WO2001022359A1 - Non-contact ic card - Google Patents

Non-contact ic card Download PDF

Info

Publication number
WO2001022359A1
WO2001022359A1 PCT/JP1999/005201 JP9905201W WO0122359A1 WO 2001022359 A1 WO2001022359 A1 WO 2001022359A1 JP 9905201 W JP9905201 W JP 9905201W WO 0122359 A1 WO0122359 A1 WO 0122359A1
Authority
WO
WIPO (PCT)
Prior art keywords
card
access
unauthorized access
contact type
unauthorized
Prior art date
Application number
PCT/JP1999/005201
Other languages
French (fr)
Japanese (ja)
Inventor
Mitsuo Uetake
Original Assignee
Fujitsu Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Limited filed Critical Fujitsu Limited
Priority to PCT/JP1999/005201 priority Critical patent/WO2001022359A1/en
Publication of WO2001022359A1 publication Critical patent/WO2001022359A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07701Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction
    • G06K19/07703Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction the interface being visual
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card

Definitions

  • the present invention relates to a contactless IC card.
  • Non-contact IC cards are used as portable data storage media with high security functions for various applications (for example, card media for electronic money, key media for entry and exit, identification cards for various local government service systems).
  • Media ⁇ It is beginning to be used for card media for transportation tickets and card media for personal identification for financial transactions such as credit approval.
  • non-contact IC cards are superior to contact IC cards in terms of mechanical strength and environmental friendliness, because they have no electrical contacts.
  • FIG. 1 is a diagram illustrating an example of the anti-collision function.
  • N01 to N03 noncontact IC cards exist in a radio wave space formed by radio waves radiated from the reader / writer for the noncontact IC card.
  • the reader / writer for the non-contact type IC card allocates a time slot, that is, a data transmission timing, to each non-contact type IC card, and assigns this to each non-contact type IC card. Notify the card. For example, time slot T A No 1 contactless IC card is assigned to SI, a No 2 contact card is assigned to time slot TS2, and a No 3 contactless IC card is assigned to time slot TS3.
  • Each non-contact type IC card that receives this information interprets the information with the built-in IC and transmits the data at the timing allocated to itself, so that one non-contact type IC card Even if there are multiple non-contact type IC cards in the radio wave space formed by the IC card reader / writer, data can be exchanged without interference.
  • non-contact IC card reader / writers that are not legal and non-contact IC card reader / writers with the same electrical and radio specifications as the relevant non-contact IC card reader / writer are in non-contact with the radio wave space from other unauthorized contactless reader / writers.
  • the same communication as that of the original non-contact type IC card reader / writer was realized, and data communication with the original non-matching reader / writer was sometimes possible.
  • the contactless IC card will be independent of the intention of the holder of the contactless IC card. This indicates the possibility of controlling access to the data in the card, and it cannot completely prevent unauthorized use of the built-in data by alteration / falsification, etc. by a third party.
  • FIG. 2 is a diagram showing the structure of a conventional non-contact type IC card.
  • FIG. 2A is a diagram showing the actual configuration of the non-contact type IC card
  • FIG. 2B is a diagram showing an electrical equivalent circuit of the non-contact type IC card.
  • the non-contact type IC card has an IC chip 1 embedded in a card body 4 and an antenna coil 2 attached thereto.
  • C chip 1 records necessary information such as ROM and EEPROM in addition to CPU. It also includes a memory for storing.
  • the antenna coil 2 forms a resonance circuit in cooperation with the capacitance component 3 of the antenna coil 2. Therefore, if the radio wave radiated from the reader / writer for the non-contact type IC card has the same frequency as the resonance frequency of this resonance circuit, a resonance voltage is generated in the antenna coil 2 and the power is applied to the IC chip 1. Will be supplied.
  • the supplied IC chip 1 starts the stored program, interprets data transmitted according to a predetermined protocol, and communicates with a reader / writer for a non-contact type IC card.
  • the present invention considers the fact that unauthorized access from a third party is performed without the knowledge of the contactless IC
  • the unauthorized access display function clearly indicates that the owner of the non-contact type Ic card who received the unauthorized access was aware of the unauthorized access and took an early action to receive the unauthorized access. To prevent disruption of social systems and loss of credibility of social systems by contactless IC cards.
  • the object of the present invention is to provide a non-contact type IC card
  • the purpose is to provide a function that distinguishes between legitimate access and unauthorized access, and to provide a contactless IC card that can clearly indicate to the holder if an unauthorized access is received.
  • the contactless IC power supply of the present invention has an antenna means for receiving power and a signal from a transmitted radio wave, and is activated by the power obtained by the antenna means, and access by the signal is predetermined. If the procedure is not performed, processing means for determining that the access is an unauthorized access; recording means for recording that there has been an unauthorized access if the processing means determines that the access is unauthorized; And unauthorized access display means for providing a display that can be viewed by the holder when an unauthorized access is recorded.
  • radio waves with a frequency that matches the resonance frequency of the antenna means have been vulnerable to unauthorized access to unauthorized readers and readers for non-contact IC cards that are accessed using a predetermined protocol.
  • a predetermined By transmitting a procedure, for example, a system identifier or a hardware identifier, and checking this in the IC card, it is possible to judge whether or not the access is unauthorized. Therefore, an unauthorized access can be detected.
  • the IC card holder can know the existence of the unauthorized access explicitly indicated, and promptly perform the procedure for reissuing the card. be able to.
  • FIG. 1 is a diagram illustrating an example of the anti-collision function.
  • FIG. 2 is a diagram showing the structure of a conventional non-contact type IC card.
  • FIG. 3 is a diagram showing a structure of a non-contact type IC card which is displayed abnormally on the unauthorized access display device according to the embodiment of the present invention and which can be visually checked.
  • FIG. 4 is a diagram illustrating an outline of an operation of displaying an abnormality on the unauthorized access display device according to the present embodiment.
  • FIG. 5 is a flowchart showing a schematic processing flow of the embodiment of the present invention.
  • C FIG. 6 is a more detailed flowchart of the processing of the embodiment of the present invention using the system ID.
  • FIG. 7 is a diagram showing another embodiment of the unauthorized access display device.
  • FIG. 8 is a diagram showing still another embodiment of the unauthorized access display device. BEST MODE FOR CARRYING OUT THE INVENTION
  • the unauthorized access display device mounted on the surface of the non-contact type IC card becomes It does not work, but a malicious actor from a reader / writer for a non-contact type IC card of a different shape / system brought by a third party with malicious intent Power / data can be transmitted / received with no problem in terms of electric field strength. Abnormal access that does not follow the procedure of the program code for the CPU built in the non-contact IC card and the CPU built in the ROM.
  • an error is displayed on the programmable detection switch and the unauthorized access display device, which are programmed and function as a system so that the error is detected in the user data area in the EEPROM.
  • a contact type IC card reader and a non-contact type IC card reader / writer system will be established.
  • the light emitting diode built in the IC card emits light, thereby discoloring the paint on the window painted on the upper surface thereof. Display windows with such materials should be installed, and even if the non-contact type IC card is far away from the reader / writer, the illegal display function itself is persistent and cannot be changed.
  • the unauthorized access display device mounted on the surface of the non-contact type IC card does not operate, but Unauthorized access from a reader / writer for a non-contact type IC card of a different shape / system that the three parties approached with malicious intent can transmit and receive power / data without any problem in terms of electric field strength.
  • an abnormal condition is detected in the user data overnight area in the EEPROM according to the procedure of the built-in CPU and the program code for the CPU built in the ROM, an abnormal display is displayed on the unauthorized access display device, and visual confirmation is performed. Use a structure that is possible.
