CN106022181A - System and method for preventing unauthorized use of IC card - Google Patents

System and method for preventing unauthorized use of IC card Download PDF

Info

Publication number
CN106022181A
CN106022181A CN201610370943.2A CN201610370943A CN106022181A CN 106022181 A CN106022181 A CN 106022181A CN 201610370943 A CN201610370943 A CN 201610370943A CN 106022181 A CN106022181 A CN 106022181A
Authority
CN
China
Prior art keywords
card
information
write
read
copy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610370943.2A
Other languages
Chinese (zh)
Other versions
CN106022181B (en
Inventor
张开生
王静
郭国法
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi University of Science and Technology
Original Assignee
Shaanxi University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi University of Science and Technology filed Critical Shaanxi University of Science and Technology
Priority to CN201610370943.2A priority Critical patent/CN106022181B/en
Publication of CN106022181A publication Critical patent/CN106022181A/en
Application granted granted Critical
Publication of CN106022181B publication Critical patent/CN106022181B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0095Testing the sensing arrangement, e.g. testing if a magnetic card reader, bar code reader, RFID interrogator or smart card reader functions properly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Storage Device Security (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The invention discloses a system for preventing unauthorized use of an IC card. The system comprises an IC card reader-writer, a microprocessor, a testing UID card, a power supply module, a display module, and an automatic alarming device. The device is capable of preventing the unauthorized use of the IC card mainly by determining whether the data writing-in state of the 0 block data of the 0 sector of the IC card, the number of the IC card, and information stored in the IC card are consistent with related information of a system database. The UID card is tested to determined whether the working of the system is normal. When the working of the system is normal, user IC card operation is carried out. When the IC card is not the original card, the system is capable of forbidding the writing and reading operation of the card, and is used to transmit IC card leakage prompting information to a cell phone of a user and a public security organ by short messages. The principle and the operation of the device for preventing the unauthorized use of the IC card are simple and clear, and therefore whether the IC card information is leaked can be determined accurately, and the safety and the confidentiality of the IC card are greatly improved.

Description

A kind of system and method preventing IC-card from stealing brush
Technical field
The invention belongs to IC-card security technology area, particularly to a kind of prevent IC-card steal brush system and Method.
Background technology
Along with the fast development of hyundai electronics information, IC-card is widely used in daily life In, the normally used mass transit card of such as people, bank card, phonecard and access card etc..Although IC-card is given The life of people provides conveniently, but some lawless persons utilize illegal means to steal the IC-card letter of people Breath is sought exorbitant profit, and carries out criminal activity even with the IC-card forged, brings to the lives and properties of people Potential safety hazard greatly, so the safety of IC-card is always the focus of social concerns.The most normal Safety measure be that IC-card is encrypted, but this cipher mode is easily cracked by lawless person, And then the data that puppet is faked, the inestimable loss of cause the user.
IC-card is mainly made up of 16 sectors, and there are 4 blocks each sector, by the behaviour to each piece Making to realize the reading and writing data of IC-card, the data of 0 piece, common IC-card 0 sector are the intrinsic of producer's formulation Data, limit and carry out write operation.Wherein, the robber that copy card and clone's card are conventional swipes the card mode.Replicate Card refers to replicate the data beyond 0 piece, 0 sector, and transfers to, in a new card, can realize The function identical with former card.Clone's card refers to former card data (including 0 piece, 0 sector) are written to one Extraordinary card, thus by all information devices in former card, all replicate, steal brush user IC for lawless person Card provides probability.
Summary of the invention
In order to overcome the shortcoming of above-mentioned prior art, it is an object of the invention to provide one and prevent IC-card from stealing The system and method for brush, can be effectively improved safety and the confidentiality of IC-card, thus ensure personal information and Property safety.
To achieve these goals, the technical solution used in the present invention is:
A kind of system preventing IC-card from stealing brush, including:
IC-card read write line 1, identifies IC-card, 0 piece, 0 sector to IC-card under microprocessor 4 drives Carry out radio communication between write operation, and test UID card 2;
Test UID card 2, is divided into 16 sectors, 4 pieces, each sector, 64 pieces altogether, wherein 0 fans 0 piece of district is set to carry out data write operation;
Microprocessor 4, its databases puts all information in subscriber phone number and its IC-card number and card, First test to judge that test system is the most normal to test UID card 2, if test system is normally, read Take the information of the IC-card that IC-card read write line 1 identifies, drive IC-card read write line 1 that current IC-card 0 is fanned 0 piece of district carries out write operation, if can write it, then judges that this card blocks as clone, and in data To this card card labelled notation abnormal information in storehouse;If write operation can not be carried out, obtain the card number of this IC-card also Judge the most consistent with the card number of databases storage, if inconsistent, then judge that this card is copy card, and To this card card labelled notation abnormal information in data base;If consistent, then continue to judge whether this card exists different Often information flag, if not existing, then this card is former card, can carry out normal operating, if existing, then root It is clone's card or copy card according to abnormal information marker for judgment;
Autoalarm 5, when being judged as clone's card or copy card, sends warning;
Display module 6, shows judged result;
Power module 3, it is achieved power supply.
Described IC-card read write line 1 carries out radio communication by magnetic field energy with test UID card 2.
Test UID card 2 is tested to judge its most normal concrete grammar by described microprocessor 4 It is:
Test UID card 2 is put into the read-write region of IC-card read write line 1, and microprocessor 4 is to test UID Datamation read and write normally by card 2, if read-write capability is normal, explanation system has read-write capability, To ensure that follow-up everything goes well with your work carries out, in case owing to system is abnormal and cause to IC-card read-write capability Maloperation (such as system write-in functions lost efficacy and caused microprocessor erroneous judgement clone's card for normal card).
Described autoalarm 5 includes buzzer and gsm module, is being judged as that clone blocks or multiple During fabrication, microprocessor 4 sends signal to autoalarm 5, controls buzzer and sends caution sound, Control gsm module to carry to the user mobile phone corresponding to IC-card and/or the transmission leakage of fixing alarm mobile phone simultaneously Show information.
Described microprocessor 4 being judged as clone's card or during copy card, to data base write copy card, Clone's card information, including card number, time, place, Card Reader number of times, is marked at lane database.
Present invention also offers a kind of method preventing IC-card from stealing brush, comprise the steps:
Prestore in data base IC card information, and this information at least includes the card number of IC-card;
Utilizing read-write equipment, read IC card information, this information at least includes the card number of IC-card;
Utilize read-write equipment, 0 piece, 0 sector of this IC-card is carried out write operation;
If write operation can be carried out, then this IC-card is clone's card, and to this card card labelled notation in data base Abnormal information;
If write operation can not be carried out, it is judged that whether the card number of this IC-card prestores data base, as do not prestored, Then it is judged as copy card, and to this card card labelled notation abnormal information in data base;
As prestored, then continue judge whether this card exists abnormal information labelling, if not existing, then this Card is former card, can carry out normal operating, if existing, then according to abnormal information marker for judgment for cloning card Or copy card.
Compared with prior art, the invention has the beneficial effects as follows:
No matter system determination is copy card or clone's card, all can write this card information to data base, including card Number, the concrete time, place, Card Reader number of times, be then marked at lane database, facilitate Public Security Organs Carry out investigating and prosecuting and point out this card of user be once replicated or cloned, thus reduce user's application risk.
In the present invention principle with operation on simple and clear, can accurately judge whether IC card information leaks, Greatly enhance safety and the confidentiality of IC-card, effectively ensured that personal information is pacified with property Entirely.
Accompanying drawing explanation
Fig. 1 is the hardware system schematic diagram of the present invention.
Fig. 2 is that the present invention tests UID card sector block diagram.
Fig. 3 is the workflow diagram of the present invention.
Detailed description of the invention
Embodiments of the present invention are described in detail below in conjunction with the accompanying drawings with embodiment.
Seeing Fig. 1, one prevents IC-card from stealing brush device and method, including IC-card read write line 1, test UID card 2, power module 3, microprocessor 4, autoalarm 5, display module 6 etc., micro-place Reason device 4 is connected with card reader 1, power module 3, autoalarm 5, display module 6 respectively, IC Card reader 1 carries out radio communication by magnetic field energy with test UID card 2.2 points of UID card of test It is 16 sectors, 4 pieces, each sector, 64 pieces altogether;Wherein 0 piece, 0 sector can carry out data and writes Enter operation.
After system is normally-open, data base set up by microprocessor 4, be used for depositing subscriber phone number and its All information in IC-card number and card are first the most normal, to ensure system with test UID card test system Normal work, process is as follows:
Test UID card 2 is put into the read-write region of IC-card read write line 1, and microprocessor 4 is to test UID Datamation read and write normally by card 2, if read-write capability is normal, explanation system has read-write capability, To ensure that follow-up everything goes well with your work carries out, in case owing to system is abnormal and cause to IC-card read-write capability Maloperation (such as system write-in functions lost efficacy and caused microprocessor erroneous judgement clone's card for normal card).
If test is normal, then can work on.Test UID card 2 leaves IC-card by drive mechanism and reads Writing the read-write region of device 1, wait the insertion of user's IC-card, if insert is normal card, system is passed through Microprocessor 4 operates IC-card read write line 1 and reads the relevant information including card number, relevant information and basis System information matches, and user can carry out the account corresponding to IC-card is carried out normal operating;If inserted Enter is copy card, system by microprocessor 4 operate card number that IC-card read write line 1 reads inevitable with this The card number that system prestores is different (although the information in addition to card number is identical);If insert is gram Grand card, although system operates the card number of IC-card read write line 1 reading with native system in advance by microprocessor 4 The card number of storage is identical, but drives IC-card read write line 1 to current IC-card 0 sector by microprocessor 4 0 piece carries out write operation and can change its card number.IC card numbers are stored in 0 piece, 0 sector, normal IC-card Card number is unique, if copy card, it is impossible to replicate card number, can only be replicated other in addition to card number Information, clone's card is overall copy card, but drives IC-card read write line 1 to currently by microprocessor 4 0 piece, IC-card 0 sector carries out write operation can change its card number.
After IC-card read write line 1 recognizes IC-card, microprocessor 4 drives card reader 1 to IC-card 0 sector 0 piece carries out write operation, if can write it, then judges that this card blocks as clone, and data base In to this card card labelled notation abnormal information.Microprocessor 4 drives autoalarm 5 to pass through short message mode Mobile phone and Public Security Organs to user send IC-card leakage information, and forbid that this card operates, aobvious Show that module 6 display system is abnormal, thus reduce the defence psychology of suspect, it is simple to Public Security Organs looks into Place.If write operation can not be carried out, microprocessor 4 obtains the card number of this IC-card by IC-card read write line 1 And judge the most consistent with the card number of databases storage, if inconsistent, then judge that this card is copy card, And to this card card labelled notation abnormal information in data base;If consistent, then continue to judge whether this card exists Abnormal information labelling, if not existing, then this card is former card, can carry out normal operating, if existing, then It is clone's card or copy card according to abnormal information marker for judgment.
When being judged as clone's card or copy card, buzzer call in autoalarm 5, show mould Block 6 prompt system is abnormal, and gsm module sends IC-card leakage prompting letter from trend user and Public Security Organs Breath, and forbid that this card operates.Once find this card be copy card or clone card all can be to database write Enter copy card, clone's card information, including card number, time, place, Card Reader number of times, enter at lane database Line flag, prompting this card of user was once replicated or cloned, thus reducing the application risk of user.
Seeing Fig. 2, the sector block diagram of the test UID card 2 of the present invention, with actual IC-card structure Unanimously, testing UID card 2 16 sectors altogether, each sector is divided into 4 pieces, 64 pieces altogether.In figure 2-1 is 0 piece, 0 sector, its storage for producer's inherent data, cannot change under normal circumstances.
Seeing Fig. 3, the workflow of the present invention is as follows: after system is normally-open, and number set up by microprocessor According to storehouse, it is used for depositing subscriber phone number and its IC-card number and card internal information;IC-card read write line recognizes After IC-card, microprocessor driven card reader carries out write operation to 0 piece, IC-card 0 sector, if can be to it Write, then judge that this card blocks as clone, and to this card card labelled notation abnormal information in data base, Microprocessor driven autoalarm sends IC by short message mode to mobile phone and the Public Security Organs of user Card leakage information, and forbid that this card operates, display module display system is abnormal;If can not enter Row write operates, if write operation can not be carried out, microprocessor 4 obtains this IC-card by IC-card read write line 1 Card number and judge with databases store up card number the most consistent, if inconsistent, then judge that this card is multiple Fabrication, and to this card card labelled notation abnormal information in data base;If consistent, then continue to judge that this card is No there is abnormal information labelling, if not existing, then this card is former card, can carry out normal operating, if depositing , then block or copy card for clone according to abnormal information marker for judgment.Buzzer in autoalarm Piping, display module prompt system is abnormal, and gsm module can send IC from trend user and Public Security Organs Card leakage information, and forbid that this card operates.Judgement is that copy card or clone's card all can be to Data base writes this card information, including card number, concrete time, place, Card Reader number of times, then in data Ku Li is marked, and facilitates Public Security Organs to carry out investigating and prosecuting and point out this card of user be once replicated or cloned, Thus reduce user's application risk.
Finally it should be noted that: above-described embodiment is only in order to illustrate technical scheme, non-to its limit System.Although being described in detail the present invention with reference to above-described embodiment, relevant technical staff should Solution to: the technical scheme of above-described embodiment can be modified by it, or to wherein portion of techniques feature It is replaced, but these amendments or replacement, do not make the essence of its technical method depart from the thought of the present invention And protection domain.

Claims (6)

1. one kind prevents the system that IC-card steals brush, it is characterised in that including:
IC-card read write line (1), identifies IC-card, fans the 0 of IC-card under microprocessor (4) drives 0 piece of district carries out radio communication between write operation, and test UID card (2);
Test UID card (2), is divided into 16 sectors, 4 pieces, each sector, 64 pieces altogether, wherein 00 piece, sector is set to carry out data write operation;
Microprocessor (4), its databases is all in putting subscriber phone number and its IC-card number and card Information, first tests test UID card (2) to judge that test system is the most normal, if test system The normal information then reading the IC-card that IC-card read write line (1) identifies of system, drives IC-card read write line (1) 0 piece, current IC-card 0 sector is carried out write operation, if it can be write, then judge this card as gram Grand card, and to this card card labelled notation abnormal information in data base;If write operation can not be carried out, obtain The card number of this IC-card judgement are the most consistent with the card number of databases storage, if inconsistent, then judging should Card is copy card, and to this card card labelled notation abnormal information in data base;If consistent, then continue to judge Whether this card exists abnormal information labelling, if not existing, then this card is former card, can carry out normal operating, If existing, then block or copy card for clone according to abnormal information marker for judgment;
Autoalarm (5), when being judged as clone's card or copy card, sends warning;
Display module (6), shows judged result;
Power module (3), it is achieved power supply.
The system preventing IC-card from stealing brush the most according to claim 1, it is characterised in that described IC Card reader (1) carries out radio communication by magnetic field energy with test UID card (2).
The system preventing IC-card from stealing brush the most according to claim 1, it is characterised in that described micro- Test UID card (2) is tested to judge that its most normal concrete grammar is by processor (4):
UID card (2) will be tested and put into the read-write region of IC-card read write line (1), microprocessor (4) Datamation is read and write in test UID card (2) normally, if read-write capability is normal, explanation System has read-write capability, to ensure that follow-up everything goes well with your work carries out, in case owing to IC-card is read and write by system The maloperation that function is abnormal and causes.
The most according to claim 1 prevent IC-card steal brush system, it is characterised in that described from Dynamic alarm device (5) includes buzzer and gsm module, when being judged as clone's card or copy card, Microprocessor (4) sends signal to autoalarm (5), controls buzzer and sends caution sound, with Time control gsm module and send leakage prompting to the user mobile phone corresponding to IC-card and/or fixing alarm mobile phone Information.
The system preventing IC-card from stealing brush the most according to claim 1, it is characterised in that described micro- Processor (4), when being judged as clone's card or copy card, writes copy card, clone's card letter to data base Breath, including card number, time, place, Card Reader number of times, is marked at lane database.
6. one kind prevents the method that IC-card steals brush, it is characterised in that comprise the steps:
Prestore in data base IC card information, and this information at least includes the card number of IC-card;
Utilizing read-write equipment, read IC card information, this information at least includes the card number of IC-card;
Utilize read-write equipment, 0 piece, 0 sector of this IC-card is carried out write operation;
If write operation can be carried out, then this IC-card is clone's card, and to this card card labelled notation in data base Abnormal information;
If write operation can not be carried out, it is judged that whether the card number of this IC-card prestores data base, as do not prestored, Then it is judged as copy card, and to this card card labelled notation abnormal information in data base;
As prestored, then continue judge whether this card exists abnormal information labelling, if not existing, then this Card is former card, can carry out normal operating, if existing, then according to abnormal information marker for judgment for cloning card Or copy card.
CN201610370943.2A 2016-05-30 2016-05-30 A kind of system for preventing IC card from stealing brush Active CN106022181B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610370943.2A CN106022181B (en) 2016-05-30 2016-05-30 A kind of system for preventing IC card from stealing brush

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610370943.2A CN106022181B (en) 2016-05-30 2016-05-30 A kind of system for preventing IC card from stealing brush

Publications (2)

Publication Number Publication Date
CN106022181A true CN106022181A (en) 2016-10-12
CN106022181B CN106022181B (en) 2018-08-31

Family

ID=57092672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610370943.2A Active CN106022181B (en) 2016-05-30 2016-05-30 A kind of system for preventing IC card from stealing brush

Country Status (1)

Country Link
CN (1) CN106022181B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600280A (en) * 2016-12-13 2017-04-26 中国人民解放军信息工程大学 IC card identifying system and card reading equipment
CN106997638A (en) * 2017-03-21 2017-08-01 陕西科技大学 A kind of automatic drawing machine management system of achievable pseudo- card capture
CN107341534A (en) * 2017-07-18 2017-11-10 南京唯捷豪信息科技有限公司 A kind of electronic card copy prevention method, device and management server
CN107454972A (en) * 2016-11-07 2017-12-08 深圳市迈斯云门禁网络科技有限公司 A kind of IC-card management method, system and access controller
CN107945324A (en) * 2017-11-14 2018-04-20 广东安居宝数码科技股份有限公司 Card writing method, card reading method and the device of access control system
CN108280504A (en) * 2017-01-06 2018-07-13 广州市西迈信息科技有限公司 The anti-copying encrypted method of access control system IC card
CN109753837A (en) * 2018-12-27 2019-05-14 佛山市伟邦电子科技有限公司 A kind of anti-copying and tamper resistant method of IC card
CN110598818A (en) * 2019-09-20 2019-12-20 刘伟 Safety IC card management system and method thereof
CN110738284A (en) * 2019-10-16 2020-01-31 上海应用技术大学 IC card full-automatic card issuing, writing and recycling method
CN110910133A (en) * 2019-10-18 2020-03-24 北京智慧中网科技有限公司 Non-replicable city all-purpose card with balance reminding function
CN111461275A (en) * 2020-04-26 2020-07-28 厦门浩邈科技有限公司 Method for detecting copy IC card

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030033485A1 (en) * 2001-08-07 2003-02-13 James Ohr System and method for preventing sector slipping in a storage area network
CN1717099A (en) * 2004-06-28 2006-01-04 华为技术有限公司 SIM card anti-cloning method
CN1741074A (en) * 2005-10-08 2006-03-01 胡阳 Method for preventing bank credit cards from unauthorized use
CN101848462A (en) * 2009-03-23 2010-09-29 ***通信集团公司 Clone card location server, location detection method and system
CN101860847A (en) * 2010-06-09 2010-10-13 中兴通讯股份有限公司 Cloned subscriber identity module card test method and system
US20150031302A1 (en) * 2013-07-25 2015-01-29 Olympus Corporation Wireless communication terminal with an rfid module, wireless communication system, wireless communication method, and a device storing a program
CN104615967A (en) * 2015-02-10 2015-05-13 陕西科技大学 Rolling code system and double encrypting method based on rolling code
CN105101211A (en) * 2014-05-23 2015-11-25 中国电信股份有限公司 Method and device for finding copied card

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030033485A1 (en) * 2001-08-07 2003-02-13 James Ohr System and method for preventing sector slipping in a storage area network
CN1717099A (en) * 2004-06-28 2006-01-04 华为技术有限公司 SIM card anti-cloning method
CN1741074A (en) * 2005-10-08 2006-03-01 胡阳 Method for preventing bank credit cards from unauthorized use
CN101848462A (en) * 2009-03-23 2010-09-29 ***通信集团公司 Clone card location server, location detection method and system
CN101860847A (en) * 2010-06-09 2010-10-13 中兴通讯股份有限公司 Cloned subscriber identity module card test method and system
US20150031302A1 (en) * 2013-07-25 2015-01-29 Olympus Corporation Wireless communication terminal with an rfid module, wireless communication system, wireless communication method, and a device storing a program
CN105101211A (en) * 2014-05-23 2015-11-25 中国电信股份有限公司 Method and device for finding copied card
CN104615967A (en) * 2015-02-10 2015-05-13 陕西科技大学 Rolling code system and double encrypting method based on rolling code

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HAERYONG PARK等: "The Security Requirement for off-line E-cash system based on IC Card", 《PROCEEDINGS OF THE 2005 11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS》 *
周洪伟等: "一种IC卡应用***的防窜改技术", 《计算机应用研究》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018082095A1 (en) * 2016-11-07 2018-05-11 深圳市迈斯云门禁网络科技有限公司 Method and system for ic card management, and door access controller
CN107454972B (en) * 2016-11-07 2019-09-10 深圳市迈斯云门禁网络科技有限公司 A kind of IC card management method, system and access controller
CN107454972A (en) * 2016-11-07 2017-12-08 深圳市迈斯云门禁网络科技有限公司 A kind of IC-card management method, system and access controller
CN106600280A (en) * 2016-12-13 2017-04-26 中国人民解放军信息工程大学 IC card identifying system and card reading equipment
CN108280504A (en) * 2017-01-06 2018-07-13 广州市西迈信息科技有限公司 The anti-copying encrypted method of access control system IC card
CN106997638A (en) * 2017-03-21 2017-08-01 陕西科技大学 A kind of automatic drawing machine management system of achievable pseudo- card capture
CN107341534A (en) * 2017-07-18 2017-11-10 南京唯捷豪信息科技有限公司 A kind of electronic card copy prevention method, device and management server
CN107341534B (en) * 2017-07-18 2020-11-24 南京唯捷豪信息科技有限公司 Electronic card anti-copy method and device and management server
CN107945324A (en) * 2017-11-14 2018-04-20 广东安居宝数码科技股份有限公司 Card writing method, card reading method and the device of access control system
CN109753837A (en) * 2018-12-27 2019-05-14 佛山市伟邦电子科技有限公司 A kind of anti-copying and tamper resistant method of IC card
CN110598818A (en) * 2019-09-20 2019-12-20 刘伟 Safety IC card management system and method thereof
CN110738284A (en) * 2019-10-16 2020-01-31 上海应用技术大学 IC card full-automatic card issuing, writing and recycling method
CN110910133A (en) * 2019-10-18 2020-03-24 北京智慧中网科技有限公司 Non-replicable city all-purpose card with balance reminding function
CN110910133B (en) * 2019-10-18 2022-08-09 北京智慧中网科技有限公司 Non-replicable city all-purpose card with balance reminding function
CN111461275A (en) * 2020-04-26 2020-07-28 厦门浩邈科技有限公司 Method for detecting copy IC card

Also Published As

Publication number Publication date
CN106022181B (en) 2018-08-31

Similar Documents

Publication Publication Date Title
CN106022181A (en) System and method for preventing unauthorized use of IC card
US20070226086A1 (en) System and method for credit card lost-and-found notification
CN104023133B (en) Anti-theft method and device for mobile terminal
US20100169151A1 (en) Alarming system and method for protecting malicious access to bank accounts
JP2008544416A (en) Analytical detection of mass information leaks / points of compromise and management system of information leaked card portfolio
CN205594622U (en) Computer storage system
CN108304725A (en) A kind of method and system to the desensitization of government data resource
CN103617668A (en) Visitor management system and visitor management method
CN105205508A (en) Self-service card issuing machine for intelligent card
CN107341534B (en) Electronic card anti-copy method and device and management server
CN108694592A (en) A kind of art work authentication registration method based on block chain technology
Price The new surveillance normal: NSA and corporate surveillance in the age of global capitalism
CN205809895U (en) A kind of clone's IC-card identification device
CN107147499A (en) The method and system verified using phonetic entry
CN107943661A (en) A kind of data storage management system
CN208521332U (en) It is a kind of using Mobile phone storage cabinet as the University classroom attendance checking system of carrier
CN103544513B (en) A kind of system and method preventing engineering equipment to be forged
CN104318665A (en) System for precluding financial false cards
CN106251151A (en) A kind of device and method identifying IC-card
CN108197515A (en) Card Reader control method and device, terminal installation and computer readable storage medium
CN104902053B (en) A kind of test method and system of encrypted card function
CN106355120A (en) Method and device for preventing magnetic card information from being copied
CN103839026B (en) Many equipment read can encryption identity card
CN1859083B (en) Identity verifying system for time sharing shared internal nucleus multiple terminals
CN109636978A (en) Ticket checking method, system and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant