipe column and opens the door; and the upload module of the access control machine uploads the identification information column, card swipe column and card swipe time of the access card to the database of the access control management module for storage.

其中門禁管理模組,係讀取資料庫內具有相同識別資訊欄的對應刷卡次數欄之記錄,異常偵測模組依照刷卡時間之先後順序,比 對前後之刷卡次數欄之位數值;以及若前後之刷卡次數欄之位數值為規律累加,則判斷門禁卡為正常;若前後之刷卡次數欄之位數值為非規律累加,則判斷門禁卡為非法卡,一黑名單產生模組,係產生卡片黑名單,並由黑名單下載模組下載到門禁機。 The access control management module reads the records of the corresponding number of times of swiping in the database with the same identification information column. The anomaly detection module compares the values of the number of times of swiping before and after the card according to the order of the time of swiping; and if If the number of digits in the number of times before and after the card is accumulated regularly, the access control card is judged to be normal; if the number of digits in the number of times in the field before and after the card is irregularly accumulated, the access card is judged to be illegal. A blacklist generation module is generated. The card blacklist is downloaded to the access control machine by the blacklist download module.

本發明相較於現有技術差異在於,本發明利用門禁機與門禁卡片的刷卡次數欄位之讀寫技術,由門禁管理模組檢查該筆刷卡次數欄位數值與前次刷卡資料的刷卡次數欄位數值是否為規律累加,進而精準判定有複製/偽造卡在使用,進而將其列入黑名單,當黑名單卡片再刷卡感應時,門禁機隨即將其識別欄位內容刪除,使其無法再使用而達停用之目的。 The difference between the present invention and the prior art lies in that the present invention utilizes the reading and writing technology of the number-of-swipe field of the access control machine and the card, and the access control management module checks the value of the number-of-swipe field and the number of times of swiping the card Whether the digit value accumulates regularly, and then accurately determine whether a copy / counterfeit card is in use, and then add it to the blacklist. When the blacklist card is swiped again, the access control will immediately delete the content of its identification field, making it no longer available. Use for the purpose of deactivation.

詳細說明係針對本發明之一可行實施例之具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。 The detailed description is a specific description of a feasible embodiment of the present invention, but this embodiment is not intended to limit the patent scope of the present invention. Any equivalent implementation or change that does not depart from the technical spirit of the present invention should be included in this case. Patent scope.

綜上所述,本案不但在空間型態上確屬創新,並能較習用物品增進上述多項功效,應已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請 貴局核准本件發明專利申請案,以勵發明,至感德便。 To sum up, this case is not only innovative in terms of space type, but also enhances the above-mentioned multiple effects over conventional items. It should have fully met the requirements for statutory invention patents that are novel and progressive. Apply for it in accordance with the law and ask your office for approval. This invention patent application is designed to encourage inventions, and it is a matter of virtue.

100‧‧‧門禁卡 100‧‧‧Access Card

101‧‧‧識別資訊欄 101‧‧‧Identification information column

102‧‧‧刷卡次數欄 102‧‧‧Swipe card number column

200‧‧‧門禁機 200‧‧‧ access control machine

201‧‧‧卡片資訊讀取模組 201‧‧‧Card Information Reading Module

202‧‧‧黑名單比對模組 202‧‧‧Blacklist comparison module

203‧‧‧卡片黑名單 203‧‧‧Card Blacklist

204‧‧‧欄位回寫模組 204‧‧‧Field write-back module

205‧‧‧上傳模組 205‧‧‧ Upload Module

300‧‧‧門禁管理模組 300‧‧‧Access Control Module

301‧‧‧黑名單產生模組 301‧‧‧Blacklist generation module

302‧‧‧資料庫 302‧‧‧Database

303‧‧‧黑名單下載模組 303‧‧‧Blacklist Download Module

304‧‧‧異常偵測模組 304‧‧‧ Anomaly Detection Module

S201~S209‧‧‧步驟流程 S201 ~ S209‧‧‧step flow

圖1為本發明之偵測及停用非法門禁卡片之系統之模組示意圖。 FIG. 1 is a schematic diagram of a module of a system for detecting and deactivating an illegal access control card according to the present invention.

圖2為本發明之偵測及停用非法門禁卡片之方法之流程示意圖。 FIG. 2 is a schematic flowchart of a method for detecting and deactivating an illegal access control card according to the present invention.

為利 貴審查委員了解本發明之技術特徵、內容與優點及其所能達到之功效,茲將本發明配合附圖,並以實施例之表達形式詳細說明如下,而其中所使用之圖式,其主旨僅為示意及輔助說明書之用,未必為本發明實施後之真實比例與精準配置,故不應就所附之圖式的比例與配置關係解讀、侷限本發明於實際實施上的權利範圍,合先敘明。 In order for the reviewing committee members to understand the technical features, contents and advantages of the present invention and the effects that can be achieved, the present invention is described in detail with the accompanying drawings in the form of embodiments, and the drawings used therein are The main purpose is only for the purpose of illustration and supplementary description. It may not be the actual proportion and precise configuration after the implementation of the invention. Therefore, the attached drawings should not be interpreted and limited to the scope of rights of the present invention in actual implementation. He Xianming.

請參閱圖1,為本發明之偵測及停用非法門禁卡片之系統之系統示意圖,其中包含門禁卡100、門禁機200、門禁管理模組300,其中門禁卡100更包含識別資訊欄101及刷卡次數欄102。門禁機200更包含卡片資訊讀取模組201係讀取門禁卡100之識別資訊欄101及刷卡次數欄102,黑名單比對模組202比對識別資訊欄101是否符合卡片黑名單203,欄位回寫模組204係將刷卡次數寫入刷卡次數欄102,以及上傳模組205將識別資訊欄101及刷卡次數欄102。門禁管理模組300更包含黑名單產生模組301,係產生卡片黑名單203,資料庫302儲存卡片黑名單203,並利用黑名單下載模組303將卡片黑名單203下載至黑名單比對模組202,異常偵測模組304係比對門禁卡100之識別資訊欄101及刷卡次數欄102。 Please refer to FIG. 1, which is a schematic diagram of a system for detecting and deactivating an illegal access control card according to the present invention, which includes an access control card 100, an access control machine 200, and an access control module 300. The access control card 100 further includes an identification information field 101 and Swipe times column 102. The access control machine 200 further includes a card information reading module 201 which reads the identification information column 101 and the card swipe column 102 of the access card 100. The blacklist comparison module 202 compares the identification information column 101 with the card blacklist 203. The bit write-back module 204 writes the number of card swipes into the card swipe count field 102, and the upload module 205 writes the identification information column 101 and the card swipe count field 102. The access control management module 300 further includes a blacklist generation module 301, which generates a card blacklist 203, a database 302 stores the card blacklist 203, and uses the blacklist download module 303 to download the card blacklist 203 to the blacklist comparison module. In group 202, the abnormality detection module 304 compares the identification information column 101 and the card swipe number column 102 of the access card 100.

請參閱圖2,為本發明之偵測及停用非法門禁卡片之方 法之流程示意圖,其步驟如下:步驟S201:當門禁機感應到門禁卡刷卡;步驟S202:即門禁機讀取門禁卡之識別資訊欄的資訊,其包含門禁卡唯一序號、密鑰讀取識別資訊以及刷卡次數欄上之刷卡次數,先判斷格式與內容是否為正確的門禁卡;步驟S203:門禁機比對卡片黑名單,若為符合卡片黑名單之門禁卡,門禁機回寫刪除門禁卡的識別資訊欄的內容,使該門禁卡片無法使用;步驟S204:若為不符合卡片黑名單之門禁卡,門禁機將密鑰讀取識別資訊中並進行刷卡次數欄上的數值累加,再回寫至門禁卡的刷卡次數欄位,並開門;步驟S205:門禁機更新筆刷卡資訊,含刷卡時間及門禁機編號,回傳至門禁管理模組之資料庫儲存;步驟S206:門禁管理模組執行異常偵測;步驟S207:讀取資料庫內具有相同識別碼的各筆刷卡資訊,依照刷卡時間先後順序,比對先後兩筆刷卡次數欄位數值,進行數值比對;步驟S208:若先後刷卡次數值呈現規律累加,代表為正常的門禁卡,若先後刷卡次數值呈現非規律累加,則判定為有非法的門禁卡;以及步驟S209:產生卡片黑名單,並下載到門禁機,當下次有識別資訊欄的黑名單卡片被門禁機讀取識別時,該列入卡片黑名單之門禁將被回寫刪除卡片識別欄位內容而使其無法使用。 Please refer to FIG. 2, which is a flow chart of a method for detecting and deactivating an illegal access control card according to the present invention. The steps are as follows: Step S201: When the access control machine senses the access card to swipe the card; Step S202: The access control machine reads the access control card. The information in the identification information column includes the unique serial number of the access control card, the key reading identification information, and the number of card swipes on the card swipe column. First, determine whether the format and content are correct for the access control card; step S203: the access control machine compares the card blacklist If it is an access card that meets the card blacklist, the access control machine writes back the content of the identification information column of the access card to delete the access card; step S204: If it is an access card that does not meet the card blacklist, the access control will be confidential. The key reads the identification information and accumulates the values on the number of times of swiping card, then writes back to the number of times of swiping card of access control card, and opens the door; step S205: the access control device updates the swiping card information, including the swiping time and access control machine number. Passed to the database storage of the access control management module; step S206: the access control management module performs anomaly detection; step S207: read the database with the same identification For each swipe card information, according to the order of the swipe card time, the values of the two swipe card fields are compared, and the values are compared; step S208: if the swipe card card number values are regularly accumulated, it represents a normal access card. The number of times is irregularly accumulated, it is determined that there is an illegal access card; and step S209: a card blacklist is generated and downloaded to the access control machine. When the blacklist card with the identification information column is read and identified by the access control machine next time, the The blacklisted access control will be written back to delete the contents of the card identification field and make it unusable.

其中數值比對係依據邏輯如下:d=a(n)-a(n-1); 其中a(n)代表後一筆刷卡次數值,a(n-1)代表前一筆刷卡次數值,n=1,2,3,4...至最新一筆,a(0)為發卡時的初始值;當d=常數(>0),代表僅有一張卡片正常使用;以及當d=0或負數,代表有多張相同識別碼的卡片在使用,為一非法的門禁卡。 The numerical comparison is based on the following logic: d = a (n) -a (n-1); where a (n) represents the value of the next card swipe, a (n-1) represents the value of the previous swipe card, n = 1, 2, 3, 4 ... to the latest one, a (0) is the initial value when the card is issued; when d = constant (> 0), it means that only one card is normally used; and when d = 0 or a negative number, It means that there are multiple cards with the same identification code, which is an illegal access control card.

其中門禁卡被門禁機讀取的內容,包含卡片唯一序號及用密鑰讀取識別資訊;其中以密鑰讀取識別資訊區的某一欄位,被當作刷卡次數儲存欄位。 Among them, the content read by the access control card by the access control machine includes the unique serial number of the card and the identification information read by the key; among them, a certain field in the identification information area read by the key is used as the storage field for the number of card swipes.

綜上所述,本案不僅於技術思想上確屬創新,並具備習用之傳統方法所不及之上述多項功效,已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請 貴局核准本件發明專利申請案,以勵發明,至感德便。 To sum up, this case is not only innovative in terms of technical ideas, but also has many of the above-mentioned effects that are not used by traditional methods. It has fully met the requirements of statutory invention patents that are novel and progressive. To approve this invention patent application, to encourage invention, to the utmost convenience.

Claims (3)

一種偵測及停用非法門禁卡片之系統,其包含:一門禁卡,其中該門禁卡更包含一識別資訊欄及一刷卡次數欄;一門禁機,其中該門禁機更包含一卡片資訊讀取模組係讀取該門禁卡之該識別資訊欄及該刷卡次數欄,一黑名單比對模組比對該識別資訊欄是否符合一卡片黑名單,一欄位回寫模組係將刷卡次數寫入該刷卡次數欄,以及一上傳模組將該識別資訊欄及該刷卡次數欄;以及一門禁管理模組,該門禁管理模組更包含一黑名單產生模組,係產生該卡片黑名單,一資料庫儲存該卡片黑名單,並利用一黑名單下載模組將該卡片黑名單下載至該黑名單比對模組,一異常偵測模組係比對該門禁卡之該識別資訊欄及該刷卡次數欄。     A system for detecting and deactivating an illegal access control card, which includes: an access control card, wherein the access control card further includes an identification information column and a card swiping number column; an access control machine, wherein the access control machine further includes a card information read The module reads the identification information column of the access card and the number of card swipes. A blacklist comparison module compares the identification information column with a card blacklist. The field write-back module indicates the number of card swipes. Write the card swipe number column, and an upload module, the identification information column and the card swipe number column; and an access control management module, the access control management module further includes a blacklist generation module for generating the card blacklist A database stores the card blacklist, and uses a blacklist download module to download the card blacklist to the blacklist comparison module. An anomaly detection module compares the identification information column of the access card. And the number of swipes.     一種偵測及停用非法門禁卡片之方法,其步驟包含:一門禁機係用一卡片資訊讀取模組讀取一門禁卡之一識別資訊欄及一刷卡次數欄;該門禁機之一黑名單比對模組係比對該識別資訊欄及一卡片黑名單,若該識別資訊欄符合該卡片黑名單,一欄位回寫模組則刪除該識別資訊欄之內容,若該識別資訊欄不符合該卡片黑名單,該欄位回寫模組則將刷卡次數累加寫入該刷卡次數欄並開門;以及該門禁機之一上傳模組將該門禁卡之該識別資訊欄、該刷卡次數欄以及一刷卡時間,上傳至一門禁管理模組之一資料庫儲存。     A method for detecting and deactivating an illegal access control card, the steps of which include: an access control machine uses a card information reading module to read an identification information column and a card swipe column of an access control card; one of the access control devices is black The list comparison module compares the identification information column with a card blacklist. If the identification information column matches the card blacklist, a field write-back module deletes the content of the identification information column. If the identification information column Does not meet the card blacklist, the write-back module in this field adds the number of card swipes to the card swipe column and opens the door; and one of the access control module uploads the identification information column and the card swipe number of the access card. Column and a swipe time, upload it to a database of an access control management module for storage.     如申請專利範圍第2項所述之偵測及停用非法門禁卡片之方法,其中該門禁管理模組,係讀取該資料庫內具有相同該識別資訊欄的對應該刷卡 次數欄之記錄,一異常偵測模組依照該刷卡時間之先後順序,比對前後之該刷卡次數欄之位數值;以及若該前後之該刷卡次數欄之位數值為規律累加,則判斷該門禁卡為正常;若該前後之該刷卡次數欄之位數值為非規律累加,則判斷該門禁卡為非法卡,一黑名單產生模組,係產生該卡片黑名單,並由一黑名單下載模組下載到該門禁機。     The method for detecting and deactivating an illegal access control card as described in item 2 of the scope of patent application, wherein the access control management module reads the record of the corresponding number of swipes in the database with the same identification information column, An anomaly detection module compares the number of digits in the card swipe column before and after in accordance with the order of the card swiping time; and if the number of digits in the number of swipe card columns before and after the sum is regularly accumulated, it judges that the access card is normal; If the number of digits in the card swipe column before and after the accumulation is irregular, it is judged that the access card is an illegal card. A blacklist generation module generates the blacklist of the card and downloads it to the blacklist download module. Access control.    
TW105134495A 2016-10-26 2016-10-26 System and method for detecting and deactivating illegal access cards TWI606424B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW105134495A TWI606424B (en) 2016-10-26 2016-10-26 System and method for detecting and deactivating illegal access cards

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW105134495A TWI606424B (en) 2016-10-26 2016-10-26 System and method for detecting and deactivating illegal access cards

Publications (2)

Publication Number Publication Date
TWI606424B TWI606424B (en) 2017-11-21
TW201816729A true TW201816729A (en) 2018-05-01

Family

ID=61023464

Family Applications (1)

Application Number Title Priority Date Filing Date
TW105134495A TWI606424B (en) 2016-10-26 2016-10-26 System and method for detecting and deactivating illegal access cards

Country Status (1)

Country Link
TW (1) TWI606424B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111461275A (en) * 2020-04-26 2020-07-28 厦门浩邈科技有限公司 Method for detecting copy IC card

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002360219A1 (en) * 2001-12-19 2003-06-30 Harexinfotech Inc. System and method for issuing card and processing blacklist using wireless communications
TW200601163A (en) * 2004-06-30 2006-01-01 Hundure Technology Co Ltd Non-contact door access system architecture
CN201377223Y (en) * 2009-01-06 2010-01-06 深圳日海通讯技术股份有限公司 Intelligent electronic lock monitoring system applied to outdoor telecommunication rooms and cabinets
US9330514B2 (en) * 2012-07-25 2016-05-03 Utc Fire & Security Corporation Systems and methods for locking device management
TW201636490A (en) * 2015-01-09 2016-10-16 鴻海精密工業股份有限公司 Device unlocking system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111461275A (en) * 2020-04-26 2020-07-28 厦门浩邈科技有限公司 Method for detecting copy IC card

Also Published As

Publication number Publication date
TWI606424B (en) 2017-11-21

Similar Documents

Publication Publication Date Title
US9418277B2 (en) Electronic device and method for unlocking the electronic device
US9646178B2 (en) Secure data storage based on physically unclonable functions
CN1329787C (en) Method of preventing firmware piracy
KR101033511B1 (en) Method for protecting private information and computer readable recording medium therefor
US20160103538A1 (en) Electronic device and access control method
CN107341534B (en) Electronic card anti-copy method and device and management server
CN106844185A (en) The storage method and device of a kind of journal file
CN104067286A (en) Detection of invalid escrow keys
US20150256344A1 (en) Memory system and method of generating management information
CN110472978B (en) Digital currency address tamper-proof method and system
CN111767537A (en) Tamper verification method of application program based on IOS (operating system) and related equipment
TW201816729A (en) System and method for detecting and deactivating illegal access control card detecting and reading a card swiping frequency field of an access control card with an access control machine in order to check if the numerical value of the card swiping frequency field is regularly accumulated or not
CN113792307A (en) Seal management method and device and electronic equipment
CN101419651A (en) Electronic device and method with peripheral use right management function
US10572672B2 (en) Modification of data elements using a semantic relationship
US20190087824A1 (en) System and method for mitigating effects of identity theft
JP2018041452A (en) Input collation method
CN112152966B (en) Method and device for identifying illegal SSL certificate
CN106355120A (en) Method and device for preventing magnetic card information from being copied
Patel Biometric Identification and Authentication in Computers: Keystroke Dynamics.
Saeed et al. Evaluating Near‐Field Communication tag security for identity theft prevention
Nel et al. Proving cybercriminals’ possession of stolen credit card details on compromised POS devices
TWI575401B (en) Mobile device and an monitoring method suitable for mobile device
CN104021357A (en) Method for registering and binding storage card of computer and identifying registered and bound storage card
WO2021098797A1 (en) Method of managing documents, user equipment, and non-transitory