  • the contactless IC card Unauthorized devices can be notified of unauthorized access from a reader / writer for a non-contact type IC card of a different shape / system brought by a third party with malicious intent. Such measures can be taken promptly.
  • FIG. 3 is a diagram showing a structure of a non-contact type IC card which is displayed abnormally on the unauthorized access display device according to the embodiment of the present invention and which can be visually checked.
  • the non-contact type IC card of this embodiment has an IC chip 1 embedded in a card body 4 and is connected to the IC chip 1 to be provided with an antenna coil 2.
  • Provide an unauthorized access display device 7 on the surface of the main unit 4 When a non-contact IC card receives radio waves from a reader / writer for a non-contact IC card that is not opposed to the non-contact IC card owned by the holder, The antenna coil 2 resonates with the capacitor 3 ((b) in the same figure) and receives power. ⁇ This activates the IC chip 1.
  • the IC chip 1 is recorded in the internal ROM or the like. If the communication protocol is different, the IC chip 1 cannot interpret the transmitted data, so no response is received.
  • the IC chip 1 uses a built-in program to detect whether or not the transmitted data is accessed according to a predetermined procedure, and determines whether the access is an illegal access or an authorized access. If it is determined that the access is unauthorized, communication is performed normally, but if it is determined that the access is unauthorized, the IC chip 1 supplies a current to the light emitting diode 8 to emit light.
  • the color of the window 9 is changed by irradiating the light 8 from the photochromic material onto the window 9 (provided on the card surface)
  • the window 9 made from the photochromic material is a light-emitting diode 8 Of the light emitted by It is configured to respond to light of a specific wavelength. It should be configured so that it does not react to the light in the surrounding environment such as sunlight or fluorescent lights, but only to the light of the light-emitting diode 8. This allows the contactless IC card holder to visually confirm the unauthorized access by seeing the discoloration of this window even after unauthorized access. Necessary actions can be taken promptly.
  • FIG. 4 is a diagram illustrating an outline of an operation of displaying an abnormality on the unauthorized access display device according to the present embodiment.
  • the CPU in the non-contact type IC card records, for example, as an illegal operation mode in the user data overnight area in the EEPROM, for example, in accordance with the program code for the CPU stored in the ROM (step). S 1). Then, the CPU accesses the user data area in the EEPROM and determines whether or not the illegal operation mode is recorded.
  • the CPU turns on the light emitting diode for the illegal access display device (step S 2), so that the window made of the photochromic material on the card surface changes color and unauthorized access is performed. Is displayed (step S3). If the photochromic material is discolored by receiving light once, the color condition is maintained, and the holder must first look at the window on the card surface after unauthorized access. You can know that it was illegally accessed when In the above embodiment, the presence or absence of unauthorized access to the non-contact type IC card can be visually identified at a glance, so that the non-contact type IC card is inadvertently contacted with an invalid non-contact type IC card reader. A function that allows you to immediately discover that you have exchanged overnight Can be realized.
  • the CPU cuts off the communication, thereby preventing the information on the IC card from being rewritten without permission.
  • t is a flowchart showing a general flow of processing of a embodiment of the present invention
  • the non-contact type IC card owned by the holder senses waves.
  • power is supplied to the IC chip and the CPU is started.
  • the CPU detects system fixed information from the information carried on the received radio wave.
  • the information fixed to the system is, for example, an identifier such as a hardware serial number of a non-contact type IC card reader / writer that transmits radio waves.
  • the CPU searches for the identifier of the reader / writer for the contactless IC card to which access is permitted, written in the ROM or the like, and determines whether or not the received identifier is included. . As a result, it can be determined whether or not the access is valid.
  • a system ID uniquely assigned to each system may be used as an identifier.
  • step S7 If it is determined in step S7 that the access is valid, normal IC card data processing is performed in step S9. On the other hand, if it is determined in step S7 that the access is unauthorized, the unauthorized access is displayed as described above, and the process ends.
  • FIG. 6 is a more detailed flowchart of the process of the embodiment of the present invention using the system ID.
  • the IC card detects reception of a radio wave.
  • the radio wave detection flag indicating that radio waves are being detected in the EEPROM or the like should be set to ON.
  • the fixed information of the system is detected (step S11).
  • the system code (or system ID) transmitted from the accessing reader / writer is detected (the system code is used to identify the reader / writer and the system stored in the IC card for each system). Information.
  • step S12 it is determined whether a system code has been detected. If no system code has been detected, it is determined in step S15 that an unauthorized access has been made, and an unauthorized operation mode flag is set in the EEPROM. Then, in step S16, the light emitting diode for the unauthorized access display device is caused to emit light, and the color of the window on the surface of the force is changed. Then, in step S17, the radio wave detection flag is set to OFF, and the process ends.
  • step S13 it is determined whether the system code matches the one in the card. Proceeding to step S17, the radio wave detection flag is set to 0FF, and the process ends. If it is determined in step S13 that the system codes match, normal IC card data processing is performed in step S14, and when the processing ends, the entire processing ends.
  • the system code may be a serial number of each hardware as described above.
  • the CPU in the IC card stores the serial number recorded in the ROM in step S13. It is determined whether or not the transmitted serial number is included.
  • FIG. 7 is a diagram showing another embodiment of the unauthorized access display device.
  • the non-contact type IC card includes an unauthorized access display device 7 ′ and a solar cell 15 in addition to the IC chip 1 and the antenna coil 2.
  • the power is supplied for displaying the unauthorized access display device 7 '.
  • the unauthorized access display device 7 ′ according to the present embodiment is constituted by a character display (character display unit). If an unauthorized access is made, the fact is indicated. Display on a character basis.
  • the IC chip 1 When detecting an unauthorized access, the IC chip 1 sets a flag indicating that an unauthorized access has been made to an internal EEPROM or the like. Then, when the holder of the IC card removes the card from the torch or the like, the solar cell 15 supplies power to the character display unit (illegal access display device) 7 '. At the same time, the solar cell 15 also supplies power to the IC chip 1 so that the IC chip 1 can send a control signal to the character display section 7 '. The CPU of the IC chip 1 detects the flag of the EEPROM and, if there is an unauthorized access, indicates that there has been an unauthorized access.
  • the character display unit illegal access display device
  • the photovoltaic cell 15 generates power when the IC card is taken out of the IC card or the like, and supplies power to the IC chip 1 and the character display section 7 ′ for comparison. Enables the operation of the character display section 7 'such as a liquid crystal panel that consumes electrical power. According to this, the owner can more clearly recognize that the unauthorized access has been made, and if the time of the unauthorized access is displayed on the unauthorized access display, the owner can know where the unauthorized access was made. I can let you know.
  • FIG. 8 is a diagram showing still another embodiment of the unauthorized access display device.
  • the IC card is provided with an unauthorized access display device 7 ′′ in addition to the antenna coil 2 and the IC chip 1.
  • Unauthorized access display device 7 '' is for heating 20, window 24, coil panel 22, 23, and color
  • the board is made up of 2 1.
  • the coil panels 22 and 23 hold the colored plate 21 in a position invisible from the window 24.
  • IC chip 1 applies voltage to heater 20 and generates heat from heater 20.
  • the coil panels 22 and 23 are made of very thin thread-like metal, and can be burned off with little heat. Therefore, the coil panel 22 is burned off by the heat generated by the heat sink 20.
  • the colored plate 21 is pulled by the coil panel 23 and moves to the position of the window 24. . This allows the window to see a different color than if there was no unauthorized access.
  • the present invention it is possible to visually indicate on a card that a third party has illegally accessed the non-contact type IC card, and to clearly indicate that the holder has illegally accessed the card. Therefore, the reliability of the non-contact type IC card can be improved, and the non-contact type IC card can be used for applications requiring reliability.

