WO2010075730A1 - 多功能读卡器及其实现方法 - Google Patents

多功能读卡器及其实现方法 Download PDF

Info

Publication number
WO2010075730A1
WO2010075730A1 PCT/CN2009/075458 CN2009075458W WO2010075730A1 WO 2010075730 A1 WO2010075730 A1 WO 2010075730A1 CN 2009075458 W CN2009075458 W CN 2009075458W WO 2010075730 A1 WO2010075730 A1 WO 2010075730A1
Authority
WO
WIPO (PCT)
Prior art keywords
card
card reader
reader
module
generate
Prior art date
Application number
PCT/CN2009/075458
Other languages
English (en)
French (fr)
Inventor
陆舟
于华章
Original Assignee
北京飞天诚信科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京飞天诚信科技有限公司 filed Critical 北京飞天诚信科技有限公司
Priority to US12/933,491 priority Critical patent/US8888000B2/en
Publication of WO2010075730A1 publication Critical patent/WO2010075730A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0873Details of the card reader
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/122Online card verification

Definitions

  • the present invention relates to the field of information security, and in particular, to a multi-function card reader and an implementation method thereof.
  • the use of smart cards requires a corresponding terminal device that supports smart card operation, that is, a card reader.
  • the card reader provides an economical, secure and universal interface for smart cards and computers, which is applicable to various computer interfaces, and With built-in powerful software, it is compatible with all kinds of existing and upcoming smart card, operating system and industrial API (Application Programming Interface) standards.
  • Card readers can now be used in enterprise security, PKI architecture, home banking and e-commerce. With a card reader, a unified, integrated security policy can be implemented within the organization with a powerful, secure, and easy-to-carry smart card.
  • the current card reader is used for smart card application.
  • the card reader is linked to the host, and the smart card is inserted into the card reader.
  • the user can communicate with the smart card through the card reader.
  • Various applications are based on The smart card performs, the card reader is only a transparent channel, so the card reader has a relatively simple function and a narrow application range.
  • the present invention provides a method for implementing a multi-function card reader and a multi-function card reader.
  • the technical solution is as follows:
  • a method for implementing a multi-function card reader comprising:
  • the card reader judges whether there is a card insertion in its own card slot and whether it is online. [8] when it is determined that there is no card insertion in the card slot of the card reader, the card reader performs an operation to generate a one-time password;
  • the card reader performs corresponding operation on the card according to the card operation request sent by the host Operation
  • the card reader when it is determined that a card is inserted in the card slot of the card reader and the card reader is in an offline state, the card reader performs an operation in conjunction with the card to generate an authentication code.
  • the method specifically includes:
  • the card reader determines whether there is a card inserted in its own card slot
  • the card reader performs an operation to generate a one-time password
  • the card reader performs a corresponding operation on the card according to a card operation request sent by the host;
  • the card reader operates in conjunction with the card to generate an authentication code.
  • the method specifically includes:
  • the card reader determines if it is online
  • the card reader determines whether there is a card inserted in its own card slot
  • the card reader performs an operation to generate a one-time password
  • the card reader performs a corresponding operation on the card according to a card operation request sent by the host;
  • the card reader determines whether there is a card inserted in its own card slot
  • the card reader performs an operation to generate a one-time password
  • the card reader operates in conjunction with the card to generate an authentication code.
  • the card reader determines whether the user requests to acquire a one-time password, and if so, performs a step of generating a one-time password, otherwise, ends the current flow and returns to wait for the system call state.
  • the card reader determines whether it is online by detecting its own USB status.
  • the method further includes: [29] The card reader determines whether there is a card operation request sent by the host, and if so, performs a step of performing a corresponding operation on the card according to the card operation request sent by the host; otherwise, ending the current process, returning to the waiting system Call state.
  • the card reader performs operations in conjunction with the card, and before generating the authentication code, the method further includes:
  • the card reader determines whether the user has an authentication request, and if so, the card reader operates in conjunction with the card to generate an authentication code. Otherwise, the current process is terminated, and the system wait state is returned.
  • a multi-function card reader comprising:
  • a power module for supplying power to the card reader
  • an input/output module configured to receive various information input by the user, and to output a one-time password or an authentication code generated by the card reader;
  • a judging module configured to determine whether there is a card insertion in the card slot of the card reader and whether the card reader is in an online state
  • an operation module configured to: when the determining module determines that there is no card insertion in the card slot of the card reader, perform an operation to generate a one-time password, and when the determining module determines the card reader a card is inserted in the card slot, and the card reader is in an offline state, and the card is operated to generate an authentication code; [37] an operation module, configured to: when the determining module determines the card of the card reader When a card is inserted in the slot and the card reader is in an online state, a corresponding operation is performed on the card according to a card operation request sent by the host.
  • the power module supplies power to the card reader through a battery, or powers the card reader through a USB interface.
  • the input/output module specifically includes: a keyboard unit, a touch unit, a display unit, and a sounding unit.
  • the determining module specifically includes:
  • a card insertion determining unit configured to determine whether there is a card insertion in the card slot of the card reader, and if no card is inserted, notifying the operation module to perform an operation to generate a one-time password;
  • an online state determining unit configured to: when the card insertion determining unit determines that the card is inserted, determine whether the card reader is in an online state, and if the online state is in progress, notify the operating module to send the device according to the host The card operation request performs a corresponding operation on the card, and if it is in an offline state, the operation module is notified to perform an operation in conjunction with the card to generate an authentication code.
  • the determining module specifically includes:
  • an online status determining unit configured to determine whether the card reader is in an online state
  • a card insertion determining unit configured to determine, after the online state determining unit determines, whether there is a card insertion in the card reader slot, and if no card is inserted, notifying the computing module to perform an operation, generating one time a password, if the card is inserted, and the online status determining unit determines that the card reader is in the online state, the operation module is notified to perform a corresponding operation on the card according to the card operation request sent by the host, if A card insertion is performed, and the online status determination unit determines that the card reader is in an offline state, and notifies the operation module to perform an operation in conjunction with the card to generate an authentication code.
  • the determining module further includes:
  • a user request determining unit configured to: when the determining module determines that there is no card insertion in the card slot of the card reader, determine whether the user requests to acquire a one-time password, and if yes, notify the computing module to perform The operation generates a one-time password. Otherwise, it ends the current process and returns to wait for the system call state.
  • the determining module determines whether the card reader is in an online state by detecting a USB state of the card reader.
  • the determining module further includes:
  • the card operation request determining unit is configured to: when the determining module determines that a card is inserted in the card slot of the card reader and the card reader is in an online state, determining whether there is a card operation sent by the host The request, if yes, notifies the operation module to perform a corresponding operation on the card according to the card operation request sent by the host; otherwise, the current process is ended, and the system waiting state is returned.
  • the determining module further includes:
  • an authentication request determining unit configured to: when the determining module determines that a card is inserted in the card slot of the card reader and the card reader is in an offline state, determining whether the user has an authentication request, if Then, the operation module is notified to perform calculation with the card to generate an authentication code. Otherwise, the current process is ended, and the system wait state is returned.
  • the technical solution provided by the present invention has the beneficial effects of: providing a multi-function card reader and an implementation method thereof, which overcomes the defect that the existing card reader authentication function is relatively simple, and the card reader provided by the invention
  • the versatility of the device is good, in addition to the function of the smart card reader, it can also be used for the authentication of the inserted card, such as generating the authentication code (Token), and applying to the authentication field such as online banking and online payment, and It can also be applied to generate a one-time password or challenge code in the cardless state for login identity authentication of online games, operating systems, and the like.
  • FIG. 1 is a flow chart of a method for implementing a multi-function card reader according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of performing an operation to generate an authentication code by the multi-function card reader provided in Embodiment 1 of the present invention
  • FIG. 3 is a flowchart of a method for implementing a multi-function card reader according to Embodiment 2 of the present invention
  • FIG. 4 is a structural diagram of a multi-function card reader provided in Embodiment 3 of the present invention.
  • Figure 5 is another structural diagram of the multi-function card reader provided in Embodiment 3 of the present invention.
  • An embodiment of the present invention provides a method for implementing a multi-function card reader, including: the card reader determines whether there is a card insertion in its own card slot and whether it is in an online state, and when determining the card slot If no card is inserted, the card reader performs the operation to generate a one-time password. When it is determined that there is a card inserted in the card slot and the card reader is in the online state, the card reader performs the corresponding card operation according to the card operation request sent by the host. Operation; When it is judged that there is a card inserted in the card slot and the card reader is in an offline state, the card is used for calculation to generate an authentication code.
  • a card reader and a liquid crystal display are provided on the card reader.
  • the embodiment provides a method for implementing a multi-function card reader, which specifically includes:
  • Step 101 The card reader is powered on, and the hardware is initialized
  • Step 102 The card reader determines whether there is a card insertion in its own card slot. If no card is inserted, step 103 is performed. If a card is inserted, step 105 is performed;
  • Step 103 The card reader determines whether the user has a request to obtain a one-time password, and if so, executes step 104, and if not, ends the current process and returns to wait for the system call state;
  • the user makes a request to acquire a one-time password to the card reader, which can be implemented by pressing an specific button on the card reader to generate an OTP request.
  • Step 104 The card reader performs OTP (One Time Password) operation and generates a one-time password, and the generated one-time password is displayed on the LCD screen, and then the current process ends, returning to wait for the system call state;
  • OTP One Time Password
  • the OTP is relative to the traditional static password, which is a dynamic password, that is, a changed password, and the change is derived from the change of the operation factor for generating the password.
  • the dynamic password generation algorithm generally uses a double operation factor.
  • One is the identification code of the user identity, which is fixed, such as the user's private key; the second is the variation factor, such as the daytime, random number, counter value, and so on.
  • the method of OTP operation is the same as the method of OTP operation in the prior art.
  • Step 105 The card reader determines whether it is online. If yes, step 106 is performed, if the card reader is in the offline state, step 108 is performed;
  • the method for the card reader to determine whether it is online is specifically:
  • the card reader detects its own USB (Universal Serial Bus) state machine and determines if the USB enumeration is successful. If successful, the card reader is online. Otherwise, it is offline.
  • USB Universal Serial Bus
  • Step 106 The card reader determines whether there is a card operation request sent by the host, and if so, performs the step
  • Step 107 The card reader performs a corresponding operation on the card according to the card operation request sent by the host, and then the current process ends, returning to wait for the system call state;
  • Step 108 The card reader determines whether the user has an authentication request, and if so, performs step 109, otherwise
  • Step 109 The card reader performs calculation with the card, generates an authentication code, and displays the generated authentication code on the LCD. Then the current process ends and returns to wait for the system call status.
  • the above process may be repeatedly executed to return to the waiting system call state, that is, returning to between step 101 and step 102, and then continuing the above steps, the specific processes are the same.
  • the card reader when the card reader is in the online state and there is a card insertion slot in the card slot of the card reader, if the card reader receives the request for acquiring the one-time password input by the user through the button or obtains the authentication code.
  • the card reader may prohibit any request, or the card reader may generate a one-time password and display it, or the card reader may generate an authentication code in combination with the card and display it.
  • the card reader performs a calculation by combining the card to generate an authentication code, which may specifically include:
  • Step 201 The user selects the function he needs according to the function list displayed on the card reader;
  • Step 202 The card reader reads the data in the card
  • Step 203 The card reader determines which mode the card authentication operation mode is, if it is the first mode
  • step 204 is performed, if it is the second mode MODE2, step 205 is performed, if it is the third mode MODE3, step 206 is performed;
  • the first mode refers to a mode in which the card reader generates an authentication code according to a challenge code and an account number input by the user, and a PIN (Personal Identification Number) code input by the user;
  • the second mode refers to a mode in which the card reader performs an operation according to a PIN code input by the user to generate an authentication code.
  • the third mode refers to that the card reader performs an operation according to a challenge code input by the user and a PIN code input by the user, and generates an authentication code. mode.
  • Step 204 The card reader receives data such as a challenge code and an account number input by the user, and then performs step 205;
  • Step 205 The card reader receives the PIN (Personal Identification Number) code input by the user, and performs a PIN operation, and then performs step 207;
  • PIN Personal Identification Number
  • Step 206 The card reader receives the challenge code input by the user, and then performs step 205;
  • Step 207 The card reader generates AC according to various data information and PIN codes received (Application)
  • Step 208 The card reader determines whether the card authentication operation mode is the second mode MODE2, and requires TDS (Transaction Data Signing). If yes, step 209 is performed.
  • TDS Transaction Data Signing
  • Step 209 The card reader transmits the transaction data input by the user to the card, and then performs step 210;
  • Step 210 The card generates an authentication code (Token) and sends the generated authentication code (Token) to the card reader;
  • Step 211 The card reader will display the received authentication code (Token) on the LCD.
  • the authentication operation includes but is not limited to: CAP (Chip Authentication)
  • CAP is a cardholder authentication method, it is an online The process, leveraging the inherent authentication capabilities of the EMV payment chip card provides strong remote cardholder authentication, and peer CAP can also provide evidence to prove the transaction details approved by the cardholder.
  • the card reader and the sounding device are provided on the card reader.
  • the embodiment provides a method for implementing another multi-function card reader, which specifically includes:
  • Step 301 The card reader is powered on, and the hardware is initialized
  • Step 302 The card reader determines whether it is online. If yes, proceed to step 303, if no, the card reader is offline, then step 308 is performed;
  • the card reader detects its own USB status and determines whether the USB enumeration is successful. If successful, the card reader is online, otherwise it is offline.
  • Step 303 The card reader determines whether there is a card insertion in its own card slot. If there is a card inserted, step 304 is performed; otherwise, step 306 is performed;
  • Step 304 The card reader determines whether there is a card operation request sent by the host, and if so, performs the step
  • Step 305 The card reader performs a corresponding operation on the card according to the card operation request sent by the host, and then ends the current process, and returns to wait for the system call state;
  • Step 306 The card reader determines whether the user has a request to obtain a one-time password, and if yes, executes step 307, and if not, ends the current process and returns to wait for the system call state;
  • the user makes a request to acquire a one-time password to the card reader, which can be implemented by pressing an specific button on the card reader to generate an OTP request.
  • Step 307 The card reader performs OTP operation, generates a one-time password, and reads out the generated one-time password by voice, then ends the current process and returns to wait for the system call state;
  • the OTP is relative to the traditional static password, which is a dynamic password, that is, a changed password, and the change is derived from the change of the operation factor for generating the password.
  • the dynamic password generation algorithm generally uses a double operation factor, one is the identification code of the user identity, which is fixed, such as the user's private key; the second is the variation factor, such as the daytime, random number, counter value, and the like.
  • the method of OTP operation is the same as the method of OTP operation in the prior art.
  • Step 308 The card reader determines whether there is a card insertion in its own card slot. If no card is inserted, step 306 is performed. If a card is inserted, step 309 is performed;
  • Step 309 The card reader determines whether the user has an authentication request, and if so, performs step 310, otherwise
  • Step 310 The card reader performs calculation with the card, generates an authentication code, and reads out the generated authentication code by voice, then ends the current process and returns to wait for the system call state.
  • the above process may be repeatedly executed, and the system wait state is returned, that is, returning to between step 301 and step 302, and then the above steps are continued, and the specific process is the same.
  • step 310 of the embodiment the card reader performs operations on the card, and the process of generating the authentication code is specifically the same as that in the embodiment 1, and is not described here.
  • the card reader when the card reader is in the online state and there is a card insertion in the card slot of the card reader, if the card reader receives the request for acquiring the one-time password input by the user through the button or obtains the authentication code.
  • the card reader may be forbidden to generate a one-time password or authentication code, or the card reader may generate a one-time password and read the one-time password in a voice manner, or may be a card reader combined with a card.
  • An authentication code is generated and the above authentication code is read out in a voice manner.
  • the authentication operation includes but is not limited to: CAP (Chip Authentication)
  • CAP is a cardholder authentication method, which is an online process that makes full use of the inherent authentication function of the EMV payment chip card to provide strong remote cardholder authentication. Peer CAP can also provide evidence. Prove the details of the transaction approved by the cardholder.
  • an embodiment of the present invention further provides a multi-function card reader, including:
  • the power module 401 is configured to supply power to the card reader.
  • the card reader can be powered by a battery, or the card reader can be powered by a USB interface.
  • the input/output module 402 is configured to receive various information input by the user, and is also used to output a one-time password or an authentication code generated by the card reader.
  • the input/output module can receive through the keyboard.
  • Various information input by the user and can display the one-time password or recognition generated by the card reader through the display screen a code, or a sounding device to broadcast a one-time password or authentication code generated by the card reader;
  • the determining module 403 is configured to check whether a card is inserted in the card slot of the card reader, whether the card reader is in an online state, and whether the user has an authentication request for determining;
  • the operation module 404 is configured to: when the determining module 403 determines that there is no card insertion in the card slot of the card reader, perform an OTP operation to generate a one-time password, and when the determining module 403 determines that the card slot of the card reader is The card is inserted, the card reader is offline, and the user has an authentication request, and the card is used for calculation to generate an authentication code;
  • the operation module 405 is configured to: when the determining module 403 determines that a card is inserted in the card slot of the card reader, and the card reader is in an online state, performing a corresponding operation on the card according to the card operation request sent by the host.
  • the determining module 403 may first determine whether a card is inserted in the card slot, and then determine whether the card reader is in an online state, that is, specifically:
  • the card insertion determining unit 4031 is configured to determine whether a card is inserted in the card slot of the card reader;
  • the online state determining unit 4032 is configured to determine whether the card reader is in an online state when the card insertion determining unit 4031 determines that the card is inserted, and notify the operation module 405 to perform the card operation according to the host if the online state is in the online state.
  • the request performs a corresponding operation on the card. If it is in an offline state, the notification operation module 404 performs an operation in conjunction with the card to generate an authentication code.
  • the judging module 403 may first determine whether the card reader is in an online state, and then determine whether there is a card insertion in the card reader slot, that is, specifically:
  • the online status determining unit 4033 is configured to determine whether the card reader is in an online state
  • the card insertion determining unit 4034 is configured to determine whether there is a card insertion in the card reader slot after the online state determining unit 4033 determines, and if there is no card insertion, notify the computing module 404 to perform an operation to generate a one-time password. If there is a card insertion, and the online state judging unit judges that the card reader is in the online state, the notification operation module 405 performs a corresponding operation on the card according to the card operation request sent by the host; if there is a card insertion and the online state judging unit 4033 judges After the card reader is offline, the operation module is notified to perform calculation with the card to generate an authentication code.
  • the judging module 403 judges whether the card reader is in the online state by detecting the USB state of the card reader regardless of which order is used.
  • the determining module 403 may further include: [127]
  • the user request determining unit 4035 is configured to: when the determining module 403 determines that there is no card insertion in the card slot of the card reader, determine whether the user requests to acquire a one-time password, and if yes, notify the operation module 404 to perform an operation, and generate One-time password, otherwise, the current process ends, returning to wait for the system call state.
  • the judging module 403 may further include: [129] a card operation request determining unit 4036, configured to determine, in the card slot of the card reader, that the judging module 403 determines If there is a card inserted and the card reader is online, it is determined whether there is a card operation request sent by the host. If so, the operation module 405 is notified to perform a corresponding operation on the card according to the card operation request sent by the host, , ends the current process, returns to wait for the system call state.
  • a card operation request determining unit 4036 configured to determine, in the card slot of the card reader, that the judging module 403 determines If there is a card inserted and the card reader is online, it is determined whether there is a card operation request sent by the host. If so, the operation module 405 is notified to perform a corresponding operation on the card according to the card operation request sent by the host, , ends the current process, returns to wait for the system call state.
  • the determining module 403 may further include: [131] an authentication request determining unit 4037, configured to: when the determining module 403 determines that the card reader has a card slot, After the card is inserted and the card reader is in an offline state, it is determined whether the user has an authentication request. If so, the operation module 404 is notified to perform an operation with the card to generate an authentication code. Otherwise, the current process is terminated, and the system wait state is returned.
  • the user request determining unit 4035, the card operation request determining unit 4036, and the authentication request determining unit 4037, the determining module 403 may include any one of them, or any plurality.
  • the authentication operation includes but is not limited to: CAP (Chip Authentication)
  • CAP is a cardholder authentication method, which is an online process that makes full use of the inherent authentication function of the EMV payment chip card to provide strong remote cardholder authentication. Peer CAP can also provide evidence. Prove the details of the transaction approved by the cardholder.
  • the operation module 404 performs operations on the card in combination with the card, and the process of generating the authentication code is specifically described in Embodiment 1, and is not described herein.
  • the technical solution provided by the present invention has the beneficial effects of: providing a multi-function card reader and an implementation method thereof, which overcomes the defect that the existing card reader authentication function is relatively simple, and the card reader provided by the present invention
  • the versatility of the device is good.
  • the smart card reader it can also be used to insert the authentication of the card, such as generating the authentication code (Token), and applying it in the field of identity authentication such as online banking and online payment, and
  • the application generates a one-time password or challenge code in the cardless state for login identity authentication of online games, operating systems, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Lock And Its Accessories (AREA)
  • Facsimiles In General (AREA)
  • Storage Device Security (AREA)

Description

说明书
Title of Invention:多功能读卡器及其实现方法 技术领域
技术领域
[1] 本发明涉及信息安全领域, 特别涉及一种多功能读卡器及其实现方法。
背景技术
背景技术
[2] 随着数字信息技术的高速发展, 数字信息技术已经突破了传统的局限, 涉及到 商业、 贸易与消费领域的电子产品。 目前, 智能卡的应用越来越广泛, 已经全 面的应用到人们的生活中。
[3] 智能卡的使用, 需要有相应的支持智能卡操作的终端机具也就是读卡器, 读卡 器给智能卡和计算机提供了一个经济、 安全和通用的界面, 它适用于各种计算 机接口, 并且凭借内置的强大的软件, 能够兼容各类已有的以及即将面世的智 能卡、 操作系统和工业 API(Application Programming Interface, 应用程序接口)标 准。 读卡器目前可以应用在企业安全、 PKI架构、 家庭银行及电子商务等领域。 通过读卡器, 可以利用强大、 安全和易于携带的智能卡, 在组织内部实施统一 和集成的安全策略。
[4] 目前的读卡器在进行智能卡应用吋, 首先将读卡器链接主机, 并要将智能卡插 入读卡器内, 则用户可以通过读卡器对智能卡进行通信, 各种应用都是基于智 能卡进行的, 读卡器只是一个透明通道, 因此读卡器的功能比较单一, 应用范 围窄。
对发明的公开
发明内容
[5] 为了解决读卡器的认证功能比较单一的问题, 本发明提供了一种多功能读卡器 的实现方法和多功能读卡器。 所述技术方案如下:
[6] 一种多功能读卡器的实现方法, 所述方法包括:
[7] 读卡器对自身的卡槽内是否有卡片插入以及自身是否处于联机状态进行判断; [8] 当判断出所述读卡器的卡槽内没有卡片插入吋, 所述读卡器进行运算, 生成一 次性口令;
[9] 或, 当判断出所述读卡器的卡槽内有卡片插入且所述读卡器处于联机状态吋, 所述读卡器按照主机发来的卡操作请求对所述卡片执行相应的操作;
[10] 或, 当判断出所述读卡器的卡槽内有卡片插入且所述读卡器处于脱机状态吋, 所述读卡器结合卡片进行运算, 生成认证码。
[11] 所述方法具体包括:
[12] 读卡器判断自身的卡槽内是否有卡片插入;
[13] 如果没有卡片插入, 则所述读卡器进行运算, 生成一次性口令;
[14] 如果有卡片插入, 则所述读卡器判断自身是否处于联机状态;
[15] 如果处于联机状态, 则所述读卡器按照主机发来的卡操作请求对所述卡片执行 相应的操作;
[16] 如果处于脱机状态, 则所述读卡器结合卡片进行运算, 生成认证码。
[17] 所述方法具体包括:
[18] 读卡器判断自身是否处于联机状态;
[19] 如果处于联机状态, 则所述读卡器判断自身卡槽内是否有卡片插入;
[20] 如果没有卡片插入, 则所述读卡器进行运算, 生成一次性口令;
[21] 如果有卡片插入, 则所述读卡器按照主机发来的卡操作请求对所述卡片执行相 应的操作;
[22] 如果处于脱机状态, 则所述读卡器判断自身卡槽内是否有卡片插入;
[23] 如果没有卡片插入, 则所述读卡器进行运算, 生成一次性口令;
[24] 如果有卡片插入, 则所述读卡器结合卡片进行运算, 生成认证码。
[25] 所述读卡器进行运算, 生成一次性口令之前, 还包括:
[26] 所述读卡器判断用户是否请求获取一次性口令, 如果是, 则执行进行运算, 生 成一次性口令的步骤, 否则, 结束当前流程, 返回等待系统调用状态。
[27] 所述读卡器通过检测自身的 USB状态来判断自身是否处于联机状态。
[28] 所述读卡器按照主机发来的卡操作请求对所述卡片执行相应的操作之前, 还包 括: [29] 所述读卡器判断是否有主机发来的卡操作请求, 如果有, 则执行按照主机发来 的卡操作请求对卡片执行相应的操作的步骤; 否则, 结束当前流程, 返回等待 系统调用状态。
[30] 所述读卡器结合卡片进行运算, 生成认证码之前, 还包括:
[31] 所述读卡器判断用户是否有认证请求, 如果有, 则所述读卡器结合卡片进行运 算, 生成认证码, 否则, 结束当前流程, 返回等待系统调用状态。
[32] 一种多功能读卡器, 所述读卡器包括:
[33] 电源模块, 用于给所述读卡器供电;
[34] 输入 /输出模块, 用于接收用户输入的各种信息, 还用于输出所述读卡器生成 的一次性口令或认证码;
[35] 判断模块, 用于对所述读卡器的卡槽内是否有卡片插入以及对所述读卡器是否 处于联机状态进行判断;
[36] 运算模块, 用于当所述判断模块判断出所述读卡器的卡槽内没有卡片插入吋, 进行运算, 生成一次性口令, 当所述判断模块判断出所述读卡器的卡槽内有卡 片插入, 且所述读卡器处于脱机状态吋, 结合卡片进行运算, 生成认证码; [37] 操作模块, 用于当所述判断模块判断出所述读卡器的卡槽内有卡片插入且所述 读卡器处于联机状态吋, 按照主机发来的卡操作请求对所述卡片执行相应的操 作。
[38] 所述电源模块通过电池对所述读卡器供电, 或者通过 USB接口对所述读卡器供 电。
[39] 所述输入 /输出模块具体包括: 键盘单元、 触摸单元、 显示单元和发声单元。
[40] 所述判断模块具体包括:
[41] 卡片插入判断单元, 用于判断所述读卡器的卡槽内是否有卡片插入, 如果没有 卡片插入, 则通知所述运算模块进行运算, 生成一次性口令;
[42] 联机状态判断单元, 用于当所述卡片插入判断单元判断出有卡片插入吋, 判断 所述读卡器是否处于联机状态, 如果处于联机状态, 则通知所述操作模块按照 主机发来的卡操作请求对所述卡片执行相应的操作, 如果处于脱机状态, 则通 知所述运算模块结合卡片进行运算, 生成认证码。 [43] 所述判断模块具体包括:
[44] 联机状态判断单元, 用于判断所述读卡器是否处于联机状态;
[45] 卡片插入判断单元, 用于在所述联机状态判断单元判断后, 判断所述读卡器卡 槽内是否有卡片插入, 如果没有卡片插入, 则通知所述运算模块进行运算, 生 成一次性口令, 如果有卡片插入, 且所述联机状态判断单元判断出所述读卡器 处于联机状态吋, 通知所述操作模块按照主机发来的卡操作请求对所述卡片执 行相应的操作, 如果有卡片插入, 且所述联机状态判断单元判断出所述读卡器 处于脱机状态吋, 通知所述运算模块结合卡片进行运算, 生成认证码。
[46] 所述判断模块还包括:
[47] 用户请求判断单元, 用于当所述判断模块判断出所述读卡器的卡槽内没有卡片 插入吋, 判断用户是否请求获取一次性口令, 如果是, 则通知所述运算模块进 行运算, 生成一次性口令, 否则, 结束当前流程, 返回等待系统调用状态。
[48] 所述判断模块通过检测所述读卡器的 USB状态来判断所述读卡器是否处于联机 状态。
[49] 所述判断模块还包括:
[50] 卡操作请求判断单元, 用于当所述判断模块判断出所述读卡器的卡槽内有卡片 插入且所述读卡器处于联机状态吋, 判断是否有主机发来的卡操作请求, 如果 有, 则通知所述操作模块按照主机发来的卡操作请求对所述卡片执行相应的操 作, 否则, 结束当前流程, 返回等待系统调用状态。
[51] 所述判断模块还包括:
[52] 认证请求判断单元, 用于当所述判断模块判断出所述读卡器的卡槽内有卡片插 入且所述读卡器处于脱机状态吋, 判断用户是否有认证请求, 如果有, 则通知 所述运算模块结合卡片进行运算, 生成认证码, 否则, 结束当前流程, 返回等 待系统调用状态。
[53] 本发明提供的技术方案带来的有益效果是: 提供了一种多功能读卡器及其实现 方法, 克服了现有读卡器认证功能比较单一的缺陷, 本发明提供的读卡器通用 性好, 除了能够完成智能卡阅读器的功能之外, 还可以用于插入卡片吋的认证 , 如产生认证码 (Token) , 并应用在网银、 在线支付等身份认证领域, 而且, 还可以应用在无卡状态下产生一次性密码或挑战码用于网游、 操作系统等的登 陆身份认证。
附图说明
[54] 图 1是本发明实施例 1提供的多功能读卡器的实现方法流程图;
[55] 图 2是本发明实施例 1提供的多功能读卡器的进行运算生成认证码的流程图; [56] 图 3是本发明实施例 2提供的多功能读卡器的实现方法流程图;
[57] 图 4是本发明实施例 3提供的多功能读卡器的一个结构图;
[58] 图 5是本发明实施例 3提供的多功能读卡器的另一个结构图。
具体实施方式
[59] 为使本发明的目的、 技术方案和优点更加清楚, 下面将结合附图对本发明实施 方式作进一步地详细描述。
[60] 本发明实施例提供了一种多功能读卡器的实现方法, 包括: 读卡器对自身的卡 槽内是否有卡片插入以及自身是否处于联机状态进行判断, 当判断出卡槽内没 有卡片插入吋, 读卡器进行运算, 生成一次性口令; 当判断出卡槽内有卡片插 入且读卡器处于联机状态吋, 读卡器按照主机发来的卡操作请求对卡片执行相 应的操作; 当判断出卡槽内有卡片插入且读卡器处于脱机状态吋, 结合卡片进 行运算, 生成认证码。
[61] 实施例 1
[62] 在本实施例中, 读卡器上带有键盘和液晶显示屏, 参见图 1, 本实施例提供了 一种多功能读卡器的实现方法, 具体包括:
[63] 步骤 101 : 读卡器上电, 硬件初始化;
[64] 步骤 102 : 读卡器判断自身的卡槽内是否有卡片插入, 如果没有卡片插入, 则 执行步骤 103, 如果有卡片插入, 则执行步骤 105 ;
[65] 步骤 103 : 读卡器判断用户是否有获取一次性口令的请求, 如果有, 则执行步 骤 104, 如果没有, 则结束当前流程, 返回等待系统调用状态;
[66] 其中, 用户向读卡器发出请求获取一次性口令, 可以通过按下读卡器上特定的 按键而产生 OTP请求来实现。
[67] 步骤 104 : 读卡器进行 OTP ( One Time Password , 一次性口令) 运算, 生成 一次性口令, 并将生成的一次性口令在液晶显示屏上显示出来, 然后当前流程 结束, 返回等待系统调用状态;
[68] 其中, OTP是相对于传统的静态口令而言的, 是动态口令, 即变化的密码, 其变化来源于产生密码的运算因子是变化的。 动态口令的生成算法一般都釆用 双运算因子, 一是用户身份的识别码, 是固定不变的, 如用户的私有密钥; 二 是变动因子, 如吋间、 随机数、 计数器值等。 本实施例中, OTP运算的方法与 现有技术中的 OTP运算的方法相同。
[69] 步骤 105 : 读卡器判断自身是否处于联机状态, 如果是, 则执行步骤 106, 否 贝 I」, 读卡器处于脱机状态, 则执行步骤 108 ;
[70] 其中, 读卡器判断自身是否处于联机状态的方法具体为:
[71] 读卡器检测自身的 USB ( Universal Serial Bus , 通用串行总路线) 状态机, 判 断 USB枚举是否成功, 如果成功, 则表示读卡器为联机状态, 否则, 为脱机状 太。
[72] 步骤 106 : 读卡器判断是否有主机发来的卡操作请求, 如果有, 则执行步骤
107, 如果没有, 则结束当前流程, 返回等待系统调用状态;
[73] 步骤 107 : 读卡器按照主机发来的卡操作请求, 对卡片执行相应的操作, 然后 当前流程结束, 返回等待系统调用状态;
[74] 步骤 108 : 读卡器判断用户是否有认证请求, 如果有, 则执行步骤 109, 否则
, 当前流程结束, 返回等待系统调用状态;
[75] 步骤 109 : 读卡器结合卡片进行运算, 生成认证码, 并将生成的认证码在液晶 显示屏上显示出来, 然后当前流程结束, 返回等待系统调用状态。
[76] 本实施例中, 在当前流程结束后, 还可以继续重复执行上述流程, 返回等待系 统调用状态, 即为返回步骤 101与步骤 102之间, 再继续执行上述步骤, 具体流 程相同。
[77] 本实施例中, 当读卡器处于联机状态并且读卡器的卡槽内有卡插入吋, 若读卡 器接收到用户通过按键输入的获取一次性口令的请求或者是获取认证码的请求 , 则读卡器可以是禁止任何请求, 还可以是读卡器产生一个一次性口令并显示 出来, 也可以是读卡器结合卡片产生一个认证码并显示出来。 [78] 参见图 2, 本实施例步骤 109中, 读卡器结合卡片进行运算, 生成认证码的过 程, 可以具体包括:
[79] 步骤 201 : 用户根据读卡器上显示的功能列表选择自己需要的功能;
[80] 步骤 202 : 读卡器读取卡片中的数据;
[81] 步骤 203 : 读卡器判断卡片认证运算工作模式为哪种模式, 如果为第一模式
MODE1, 则执行步骤 204, 如果为第二模式 MODE2, 则执行步骤 205, 如果 为第三模式 MODE3, 则执行步骤 206;
[82] 本实施例中, 第一模式是指读卡器根据用户输入的挑战码和帐号等数据以及用 户输入的 PIN ( Personal Identification Number , 个人身份号码) 码进行运算, 生成认证码的模式; 第二模式是指读卡器根据用户输入的 PIN码进行运算, 生 成认证码的模式; 第三模式是指读卡器根据用户输入的挑战码以及用户输入的 PIN码进行运算, 生成认证码的模式。
[83] 步骤 204 : 读卡器接收用户输入的挑战码和帐号等数据, 然后执行步骤 205 ;
[84] 步骤 205 : 读卡器接收用户输入的 PIN ( Personal Identification Number , 个人 身份号码) 码, 并进行 PIN运算, 然后执行步骤 207 ;
[85] 步骤 206 : 读卡器接收用户输入的挑战码, 然后执行步骤 205 ;
[86] 步骤 207: 读卡器根据接收到的各种数据信息和 PIN码生成 AC ( Application
Figure imgf000009_0001
步骤 208 : 读卡器判断卡片认证运算工作模式是否为第二模式 MODE2 , 且需 要 TDS ( Transaction Data Signing , 交易数据签名) , 如果是, 则执行步骤 209
, 否则, 执行步骤 210 ;
[88] 步骤 209 : 读卡器将用户输入的交易数据传输给卡片, 然后执行步骤 210 ;
[89] 步骤 210 : 卡片生成认证码 (Token ) 并将生成的认证码 (Token ) 发送给读 卡器;
[90] 步骤 211 : 读卡器将接收到的认证码 (Token ) 在液晶屏上进行显示。
[91] 本实施例中, 所述认证运算包括但不限于: CAP ( Chip Authentication
Program , 芯片认证禾呈序) 运算和 DPA ( Dynamic Passcode Authentication , 云力 态口令认证) 运算。 其中, CAP是一种持卡人的身份验证方法, 它是一个在线 的进程, 充分利用 EMV支付芯片卡固有的认证功能提供了强大的远程持卡人的 身份验证, 同吋 CAP也可以提供证据证明持卡人批准的交易细节。
[92] 实施例 2
[93] 在本实施例中, 读卡器上带有键盘和发声装置, 参见图 3, 本实施例提供了另 一种多功能读卡器的实现方法, 具体包括:
[94] 步骤 301 : 读卡器上电, 硬件初始化;
[95] 步骤 302 : 读卡器判断自身是否处于联机状态, 如果是, 则执行步骤 303, 否 贝 I」, 读卡器为脱机状态, 则执行步骤 308 ;
[96] 其中, 读卡器判断自身是否处于联机状态的方法具体为:
[97] 读卡器检测自身的 USB状态, 判断 USB枚举是否成功, 如果成功, 则表示读 卡器为联机状态, 否则, 为脱机状态。
[98] 步骤 303 : 读卡器判断自身的卡槽内是否有卡片插入, 如果有卡片插入, 则执 行步骤 304, 否则, 执行步骤 306 ;
[99] 步骤 304 : 读卡器判断是否有主机发来的卡操作请求, 如果有, 则执行步骤
305, 如果没有, 则结束当前流程, 返回等待系统调用状态;
[100] 步骤 305 : 读卡器按照主机发来的卡操作请求, 对卡片执行相应的操作, 然后 结束当前流程, 返回等待系统调用状态;
[101] 步骤 306 : 读卡器判断用户是否有获取一次性口令的请求, 如果是, 则执行步 骤 307, 如果不是, 则结束当前流程, 返回等待系统调用状态;
[102] 其中, 用户向读卡器发出请求获取一次性口令, 可以通过按下读卡器上特定的 按键而产生 OTP请求来实现。
[103] 步骤 307 : 读卡器进行 OTP运算, 生成一次性口令, 并将生成的一次性口令 以语音发声的方式读出来, 然后结束当前流程, 返回等待系统调用状态;
[104] 其中, OTP是相对于传统的静态口令而言的, 是动态口令, 即变化的密码, 其变化来源于产生密码的运算因子是变化的。 动态口令的生成算法一般都釆用 双运算因子, 一是用户身份的识别码, 是固定不变的, 如用户的私有密钥; 二 是变动因子, 如吋间、 随机数、 计数器值等。 本实施例中, OTP运算的方法与 现有技术中的 OTP运算的方法相同。 [105] 步骤 308 : 读卡器判断自身的卡槽内是否有卡片插入, 如果没有卡片插入, 则 执行步骤 306, 如果有卡片插入, 则执行步骤 309 ;
[106] 步骤 309 : 读卡器判断用户是否有认证请求, 如果有, 则执行步骤 310, 否则
, 结束当前流程, 返回等待系统调用状态;
[107] 步骤 310 : 读卡器结合卡片进行运算, 生成认证码, 并将生成的认证码以语音 发声的方式读出来, 然后结束当前流程, 返回等待系统调用状态。
[108] 在本实施例中, 在当前流程结束后, 还可以继续重复执行上述流程, 返回等待 系统调用状态, 即为返回步骤 301与步骤 302之间, 再继续执行上述步骤, 具 体流程相同。
[109] 本实施例步骤 310中, 读卡器结合卡片进行运算, 生成认证码的过程具体同实 施例 1中的描述, 此处不再赞述。
[110] 本实施例中, 当读卡器处于联机状态并且读卡器的卡槽内有卡插入吋, 若读卡 器接收到用户通过按键输入的获取一次性口令的请求或者是获取认证码的请求 , 则读卡器可以是禁止产生一次性口令或者认证码, 还可以是读卡器产生一个 一次性口令并将上述一次性口令以语音的方式读出来, 也可以是读卡器结合卡 片产生一个认证码并将上述认证码以语音的方式读出来。
[111] 本实施例中, 所述认证运算包括但不限于: CAP ( Chip Authentication
Program , 芯片认证禾呈序) 运算和 DPA ( Dynamic Passcode Authentication , 云力 态口令认证) 运算。 其中, CAP是一种持卡人的身份验证方法, 它是一个在线 的进程, 充分利用 EMV支付芯片卡固有的认证功能提供了强大的远程持卡人的 身份验证, 同吋 CAP也可以提供证据证明持卡人批准的交易细节。
[112] 实施例 3
[113] 参见图 4, 本发明实施例还提供了一种多功能读卡器, 包括:
[114] 电源模块 401, 用于给读卡器供电, 在本实施例中, 可以是通过电池给读卡器 供电, 还可以是通过 USB接口来给读卡器供电;
[115] 输入 /输出模块 402, 用于接收用户输入的各种信息, 还用于输出读卡器生成 的一次性口令或者认证码, 在本实施例中, 输入 /输出模块可以通过键盘来接收 用户输入的各种信息, 而且可以通过显示屏显示读卡器生成的一次性口令或认 证码, 或者通过发声装置来播报读卡器生成的一次性口令或认证码;
[116] 判断模块 403, 用于对读卡器的卡槽内是否有卡片插入, 读卡器是否处于联机 状态, 以及用户是否有认证请求进行判断;
[117] 运算模块 404, 用于当判断模块 403判断出读卡器的卡槽内没有卡片插入吋, 进行 OTP运算, 生成一次性口令, 当判断模块 403判断出读卡器的卡槽内有卡 片插入, 读卡器处于脱机状态, 且用户有认证请求吋, 结合卡片进行运算, 生 成认证码;
[118] 操作模块 405, 用于当判断模块 403判断出读卡器的卡槽内有卡片插入, 读卡 器处于联机状态吋, 按照主机发来的卡操作请求对卡片执行相应的操作。
[119] 本实施例中, 判断模块 403可以先判断卡槽内是否有卡片插入, 然后再判断读 卡器是否处于联机状态, 即具体包括:
[120] 卡片插入判断单元 4031, 用于判断读卡器的卡槽内是否有卡片插入;
[121] 联机状态判断单元 4032, 用于当卡片插入判断单元 4031判断出有卡片插入吋 , 判断读卡器是否处于联机状态; 如果处于联机状态, 则通知操作模块 405按 照主机发来的卡操作请求对卡片执行相应的操作, 如果处于脱机状态, 则通知 运算模块 404结合卡片进行运算, 生成认证码。
[122] 另外, 参见图 5, 判断模块 403也可以先判断读卡器是否处于联机状态, 然后 再判断读卡器卡槽内是否有卡片插入, 即具体包括:
[123] 联机状态判断单元 4033, 用于判断读卡器是否处于联机状态;
[124] 卡片插入判断单元 4034, 用于在联机状态判断单元 4033判断后, 判断读卡器 卡槽内是否有卡片插入, 如果没有卡片插入, 则通知运算模块 404进行运算, 生成一次性口令, 如果有卡片插入, 且联机状态判断单元判断出读卡器处于联 机状态吋, 通知操作模块 405按照主机发来的卡操作请求对卡片执行相应的操 作; 如果有卡片插入且联机状态判断单元 4033判断出读卡器处于脱机状态吋, 通知运算模块结合卡片进行运算, 生成认证码。
[125] 本实施例中, 判断模块 403无论釆用哪种顺序进行判断, 均可以通过检测读卡 器的 USB状态来判断读卡器是否处于联机状态。
[126] 本实施例中, 判断模块 403无论釆用哪种顺序进行判断, 均可以还包括: [127] 用户请求判断单元 4035, 用于当判断模块 403判断出读卡器的卡槽内没有卡 片插入吋, 判断用户是否请求获取一次性口令, 如果是, 则通知运算模块 404 进行运算, 生成一次性口令, 否则, 结束当前流程, 返回等待系统调用状态。
[128] 本实施例中, 判断模块 403无论釆用哪种顺序进行判断, 均可以还包括: [129] 卡操作请求判断单元 4036, 用于当判断模块 403判断出读卡器的卡槽内有卡 片插入且读卡器处于联机状态吋, 判断是否有主机发来的卡操作请求, 如果有 , 则通知操作模块 405按照主机发来的卡操作请求对卡片执行相应的操作, 否 贝 I」, 结束当前流程, 返回等待系统调用状态。
[130] 本实施例中, 判断模块 403无论釆用哪种顺序进行判断, 均可以还包括: [131] 认证请求判断单元 4037, 用于当判断模块 403判断出读卡器的卡槽内有卡片 插入且读卡器处于脱机状态吋, 判断用户是否有认证请求, 如果有, 则通知运 算模块 404结合卡片进行运算, 生成认证码, 否则, 结束当前流程, 返回等待 系统调用状态。
[132] 上述用户请求判断单元 4035、 卡操作请求判断单元 4036和认证请求判断单元 4037, 判断模块 403可以包含其中的任一种, 或者任意多种。
[133] 本实施例中, 所述认证运算包括但不限于: CAP ( Chip Authentication
Program , 芯片认证禾呈序) 运算和 DPA ( Dynamic Passcode Authentication , 云力 态口令认证) 运算。 其中, CAP是一种持卡人的身份验证方法, 它是一个在线 的进程, 充分利用 EMV支付芯片卡固有的认证功能提供了强大的远程持卡人的 身份验证, 同吋 CAP也可以提供证据证明持卡人批准的交易细节。
[134] 本实施例中, 运算模块 404结合卡片进行运算, 生成认证码的过程具体同实施 例 1中的描述, 此处不再赞述。
[135] 本发明提供的技术方案带来的有益效果是: 提供了一种多功能读卡器及其实现 方法, 克服了现有读卡器认证功能比较单一的缺陷, 本发明提供的读卡器通用 性好, 除了能够完成智能卡阅读器的功能之外, 还可以用于插入卡片吋的认证 , 如产生认证码 (Token ) , 并应用在网银、 在线支付等身份认证领域, 而且 , 还可以应用在无卡状态下产生一次性密码或挑战码用于网游、 操作系统等的 登陆身份认证。 以上所述仅为本发明的较佳实施例, 并不用以限制本发明, 凡在本发明的精神 和原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。

Claims

权利要求书
一种多功能读卡器的实现方法, 其特征在于, 所述方法包括: 读卡器对自身的卡槽内是否有卡片插入以及自身是否处于联机状 态进行判断;
当判断出所述读卡器的卡槽内没有卡片插入吋, 所述读卡器进行 运算, 生成一次性口令;
或, 当判断出所述读卡器的卡槽内有卡片插入且所述读卡器处于 联机状态吋, 所述读卡器按照主机发来的卡操作请求对所述卡片 执行相应的操作;
或, 当判断出所述读卡器的卡槽内有卡片插入且所述读卡器处于 脱机状态吋, 所述读卡器结合卡片进行运算, 生成认证码。
根据权利要求 1所述的多功能读卡器的实现方法, 其特征在于, 所 述方法具体包括:
读卡器判断自身的卡槽内是否有卡片插入;
如果没有卡片插入, 则所述读卡器进行运算, 生成一次性口令; 如果有卡片插入, 则所述读卡器判断自身是否处于联机状态; 如果处于联机状态, 则所述读卡器按照主机发来的卡操作请求对 所述卡片执行相应的操作;
如果处于脱机状态, 则所述读卡器结合卡片进行运算, 生成认证 码。
根据权利要求 1所述的多功能读卡器的实现方法, 其特征在于, 所 述方法具体包括:
读卡器判断自身是否处于联机状态;
如果处于联机状态, 则所述读卡器判断自身卡槽内是否有卡片插 入;
如果没有卡片插入, 则所述读卡器进行运算, 生成一次性口令; 如果有卡片插入, 则所述读卡器按照主机发来的卡操作请求对所 述卡片执行相应的操作; 如果处于脱机状态, 则所述读卡器判断自身卡槽内是否有卡片插 入;
如果没有卡片插入, 则所述读卡器进行运算, 生成一次性口令; 如果有卡片插入, 则所述读卡器结合卡片进行运算, 生成认证码 根据权利要求 1所述的多功能读卡器的实现方法, 其特征在于, 所 述读卡器进行运算, 生成一次性口令之前, 还包括:
所述读卡器判断用户是否请求获取一次性口令, 如果是, 则执行 进行运算, 生成一次性口令的步骤, 否则, 结束当前流程, 返回 等待系统调用状态。
根据权利要求 1所述的多功能读卡器的实现方法, 其特征在于, 所 述读卡器通过检测自身的 USB状态来判断自身是否处于联机状态 根据权利要求 1所述的多功能读卡器的实现方法, 其特征在于, 所 述读卡器按照主机发来的卡操作请求对所述卡片执行相应的操作 之前, 还包括:
所述读卡器判断是否有主机发来的卡操作请求, 如果有, 则执行 按照主机发来的卡操作请求对卡片执行相应的操作的步骤; 否则 , 结束当前流程, 返回等待系统调用状态。
根据权利要求 1所述的多功能读卡器的实现方法, 其特征在于, 所 述读卡器结合卡片进行运算, 生成认证码之前, 还包括: 所述读卡器判断用户是否有认证请求, 如果有, 则所述读卡器结 合卡片进行运算, 生成认证码, 否则, 结束当前流程, 返回等待 系统调用状态。
一种多功能读卡器, 其特征在于, 所述读卡器包括:
电源模块, 用于给所述读卡器供电;
输入 /输出模块, 用于接收用户输入的各种信息, 还用于输出所述 读卡器生成的一次性口令或认证码; 判断模块, 用于对所述读卡器的卡槽内是否有卡片插入以及对所 述读卡器是否处于联机状态进行判断;
运算模块, 用于当所述判断模块判断出所述读卡器的卡槽内没有 卡片插入吋, 进行运算, 生成一次性口令, 当所述判断模块判断 出所述读卡器的卡槽内有卡片插入, 且所述读卡器处于脱机状态 吋, 结合卡片进行运算, 生成认证码;
操作模块, 用于当所述判断模块判断出所述读卡器的卡槽内有卡 片插入且所述读卡器处于联机状态吋, 按照主机发来的卡操作请 求对所述卡片执行相应的操作。
[Claim 9] 根据权利要求 8所述的多功能读卡器, 其特征在于, 所述电源模块 通过电池对所述读卡器供电, 或者通过 USB接口对所述读卡器供 电。
[Claim 10] 根据权利要求 8所述的多功能读卡器, 其特征在于, 所述输入 /输出 模块具体包括: 键盘单元、 触摸单元、 显示单元和发声单元。
[Claim 11] 根据权利要求 8所述的多功能读卡器, 其特征在于, 所述判断模块 具体包括:
卡片插入判断单元, 用于判断所述读卡器的卡槽内是否有卡片插 入, 如果没有卡片插入, 则通知所述运算模块进行运算, 生成一 次性口令;
联机状态判断单元, 用于当所述卡片插入判断单元判断出有卡片 插入吋, 判断所述读卡器是否处于联机状态, 如果处于联机状态 , 则通知所述操作模块按照主机发来的卡操作请求对所述卡片执 行相应的操作, 如果处于脱机状态, 则通知所述运算模块结合卡 片进行运算, 生成认证码。
[Claim 12] 根据权利要求 8所述的多功能读卡器, 其特征在于, 所述判断模块 具体包括:
联机状态判断单元, 用于判断所述读卡器是否处于联机状态; 卡片插入判断单元, 用于在所述联机状态判断单元判断后, 判断 所述读卡器卡槽内是否有卡片插入, 如果没有卡片插入, 则通知 所述运算模块进行运算, 生成一次性口令, 如果有卡片插入, 且 所述联机状态判断单元判断出所述读卡器处于联机状态吋, 通知 所述操作模块按照主机发来的卡操作请求对所述卡片执行相应的 操作, 如果有卡片插入, 且所述联机状态判断单元判断出所述读 卡器处于脱机状态吋, 通知所述运算模块结合卡片进行运算, 生 成认证码。
根据权利要求 8所述的多功能读卡器, 其特征在于, 所述判断模块 还包括:
用户请求判断单元, 用于当所述判断模块判断出所述读卡器的卡 槽内没有卡片插入吋, 判断用户是否请求获取一次性口令, 如果 是, 则通知所述运算模块进行运算, 生成一次性口令, 否则, 结 束当前流程, 返回等待系统调用状态。
根据权利要求 8所述的多功能读卡器, 其特征在于, 所述判断模块 通过检测所述读卡器的 USB状态来判断所述读卡器是否处于联机 状态。
根据权利要求 8所述的多功能读卡器, 其特征在于, 所述判断模块 还包括:
卡操作请求判断单元, 用于当所述判断模块判断出所述读卡器的 卡槽内有卡片插入且所述读卡器处于联机状态吋, 判断是否有主 机发来的卡操作请求, 如果有, 则通知所述操作模块按照主机发 来的卡操作请求对所述卡片执行相应的操作, 否则, 结束当前流 程, 返回等待系统调用状态。
根据权利要求 8所述的多功能读卡器, 其特征在于, 所述判断模块 还包括:
认证请求判断单元, 用于当所述判断模块判断出所述读卡器的卡 槽内有卡片插入且所述读卡器处于脱机状态吋, 判断用户是否有 认证请求, 如果有, 则通知所述运算模块结合卡片进行运算, 生 成认证码, 否则, 结束当前流程, 返回等待系统调用状态。
PCT/CN2009/075458 2008-12-31 2009-12-10 多功能读卡器及其实现方法 WO2010075730A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/933,491 US8888000B2 (en) 2008-12-31 2009-12-10 Card reader with multiple functions and a method for implementing the same

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN 200810247460 CN101576945B (zh) 2008-12-31 2008-12-31 多功能读卡器及其实现方法
CN200810247460.9 2008-12-31

Publications (1)

Publication Number Publication Date
WO2010075730A1 true WO2010075730A1 (zh) 2010-07-08

Family

ID=41271879

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/075458 WO2010075730A1 (zh) 2008-12-31 2009-12-10 多功能读卡器及其实现方法

Country Status (3)

Country Link
US (1) US8888000B2 (zh)
CN (1) CN101576945B (zh)
WO (1) WO2010075730A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101576945B (zh) * 2008-12-31 2012-12-12 飞天诚信科技股份有限公司 多功能读卡器及其实现方法
CN103093160B (zh) * 2011-10-27 2015-11-04 普天信息技术研究院有限公司 一种辅助智能存储卡实现多功能应用的装置
CN103532719B (zh) * 2013-10-22 2017-01-18 天地融科技股份有限公司 动态口令生成方法和系统、交易请求的处理方法和系统
CN103763103B (zh) * 2013-12-31 2017-02-01 飞天诚信科技股份有限公司 一种智能卡生成脱机认证凭据的方法
CN104573762B (zh) * 2014-12-15 2017-12-22 国家电网公司 一种预付费表用逻辑加密卡的识别方法
CN107784243B (zh) * 2017-09-30 2020-11-03 飞天诚信科技股份有限公司 一种在安卓系统中实现读卡器设备通信的方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030049387A (ko) * 2001-12-14 2003-06-25 엔시비즈(주) 확장 스마트 카드 시스템 및 그 제어 방법
CN1614620A (zh) * 2004-11-26 2005-05-11 王小矿 一种便携式读卡器及其读卡方法
CN101576945A (zh) * 2008-12-31 2009-11-11 北京飞天诚信科技有限公司 多功能读卡器及其实现方法

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9920502D0 (en) * 1999-09-01 1999-11-03 Ncr Int Inc Portable terminal
WO2001061620A1 (en) * 2000-02-18 2001-08-23 Vasco Data Security, Inc. Field programmable smart card terminal and token device
US6978335B2 (en) * 2000-06-30 2005-12-20 02Micro International Limited Smart card virtual hub
US20040107170A1 (en) * 2002-08-08 2004-06-03 Fujitsu Limited Apparatuses for purchasing of goods and services
US6945454B2 (en) * 2003-04-22 2005-09-20 Stmicroelectronics, Inc. Smart card device used as mass storage device
US20050061875A1 (en) * 2003-09-10 2005-03-24 Zai Li-Cheng Richard Method and apparatus for a secure RFID system
JP2005182462A (ja) * 2003-12-19 2005-07-07 Toshiba Corp 電子機器、ユニット駆動装置およびユニット駆動装置のインタフェース制御方法
CN100364261C (zh) * 2004-03-31 2008-01-23 刘学明 基于双动态口令的身份鉴别系统
EP1865470A1 (en) * 2006-06-06 2007-12-12 CardSafe System Cardholder system with improved security functions and corresponding methods
CN101102194B (zh) * 2007-07-31 2010-06-09 北京飞天诚信科技有限公司 一种otp设备及利用该设备进行身份认证的方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030049387A (ko) * 2001-12-14 2003-06-25 엔시비즈(주) 확장 스마트 카드 시스템 및 그 제어 방법
CN1614620A (zh) * 2004-11-26 2005-05-11 王小矿 一种便携式读卡器及其读卡方法
CN101576945A (zh) * 2008-12-31 2009-11-11 北京飞天诚信科技有限公司 多功能读卡器及其实现方法

Also Published As

Publication number Publication date
CN101576945B (zh) 2012-12-12
CN101576945A (zh) 2009-11-11
US20110042457A1 (en) 2011-02-24
US8888000B2 (en) 2014-11-18

Similar Documents

Publication Publication Date Title
US10204215B2 (en) System and method for processing a transaction with secured authentication
US20100163618A1 (en) Transaction method with e-payment card and e-payment card
WO2010075730A1 (zh) 多功能读卡器及其实现方法
TWI611358B (zh) 交易裝置、使用其之交易系統與交易方法
CN103368743A (zh) 多功能智能卡及其身份认证方法和运行方法
CN202004768U (zh) 物理认证装置及动态口令牌
CN100534039C (zh) 一种处理符合usb接口规范的信息载体的金融交易终端及其工作方法
CN102611551A (zh) 物理认证方法、装置及动态口令牌
US20220005046A1 (en) Payment method using biometric authentication and electronic device therefor
WO2020001456A1 (en) Bank card privacy information hiding method, bank card and computer readable storage medium
AU2019204157A1 (en) Method, system and device for e-commerce payment intelligent access control
US20230351000A1 (en) Medium for temporary account access
WO2013181882A1 (zh) 手写笔、移动终端以及信息的处理方法
US20200387907A1 (en) System and electronic device for performing offline payment by using online authentication
CN101593251A (zh) 数字签名装置和数字签名方法
CN105405010B (zh) 交易装置、使用其的交易系统与交易方法
TW201828183A (zh) 行動裝置中跨平台支付之方法
TW201608498A (zh) 交易認證卡
US20120144450A1 (en) Authentication Method in Electronic Commerce
TWM561853U (zh) 具網路交易資訊確認功能之卡片讀取裝置
KR20170062115A (ko) 금융카드
TW201619879A (zh) 以可攜式裝置於零售端進行交易的方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09836017

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 12933491

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09836017

Country of ref document: EP

Kind code of ref document: A1