WO2016155374A1 - 数据防窃取装置及方法 - Google Patents
数据防窃取装置及方法 Download PDFInfo
- Publication number
- WO2016155374A1 WO2016155374A1 PCT/CN2015/099008 CN2015099008W WO2016155374A1 WO 2016155374 A1 WO2016155374 A1 WO 2016155374A1 CN 2015099008 W CN2015099008 W CN 2015099008W WO 2016155374 A1 WO2016155374 A1 WO 2016155374A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- attribute
- interference
- reader
- radio frequency
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 230000002265 prevention Effects 0.000 title claims abstract description 8
- 230000006854 communication Effects 0.000 claims abstract description 25
- 238000004891 communication Methods 0.000 claims abstract description 23
- 238000004590 computer program Methods 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000001514 detection method Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 8
- 230000002452 interceptive effect Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000010355 oscillation Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000004397 blinking Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002618 waking effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
Definitions
- the present invention relates to the field of Internet information security technologies, and in particular, to a data anti-theft device and method.
- Radio Frequency Identification is a wireless communication technology that can identify specific targets and read and write related data through radio signals without establishing mechanical or optical contact between the system and a specific target. Its applications are very broad, such as: libraries, access control systems, food safety traceability.
- RFID Radio Frequency Identification
- the advantage of this technology is that the user can conveniently read the related information of some RF cards through the reader without contact, and the information of the radio frequency card is also reduced while being convenient to read. For example, some criminals obtain some private RF card information without their permission, and then copy some of the obtained private RF card information, and copy the identity card, bank card and other information to steal property, causing huge economic benefits for users. loss.
- radio frequency card that provides a mechanism for selectively reading information from a reader. For example, when a radio frequency card is not authorized to read, the reader cannot read the information of the unauthorized radio frequency card.
- RF cards such as passports, payment cards (credit cards, bank cards, etc.), car key cards, etc.
- each RF card has this function, its cost is very high, and all RF cards have This mechanism is also difficult to achieve.
- the present invention provides a data anti-theft device and method for intercepting communication between a reader and a radio frequency card by transmitting interference information, thereby effectively preventing the reader from reading data in the radio frequency card.
- the present invention provides a data anti-theft device, including:
- An auxiliary module configured to acquire a first signal sent by the reader, and determine an attribute of the first signal according to the first signal
- an interference module configured to send, according to an attribute of the first signal determined by the auxiliary module, an interference signal corresponding to an attribute of the first signal and/or an interference signal corresponding to an attribute of the second signal, to Superimposing the interference signal with the first signal and/or the second signal to interfere with the interference
- the reader reads data in the radio frequency card
- the second signal is a radio frequency card data signal sent by the radio frequency card in response to the first signal.
- the present invention further provides a data anti-theft method, including:
- the second signal is a radio frequency card data signal sent by the radio frequency card in response to the first signal.
- the present invention further provides a data anti-theft device comprising: a first coil, a second coil, and a frequency modulation unit;
- the first coil is adapted to detect a first signal sent by a reader and/or a second signal sent by a radio frequency card;
- the frequency modulating unit is adapted to modulate the second coil to transmit an interference signal according to the first signal and/or the second signal detected by the first coil, so that the interference signal interferes with the reader and the radio frequency card
- the communication between the readers makes it impossible for the reader to read the data in the RF card.
- the present invention further provides a data anti-theft system, including the above-mentioned data anti-theft device, and a radio frequency card within a preset range with the data anti-theft device;
- the radio frequency card sends the second signal
- the data anti-theft device sends the interference signal, so that the interference signal interferes with the reader and the radio frequency Communication between the cards, so that the reader cannot read the data in the RF card.
- a computer program comprising computer readable code, when the computer readable code is run on a computing device, causing the computing device to perform data theft prevention according to any of the above method.
- a computer readable medium storing a computer program as described above is provided.
- the data party stealing device and method provide a signal sent by a reader, determine the attribute of the signal, and then send an interference signal according to the attribute, thereby interfering with the reader and the RF card. Communication between the readers, so that the reader cannot read the data in the RF card.
- the device has a simple structure, protects the security of the data information of the radio frequency card, and prevents the possibility of the data information of the radio frequency card being stolen.
- FIG. 1 is a schematic diagram of communication in which a reader reads data information of a radio frequency card in the prior art
- FIG. 2 is a schematic flowchart of a data anti-theft method according to an embodiment of the present invention
- FIG. 3 is a schematic flowchart of a data anti-theft method according to another embodiment of the present invention.
- FIG. 4 is a schematic flowchart of a data anti-theft method according to another embodiment of the present invention.
- FIG. 5 is a schematic flowchart of a data anti-theft method according to another embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of a data anti-theft device according to an embodiment of the present invention.
- FIG. 7 is a schematic diagram of communication of a data anti-theft device transmitting an interference signal according to an embodiment of the present invention.
- Figure 8 is a schematic block diagram of a computing device for performing a data theft prevention method in accordance with the present invention.
- Fig. 9 schematically shows a storage unit for holding or carrying program code implementing the data anti-theft method according to the present invention.
- the same-frequency interference in the following embodiments is the carrier frequency of the unwanted signal and the carrier frequency of the useful signal. The same, and the interference caused by the receiver receiving the same frequency useful signal.
- Magnetically coupled resonance through the near-field coupling of the magnetic field, causes the receiving coil and the transmitting coil to resonate to achieve wireless transmission of energy.
- the communication process between the reader and the RF card is as follows:
- the reader activates the RF card through the RF field according to the magnetic coupling resonance technology.
- the RF card waits for the reader to read the command; afterwards, the reader sends a certain carrier frequency RF signal to the RF card, and the RF card receives the RF signal,
- the energy obtained by the induced current sends the RF card data information to the reader, as shown in Figure 1.
- the reader sends a read request RF signal with a frequency of 13.56 MHz
- the RF card will issue a subcarrier frequency of 847 KHz. Response signal.
- the present invention proposes a data anti-theft method.
- FIG. 2 is a schematic flowchart diagram of a data anti-theft method according to an embodiment of the present invention. As shown in FIG. 2, the method includes the following steps:
- the first signal can be understood as a radio frequency signal sent by the reader to the radio frequency card to read the radio frequency card data information.
- the first signal may be divided into a high frequency signal (such as 13.56 MHz), an intermediate frequency signal, and a low frequency signal (such as 125 kHz to 135 kHz) according to the frequency band.
- the attributes of the first signal include a high frequency attribute, an intermediate frequency attribute, and Low frequency properties.
- the second signal is a radio frequency card data signal sent by the radio frequency card in response to the first signal.
- the method obtains the first signal sent by the reader, determines the attribute of the first signal, and then sends an interference signal according to the attribute, thereby interfering with the communication between the reader and the RF card.
- the reader can not read the data in the radio frequency card, protect the security of the radio frequency card data information, and prevent the possibility of the radio frequency card data information being stolen.
- step 202 the attribute of the first signal is determined according to the first signal, and includes the following sub-steps not shown in FIG. 2:
- the carrier frequency signal of the preset frequency band in the above step 2022 includes: a carrier frequency signal of a high frequency attribute and a carrier frequency signal of a low frequency attribute.
- the carrier frequency signal of the preset frequency band may further include a carrier frequency signal of an intermediate frequency attribute.
- the step 202 is mainly for obtaining the attributes of the signals sent by the reader and the radio frequency card.
- the communication between the reader and the radio frequency card is in accordance with the communication protocol, the first one sent by the reader is obtained.
- the properties of the second signal that the RF card is to send to the reader can be indirectly known.
- the interference signal corresponding to the attribute may be sent according to the same-frequency interference technology.
- the interfering signal corresponds to an attribute of the first signal and/or to an attribute of the second signal. That is, the interference signal may be superimposed with the second signal to prevent the reader from reading the second signal sent by the RF card; the interference signal may also be superimposed with the first signal to prevent the RF card from acquiring the reader.
- the first signal is sent; the interference signal can also be superimposed on the first signal and the second signal at the same time, which prevents the reader from reading the second signal sent by the RF card and preventing the RF card from acquiring the first signal sent by the reader.
- the following describes the method for communication between the interfering signal interference reader and the radio frequency card through three schemes.
- the interference signal is superimposed with the second signal to prevent the reader from reading the second signal sent by the radio frequency card.
- FIG. 3 is a schematic flowchart of a data anti-theft method according to an embodiment of the present invention. As shown in FIG. 3, the method includes the following steps:
- the first signal can be understood as a radio frequency signal sent by the reader to the radio frequency card to read the radio frequency card data information.
- the attribute of the second signal can be known according to the communication protocol between the reader and the radio frequency card.
- the second signal is a radio frequency card data signal sent by the radio frequency card in response to the first signal.
- the foregoing step 304 can be understood as: sending, according to the attribute of the second signal, an interference signal corresponding to an attribute of the second signal by using load modulation. That is, in order to make the interference signal and the second signal superimposed, the interference can be effectively interfered with by the reader to read the data information of the radio frequency card, and the interference signal corresponding to the attribute of the second signal is sent to the reader by changing the current of the coil.
- This embodiment does not describe in detail how it is modulated and which mode modulation is used.
- the interference signal corresponding to the attribute of the second signal can also be transmitted by modulating the carrier frequency modulation. That is, in order to make the interference signal and the second signal superimposed, the interference can be effectively interfered with by the reader to read the data information of the radio frequency card, and the interference signal corresponding to the attribute of the second signal is sent to the reader by changing the voltage of the coil.
- the second scheme is shown in FIG. 4.
- the interference signal is superimposed with the first signal to prevent the radio frequency card from acquiring the first signal sent by the reader.
- FIG. 4 is a schematic flowchart diagram of a data anti-theft method according to an embodiment of the present invention. As shown in FIG. 4, the method includes the following steps:
- the first signal can be understood as a radio frequency signal sent by the reader to the radio frequency card to read the radio frequency card data information.
- the foregoing step 403 can be understood as: sending, according to the attribute of the first signal, an interference signal corresponding to an attribute of the first signal by using load modulation. That is, in order to make the interference signal and the first signal superimposed, the interference can be effectively interfered with by the reader to read the data information of the radio frequency card, and the interference signal corresponding to the attribute of the first signal is sent to the radio frequency card by changing the current of the coil.
- This embodiment does not describe in detail how it is modulated and which mode modulation is used.
- the interference signal corresponding to the attribute of the first signal can also be transmitted by modulating the carrier frequency modulation. That is, in order to make the interference signal and the first signal superimposed, the interference can be effectively interfered with by the reader to read the data information of the radio frequency card, and the interference signal corresponding to the attribute of the first signal is sent to the radio frequency card by changing the voltage of the coil.
- the interference signal can also be superimposed on the first signal and the second signal at the same time, which prevents the reader from reading the second signal sent by the RF card and prevents the RF card from acquiring the first transmission by the reader. signal.
- FIG. 5 is a schematic flowchart of a data anti-theft method according to an embodiment of the present invention. As shown in FIG. 5, the method includes the following steps:
- the first signal can be understood as a radio frequency signal sent by the reader to the radio frequency card to read the radio frequency card data information.
- the attribute of the second signal can be known according to the communication protocol between the reader and the radio frequency card.
- the second signal is a radio frequency card data signal sent by the radio frequency card in response to the first signal.
- the foregoing step 503 is understood to be: sending, according to an attribute of the second signal, a first interference signal corresponding to an attribute of the second signal by using load modulation, and adopting a load according to an attribute of the first signal.
- the modulated mode transmits a second interference signal corresponding to the attribute of the first signal.
- the interference in order to make the first interference signal and the second signal superimposed, the interference can be effectively interfered with by the reader to read the data information of the radio frequency card, and the interference signal corresponding to the attribute of the second signal is sent to the reader by changing the current of the coil, and In order to make the second interference signal and the first signal superimposed to effectively interfere with the reader reading the data information of the radio frequency card, the interference signal corresponding to the attribute of the first signal is sent to the radio frequency card by changing the current of the coil.
- This embodiment does not describe in detail how it is modulated and which mode modulation is used.
- the first interference signal corresponding to the attribute of the second signal and the second interference signal corresponding to the attribute of the first signal may be transmitted by modulating the carrier frequency. That is, in order to make the first interfering signal and the second signal superimposed to effectively interfere with the reader reading the data information of the radio frequency card, the first interference signal corresponding to the attribute of the second signal is sent to the reader by changing the voltage of the coil; At the same time, it can also be transmitted by modulating the carrier frequency.
- a second interfering signal corresponding to an attribute of the first signal is sent to the radio frequency card by changing the voltage of the coil.
- the timing is detected whether the first signal sent by the reader is acquired, and if so, the interference signal is continuously sent, otherwise, the process ends.
- FIG. 6 is a schematic structural diagram of a data anti-theft device according to an embodiment of the present invention. As shown in FIG. 6, the data anti-theft device includes an auxiliary module 61 and an interference module 62.
- the auxiliary module 61 is adapted to acquire a first signal sent by the reader, and determine an attribute of the first signal according to the first signal;
- the interference module 62 is adapted to send an interference signal corresponding to an attribute of the first signal and/or an interference signal corresponding to an attribute of the second signal according to an attribute of the first signal determined by the auxiliary module, So that the interference signal is superimposed with the first signal and/or the second signal to interfere with the reader to read data in the radio frequency card;
- the second signal is a radio frequency card data signal sent by the radio frequency card in response to the first signal.
- the interference module generates an interference signal generated by the interference module and a frequency band error of the first signal and/or the second signal within a preset error range.
- the device After obtaining the first signal sent by the reader, the device determines the attribute of the first signal, and then sends an interference signal according to the attribute, thereby interfering with the communication between the reader and the RF card, so that the reader cannot read the RF card.
- the data is simple in structure, protects the security of the data information of the radio frequency card, and prevents the possibility of the data information of the radio frequency card being stolen.
- the interference module may send the first interference signal to be superimposed with the second signal, and is adapted to prevent the reader from reading the second signal sent by the RF card (as shown in FIG. 7). And transmitting a second interference signal and the first signal, and is adapted to prevent the RF card from acquiring the first signal sent by the reader; and simultaneously transmitting the first interference signal and the second interference signal respectively and the second signal and The first signals are superimposed to prevent the reader from reading the second signal sent by the RF card and preventing the RF card from acquiring the first signal sent by the reader.
- auxiliary module 61 is specifically adapted to:
- the carrier frequency signal of the preset frequency band includes: a carrier frequency signal of a high frequency attribute, a carrier frequency signal of a low frequency attribute, and a carrier frequency signal of an intermediate frequency attribute. For example, if the frequency of the 125 kHz signal falls within the range of 115 kHz to 135 kHz, the attribute of the frequency is a low frequency attribute.
- the auxiliary module 61 can also obtain the attribute of the second signal by using the attribute of the first signal according to a communication protocol between the reader and the radio frequency card.
- the attributes of the first signal and the attributes of the second signal include a high frequency attribute, an intermediate frequency attribute, and a low frequency attribute; for example, a signal with a carrier frequency of 13.56 MHz is a high frequency attribute, and a signal with a frequency of 125 KHz is a low frequency attribute.
- the interference module 62 is specifically adapted to:
- An interference signal corresponding to an attribute of the first signal and/or an interference signal corresponding to an attribute of the second signal is transmitted in a manner of load modulation or modulation of a carrier frequency.
- the auxiliary module 61 is further configured to detect, when the interference module sends an interference signal, the first signal sent by the reader;
- the interference module 62 is further adapted to:
- the auxiliary module When the auxiliary module does not detect the first signal sent by the reader, the transmission of the interference signal is stopped.
- auxiliary module is mainly suitable for waking up the data anti-theft device and assisting the interference module to work.
- the embodiment of the invention further provides a data anti-theft device.
- the data anti-theft device can be of any shape.
- the data anti-theft device can also be formed into a shape similar to a bank card, and can also be used as a key chain and a car key.
- the shape of the data anti-theft device is not limited in this embodiment.
- the data anti-theft device includes: a first coil, a second coil, and a frequency modulation unit;
- the first coil is adapted to detect a first signal sent by a reader and/or a second signal sent by a radio frequency card;
- the frequency modulating unit is adapted to modulate the second coil to transmit an interference signal according to the first signal and/or the second signal detected by the first coil, so that the interference signal interferes with the reader and the radio frequency card
- the communication between the readers makes it impossible for the reader to read the data in the RF card.
- the first coil described above can be understood as a detection coil
- the second coil can be understood as a transmission coil.
- the frequency modulating unit can transmit data with high power and load modulation, and then interfere with the interference signal of the reader or the radio frequency carrier frequency through the second coil to prevent the radio frequency card information from leaking, in the specific implementation process.
- the first coil is in a state to be triggered.
- the frequency modulation unit transmits the interference signal of the same frequency as the radio frequency signal according to the radio frequency signal detected by the first coil.
- the radio frequency signal corresponding to the high frequency signal, the intermediate frequency signal and the low frequency signal, the general flash payment bank card, the work card and the like use the high frequency signal to communicate with the reader for data communication, the cell access control card and the like use the low frequency signal to communicate with the reader for data communication.
- the above-mentioned interference can prevent the information such as the radio frequency card from being stolen.
- the data anti-theft device can also be applied to the car key information stealing, etc., and the detailed description is not provided in this embodiment.
- the frequency modulation unit is specifically adapted to:
- Determining an attribute of the first signal and/or an attribute of the second signal and transmitting an interference signal by modulating a voltage or current of the second coil.
- the data anti-theft device may be provided with a high frequency coil, a low frequency coil, and an intermediate frequency coil.
- the high frequency coil may be two high frequency detecting coils and a high frequency transmitting coil, and the high frequency detecting coil may pass Parallel resonance or series resonance, suitable for inductive triggering when detecting the radio frequency signal emitted by the reader; the high frequency transmitting coil transmits an interference signal after the high frequency detection coil is triggered, and the high frequency transmitting coil can pass parallel resonance or series resonance. When the interference signal is sent, the interference effect is more significant.
- the high-frequency detecting coil and the high-frequency transmitting coil of the high-frequency coil can work at the same time, and can be two separate coils, or can be simplified into one, taking into account the effect of inspection and interference.
- the low-frequency coil has the same principle as the high-frequency coil, and the implementation is the same. The example will not be described in detail.
- the device further includes: a power source adapted to supply power to the frequency modulation unit, a touch button unit, and a display unit connected to the touch button unit;
- the touch button unit is adapted to send a power display command to the display unit when receiving a touch instruction of the user;
- the display unit is adapted to display the power of the power source when receiving the power display command sent by the touch button unit. When the remaining battery is lower than the preset value, the alarm can be alarmed.
- the display unit may be a led indicator, which indicates the level of the power by blinking or the like, and may also display the percentage of the remaining power directly for the display screen, and may also adopt other display modes, which are not described in detail in this embodiment.
- the first coil and the second coil described above can also be used as a wireless charging interface.
- the present invention also provides a data anti-theft system, as shown in the dotted line block diagram shown in FIG. 7, including the above-mentioned data anti-theft device, and a radio frequency card within a preset range with the data anti-theft device;
- the radio frequency card sends the second signal
- the data anti-theft device sends the interference signal, so that the interference signal interferes with the reader and the radio frequency Communication between the cards, so that the reader cannot read the data in the RF card.
- modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
- the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
- any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
- Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
- the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
- a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the components of the data theft prevention device, data theft prevention system in accordance with embodiments of the present invention.
- the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
- a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
- Figure 8 illustrates a computing device that can implement a data theft prevention method in accordance with the present invention.
- the computing device conventionally includes a processor 810 and a computer program product or computer readable medium in the form of a memory 820.
- the memory 820 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
- Memory 820 has a memory space 830 for program code 831 for performing any of the method steps described above.
- storage space 830 for program code may include various program code 831 for implementing various steps in the above methods, respectively.
- the program code can be read from or written to one or more computer program products.
- Such computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
- Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG.
- the storage unit may have storage segments, storage spaces, and the like that are similar to the storage 820 in the computing device of FIG.
- the program code can be compressed, for example, in an appropriate form.
- the storage unit includes computer readable code 831', ie, code readable by a processor, such as 810, that when executed by a computing device causes the computing device to perform each of the methods described above step.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Burglar Alarm Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
一种数据防窃取装置及方法,该方法包括:获取阅读器发送的第一信号(201);根据所述第一信号确定所述第一信号的属性(202);根据确定的所述第一信号的属性,发送与所述第一信号的属性相对应的干扰信号和/或与第二信号的属性相对应的干扰信号,以使所述干扰信号与所述第一信号和/或第二信号相叠加,以干扰所述阅读器读取射频卡中的数据(203)。通过获取阅读器发送的信号,确定该信号的属性后,再根据该属性发送干扰信号,进而干扰阅读器与射频卡之间的通信,使阅读器无法读取射频卡中的数据,保护了射频卡数据信息的安全,阻止了射频卡数据信息被窃取的可能。
Description
本发明涉及互联网信息安全技术领域,具体涉及一种数据防窃取装置及方法。
射频识别(Radio Frequency Identification,简称RFID)是一种无线通信技术,可以通过无线电讯号识别特定目标并读写相关数据,而无需识别系统与特定目标之间建立机械或者光学接触。其应用十分广泛,例如:图书馆,门禁系统,食品安全溯源等。该项技术的优点在于用户可以方便的通过阅读器非接触式读取一些射频卡的相关信息,在读取方便的同时也会降低了射频卡信息的安全。例如一些不法分子在未经本人许可的情况下获取一些私人射频卡信息,然后将得到的一些私人射频卡信息进行复制,通过复制身份证、银行卡等信息盗取财产,给用户造成巨大的经济损失。
目前存在一种射频卡,其提供了一种选择性的使阅读器读取信息的机制,例如某个射频卡未被授权读取时,阅读器是无法读取未经授权的射频卡的信息,然而,由于射频卡的种类繁多,例如:护照、支付卡(信用卡、银行卡等)、汽车钥匙卡等,每一个射频卡均具有该项功能,其成本非常高,并且所有射频卡均具有该机制也是很难实现的。
发明内容
针对现有技术中的缺陷,本发明提供一种数据防窃取装置及方法,通过发送干扰信息,干扰阅读器与射频卡之间的通信,有效阻止了阅读器读取射频卡中的数据。
基于本发明的第一方面,本发明提供一种数据防窃取装置,包括:
辅助模块,适于获取阅读器发送的第一信号,根据所述第一信号确定所述第一信号的属性;
干扰模块,适于根据所述辅助模块确定的所述第一信号的属性,发送与所述第一信号的属性相对应的干扰信号和/或与第二信号的属性相对应的干扰信号,以使所述干扰信号与所述第一信号和/或第二信号相叠加,以干扰所
述阅读器读取射频卡中的数据;
其中,所述第二信号为射频卡响应于所述第一信号发送的射频卡数据信号。
基于本发明的第二方面,本发明还提供了一种数据防窃取方法,包括:
获取阅读器发送的第一信号;
根据所述第一信号确定所述第一信号的属性;
根据确定的所述第一信号的属性,发送与所述第一信号的属性相对应的干扰信号和/或与第二信号的属性相对应的干扰信号,以使所述干扰信号与所述第一信号和/或第二信号相叠加,以干扰所述阅读器读取射频卡中的数据;
其中,所述第二信号为射频卡响应于所述第一信号发送的射频卡数据信号。
基于本发明的第三方面,本发明还提供了一种数据防窃取装置,包括:第一线圈、第二线圈和频率调制单元;
所述第一线圈,适于检测阅读器发送的第一信号和/或射频卡发送的第二信号;
所述频率调制单元,适于根据所述第一线圈检测的第一信号和/或第二信号,调制所述第二线圈发送干扰信号,以使所述干扰信号干扰所述阅读器与射频卡之间的通信,从而使阅读器无法读取射频卡中数据。
基于本发明的第四方面,本发明还提供了一种数据防窃取系统,包括上述的数据防窃取装置,以及与所述数据防窃取装置在预设范围内的射频卡;
在阅读器发送的读取射频卡中数据的第一信号时,所述射频卡发送第二信号,同时所述数据防窃取装置发送干扰信号,以使所述干扰信号干扰所述阅读器与射频卡之间的通信,从而使阅读器无法读取射频卡中的数据。
根据本发明的又一个方面,提供了一种计算机程序,其包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据上述任一个的数据防窃取方法。
根据本发明的再一个方面,提供了一种计算机可读介质,其中存储了如上文所述的计算机程序。
由上述技术方案可知,本发明提供的一种数据方窃取装置及方法,通过获取阅读器发送的信号,确定该信号的属性后,再根据该属性发送干扰信号,进而干扰阅读器与射频卡之间的通信,使阅读器无法读取射频卡中的数据,
该装置结构简单,保护了射频卡数据信息的安全,阻止了射频卡数据信息被窃取的可能。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1为现有技术中阅读器读取射频卡数据信息的通信示意图;
图2为本发明一实施例提供的数据防窃取方法的流程示意图;
图3为本发明另一实施例提供的数据防窃取方法的流程示意图;
图4为本发明另一实施例提供的数据防窃取方法的流程示意图;
图5为本发明另一实施例提供的数据防窃取方法的流程示意图;
图6为本发明一实施例提供的数据防窃取装置的结构示意图;
图7为本发明一实施例提供的数据防窃取装置发送干扰信号的通信示意图;
图8示意性地示出了用于执行根据本发明的数据防窃取方法的计算设备的框图;以及
图9示意性地示出了用于保持或者携带实现根据本发明的数据防窃取方法的程序代码的存储单元。
下面结合附图和具体的实施方式对本发明作进一步的描述。
为了更清楚的说明本发明实施例中使阅读器无法读取射频卡中的数据的技术方案,下面对一些简单的概念以及阅读器与射频卡的通信过程进行简单说明。
下述实施例中的同频干扰,为无用信号的载频与有用信号的载频
相同时,并对接收同频有用信号的接收机造成的干扰。
磁耦合谐振,通过磁场的近场耦合,使接收线圈和发射线圈产生共振,来实现能量的无线传输。
其中,阅读器与射频卡的通信过程如下:
阅读器根据磁耦合谐振技术通过射频场激活射频卡,此时射频卡会等待阅读器的读取命令;之后阅读器向射频卡发送一定载波频率的射频信号,射频卡接收到射频信号后,凭借感应电流所获得的能量向阅读器发送射频卡数据信息,如图1所示,例如:当阅读器发出频率为13.56MHz的读取请求的射频信号时,则射频卡会发出副载波频率为847KHz的应答信号。
在上述阅读器与射频卡通信的基础上,为了防止一些不法分子采用上述技术通过阅读器恶意读取射频卡内的信息,本发明提出了一种数据防窃取方法。
图2示出了本发明实施例提供的数据防窃取方法的流程示意图,如图2所示,该方法包括以下步骤:
201、获取阅读器发送的第一信号;
上述第一信号可以理解为阅读器向射频卡发送的请求读取射频卡数据信息的射频信号。
202、根据所述第一信号确定所述第一信号的属性;
举例来说,上述第一信号可以根据频段分为高频信号(如13.56MHz)、中频信号和低频信号(如125KHz~135KHz),相应的,第一信号的属性包括高频属性、中频属性和低频属性。
203、根据确定的所述第一信号的属性,发送与所述第一信号的属性相对应的干扰信号和/或与第二信号的属性相对应的干扰信号,以使所述干扰信号与所述第一信号和/或第二信号相叠加,以干扰所述阅读器读取射频卡中的数据;
其中,所述第二信号为射频卡响应于所述第一信号发送的射频卡数据信号。
该方法通过获取阅读器发送的第一信号,确定第一信号的属性后,再根据该属性发送干扰信号,进而干扰阅读器与射频卡之间的通信,
使阅读器无法读取射频卡中的数据,保护了射频卡数据信息的安全,阻止了射频卡数据信息被窃取的可能。
上述步骤202中,根据所述第一信号确定所述第一信号的属性,包括图2中未示出的以下子步骤:
2021、检测阅读器发送的第一信号和/或射频卡发送的第二信号;
2022、将所述第一信号和/或所述第二信号分别与预设频段的载波频率信号进行比较,确定所述第一信号和/或所述第二信号的频段,获取所述第一信号和/或所述第二信号的属性。
上述步骤2022中预设频段的载波频率信号包括:高频属性的载波频率信号、低频属性的载波频率的信号。在具体应用中,该预设频段的载波频率信号还可以包括中频属性的载波频率信号。
可理解的是,该步骤202主要是为了获取阅读器和射频卡发送的信号的属性,当然,由于阅读器和射频卡之间通信时是符合通信协议的,在获取到阅读器发送的第一信号的属性之后,就可以间接得知射频卡要向阅读器发送的第二信号的属性。
具体的,上述步骤203中在得知第一信号的属性后,就可以根据同频干扰技术发送与该属性对应的干扰信号。在具体应用中,该干扰信号与所述第一信号的属性相对应和/或与第二信号的属性相对应。也就是说,该干扰信号可以与第二信号相叠加,用于防止阅读器读取射频卡发送的第二信号;该干扰信号还可以与第一信号相叠加,用于防止射频卡获取阅读器发送的第一信号;该干扰信号还可以同时与第一信号和第二信号相叠加,既防止阅读器读取射频卡发送的第二信号又防止射频卡获取阅读器发送的第一信号。
下面通过三种方案对干扰信号干扰阅读器与射频卡之间进行通信的方法进行详细说明。
第一种方案如图3所示,干扰信号与第二信号相叠加,用于防止阅读器读取射频卡发送的第二信号。
图3示出了本发明实施例提供的数据防窃取方法的流程示意图,如图3所示,该方法包括以下步骤:
301、获取阅读器发送的第一信号;
上述第一信号可以理解为阅读器向射频卡发送的请求读取射频卡数据信息的射频信号。
302、根据所述第一信号确定所述第一信号的属性;
303、根据第一信号的属性,获取第二信号的属性;
具体的,在得知第一信号的属性时,根据阅读器与射频卡通信传输协议,就可以得知第二信号的属性。
304、根据第二信号的属性,向阅读器发送与第二信号的属性相对应的干扰信号,以使干扰信号与第二信号相叠加,以干扰所述阅读器读取射频卡中的数据;
其中,所述第二信号为射频卡响应于所述第一信号发送的射频卡数据信号。
具体的,上述步骤304可以理解为根据所述第二信号的属性,采用负载调制的方式发送与第二信号的属性相对应的干扰信号。也即为了使该干扰信号与第二信号叠加后能够有效干扰阅读器读取射频卡的数据信息,通过改变线圈的电流向阅读器发送与第二信号的属性相对应的干扰信号。本实施例不对其如何调制以及采用哪种方式调制进行详细说明。
改变线圈电流可以通过对振荡回路的电参数按照数据流的节拍进行调节,使其干扰信号与第二信号的误差在预设范围λ(例如:λ=125KHz)内,例如|干扰信号-第二信号|<λ。
同理,也可以通过调制载波频率调制,发送与第二信号的属性相对应的干扰信号。也即为了使该干扰信号与第二信号叠加后能够有效干扰阅读器读取射频卡的数据信息,通过改变线圈的电压向阅读器发送与第二信号的属性相对应的干扰信号。
改变线圈的电压主要是通过PWM波控制功率开关器件的开通与关断的次数,使其生成的干扰信号与第二信号的误差在预设范围λ(例如:λ=125KHz)内,例如|干扰信号-第二信号|<λ。第二种方案如图4所示,干扰信号与第一信号相叠加,用于防止射频卡获取阅读器发送的第一信号。
图4示出了本发明实施例提供的数据防窃取方法的流程示意图,
如图4所示,该方法包括以下步骤:
401、获取阅读器发送的第一信号;
上述第一信号可以理解为阅读器向射频卡发送的请求读取射频卡数据信息的射频信号。
402、根据所述第一信号确定所述第一信号的属性;
403、根据第一信号的属性,向射频卡发送与第一信号的属性相对应的干扰信号,以使干扰信号与第一信号相叠加,以干扰所述阅读器读取射频卡中的数据。
具体的,上述步骤403可以理解为根据所述第一信号的属性,采用负载调制的方式发送与第一信号的属性相对应的干扰信号。也即为了使该干扰信号与第一信号叠加后能够有效干扰阅读器读取射频卡的数据信息,通过改变线圈的电流向射频卡发送与第一信号的属性相对应的干扰信号。本实施例不对其如何调制以及采用哪种方式调制进行详细说明。
改变线圈电流可以通过对振荡回路的电参数按照数据流的节拍进行调节,使其干扰信号与第一信号的误差在预设范围λ(例如:λ=125KHz)内,例如|干扰信号-第二信号|<λ。
同理,也可以通过调制载波频率调制,发送与第一信号的属性相对应的干扰信号。也即为了使该干扰信号与第一信号叠加后能够有效干扰阅读器读取射频卡的数据信息,通过改变线圈的电压向射频卡发送与第一信号的属性相对应的干扰信号。
改变线圈的电压主要是通过PWM波控制功率开关器件的开通与关断的次数,使其生成的干扰信号与第一信号的误差在预设范围λ(例如:λ=125KHz)内,例如|干扰信号-第二信号|<λ。
第三种方案如图5所示,干扰信号还可以同时与第一信号和第二信号相叠加,既防止阅读器读取射频卡发送的第二信号又防止射频卡获取阅读器发送的第一信号。
图5示出了本发明实施例提供的数据防窃取方法的流程示意图,如图5所示,该方法包括以下步骤:
501、获取阅读器发送的第一信号;
上述第一信号可以理解为阅读器向射频卡发送的请求读取射频卡数据信息的射频信号。
502、根据所述第一信号确定所述第一信号的属性;
具体的,在得知第一信号的属性时,根据阅读器与射频卡通信传输协议,就可以得知第二信号的属性。
503、根据第一信号的属性,向阅读器发送与第二信号的属性相对应的第一干扰信号以及向射频卡发送与第一信号的属性相对应的第二干扰信号,以使第一干扰信号和第二干扰信号分别与第二信号和第一信号相叠加,以干扰所述阅读器读取射频卡中的数据;
其中,所述第二信号为射频卡响应于所述第一信号发送的射频卡数据信号。
具体的,上述步骤503可以理解为根据所述第二信号的属性,采用负载调制的方式发送与第二信号的属性相对应的第一干扰信号,同时根据所述第一信号的属性,采用负载调制的方式发送与第一信号的属性相对应的第二干扰信号。也即为了使第一干扰信号与第二信号叠加后能够有效干扰阅读器读取射频卡的数据信息,通过改变线圈的电流向阅读器发送与第二信号的属性相对应的干扰信号,同时,为了使第二干扰信号与第一信号叠加后能够有效干扰阅读器读取射频卡的数据信息,通过改变线圈的电流向射频卡发送与第一信号的属性相对应的干扰信号。本实施例不对其如何调制以及采用哪种方式调制进行详细说明。
改变线圈电流可以通过对振荡回路的电参数按照数据流的节拍进行调节,使其第一干扰信号与第二信号的误差在预设范围内,第二干扰信号与第一信号的误差在预设范围λ(例如:λ=125KHz)内,例如|干扰信号-第二信号|<λ。
同理,也可以通过调制载波频率,发送与第二信号的属性相对应的第一干扰信号,和发送与第一信号的属性相对应的第二干扰信号。也即为了使第一干扰信号与第二信号叠加后能够有效干扰阅读器读取射频卡的数据信息,通过改变线圈的电压向阅读器发送与第二信号的属性相对应的第一干扰信号;同时,也可以通过调制载波频率,发送
与第一信号的属性相对应的第二干扰信号。也即为了使该第二干扰信号与第一信号叠加后能够有效干扰阅读器读取射频卡的数据信息,通过改变线圈的电压向射频卡发送与第一信号的属性相对应的第二干扰信号。
改变线圈的电压主要是通过PWM波控制功率开关器件的开通与关断的次数,使其生成的第一干扰信号与第二信号的误差在预设范围内,第二干扰信号与第一信号的误差在预设范围λ(例如:λ=125KHz)内,例如|干扰信号-第二信号|<λ。
在上述三种方案的实施过程中,在发送干扰信号时,同时定时检测是否获取到阅读器发送的第一信号,如果有,持续发送干扰信号,否则,结束。
图6示出了本发明实施例提供的数据防窃取装置的结构示意图,如图6所示,该数据防窃取装置包括:辅助模块61和干扰模块62。
辅助模块61,适于获取阅读器发送的第一信号,根据所述第一信号确定所述第一信号的属性;
干扰模块62,适于根据所述辅助模块确定的所述第一信号的属性,发送与所述第一信号的属性相对应的干扰信号和/或与第二信号的属性相对应的干扰信号,以使所述干扰信号与所述第一信号和/或第二信号相叠加,以干扰所述阅读器读取射频卡中的数据;
其中,所述第二信号为射频卡响应于所述第一信号发送的射频卡数据信号。
具体的,干扰模块为了更好的产生干扰作用,干扰模块产生的干扰信号与所述第一信号和/或所述第二信号的频段误差在预设误差范围内。
该装置通过获取阅读器发送的第一信号,确定第一信号的属性后,再根据该属性发送干扰信号,进而干扰阅读器与射频卡之间的通信,使阅读器无法读取射频卡中的数据,该装置结构简单,保护了射频卡数据信息的安全,阻止了射频卡数据信息被窃取的可能。
在具体应用中,上述干扰模块可以发送第一干扰信号可以与第二信号相叠加,适于防止阅读器读取射频卡发送的第二信号(如图7所
示);还可以发送第二干扰信号与第一信号相叠加,适于防止射频卡获取阅读器发送的第一信号;还可以同时发送第一干扰信号和第二干扰信号分别与第二信号和第一信号相叠加,既防止阅读器读取射频卡发送的第二信号又防止射频卡获取阅读器发送的第一信号。
具体的,所述辅助模块61,具体适于:
检测阅读器发送的第一信号和/或射频卡发送的第二信号;
将所述第一信号和/或所述第二信号分别与预设频段的载波频率信号进行比较,确定所述第一信号和/或所述第二信号的频段,获取所述第一信号和/或所述第二信号的属性。其中,预设频段的载波频率信号包括:高频属性的载波频率信号、低频属性的载波频率的信号和中频属性的载波频率信号。例如频率为125KHz信号落在了115KHz~135KHz频段的范围内,则该频率的属性为低频属性。
上述辅助模块61还可以根据阅读器和射频卡之间的通信协议,通过第一信号的属性,获取第二信号的属性。其中所述第一信号的属性和所述第二信号的属性包括高频属性、中频属性和低频属性;例如:载波频率为13.56MHz的信号为高频属性,频率为125KHz的信号为低频属性。
所述干扰模块62,具体适于:
采用负载调制或调制载波频率的方式发送与所述第一信号的属性相对应的干扰信号和/或与所述第二信号的属性相对应的干扰信号。
所述辅助模块61,还适于在所述干扰模块发送干扰信号时,检测所述阅读器发送的第一信号;
所述干扰模块62,还适于:
在所述辅助模块检测到所述阅读器发送的第一信号时,持续发送干扰信号;
或
在所述辅助模块未检测到所述阅读器发送的第一信号时,停止发送干扰信号。
可理解的是,上述辅助模块主要是适于唤醒该数据防窃取装置,并且辅助干扰模块工作。
本发明实施例还提供了一种数据防窃取装置,该数据防窃取装置可以为任意形状,为了携带和放置方便,也可以做成与银行卡类似的形状,也可以作为钥匙链与汽车钥匙等串接,本实施例不对该数据防窃取装置的形状进行限定。
该数据防窃取装置包括:第一线圈、第二线圈和频率调制单元;
所述第一线圈,适于检测阅读器发送的第一信号和/或射频卡发送的第二信号;
所述频率调制单元,适于根据所述第一线圈检测的第一信号和/或第二信号,调制所述第二线圈发送干扰信号,以使所述干扰信号干扰所述阅读器与射频卡之间的通信,从而使阅读器无法读取射频卡中数据。
具体的,上述第一线圈可以理解为检测线圈,第二线圈可以理解为发射线圈。
该频率调制单元可以发射大功率并已负载调制的方式进行数据编码,然后通过第二线圈对阅读器或射频卡载波频率一致的干扰信号进行干扰,以防止射频卡信息泄露,在具体实施过程中,第一线圈处于待触发状态,通过电磁感应,当第一线圈检测到阅读器发射的射频信号时,则频率调制单元根据第一线圈检测的射频信号发送与射频信号同频的干扰信号。其中射频信号对应包括高频信号、中频信号和低频信号,一般的闪付银行卡,工卡等使用高频信号与阅读器进行数据通信,小区门禁卡等使用低频信号与阅读器进行数据通信。通过上述干扰可以防止射频卡等信息被窃取,在具体应用中,该数据防窃取装置还可以应用于汽车钥匙信息窃取等,本实施例不再进行详细举例说明。
所述频率调制单元,具体适于:
确定所述第一信号的属性和/或第二信号的属性,通过调制所述第二线圈的电压或电流发送干扰信号。
改变线圈电流可以通过对振荡回路的电参数按照数据流的节拍进行调节,使其第一干扰信号与第二信号的误差在预设范围内,第二干扰信号与第一信号的误差在预设范围λ(例如:λ=125KHz)内,例如|干扰信号-第二信号|<λ。
改变线圈的电压主要是通过PWM波控制功率开关器件的开通与关断的次数,使其生成的第一干扰信号与第二信号的误差在预设范围内,第二干扰信号与第一信号的误差在预设范围λ(例如:λ=125KHz)内,例如|干扰信号-第二信号|<λ。
在具体应用中,该数据防窃取装置中可以设置高频线圈、低频线圈、中频线圈,具体的,高频线圈可以为两个包括高频检测线圈和高频发射线圈,高频检测线圈可以通过并联谐振或串联谐振,适于在检测阅读器发射的射频信号时,做感应触发;高频发射线圈在高频检测线圈触发后,发送干扰信号,高频发射线圈可以通过并联谐振或串联谐振,发送干扰信号,其干扰效果较为显著。
该高频线圈的高频检测线圈和高频发射线圈可以同时工作,可以是分开的两个线圈,也可以简化为一个,兼顾检查和干扰的作用低频线圈其与高频线圈原理相同,本实施例不再进行详细说明。
上述装置还包括:适于为所述频率调制单元供电的电源、触摸按键单元和与所述触摸按键单元相连的显示单元;
触摸按键单元,适于在接收用户的触摸指令时,向所述显示单元发送电量显示命令;
显示单元,适于在接收到触摸按键单元发送的电量显示命令时,显示所述电源的电量。在剩余电量低于预设值时,可以报警提醒。
具体的,上述显示单元可以为led指示灯,通过闪烁等效果指示电量的高低,也可以为显示屏,直接显示剩余电量的百分比,还可以采用其他显示方式,本实施例不再进行详细说明。
上述第一线圈和所述第二线圈还可以作为无线充电接口使用。
本发明还提供了一种数据防窃取系统,如图7所示的虚线框图部分,包括上述的数据防窃取装置,以及与所述数据防窃取装置在预设范围内的射频卡;
在阅读器发送的读取射频卡中数据的第一信号时,所述射频卡发送第二信号,同时所述数据防窃取装置发送干扰信号,以使所述干扰信号干扰所述阅读器与射频卡之间的通信,从而使阅读器无法读取射频卡中的数据。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的
技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的数据防窃取装置、数据防窃取系统中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。
例如,图8示出了可以实现根据本发明的数据防窃取方法的计算设备。该计算设备传统上包括处理器810和以存储器820形式的计算机程序产品或者计算机可读介质。存储器820可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器820具有用于执行上述方法中的任何方法步骤的程序代码831的存储空间830。例如,用于程序代码的存储空间830可以包括分别用于实现上面的方法中的各种步骤的各个程序代码831。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图9所述的便携式或者固定存储单元。该存储单元可以具有与图8的计算设备中的存储器820类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括计算机可读代码831’,即可以由例如诸如810之类的处理器读取的代码,这些代码当由计算设备运行时,导致该计算设备执行上面所描述的方法中的各个步骤。
本文中所称的“一个实施例”、“实施例”或者“一个或者多个实施例”意味着,结合实施例描述的特定特征、结构或者特性包括在本发明的至少一个实施例中。此外,请注意,这里“在一个实施例中”的词语例子不一定全指同一个实施例。
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可
设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。
此外,还应当注意,本说明书中使用的语言主要是为了可读性和教导的目的而选择的,而不是为了解释或者限定本发明的主题而选择的。因此,在不偏离所附权利要求书的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。对于本发明的范围,对本发明所做的公开是说明性的,而非限制性的,本发明的范围由所附权利要求书限定。
Claims (21)
- 一种数据防窃取装置,包括:辅助模块,适于获取阅读器发送的第一信号,根据所述第一信号确定所述第一信号的属性;干扰模块,适于根据所述辅助模块确定的所述第一信号的属性,发送与所述第一信号的属性相对应的干扰信号和/或与第二信号的属性相对应的干扰信号,以使所述干扰信号与所述第一信号和/或第二信号相叠加,以干扰所述阅读器读取射频卡中的数据;其中,所述第二信号为射频卡响应于所述第一信号发送的射频卡数据信号。
- 根据权利要求1所述的装置,其中,所述第一信号的属性和所述第二信号的属性包括高频属性和低频属性;相应的,所述辅助模块,具体适于:检测阅读器发送的第一信号和/或射频卡发送的第二信号;将所述第一信号和/或所述第二信号分别与预设频段的载波频率信号进行比较,确定所述第一信号和/或所述第二信号的频段,获取所述第一信号和/或所述第二信号的属性。
- 根据权利要求2所述的装置,其中,所述预设频段的载波频率信号包括:高频属性的载波频率信号和低频属性的载波频率的信号。
- 根据权利要求1所述的装置,其中,所述干扰模块,具体适于:采用负载调制或调制载波频率的方式发送与所述第一信号的属性相对应的干扰信号和/或与所述第二信号的属性相对应的干扰信号。
- 根据权利要求1-4中任一项所述的装置,其中,所述辅助模块,还适于在所述干扰模块发送干扰信号时,检测所述阅读器发送的第一信号;相应的,所述干扰模块,还适于:在所述辅助模块检测到所述阅读器发送的第一信号时,持续发送干扰信号;或在所述辅助模块未检测到所述阅读器发送的第一信号时,停止发送干扰信号。
- 根据权利要求1-5中任一项所述的装置,其中,所述干扰信号与所述第一信号和/或所述第二信号的频段误差在预设误差范围内。
- 一种数据防窃取方法,包括:获取阅读器发送的第一信号;根据所述第一信号确定所述第一信号的属性;根据确定的所述第一信号的属性,发送与所述第一信号的属性相对应的干扰信号和/或与第二信号的属性相对应的干扰信号,以使所述干扰信号与所述第一信号和/或第二信号相叠加,以干扰所述阅读器读取射频卡中的数据;其中,所述第二信号为射频卡响应于所述第一信号发送的射频卡数据信号。
- 根据权利要求7所述的方法,其中,所述第一信号的属性包括高频属性和低频属性;相应的,所述根据所述第一信号确定所述第一信号的属性,包括:检测阅读器发送的第一信号和/或射频卡发送的第二信号;将所述第一信号和/或所述第二信号分别与预设频段的载波频率信号进行比较,确定所述第一信号和/或所述第二信号的频段,获取所述第一信号和/或所述第二信号的属性。
- 根据权利要求8所述的方法,其中,所述预设频段的载波频率信号包括:高频属性的载波频率信号、低频属性的载波频率的信号。
- 根据权利要求7所述的方法,其中,根据确定的所述第一信号的属性,发送与所述第一信号的属性相对应的干扰信号和/或与第二信号的属性相对应的干扰信号,包括:根据所述第一信号的属性,采用负载调制或调制载波频率的方式发送与所述第一信号的属性相对应的干扰信号和/或与所述第二信号的属性相对应的干扰信号。
- 根据权利要求7-10中任一项所述的方法,其中,在发送与所述第一信号的属性相对应的干扰信号和/或与第二信号的属性相对应的干扰信号时,所述方法还包括:检测是否获取到所述阅读器发送的第一信号,如果有,持续发送干扰信号,否则,结束。
- 根据权利要求7-11中任一项所述的方法,其中,所述干扰信 号与所述第一信号和/或所述第二信号的频段误差在预设误差范围内。
- 一种数据防窃取装置,包括:第一线圈、第二线圈和频率调制单元;所述第一线圈,适于检测阅读器发送的第一信号和/或射频卡发送的第二信号;所述频率调制单元,适于根据所述第一线圈检测的第一信号和/或第二信号,调制所述第二线圈发送干扰信号,以使所述干扰信号干扰所述阅读器与射频卡之间的通信,从而使阅读器无法读取射频卡中数据。
- 根据权利要求13所述的装置,其中,所述频率调制单元,具体适于:确定所述第一信号的属性和/或第二信号的属性,通过调制所述第二线圈的电压或电流发送干扰信号。
- 根据权利要求13所述的装置,其中,所述第一线圈为检测线圈,所述第二线圈为发射线圈。
- 根据权利要求13所述的装置,其中,所述装置还包括:适于为所述频率调制单元供电的电源。
- 根据权利要求16所述的装置,其中,所述装置还包括:触摸按键单元和与所述触摸按键单元相连的显示单元;所述触摸按键单元,适于在接收用户的触摸指令时,向所述显示单元发送电量显示命令;所述显示单元,适于在接收到所述触摸按键单元发送的电量显示命令时,显示所述电源的电量。
- 根据权利要求17所述的装置,其中,所述第一线圈和所述第二线圈还适于为所述电源充电。
- 一种数据防窃取系统,包括如权利要求13-18中任一项所述的数据防窃取装置,以及与所述数据防窃取装置在预设范围内的射频卡;在阅读器发送的读取射频卡中数据的第一信号时,所述射频卡发送第二信号,同时所述数据防窃取装置发送干扰信号,以使所述干扰信号干扰所述阅读器与射频卡之间的通信,从而使阅读器无法读取射频卡中的数据。
- 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据权利要求7-12任一项所述的数据防窃取方法。
- 一种计算机可读介质,其中存储了如权利要求20所述的计算机程序。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510159222.2 | 2015-04-03 | ||
CN201510159222.2A CN104794436A (zh) | 2015-04-03 | 2015-04-03 | 数据防窃取装置及方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016155374A1 true WO2016155374A1 (zh) | 2016-10-06 |
Family
ID=53559224
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/099008 WO2016155374A1 (zh) | 2015-04-03 | 2015-12-25 | 数据防窃取装置及方法 |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN104794436A (zh) |
WO (1) | WO2016155374A1 (zh) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104794436A (zh) * | 2015-04-03 | 2015-07-22 | 北京奇虎科技有限公司 | 数据防窃取装置及方法 |
CN106919874A (zh) * | 2015-12-24 | 2017-07-04 | 北京奇虎科技有限公司 | 一种数据保护的方法和装置 |
CN106919875A (zh) * | 2015-12-24 | 2017-07-04 | 北京奇虎科技有限公司 | 一种数据保护的方法和装置 |
CN111654352A (zh) * | 2020-05-28 | 2020-09-11 | 上海飞聚微电子有限公司 | 屏蔽射频通信方法及装置 |
CN118261186A (zh) * | 2022-12-27 | 2024-06-28 | 天地融科技股份有限公司 | 一种非接卡片防盗刷装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1372380A (zh) * | 2001-02-28 | 2002-10-02 | 上海慧康信息技术有限公司 | 电磁传导干扰器 |
CN1886750A (zh) * | 2003-11-27 | 2006-12-27 | 皇家飞利浦电子股份有限公司 | 用于标签和智能卡的干扰机 |
CN103353947A (zh) * | 2013-07-24 | 2013-10-16 | 车德军 | 射频卡防盗刷保护装置 |
US20140118116A1 (en) * | 2012-10-30 | 2014-05-01 | Raytheon Company | Protection System For Radio Frequency Communications |
CN104156754A (zh) * | 2014-07-22 | 2014-11-19 | 赵伊宁 | 非接触式ic卡的防盗装置 |
CN104794436A (zh) * | 2015-04-03 | 2015-07-22 | 北京奇虎科技有限公司 | 数据防窃取装置及方法 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7772963B2 (en) * | 2005-10-20 | 2010-08-10 | Honeywell International Inc. | System and method for synchronization of data streams |
CN102282574B (zh) * | 2008-12-15 | 2015-06-03 | 卡德赖博私人有限公司 | Rfid标签 |
CN102866406B (zh) * | 2012-09-21 | 2014-04-30 | 桂林电子科技大学 | 一种gps欺骗式干扰方法与系统 |
CN103873162B (zh) * | 2012-12-18 | 2016-02-10 | 中兴通讯股份有限公司 | 频谱干扰检测装置及方法 |
CN203276291U (zh) * | 2013-04-11 | 2013-11-06 | 杭州华韵天略电子科技有限公司 | 一种高抗干扰的低频检测装置 |
-
2015
- 2015-04-03 CN CN201510159222.2A patent/CN104794436A/zh active Pending
- 2015-04-03 CN CN201811535948.1A patent/CN109598159A/zh active Pending
- 2015-12-25 WO PCT/CN2015/099008 patent/WO2016155374A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1372380A (zh) * | 2001-02-28 | 2002-10-02 | 上海慧康信息技术有限公司 | 电磁传导干扰器 |
CN1886750A (zh) * | 2003-11-27 | 2006-12-27 | 皇家飞利浦电子股份有限公司 | 用于标签和智能卡的干扰机 |
US20140118116A1 (en) * | 2012-10-30 | 2014-05-01 | Raytheon Company | Protection System For Radio Frequency Communications |
CN103353947A (zh) * | 2013-07-24 | 2013-10-16 | 车德军 | 射频卡防盗刷保护装置 |
CN104156754A (zh) * | 2014-07-22 | 2014-11-19 | 赵伊宁 | 非接触式ic卡的防盗装置 |
CN104794436A (zh) * | 2015-04-03 | 2015-07-22 | 北京奇虎科技有限公司 | 数据防窃取装置及方法 |
Also Published As
Publication number | Publication date |
---|---|
CN109598159A (zh) | 2019-04-09 |
CN104794436A (zh) | 2015-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016155374A1 (zh) | 数据防窃取装置及方法 | |
US9379841B2 (en) | Mobile device prevention of contactless card attacks | |
CN107295516B (zh) | 保护遥控钥匙的系统和方法 | |
US10600298B1 (en) | Exit-code-based RFID loss-prevention system | |
US10318854B2 (en) | Systems and methods for protecting sensitive information stored on a mobile device | |
US9607286B1 (en) | RFID tags with brand protection and loss prevention | |
US20150006378A1 (en) | User devices, systems and methods for use in transactions | |
JP2019533411A (ja) | 在外オブジェクト検出を使用してビークルを位置決定するための方法および装置 | |
US11206259B2 (en) | Authentication by transmitting information through magnetic fields | |
BR112014017152B1 (pt) | método e sistema para segurança de nfc | |
AU2006203769A1 (en) | Human feedback using parasitic power harvesting of RFID tags | |
US20120286929A1 (en) | Authenticated security system | |
CN107040290B (zh) | 一种无线充电方法、系统及计算机可读介质 | |
US9792473B2 (en) | Card swiping method and device for determining mobile terminal for swiping card, utilizing intensity of ultrasonic signal | |
US8792862B1 (en) | Providing enhanced security for wireless telecommunications devices | |
KR101001103B1 (ko) | 트리거 입력부가 구비된 차량 제어 시스템 및 그 방법 | |
US8860556B2 (en) | Method and system for the secure detection of an RFID electronic tag | |
US8934940B1 (en) | Providing enhanced security for wireless telecommunications devices | |
TWI716897B (zh) | Rfid電子標籤之動態防偽加密方法及電子標籤 | |
WO2009005296A2 (en) | System and method for processing certification of digital contents and computer-readable medium having thereon program performing function embodying the same | |
CN106919875A (zh) | 一种数据保护的方法和装置 | |
JP2008233975A (ja) | 情報通信装置、情報集中管理装置、及び情報処理システム | |
CN104866744B (zh) | 一种信息处理方法及电子设备 | |
US9024730B2 (en) | Standby activation | |
CN109741067B (zh) | 一种基于ic卡开锁的数据处理方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15887324 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15887324 Country of ref document: EP Kind code of ref document: A1 |