Abstract

A non-contact IC card is provided with an unauthorized access indicator (7). This unauthorized access indicator (7) judges that a radio wave making an access to an IC chip (1) without following a predetermined procedure is an unauthorized access. When the IC chip (1) judges that it receives an authorized access, it causes a light emitting diode (8) packaged in a card body (4) to emit light and illuminate a window (9) of an optical color changing material formed in the card surface. As a result, the color of the window (9) changes, so that the card owner can recognize at a glance that card receives an unauthorized access unknowingly when the owner takes out the card from the bag or the like. Therefore, after having recognized the reception of the unauthorized access, the owner can take the necessary procedure promptly to ask a reissue or the like of the card.

Description

明 細 非接触型 I Cカード 技術分野  Details Non-contact type IC card Technical field
本発明は、 非接触型 I Cカードに関する。 背景技術  The present invention relates to a contactless IC card. Background art
非接触型 I Cカードは、 セキュリティ機能の高い可搬型データ保持媒体とし て各種のアプリケーション (例えば、 電子マネー用カード媒体 · 入退室用ゲ一 トのキ一媒体 · 各種自治体サービスシステムの本人確認用カード媒体 · 交通機 関の切符用カード媒体, クレジッ ト決裁など金融取引用本人確認用カード媒体 など) に利用され始めようとしている。  Non-contact IC cards are used as portable data storage media with high security functions for various applications (for example, card media for electronic money, key media for entry and exit, identification cards for various local government service systems). Media · It is beginning to be used for card media for transportation tickets and card media for personal identification for financial transactions such as credit approval.
特に、 非接触型 I Cカードは電気的接点がない分、 機械的強度や対環境性が 高いこと等が接触型 I Cカードに比して優れており、 交通機関の切符用カード 媒体や入退室用ゲートのキー媒体などの利用分野が多い。  In particular, non-contact IC cards are superior to contact IC cards in terms of mechanical strength and environmental friendliness, because they have no electrical contacts. There are many applications such as key media for gates.
従来の非接触型 I Cカードでは、 非接触型 I Cカードに相対する非接触型 I Cカードリーダライ夕においては、 異なる同様な非接触型 I Cカードが同一空 間に複数存在した場合に、 混信してデ一夕の授受が妨害されることを防ぐため のいわゆるアンチコリジョン機能も実現されている。  In a conventional non-contact IC card, in a non-contact IC card reader / writer opposed to a non-contact IC card, interference occurs when there are multiple different similar non-contact IC cards in the same space. A so-called anti-collision function has also been implemented to prevent interruptions in data transfer.
図 1は、 アンチコリジョン機能の一例を説明する図である。  FIG. 1 is a diagram illustrating an example of the anti-collision function.
非接触型 I Cカード用リーダライ夕から放射される電波が形成する電波空間 に、 N 0 1〜N 0 3の非接触型 I C力一ドが存在したとする。 非接触型 I C カード用リーダライ夕は、 非接触型 I Cカードの存在を検出すると、 各非接触 型 I Cカードにタイムスロッ ト、 すなわち、 データを送信するタイミングを割 り振り、 これを各非接触型 I Cカードに通知する。 例えば、 タイムスロッ ト T S Iには、 N o 1の非接触型 I Cカードを、 タイムスロッ ト T S 2には、 N o 2、 タイムスロット T S 3には N o 3の非接触型 I Cカードを割り振る。 この 情報を受け取った各非接触型 I Cカードは、 内蔵されている I Cにより、 情報 を解釈し、 自力一ドに割り振られたタイミングでデータを送信するようにする, これにより、 1つの非接触型 I Cカード用リーダライタが形成する電波空間に 複数の非接触型 I Cカードが存在しても、 混信することなくデータの授受を行 うことが出来る。 It is assumed that N01 to N03 noncontact IC cards exist in a radio wave space formed by radio waves radiated from the reader / writer for the noncontact IC card. When detecting the presence of a non-contact type IC card, the reader / writer for the non-contact type IC card allocates a time slot, that is, a data transmission timing, to each non-contact type IC card, and assigns this to each non-contact type IC card. Notify the card. For example, time slot T A No 1 contactless IC card is assigned to SI, a No 2 contact card is assigned to time slot TS2, and a No 3 contactless IC card is assigned to time slot TS3. Each non-contact type IC card that receives this information interprets the information with the built-in IC and transmits the data at the timing allocated to itself, so that one non-contact type IC card Even if there are multiple non-contact type IC cards in the radio wave space formed by the IC card reader / writer, data can be exchanged without interference.
非接触型 I Cカードが 1枚しか電波空間に存在しない場合、 交信可能距離で あれば自動的に非接触型 I Cカードリーダとの間で交信を開始して必要なデ一 夕交換を行う。  If there is only one non-contact type IC card in the radio wave space, communication is automatically started with the non-contact type IC card reader and the necessary data exchange is performed if the communication distance is within the range.
逆に言えば、 当該非接触型 I Cカードリーダライタと電気的/電波的に同一 仕様の正当な非接触型 I Cカード用リーダライ夕でない他の不正な非接触型 リーダライ夕からの電波空間に非接触型 I Cカードを存在させれば、 本来の非 接触型 I Cカード用リーダライタと同一の交信が実現し、 本来の相対しない リーダライ夕との間でデータの交信が可能となる場合があった。  Conversely, non-contact IC card reader / writers that are not legal and non-contact IC card reader / writers with the same electrical and radio specifications as the relevant non-contact IC card reader / writer are in non-contact with the radio wave space from other unauthorized contactless reader / writers. With the presence of a type IC card, the same communication as that of the original non-contact type IC card reader / writer was realized, and data communication with the original non-matching reader / writer was sometimes possible.
このことは、 悪意を持った第三者が非接触型 I Cカードの動作仕様にのっと り電波空間を実現すれば、 非接触型 I Cカードの保持者の意思とは関係なく非 接触型 I Cカード内のデータをアクセス制御する可能性を示し、 第三者による 内蔵されたデータの変更/改ざん等による不正使用を完全に防止することはで きない。  This means that if a malicious third party realizes the radio wave space according to the operating specifications of the contactless IC card, the contactless IC card will be independent of the intention of the holder of the contactless IC card. This indicates the possibility of controlling access to the data in the card, and it cannot completely prevent unauthorized use of the built-in data by alteration / falsification, etc. by a third party.
図 2は、 従来の非接触型 I Cカードの構造を示す図である。  FIG. 2 is a diagram showing the structure of a conventional non-contact type IC card.
同図 (a ) は、 非接触型 I Cカードの実際の構成を示した図であり、 同図 ( b ) は、 非接触型 I Cカードの電気的等価回路を示した図である。  FIG. 2A is a diagram showing the actual configuration of the non-contact type IC card, and FIG. 2B is a diagram showing an electrical equivalent circuit of the non-contact type IC card.
同図 (a ) に示されるように、 非接触型 I Cカードは、 カード本体 4内に I Cチップ 1が埋め込まれ、 これにアンテナコイル 2が取り付けられている。 I As shown in FIG. 2A, the non-contact type IC card has an IC chip 1 embedded in a card body 4 and an antenna coil 2 attached thereto. I
Cチップ 1は、 C P Uの他に、 R O Mや E E P R O Mなど必要な情報を記録し ておくためのメモリ等も含んでいる。 非接触型 I Cカードを相対する非接触型 I Cカード用リーダライ夕に近づけると、 非接触型 I Cカード用リーダライ夕 から放射される電波をアンテナコイル 2で受信する。 同図 ( b ) に示されるよ うに、 アンテナコイル 2は、 アンテナコイル 2が有する容量成分 3 と協同して, 共振回路を構成している。 従って、 非接触型 I Cカード用リーダライ夕から放 射される電波が、 この共振回路の共振周波数と同じ周波数を有している場合に は、 アンテナコイル 2に共振電圧が生じ、 I Cチップ 1 に電力を供給するよう になる。 電力を供給された I Cチップ 1は、 格納されているプログラムを起動 し、 所定のプロトコルで送信されてきたデータを解釈し、 非接触型 I Cカード 用リーダライ夕との交信を行う。 C chip 1 records necessary information such as ROM and EEPROM in addition to CPU. It also includes a memory for storing. When the non-contact type IC card is brought close to the opposing reader / writer for the non-contact type IC card, the radio wave radiated from the reader / writer for the non-contact type IC card is received by the antenna coil 2. As shown in Fig. 3 (b), the antenna coil 2 forms a resonance circuit in cooperation with the capacitance component 3 of the antenna coil 2. Therefore, if the radio wave radiated from the reader / writer for the non-contact type IC card has the same frequency as the resonance frequency of this resonance circuit, a resonance voltage is generated in the antenna coil 2 and the power is applied to the IC chip 1. Will be supplied. The supplied IC chip 1 starts the stored program, interprets data transmitted according to a predetermined protocol, and communicates with a reader / writer for a non-contact type IC card.
従来の技術では、 第三者が悪意を持って近づけた正当なシステムのものでな い非接触型 I Cカード用リーダライ夕からの不正なアクセスについては、 電界 強度的に問題なく電力/データの授受が実現された場合、 I Cチップ 1上のプ ログラムコードが本来のシステムでしか動作しないため全く無応答となる。 し かし、 悪意を持つ第三者がシステムの通信プロ トコルを知っている場合には, 容易に非接触型 I Cカードにアクセスし、 内容を改ざんすることができるとい う問題点がある。  In the conventional technology, for unauthorized access from a contactless IC card reader / writer that is not a legitimate system that a third party has maliciously approached, power / data can be exchanged without any problem in terms of electric field strength When this is realized, there is no response at all because the program code on the IC chip 1 operates only in the original system. However, there is the problem that if a malicious third party knows the communication protocol of the system, it can easily access the contactless IC card and falsify the contents.
このような問題は、 非接触型 I Cカードを電子マネーなどの分野に使用する 場合に大きな問題となる。 すなわち、 非接触型 I Cカードを所持者が有してい る電子マネーの金額を記録しているとすると、 所持者は通常は、 非接触型 I C カードを鞫の中やポケッ 卜の中などに入れて持ち運ぶが、 所持者がどこかで不 正な非接触型 I Cカード用リーダライ夕の放射する電波にさらされた場合、 所 持者が気がつかない間に非接触型 I Cカードの中の金額が書き換えられてしま う可能性を有する。 この問題を解決すべく、 アクセスキー、 暗証番号などの照 合を行うことにより、 不正なアクセスを防止することが知られている。  Such a problem becomes a serious problem when the contactless IC card is used in fields such as electronic money. That is, assuming that the amount of electronic money held by the holder of the contactless IC card is recorded, the holder usually puts the contactless IC card in a line or a pocket. If the holder is exposed somewhere to the radio waves emitted by the illegal reader / writer for the contactless IC card, the amount in the contactless IC card is rewritten while the holder is unaware. There is a possibility that it will be done. In order to solve this problem, it is known to prevent unauthorized access by checking access keys, PINs, and so on.
しかしながら、 そのような手段にて、 不正なアクセスを防止することが出来 たとしても、 カード使用者は、 そのような不正なアクセスの試みがあったこと を把握することは出来ない。 従って、 いつどこで所持者の非接触型 I Cカード が不正なアクセスを受けたかを知るすべがないため、 不正装置や当該装置使用 者の即時摘発/追跡といった対処が出来ないという問題がある。 発明の開示 However, such measures can prevent unauthorized access. Even so, the card user cannot be aware of such unauthorized access attempts. Therefore, there is no way to know when and where the non-contact type IC card of the holder has been illegally accessed, and there is a problem that it is not possible to take measures such as immediately detecting / tracking the unauthorized device or the user of the device. Disclosure of the invention
本発明は、 上記問題に鑑みて、 第三者からの不正なアクセスを非接触型 I C 力一 ドの所持者本人の知らない間に行われた場合、 その事実を非接触型 I C カード自体のアクセス異常表示機能にて明示し、 不正なアクセスを受けた非接 触型 I cカードの所持者自信が不正なアクセスがあったことを自覚し、 早期に 対処することで、 不正なアクセスを受けた非接触型 I Cカードによる社会的シ ステムの混乱及び社会的システムの信用度の失墜を防止する。  In view of the above problems, the present invention considers the fact that unauthorized access from a third party is performed without the knowledge of the contactless IC The unauthorized access display function clearly indicates that the owner of the non-contact type Ic card who received the unauthorized access was aware of the unauthorized access and took an early action to receive the unauthorized access. To prevent disruption of social systems and loss of credibility of social systems by contactless IC cards.
すなわち、 本発明の課題は、 不正なアクセスを受けた非接触型 I Cカードに That is, the object of the present invention is to provide a non-contact type IC card
、 正当なアクセスと不正なアクセスを識別する機能を設け、 不正なアクセスを 受けた場合には、 これを所持者に明示することの出来る非接触型 I Cカードを 提供することである。 The purpose is to provide a function that distinguishes between legitimate access and unauthorized access, and to provide a contactless IC card that can clearly indicate to the holder if an unauthorized access is received.
本発明の非接触型 I C力一ドは、 送信されてくる電波から電力及び信号を受 け取るアンテナ手段と、 該アンテナ手段が得た電力によって起動し、 該信号に よるアクセスがあらかじめ定められた手続きを行わない場合、 該アクセスを不 正なアクセスと判断する処理手段と、 該処理手段が不正なアクセスと判断した 場合に、 不正なアクセスがあったことを記録する記録手段と、 該記録手段に不 正なアクセスがあったことが記録されている場合に、 所持者が目視可能な表示 を行う不正アクセス表示手段とを備えることを特徴とする。  The contactless IC power supply of the present invention has an antenna means for receiving power and a signal from a transmitted radio wave, and is activated by the power obtained by the antenna means, and access by the signal is predetermined. If the procedure is not performed, processing means for determining that the access is an unauthorized access; recording means for recording that there has been an unauthorized access if the processing means determines that the access is unauthorized; And unauthorized access display means for providing a display that can be viewed by the holder when an unauthorized access is recorded.
従来、 アンテナ手段の共振周波数と一致した周波数の電波で、 所定のプロ ト コルを用いてアクセスしてくる不正な非接触型 I Cカード用リーダライ夕のァ クセスに対して無防備であつたが、 本発明においては、 アクセス手順に所定の 手続き、 例えば、 システムの識別子やハードウェアの識別子を送信させ、 これ を I Cカード内で照合することにより、 不正なアクセスか否かを判断するよう 従って、 不正なアクセスを検出することが出来る。 また、 これを不正ァクセ ス表示手段に表示することにより、 I Cカードの所持者は明示的に示された不 正アクセスの存在を知ることが出来、 カードの再発行の手続きなどを迅速に行 うことができる。 図面の簡単な説明 Conventionally, radio waves with a frequency that matches the resonance frequency of the antenna means have been vulnerable to unauthorized access to unauthorized readers and readers for non-contact IC cards that are accessed using a predetermined protocol. In the invention, a predetermined By transmitting a procedure, for example, a system identifier or a hardware identifier, and checking this in the IC card, it is possible to judge whether or not the access is unauthorized. Therefore, an unauthorized access can be detected. In addition, by displaying this on the unauthorized access display means, the IC card holder can know the existence of the unauthorized access explicitly indicated, and promptly perform the procedure for reissuing the card. be able to. BRIEF DESCRIPTION OF THE FIGURES
図 1は、 アンチコリジョ ン機能の一例を説明する図である。  FIG. 1 is a diagram illustrating an example of the anti-collision function.
図 2は、 従来の非接触型 I Cカードの構造を示す図である。  FIG. 2 is a diagram showing the structure of a conventional non-contact type IC card.
図 3は、 本発明の一実施形態の不正アクセス表示装置にて異常表示し、 目視 確認が可能な非接触型 I Cカードの構造を示す図である。  FIG. 3 is a diagram showing a structure of a non-contact type IC card which is displayed abnormally on the unauthorized access display device according to the embodiment of the present invention and which can be visually checked.
図 4は、 本実施形態における不正アクセス表示装置にて異常表示をする動作 の概要を示す図である。  FIG. 4 is a diagram illustrating an outline of an operation of displaying an abnormality on the unauthorized access display device according to the present embodiment.
図 5は、 本発明の実施形態の概略の処理の流れを示すフローチャートである c 図 6 は、 システム I Dを使用した本発明の実施形態の処理のより詳細なフ ローチヤ一トである。 FIG. 5 is a flowchart showing a schematic processing flow of the embodiment of the present invention. C FIG. 6 is a more detailed flowchart of the processing of the embodiment of the present invention using the system ID.
図 7は、 不正アクセス表示装置の別の実施形態を示す図である。  FIG. 7 is a diagram showing another embodiment of the unauthorized access display device.
図 8は、 不正アクセス表示装置のさらに別の実施形態を示す図である。 発明を実施するための最良の形態  FIG. 8 is a diagram showing still another embodiment of the unauthorized access display device. BEST MODE FOR CARRYING OUT THE INVENTION
本発明の実施形態では、 非接触型 I Cカードが、 相対する非接触型 I C力一 ドリ一ダライタとの間で交信を実行すると、 非接触型 I Cカードの表面に実装 された不正アクセス表示装置は動作しないが、 第三者が悪意を持って近づけた 異なる形状/システムの非接触型 I Cカード用リーダライ夕からの不正なァク セスについては電界強度的には問題なく電力/データの授受を実現できるが. 非接触型 I Cカードに内蔵されている C P U及び R O Mに内蔵された C P U用 のプログラムコードの手順に従っていない異常なアクセスがあった場合には, E E P R O M内のユーザデータエリアに異常検知状態として記録されるように システムプログラム化され機能するようなプログラマブル検知スィッチ及び不 正アクセス表示装置にて異常表示を実現するように、 非接触型 I Cカードリ一 ダ及び当該非接触型 I Cカード用リーダライ夕のシステムを構築しておく。 なお、 不正アクセス表示装置自体は、 例えば、 非接触型 I Cカードの C P U が動作させることで、 I Cカードに内蔵された発光ダイオードを発光させるこ とでその上面に塗られた窓の塗料が変色するような素材を持った表示窓を設置 するようにし、 非接触型 I Cカードがリーダライ夕から距離的に離れてしまつ ても不正表示機能自体は持続性があり変更できないような表示機能にする。 このことにより、 本機能が動作すれば不正アクセスを受けた非接触型 I C力 ードの所持者の意思によらない、 第三者が悪意を持って近づけた異なる形状/ システムの非接触型 I C力一ド用リーダライ夕からの不正なアクセスを所持者 本人に知らせるようにする。 In the embodiment of the present invention, when the non-contact type IC card performs communication with the opposing non-contact type IC force reader / writer, the unauthorized access display device mounted on the surface of the non-contact type IC card becomes It does not work, but a malicious actor from a reader / writer for a non-contact type IC card of a different shape / system brought by a third party with malicious intent Power / data can be transmitted / received with no problem in terms of electric field strength. Abnormal access that does not follow the procedure of the program code for the CPU built in the non-contact IC card and the CPU built in the ROM. If there is, an error is displayed on the programmable detection switch and the unauthorized access display device, which are programmed and function as a system so that the error is detected in the user data area in the EEPROM. A contact type IC card reader and a non-contact type IC card reader / writer system will be established. In the unauthorized access display device itself, for example, when the CPU of the non-contact type IC card is operated, the light emitting diode built in the IC card emits light, thereby discoloring the paint on the window painted on the upper surface thereof. Display windows with such materials should be installed, and even if the non-contact type IC card is far away from the reader / writer, the illegal display function itself is persistent and cannot be changed. As a result, non-contact ICs of different shapes / systems that are approached maliciously by a third party, regardless of the intention of the holder of the non-contact IC card that has been unauthorizedly accessed if this function operates Inform the holder of unauthorized access from the force reader / writer.
あるいは、 非接触型 I Cカードが、 相対する非接触型 I C力一ドリーダライ 夕との間で交信を実行すると、 非接触型 I Cカードの表面に実装された不正ァ クセス表示装置は動作しないが、 第三者が悪意をもって近づけた異なる形状/ システムの非接触型 I Cカード用リーダライ夕からの不正なアクセスについて は電界強度的には問題なく電力/データの授受が実現できるが、 非接触型 I C カードに内蔵される C P U及び R O Mに内蔵された当該 C P U用のプログラム コードの手順に従って E E P R O M内のユーザデ一夕エリアに異常検知状態と して認識されると不正アクセス表示装置にて異常表示し、 目視確認が可能な構 造とする。  Alternatively, if the non-contact type IC card communicates with the opposing non-contact type IC card reader / writer, the unauthorized access display device mounted on the surface of the non-contact type IC card does not operate, but Unauthorized access from a reader / writer for a non-contact type IC card of a different shape / system that the three parties approached with malicious intent can transmit and receive power / data without any problem in terms of electric field strength. When an abnormal condition is detected in the user data overnight area in the EEPROM according to the procedure of the built-in CPU and the program code for the CPU built in the ROM, an abnormal display is displayed on the unauthorized access display device, and visual confirmation is performed. Use a structure that is possible.
このことにより、 本機能が動作すれば非接触型 I Cカードの保有者の意思に よらいない第三者が悪意を持って近づけた異なる形状/システムの非接触型 I Cカード用リーダライ夕からの不正なアクセスがあったことを所有者本人に知 らしめることができ、 不正装置の摘発などの対応を迅速に取ることが可能とな る。 As a result, if this function operates, the contactless IC card Unauthorized devices can be notified of unauthorized access from a reader / writer for a non-contact type IC card of a different shape / system brought by a third party with malicious intent. Such measures can be taken promptly.
図 3は、 本発明の一実施形態の不正アクセス表示装置にて異常表示し、 目視 確認が可能な非接触型 I Cカードの構造を示す図である。  FIG. 3 is a diagram showing a structure of a non-contact type IC card which is displayed abnormally on the unauthorized access display device according to the embodiment of the present invention and which can be visually checked.
同図 ( a ) に示されるように、 本実施形態の非接触型 I Cカードは、 カード 本体 4内に I Cチップ 1が埋め込まれ、 I Cチップ 1 に接続してアンテナコィ ル 2が設けられる他、 カード本体 4の表面に不正アクセス表示装置 7を設ける ( 所持者が有している非接触型 I Cカードと相対していない非接触型 I Cカード 用リーダライ夕から非接触型 I Cカードが電波を受け取ると、 アンテナコイル 2は容量 3 (同図 (b ) ) と協同して共振を起こし、 電力を受けることになる < これにより、 I Cチップ 1が起動する。 I Cチップ 1は、 内部の R O M等に記 録されているプログラムを起動し、 送信されてくるデ一夕を受け取る。 通信プ ロトコルが異なる場合には、 I Cチップ 1は、 送信されてくるデ一夕を解釈で きないので、 何の応答も行わない。 従って、 I Cチップ 1の内容が書き換えら れることはない。 しかし、 悪意の第三者が非接触型 I Cカードの通信プロ トコ ルを知っている場合には、 不正なアクセスが I Cチップ 1 に対してなされる可 能性がある。 そこで、 I Cチップ 1は、 送信されてくるデータが所定の手続き を踏んでアクセスしてくるか否かを内蔵のプログラムで検出し、 不正なァクセ スか正当なアクセスかを判断する。 正当なアクセスであると判断された場合に は、 通常通り通信を行うが、 不正なアクセスであると判断された場合には、 I Cチップ 1は、 発光ダイオード 8に電流を流し、 発光させる。 発光ダイオード 8の光を光変色性の素材で出来た窓 9 (カード表面に設ける) に照射すること により、 窓の色を変色させる。 光変色性の素材で出来た窓 9は、 発光ダイォ一 ド 8の発する光の内、 特定の波長の光に反応するように構成する。 すなわち、 日光や蛍光灯など周囲の環境に多くある光には反応せず、 発光ダイォード 8の 光のみに反応するように構成しておく。 これにより、 非接触型 I Cカードの所 持者は、 不正なアクセスがあった後になっても、 この窓の変色を見ることによ り、 不正アクセスがあったことを目視で確認することが出来、 必要な処置を迅 速にとることができる。 As shown in FIG. 1A, the non-contact type IC card of this embodiment has an IC chip 1 embedded in a card body 4 and is connected to the IC chip 1 to be provided with an antenna coil 2. Provide an unauthorized access display device 7 on the surface of the main unit 4 (When a non-contact IC card receives radio waves from a reader / writer for a non-contact IC card that is not opposed to the non-contact IC card owned by the holder, The antenna coil 2 resonates with the capacitor 3 ((b) in the same figure) and receives power. <This activates the IC chip 1. The IC chip 1 is recorded in the internal ROM or the like. If the communication protocol is different, the IC chip 1 cannot interpret the transmitted data, so no response is received. No, so within IC chip 1 However, if a malicious third party knows the communication protocol of the contactless IC card, there is a possibility that unauthorized access may be made to the IC chip 1. Therefore, the IC chip 1 uses a built-in program to detect whether or not the transmitted data is accessed according to a predetermined procedure, and determines whether the access is an illegal access or an authorized access. If it is determined that the access is unauthorized, communication is performed normally, but if it is determined that the access is unauthorized, the IC chip 1 supplies a current to the light emitting diode 8 to emit light. The color of the window 9 is changed by irradiating the light 8 from the photochromic material onto the window 9 (provided on the card surface) The window 9 made from the photochromic material is a light-emitting diode 8 Of the light emitted by It is configured to respond to light of a specific wavelength. It should be configured so that it does not react to the light in the surrounding environment such as sunlight or fluorescent lights, but only to the light of the light-emitting diode 8. This allows the contactless IC card holder to visually confirm the unauthorized access by seeing the discoloration of this window even after unauthorized access. Necessary actions can be taken promptly.
なお、 ここで、 不正アクセス表示装置として、 発光ダイオードと光変色性の 窓 9を示したが、 後に説明するように他の方法で実現することも可能である。 図 4は、 本実施形態における不正アクセス表示装置にて異常表示をする動作 の概要を示す図である。  Here, the light emitting diode and the photochromic window 9 are shown as the unauthorized access display device, but they can be realized by other methods as described later. FIG. 4 is a diagram illustrating an outline of an operation of displaying an abnormality on the unauthorized access display device according to the present embodiment.
所持者の所有する非接触型 I Cカードにアクセスしてきた非接触型 I C力一 ド用リーダライタとの間で、 正当な非接触型 I Cカード用リーダライ夕であれ ば行うはずの手続きを含まないデータ交信をすると、 該非接触型 I Cカード内 の CPUは、 例えば、 ROMに内蔵された当該 C P U用のプログラムコードの 順に従って、 例えば、 E E P ROM内のユーザデ一夕エリアに不正動作モード として記録する (ステップ S 1) 。 すると、 C PUは、 この EE PROM内の ユーザデータエリアにアクセスし、 不正動作モードが記録されていないか否か を判断する。 不正動作モードが記録されていた場合には、 C PUが不正ァクセ ス表示装置用発光ダイオードを点灯するので (ステップ S 2) 、 カード表面の 光変色性素材で出来た窓が変色し、 不正アクセスがあったことを表示する (ス テツプ S 3) 。 なお、 この光変色性素材を、 一回光を受けて変色した後は、 そ の色の状態を保持するものとすれば、 所持者は、 不正アクセスの後、 最初に カード表面の窓を見たときに不正アクセスされていたことを知ることが出来る。 上記実施形態にて、 非接触型 I Cカードへの不正アクセスの有無が目視にて 一目で判明するので、 非接触型 I Cカードが正当でない非接触型 I Cカードリ —ダとの間で不本意なデ一夕の授受をしたことが即時に発見できるという機能 を実現することができる。 Data that does not include the procedures that would have to be performed with a valid non-contact IC card reader / writer between the non-contact IC card reader / writer that accessed the non-contact IC card owned by the holder. When the communication is performed, the CPU in the non-contact type IC card records, for example, as an illegal operation mode in the user data overnight area in the EEPROM, for example, in accordance with the program code for the CPU stored in the ROM (step). S 1). Then, the CPU accesses the user data area in the EEPROM and determines whether or not the illegal operation mode is recorded. If the illegal operation mode has been recorded, the CPU turns on the light emitting diode for the illegal access display device (step S 2), so that the window made of the photochromic material on the card surface changes color and unauthorized access is performed. Is displayed (step S3). If the photochromic material is discolored by receiving light once, the color condition is maintained, and the holder must first look at the window on the card surface after unauthorized access. You can know that it was illegally accessed when In the above embodiment, the presence or absence of unauthorized access to the non-contact type IC card can be visually identified at a glance, so that the non-contact type IC card is inadvertently contacted with an invalid non-contact type IC card reader. A function that allows you to immediately discover that you have exchanged overnight Can be realized.
従って、 第三者からの不正アクセスを所持者本人の知らない間に行われるこ とを検知し、 当該非接触型 I Cカードによる社会的システムの混乱及び社会的 システムの信頼度の失墜を防止することについて効果大である。  Therefore, by detecting unauthorized access from a third party without the knowledge of the owner, the disruption of the social system and the loss of reliability of the social system due to the contactless IC card are prevented. The effect is great.
また、 不正アクセスであると判断された場合には、 C P Uが通信を遮断する ことにより、 勝手に I Cカードの情報を書き換えられることを防止することが 出来る。  Also, if it is determined that the access is unauthorized, the CPU cuts off the communication, thereby preventing the information on the IC card from being rewritten without permission.
図 5は、 本発明の実施形態の概略の処理の流れを示すフローチャートである t まず、 ステップ S 5で、 所持者の所有する非接触型 I Cカードが電波を感知 する。 すると、 I Cチップに電力が供給され、 C P Uが起動する。 次に、 C P Uは、 ステップ S 6で、 受信した電波に乗せられている情報の中から、 システ ム固定情報を検知する。 システムに固定の情報とは、 例えば、 電波を送信して きている非接触型 I Cカード用リ一ダライタのハードウェアシリアル番号等の 識別子である。 そして、 ステップ S 7で、 C P Uは、 R O M等に書き込まれて いる、 アクセスが許可されている非接触型 I Cカード用リーダライタの識別子 を検索し、 受信した識別子が含まれるか否かを判断する。 これにより、 正当な アクセスであるか否かを判断することが出来る。 あるいは、 ハードウェアシリ アル番号ではなく、 非接触型 I Cカードシステムを構築した際に、 各システム に固有に割り振られるシステム I Dのようなものを識別子として使用しても良 い。 5, t is a flowchart showing a general flow of processing of a embodiment of the present invention First, at step S 5, the non-contact type IC card owned by the holder senses waves. Then, power is supplied to the IC chip and the CPU is started. Next, in step S6, the CPU detects system fixed information from the information carried on the received radio wave. The information fixed to the system is, for example, an identifier such as a hardware serial number of a non-contact type IC card reader / writer that transmits radio waves. Then, in step S7, the CPU searches for the identifier of the reader / writer for the contactless IC card to which access is permitted, written in the ROM or the like, and determines whether or not the received identifier is included. . As a result, it can be determined whether or not the access is valid. Alternatively, instead of a hardware serial number, when constructing a contactless IC card system, a system ID uniquely assigned to each system may be used as an identifier.
正当なアクセスであると、 ステップ S 7で判断された場合には、 ステップ S 9で、 通常の I Cカードのデータ処理を行う。 一方、 ステップ S 7で、 不正ァ クセスであると検知された場合には、 上記したような不正アクセス表示を行い、 処理を終了する。  If it is determined in step S7 that the access is valid, normal IC card data processing is performed in step S9. On the other hand, if it is determined in step S7 that the access is unauthorized, the unauthorized access is displayed as described above, and the process ends.
図 6 は、 システム I Dを使用した本発明の実施形態の処理のより詳細なフ 口一チャートである。 まず、 ステップ S I 0において、 I Cカードが電波受信を感知する。 このと き、 E E P ROM等に電波を感知していることを示す電波感知フラグを ONに 設定するようにする。 そして、 情報の授受の開始時点で、 システムの固定情報 を検知する (ステップ S 1 1) 。 本実施形態の場合、 アクセスしてきたリーダ ライ夕から送信されるシステムコード (あるいは、 システム I D) を検知する ( システムコードは、 各システム毎にリーダライタ及び I Cカード内に格納され ているシステムの識別情報である。 FIG. 6 is a more detailed flowchart of the process of the embodiment of the present invention using the system ID. First, in step SI0, the IC card detects reception of a radio wave. At this time, the radio wave detection flag indicating that radio waves are being detected in the EEPROM or the like should be set to ON. Then, at the start of the information transfer, the fixed information of the system is detected (step S11). In the case of this embodiment, the system code (or system ID) transmitted from the accessing reader / writer is detected (the system code is used to identify the reader / writer and the system stored in the IC card for each system). Information.
次に、 ステップ S 12で、 システムコードを検知したか否かを判断する。 シ ステムコ一ドを検知していない場合には、 ステップ S 1 5で、 不正アクセスが あつたと判断し、 不正動作動作モードフラグを E E P ROMに設定する。 そし て、 ステップ S 16で、 不正アクセス表示装置用の発光ダイオードを発光させ, 力一ド表面の窓の色を変色させる。 そして、 ステップ S 1 7で、 電波感知フラ グを OF Fに設定し、 処理を終了する。  Next, in step S12, it is determined whether a system code has been detected. If no system code has been detected, it is determined in step S15 that an unauthorized access has been made, and an unauthorized operation mode flag is set in the EEPROM. Then, in step S16, the light emitting diode for the unauthorized access display device is caused to emit light, and the color of the window on the surface of the force is changed. Then, in step S17, the radio wave detection flag is set to OFF, and the process ends.
ステップ S 1 2で、 システムコードを検知したと判断した場合には、 ステツ プ S 1 3で、 システムコ一ドはカード内のものと一致したか否かを判断する < 一致しない場合には、 ステップ S 1 7に進んで、 電波感知フラグを 0 F Fに設 定し、 処理を終了する。 ステップ S 1 3で、 システムコードが一致したと判断 された場合には、 ステップ S 14で、 通常の I Cカードデータ処理を行い、 処 理が終わった時点で、 全体の処理を終了する。  If it is determined in step S12 that a system code has been detected, in step S13, it is determined whether the system code matches the one in the card. Proceeding to step S17, the radio wave detection flag is set to 0FF, and the process ends. If it is determined in step S13 that the system codes match, normal IC card data processing is performed in step S14, and when the processing ends, the entire processing ends.
なお、 ここでは、 不正アクセス表示装置として発光ダイオードと光変色性窓 を使った例を示したが、 以下に説明するように、 他の構成の表示装置を使用す ることも可能である。  Although an example using a light-emitting diode and a photochromic window as an unauthorized access display device has been described here, a display device having another configuration can be used as described below.
また、 システムコードは、 前述したように、 各ハードウェアのシリアル番号 でもよく、 この場合、 I Cカード内の C PUは、 ステップ S 1 3において、 R OMに記録されているシリアル番号の中に、 送信されてきたシリアル番号が含 まれているか否かを判定するようにする。 図 7は、 不正アクセス表示装置の別の実施形態を示す図である。 Further, the system code may be a serial number of each hardware as described above. In this case, the CPU in the IC card stores the serial number recorded in the ROM in step S13. It is determined whether or not the transmitted serial number is included. FIG. 7 is a diagram showing another embodiment of the unauthorized access display device.
同図 (a) に示されるように、 非接触型 I Cカードは、 I Cチップ 1とアン テナコイル 2の他に、 不正アクセス表示装置 7 ' と太陽電池 1 5を備えている, 太陽電池 1 5は、 不正アクセス表示装置 7 ' の表示を行うための電力を供給す る。 同図 (b) に示されるように、 本実施形態の不正アクセス表示装置 7 ' は 、 キャラクタディスプレイ (文字表示部) によって構成されており、 不正ァク セスがあった場合には、 その旨をキャラクタベースで表示する。  As shown in FIG. 1A, the non-contact type IC card includes an unauthorized access display device 7 ′ and a solar cell 15 in addition to the IC chip 1 and the antenna coil 2. The power is supplied for displaying the unauthorized access display device 7 '. As shown in FIG. 13B, the unauthorized access display device 7 ′ according to the present embodiment is constituted by a character display (character display unit). If an unauthorized access is made, the fact is indicated. Display on a character basis.
I Cチップ 1は、 不正アクセスを検出すると、 内部の E E P ROM等に不正 アクセスがあったことを示すフラグを立てる。 そして、 I Cカードの所持者が カードを鞫等から取り出した場合に、 太陽電池 1 5が文字表示部 (不正ァクセ ス表示装置) 7 ' に電力を供給する。 また、 同時に、 太陽電池 1 5は、 I Cチ ップ 1にも電力を供給し、 I Cチップ 1が文字表示部 7 ' に対して制御信号を 送れるようにする。 I Cチップ 1の C PUは、 E E P ROMのフラグを検出し, 不正アクセスがあった場合には、 不正アクセスがあった旨を表示するようにす る。  When detecting an unauthorized access, the IC chip 1 sets a flag indicating that an unauthorized access has been made to an internal EEPROM or the like. Then, when the holder of the IC card removes the card from the torch or the like, the solar cell 15 supplies power to the character display unit (illegal access display device) 7 '. At the same time, the solar cell 15 also supplies power to the IC chip 1 so that the IC chip 1 can send a control signal to the character display section 7 '. The CPU of the IC chip 1 detects the flag of the EEPROM and, if there is an unauthorized access, indicates that there has been an unauthorized access.
このような構成においては、 太陽電池 1 5が、 I Cカードが鞫などから取り 出された場合に、 電力を生成し、 I Cチップ 1及び文字表示部 7 ' に電力を供 給することにより、 比較的電力を消費する液晶パネルなどの文字表示部 7 ' の 動作を可能にする。 これによれば、 所持者はより明確に不正アクセスがあった ことが認識できるとともに、 不正アクセス表示に不正アクセスがあった時間を 表示するようにすれば、 所持者にどこで不正アクセスがあつたかを知らせるこ とができる。  In such a configuration, the photovoltaic cell 15 generates power when the IC card is taken out of the IC card or the like, and supplies power to the IC chip 1 and the character display section 7 ′ for comparison. Enables the operation of the character display section 7 'such as a liquid crystal panel that consumes electrical power. According to this, the owner can more clearly recognize that the unauthorized access has been made, and if the time of the unauthorized access is displayed on the unauthorized access display, the owner can know where the unauthorized access was made. I can let you know.
図 8は、 不正アクセス表示装置のさらに別の実施形態を示す図である。  FIG. 8 is a diagram showing still another embodiment of the unauthorized access display device.
同図 (a) 及び (b) に示すように、 I Cカードには、 アンテナコイル 2と I Cチップ 1の他に、 不正アクセス表示装置 7 ' ' が設けられる。 不正ァクセ ス表示装置 7 ' ' は、 ヒー夕 20、 窓 24、 コイルパネ 22、 2 3、 及び色つ き板 2 1からなつている。 不正アクセスが生じていない段階では、 コイルパネ 2 2とコイルパネ 2 3が色つき板 2 1 を、 窓 2 4から見えない位置に保持して いる。 不正アクセスが生じると、 I Cチップ 1 は、 ヒー夕 2 0 に電圧を加え. ヒータ 2 0から熱を発生させる。 コイルパネ 2 2 、 2 3は、 非常に細い糸状の 金属で構成されており、 少ない熱で焼き切られるように構成されている。 従つ て、 ヒ一夕 2 0が熱を発生することにより、 コイルパネ 2 2が焼き切られる, その結果、 色つき板 2 1がコイルパネ 2 3に引っ張られ、 窓 2 4の位置まで移 動する。 これにより、 不正アクセスがない場合とは異なる色が窓から見えるよ うになる。 As shown in FIGS. 7A and 7B, the IC card is provided with an unauthorized access display device 7 ″ in addition to the antenna coil 2 and the IC chip 1. Unauthorized access display device 7 '' is for heating 20, window 24, coil panel 22, 23, and color The board is made up of 2 1. When no unauthorized access has occurred, the coil panels 22 and 23 hold the colored plate 21 in a position invisible from the window 24. When unauthorized access occurs, IC chip 1 applies voltage to heater 20 and generates heat from heater 20. The coil panels 22 and 23 are made of very thin thread-like metal, and can be burned off with little heat. Therefore, the coil panel 22 is burned off by the heat generated by the heat sink 20. As a result, the colored plate 21 is pulled by the coil panel 23 and moves to the position of the window 24. . This allows the window to see a different color than if there was no unauthorized access.
従って、 所持者は、 窓から見える色の変化によって、 不正アクセスがあった か否かを判断することができる。 産業上の利用可能性  Therefore, the owner can determine whether or not there has been unauthorized access based on the change in the color seen through the window. Industrial applicability
本発明は、 非接触型 I C力一ドに第三者が不正にアクセスしたことをカード に目視可能なように表示し、 所持者に不正なアクセスがあったことを明示する ことができる。 従って、 非接触型 I Cカードの信頼性を高めることが出来、 信 頼性の必要とされる用途にも非接触型 I Cカードを使用することが出来る。  According to the present invention, it is possible to visually indicate on a card that a third party has illegally accessed the non-contact type IC card, and to clearly indicate that the holder has illegally accessed the card. Therefore, the reliability of the non-contact type IC card can be improved, and the non-contact type IC card can be used for applications requiring reliability.

Claims

請 求 の 範 囲 The scope of the claims
1 . 送信されてくる電波から電力及び信号を受け取るアンテナ手段と、 1. Antenna means for receiving power and signals from transmitted radio waves,
該アンテナ手段が得た電力によって起動し、 該信号によるアクセスがあらか じめ定められた手続きを行わない場合、 該アクセスを不正なアクセスと判断す る処理手段と、  Processing means for activating by the power obtained by the antenna means and judging the access as an unauthorized access when access by the signal does not perform a predetermined procedure;
該処理手段が不正なアクセスと判断した場合に、 所持者が目視可能な表示を 行う不正アクセス表示手段と、  An unauthorized access display means for displaying a display which can be visually recognized by the holder when the processing means determines that the access is unauthorized;
を備えることを特徴とする非接触型 I Cカード。 A non-contact type IC card comprising:
2 . 更に、 該処理手段が不正なアクセスと判断した場合に、 不正なアクセス があったことを記録する記録手段を備えることを特徴とする請求の範囲第 1項 に記載の非接触型 I Cカード。 2. The non-contact type IC card according to claim 1, further comprising a recording unit that records that the unauthorized access has been made when the processing unit determines that the access is unauthorized. .
3 . 前記不正アクセス表示手段は、 発光ダイオードと光変色性材質で出来た. I Cカード表面に設けられる窓とからなり、 該発光ダイォ一ドが該窓に光を当 てることにより、 該窓を変色させて不正アクセスがあったことを表示すること を特徴とする請求の範囲第 1項に記載の非接触型 I Cカード。 3. The unauthorized access display means is made of a light emitting diode and a photochromic material. It comprises a window provided on the surface of the IC card, and the light emitting diode irradiates the window with light to close the window. 2. The non-contact type IC card according to claim 1, wherein the fact that an unauthorized access is made is displayed by discoloring.
4 . 前記不正アクセス表示手段は、 太陽電池と文字表示部からなり、 不正なァ クセスがあった場合には、 該太陽電池の電力を利用して文字表示部に不正ァク セスがあった旨を表示することを特徴とする請求の範囲第 1項に記載の非接触 型 I Cカード。 4. The unauthorized access display means includes a solar cell and a character display unit, and when there is an unauthorized access, the power of the solar cell is used to inform that the character display unit has been accessed illegally. The non-contact type IC card according to claim 1, wherein the non-contact type IC card is displayed.
5 . 前記文字表示部は、 液晶パネルで構成されていることを特徴とする請求の 範囲第 4項に記載の非接触型 I Cカード。 5. The non-contact type IC card according to claim 4, wherein the character display section is constituted by a liquid crystal panel.
6 . 前記不正アクセス表示手段は、 色つき板と、 該色つき板を保持する少なく とも 1つのコイルパネと、 該少なく とも 1つのコイルパネを焼き切るヒ一夕と 、 色を表示可能な窓とからなり、 不正なアクセスがあった場合には、 該ヒ一夕 が該コイルパネを焼き切ることによって、 色つき板の位置を変化させ、 該窓か ら見える色を変化させることを特徴とする請求の範囲第 1項に記載の非接触型 I Cカード。 6. The unauthorized access display means includes a colored plate, at least one coil panel for holding the colored plate, a window for burning the at least one coil panel, and a window capable of displaying a color. If there is an unauthorized access, the burner burns off the coil panel, thereby changing the position of the colored plate and changing the color seen through the window. The non-contact type IC card according to item 1.
7 . 前記処理手段は、 アクセスしてきた信号に、 非接触型 I Cカードシステム に固有の識別子が含まれていない場合に、 不正なアクセスであると判断するこ とを特徴とする請求の範囲第 1項に記載の非接触型 I Cカード。 7. The method according to claim 1, wherein the processing unit determines that the access is unauthorized when the accessed signal does not include an identifier unique to the contactless IC card system. Non-contact type IC card according to the item.
8 . 前記処理手段は、 アクセスしてきた信号に、 前記非接触型 I Cカードにァ クセスが許されているハードウエアの識別子が含まれていない場合に、 不正な アクセスであると判断することを特徴とする請求の範囲第 1項に記載の非接触 型 I Cカード。 8. The processing means determines that the access is unauthorized if the accessed signal does not include an identifier of hardware that is allowed to access the contactless IC card. The non-contact type IC card according to claim 1, wherein:
PCT/JP1999/005201 1999-09-22 1999-09-22 Non-contact ic card WO2001022359A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP1999/005201 WO2001022359A1 (en) 1999-09-22 1999-09-22 Non-contact ic card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP1999/005201 WO2001022359A1 (en) 1999-09-22 1999-09-22 Non-contact ic card

Publications (1)

Publication Number Publication Date
WO2001022359A1 true WO2001022359A1 (en) 2001-03-29

Family

ID=14236795

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP1999/005201 WO2001022359A1 (en) 1999-09-22 1999-09-22 Non-contact ic card

Country Status (1)

Country Link
WO (1) WO2001022359A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002366906A (en) * 2001-06-05 2002-12-20 Dainippon Printing Co Ltd Non-contact communication method for portable information processor
WO2007095913A1 (en) 2006-02-21 2007-08-30 Bundesdruckerei Gmbh Security and/or valuable document
WO2010093623A1 (en) * 2009-02-10 2010-08-19 Cubic Corporation Smartcard protection device
EP2296108A1 (en) 2006-06-15 2011-03-16 Kabushiki Kaisha Toshiba Portable electronic device and control method thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6356499A (en) * 1986-08-27 1988-03-11 株式会社東芝 Portable medium
JPS6443475U (en) * 1987-09-08 1989-03-15
JPH0338396A (en) * 1989-07-05 1991-02-19 Koatsu Gas Kogyo Co Ltd Next generation ic card
JPH0499698A (en) * 1990-08-18 1992-03-31 Railway Technical Res Inst Non-contact type ic card
JPH04169990A (en) * 1990-11-01 1992-06-17 Tokimec Inc Data secret keeping device for memory module
JPH06176220A (en) * 1992-12-09 1994-06-24 Omron Corp Portable storage medium
JPH08315097A (en) * 1995-05-19 1996-11-29 Toppan Printing Co Ltd Information medium and information medium processor

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6356499A (en) * 1986-08-27 1988-03-11 株式会社東芝 Portable medium
JPS6443475U (en) * 1987-09-08 1989-03-15
JPH0338396A (en) * 1989-07-05 1991-02-19 Koatsu Gas Kogyo Co Ltd Next generation ic card
JPH0499698A (en) * 1990-08-18 1992-03-31 Railway Technical Res Inst Non-contact type ic card
JPH04169990A (en) * 1990-11-01 1992-06-17 Tokimec Inc Data secret keeping device for memory module
JPH06176220A (en) * 1992-12-09 1994-06-24 Omron Corp Portable storage medium
JPH08315097A (en) * 1995-05-19 1996-11-29 Toppan Printing Co Ltd Information medium and information medium processor

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002366906A (en) * 2001-06-05 2002-12-20 Dainippon Printing Co Ltd Non-contact communication method for portable information processor
JP4683517B2 (en) * 2001-06-05 2011-05-18 大日本印刷株式会社 Non-contact communication method of portable information processing apparatus
WO2007095913A1 (en) 2006-02-21 2007-08-30 Bundesdruckerei Gmbh Security and/or valuable document
EP2296108A1 (en) 2006-06-15 2011-03-16 Kabushiki Kaisha Toshiba Portable electronic device and control method thereof
US8595826B2 (en) 2006-06-15 2013-11-26 Kabushiki Kaisha Toshiba Portable electronic device and control method thereof
WO2010093623A1 (en) * 2009-02-10 2010-08-19 Cubic Corporation Smartcard protection device
US8902073B2 (en) 2009-02-10 2014-12-02 Cubic Corporation Smartcard protection device

Similar Documents

Publication Publication Date Title
US20240078405A1 (en) Dual Transponder Radio Frequency Identification
EP1755061B1 (en) Protection of non-promiscuous data in an RFID transponder
US8322608B2 (en) Using promiscuous and non-promiscuous data to verify card and reader identity
KR100743434B1 (en) Automated real-time distributed tag reader network
CN105379409B (en) EHF safety communications equipment
US7872567B2 (en) Method for transponder access control
US7128274B2 (en) Secure credit card with near field communications
US8228175B1 (en) RFID tag chips and tags with alternative behaviors and methods
JP5107934B2 (en) Communication control method, RFID device, and RFID system
JPWO2002086808A1 (en) Information protection system and information protection method
US20100176948A1 (en) Methds and systems for activating a proximity information device
CA2647713A1 (en) System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
EP1692639A2 (en) Jammer for jamming the readout of contactless data carriers
US9607286B1 (en) RFID tags with brand protection and loss prevention
CN102673886B (en) Storage device
US20150254483A1 (en) RFID Sensor
WO2016155374A1 (en) Data theft prevention device and method
WO2001022359A1 (en) Non-contact ic card
KR100783084B1 (en) Rfid system having security apparatus and controlling method thereof
Johansson An Introduction to RFID–Information Security and Privacy Concerns
KR101112535B1 (en) Method for Authenticating RFID Readers by Using Flags in RFID Tag
JP2001184467A (en) Contactless information medium system
JP4091611B2 (en) Authentication registration processing apparatus and authentication registration processing method
EP2495690B1 (en) Transponder and method for monitoring access to application data in the transponder
KR101112571B1 (en) RFID Tag with Function of Authentication for RFID Readers

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): FR

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP