CN106022181A - System and method for preventing unauthorized use of IC card - Google Patents
System and method for preventing unauthorized use of IC card Download PDFInfo
- Publication number
- CN106022181A CN106022181A CN201610370943.2A CN201610370943A CN106022181A CN 106022181 A CN106022181 A CN 106022181A CN 201610370943 A CN201610370943 A CN 201610370943A CN 106022181 A CN106022181 A CN 106022181A
- Authority
- CN
- China
- Prior art keywords
- card
- information
- write
- read
- copy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0095—Testing the sensing arrangement, e.g. testing if a magnetic card reader, bar code reader, RFID interrogator or smart card reader functions properly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Storage Device Security (AREA)
- Credit Cards Or The Like (AREA)
Abstract
The invention discloses a system for preventing unauthorized use of an IC card. The system comprises an IC card reader-writer, a microprocessor, a testing UID card, a power supply module, a display module, and an automatic alarming device. The device is capable of preventing the unauthorized use of the IC card mainly by determining whether the data writing-in state of the 0 block data of the 0 sector of the IC card, the number of the IC card, and information stored in the IC card are consistent with related information of a system database. The UID card is tested to determined whether the working of the system is normal. When the working of the system is normal, user IC card operation is carried out. When the IC card is not the original card, the system is capable of forbidding the writing and reading operation of the card, and is used to transmit IC card leakage prompting information to a cell phone of a user and a public security organ by short messages. The principle and the operation of the device for preventing the unauthorized use of the IC card are simple and clear, and therefore whether the IC card information is leaked can be determined accurately, and the safety and the confidentiality of the IC card are greatly improved.
Description
Technical field
The invention belongs to IC-card security technology area, particularly to a kind of prevent IC-card steal brush system and
Method.
Background technology
Along with the fast development of hyundai electronics information, IC-card is widely used in daily life
In, the normally used mass transit card of such as people, bank card, phonecard and access card etc..Although IC-card is given
The life of people provides conveniently, but some lawless persons utilize illegal means to steal the IC-card letter of people
Breath is sought exorbitant profit, and carries out criminal activity even with the IC-card forged, brings to the lives and properties of people
Potential safety hazard greatly, so the safety of IC-card is always the focus of social concerns.The most normal
Safety measure be that IC-card is encrypted, but this cipher mode is easily cracked by lawless person,
And then the data that puppet is faked, the inestimable loss of cause the user.
IC-card is mainly made up of 16 sectors, and there are 4 blocks each sector, by the behaviour to each piece
Making to realize the reading and writing data of IC-card, the data of 0 piece, common IC-card 0 sector are the intrinsic of producer's formulation
Data, limit and carry out write operation.Wherein, the robber that copy card and clone's card are conventional swipes the card mode.Replicate
Card refers to replicate the data beyond 0 piece, 0 sector, and transfers to, in a new card, can realize
The function identical with former card.Clone's card refers to former card data (including 0 piece, 0 sector) are written to one
Extraordinary card, thus by all information devices in former card, all replicate, steal brush user IC for lawless person
Card provides probability.
Summary of the invention
In order to overcome the shortcoming of above-mentioned prior art, it is an object of the invention to provide one and prevent IC-card from stealing
The system and method for brush, can be effectively improved safety and the confidentiality of IC-card, thus ensure personal information and
Property safety.
To achieve these goals, the technical solution used in the present invention is:
A kind of system preventing IC-card from stealing brush, including:
IC-card read write line 1, identifies IC-card, 0 piece, 0 sector to IC-card under microprocessor 4 drives
Carry out radio communication between write operation, and test UID card 2;
Test UID card 2, is divided into 16 sectors, 4 pieces, each sector, 64 pieces altogether, wherein 0 fans
0 piece of district is set to carry out data write operation;
Microprocessor 4, its databases puts all information in subscriber phone number and its IC-card number and card,
First test to judge that test system is the most normal to test UID card 2, if test system is normally, read
Take the information of the IC-card that IC-card read write line 1 identifies, drive IC-card read write line 1 that current IC-card 0 is fanned
0 piece of district carries out write operation, if can write it, then judges that this card blocks as clone, and in data
To this card card labelled notation abnormal information in storehouse;If write operation can not be carried out, obtain the card number of this IC-card also
Judge the most consistent with the card number of databases storage, if inconsistent, then judge that this card is copy card, and
To this card card labelled notation abnormal information in data base;If consistent, then continue to judge whether this card exists different
Often information flag, if not existing, then this card is former card, can carry out normal operating, if existing, then root
It is clone's card or copy card according to abnormal information marker for judgment;
Autoalarm 5, when being judged as clone's card or copy card, sends warning;
Display module 6, shows judged result;
Power module 3, it is achieved power supply.
Described IC-card read write line 1 carries out radio communication by magnetic field energy with test UID card 2.
Test UID card 2 is tested to judge its most normal concrete grammar by described microprocessor 4
It is:
Test UID card 2 is put into the read-write region of IC-card read write line 1, and microprocessor 4 is to test UID
Datamation read and write normally by card 2, if read-write capability is normal, explanation system has read-write capability,
To ensure that follow-up everything goes well with your work carries out, in case owing to system is abnormal and cause to IC-card read-write capability
Maloperation (such as system write-in functions lost efficacy and caused microprocessor erroneous judgement clone's card for normal card).
Described autoalarm 5 includes buzzer and gsm module, is being judged as that clone blocks or multiple
During fabrication, microprocessor 4 sends signal to autoalarm 5, controls buzzer and sends caution sound,
Control gsm module to carry to the user mobile phone corresponding to IC-card and/or the transmission leakage of fixing alarm mobile phone simultaneously
Show information.
Described microprocessor 4 being judged as clone's card or during copy card, to data base write copy card,
Clone's card information, including card number, time, place, Card Reader number of times, is marked at lane database.
Present invention also offers a kind of method preventing IC-card from stealing brush, comprise the steps:
Prestore in data base IC card information, and this information at least includes the card number of IC-card;
Utilizing read-write equipment, read IC card information, this information at least includes the card number of IC-card;
Utilize read-write equipment, 0 piece, 0 sector of this IC-card is carried out write operation;
If write operation can be carried out, then this IC-card is clone's card, and to this card card labelled notation in data base
Abnormal information;
If write operation can not be carried out, it is judged that whether the card number of this IC-card prestores data base, as do not prestored,
Then it is judged as copy card, and to this card card labelled notation abnormal information in data base;
As prestored, then continue judge whether this card exists abnormal information labelling, if not existing, then this
Card is former card, can carry out normal operating, if existing, then according to abnormal information marker for judgment for cloning card
Or copy card.
Compared with prior art, the invention has the beneficial effects as follows:
No matter system determination is copy card or clone's card, all can write this card information to data base, including card
Number, the concrete time, place, Card Reader number of times, be then marked at lane database, facilitate Public Security Organs
Carry out investigating and prosecuting and point out this card of user be once replicated or cloned, thus reduce user's application risk.
In the present invention principle with operation on simple and clear, can accurately judge whether IC card information leaks,
Greatly enhance safety and the confidentiality of IC-card, effectively ensured that personal information is pacified with property
Entirely.
Accompanying drawing explanation
Fig. 1 is the hardware system schematic diagram of the present invention.
Fig. 2 is that the present invention tests UID card sector block diagram.
Fig. 3 is the workflow diagram of the present invention.
Detailed description of the invention
Embodiments of the present invention are described in detail below in conjunction with the accompanying drawings with embodiment.
Seeing Fig. 1, one prevents IC-card from stealing brush device and method, including IC-card read write line 1, test
UID card 2, power module 3, microprocessor 4, autoalarm 5, display module 6 etc., micro-place
Reason device 4 is connected with card reader 1, power module 3, autoalarm 5, display module 6 respectively, IC
Card reader 1 carries out radio communication by magnetic field energy with test UID card 2.2 points of UID card of test
It is 16 sectors, 4 pieces, each sector, 64 pieces altogether;Wherein 0 piece, 0 sector can carry out data and writes
Enter operation.
After system is normally-open, data base set up by microprocessor 4, be used for depositing subscriber phone number and its
All information in IC-card number and card are first the most normal, to ensure system with test UID card test system
Normal work, process is as follows:
Test UID card 2 is put into the read-write region of IC-card read write line 1, and microprocessor 4 is to test UID
Datamation read and write normally by card 2, if read-write capability is normal, explanation system has read-write capability,
To ensure that follow-up everything goes well with your work carries out, in case owing to system is abnormal and cause to IC-card read-write capability
Maloperation (such as system write-in functions lost efficacy and caused microprocessor erroneous judgement clone's card for normal card).
If test is normal, then can work on.Test UID card 2 leaves IC-card by drive mechanism and reads
Writing the read-write region of device 1, wait the insertion of user's IC-card, if insert is normal card, system is passed through
Microprocessor 4 operates IC-card read write line 1 and reads the relevant information including card number, relevant information and basis
System information matches, and user can carry out the account corresponding to IC-card is carried out normal operating;If inserted
Enter is copy card, system by microprocessor 4 operate card number that IC-card read write line 1 reads inevitable with this
The card number that system prestores is different (although the information in addition to card number is identical);If insert is gram
Grand card, although system operates the card number of IC-card read write line 1 reading with native system in advance by microprocessor 4
The card number of storage is identical, but drives IC-card read write line 1 to current IC-card 0 sector by microprocessor 4
0 piece carries out write operation and can change its card number.IC card numbers are stored in 0 piece, 0 sector, normal IC-card
Card number is unique, if copy card, it is impossible to replicate card number, can only be replicated other in addition to card number
Information, clone's card is overall copy card, but drives IC-card read write line 1 to currently by microprocessor 4
0 piece, IC-card 0 sector carries out write operation can change its card number.
After IC-card read write line 1 recognizes IC-card, microprocessor 4 drives card reader 1 to IC-card 0 sector
0 piece carries out write operation, if can write it, then judges that this card blocks as clone, and data base
In to this card card labelled notation abnormal information.Microprocessor 4 drives autoalarm 5 to pass through short message mode
Mobile phone and Public Security Organs to user send IC-card leakage information, and forbid that this card operates, aobvious
Show that module 6 display system is abnormal, thus reduce the defence psychology of suspect, it is simple to Public Security Organs looks into
Place.If write operation can not be carried out, microprocessor 4 obtains the card number of this IC-card by IC-card read write line 1
And judge the most consistent with the card number of databases storage, if inconsistent, then judge that this card is copy card,
And to this card card labelled notation abnormal information in data base;If consistent, then continue to judge whether this card exists
Abnormal information labelling, if not existing, then this card is former card, can carry out normal operating, if existing, then
It is clone's card or copy card according to abnormal information marker for judgment.
When being judged as clone's card or copy card, buzzer call in autoalarm 5, show mould
Block 6 prompt system is abnormal, and gsm module sends IC-card leakage prompting letter from trend user and Public Security Organs
Breath, and forbid that this card operates.Once find this card be copy card or clone card all can be to database write
Enter copy card, clone's card information, including card number, time, place, Card Reader number of times, enter at lane database
Line flag, prompting this card of user was once replicated or cloned, thus reducing the application risk of user.
Seeing Fig. 2, the sector block diagram of the test UID card 2 of the present invention, with actual IC-card structure
Unanimously, testing UID card 2 16 sectors altogether, each sector is divided into 4 pieces, 64 pieces altogether.In figure
2-1 is 0 piece, 0 sector, its storage for producer's inherent data, cannot change under normal circumstances.
Seeing Fig. 3, the workflow of the present invention is as follows: after system is normally-open, and number set up by microprocessor
According to storehouse, it is used for depositing subscriber phone number and its IC-card number and card internal information;IC-card read write line recognizes
After IC-card, microprocessor driven card reader carries out write operation to 0 piece, IC-card 0 sector, if can be to it
Write, then judge that this card blocks as clone, and to this card card labelled notation abnormal information in data base,
Microprocessor driven autoalarm sends IC by short message mode to mobile phone and the Public Security Organs of user
Card leakage information, and forbid that this card operates, display module display system is abnormal;If can not enter
Row write operates, if write operation can not be carried out, microprocessor 4 obtains this IC-card by IC-card read write line 1
Card number and judge with databases store up card number the most consistent, if inconsistent, then judge that this card is multiple
Fabrication, and to this card card labelled notation abnormal information in data base;If consistent, then continue to judge that this card is
No there is abnormal information labelling, if not existing, then this card is former card, can carry out normal operating, if depositing
, then block or copy card for clone according to abnormal information marker for judgment.Buzzer in autoalarm
Piping, display module prompt system is abnormal, and gsm module can send IC from trend user and Public Security Organs
Card leakage information, and forbid that this card operates.Judgement is that copy card or clone's card all can be to
Data base writes this card information, including card number, concrete time, place, Card Reader number of times, then in data
Ku Li is marked, and facilitates Public Security Organs to carry out investigating and prosecuting and point out this card of user be once replicated or cloned,
Thus reduce user's application risk.
Finally it should be noted that: above-described embodiment is only in order to illustrate technical scheme, non-to its limit
System.Although being described in detail the present invention with reference to above-described embodiment, relevant technical staff should
Solution to: the technical scheme of above-described embodiment can be modified by it, or to wherein portion of techniques feature
It is replaced, but these amendments or replacement, do not make the essence of its technical method depart from the thought of the present invention
And protection domain.
Claims (6)
1. one kind prevents the system that IC-card steals brush, it is characterised in that including:
IC-card read write line (1), identifies IC-card, fans the 0 of IC-card under microprocessor (4) drives
0 piece of district carries out radio communication between write operation, and test UID card (2);
Test UID card (2), is divided into 16 sectors, 4 pieces, each sector, 64 pieces altogether, wherein
00 piece, sector is set to carry out data write operation;
Microprocessor (4), its databases is all in putting subscriber phone number and its IC-card number and card
Information, first tests test UID card (2) to judge that test system is the most normal, if test system
The normal information then reading the IC-card that IC-card read write line (1) identifies of system, drives IC-card read write line (1)
0 piece, current IC-card 0 sector is carried out write operation, if it can be write, then judge this card as gram
Grand card, and to this card card labelled notation abnormal information in data base;If write operation can not be carried out, obtain
The card number of this IC-card judgement are the most consistent with the card number of databases storage, if inconsistent, then judging should
Card is copy card, and to this card card labelled notation abnormal information in data base;If consistent, then continue to judge
Whether this card exists abnormal information labelling, if not existing, then this card is former card, can carry out normal operating,
If existing, then block or copy card for clone according to abnormal information marker for judgment;
Autoalarm (5), when being judged as clone's card or copy card, sends warning;
Display module (6), shows judged result;
Power module (3), it is achieved power supply.
The system preventing IC-card from stealing brush the most according to claim 1, it is characterised in that described IC
Card reader (1) carries out radio communication by magnetic field energy with test UID card (2).
The system preventing IC-card from stealing brush the most according to claim 1, it is characterised in that described micro-
Test UID card (2) is tested to judge that its most normal concrete grammar is by processor (4):
UID card (2) will be tested and put into the read-write region of IC-card read write line (1), microprocessor (4)
Datamation is read and write in test UID card (2) normally, if read-write capability is normal, explanation
System has read-write capability, to ensure that follow-up everything goes well with your work carries out, in case owing to IC-card is read and write by system
The maloperation that function is abnormal and causes.
The most according to claim 1 prevent IC-card steal brush system, it is characterised in that described from
Dynamic alarm device (5) includes buzzer and gsm module, when being judged as clone's card or copy card,
Microprocessor (4) sends signal to autoalarm (5), controls buzzer and sends caution sound, with
Time control gsm module and send leakage prompting to the user mobile phone corresponding to IC-card and/or fixing alarm mobile phone
Information.
The system preventing IC-card from stealing brush the most according to claim 1, it is characterised in that described micro-
Processor (4), when being judged as clone's card or copy card, writes copy card, clone's card letter to data base
Breath, including card number, time, place, Card Reader number of times, is marked at lane database.
6. one kind prevents the method that IC-card steals brush, it is characterised in that comprise the steps:
Prestore in data base IC card information, and this information at least includes the card number of IC-card;
Utilizing read-write equipment, read IC card information, this information at least includes the card number of IC-card;
Utilize read-write equipment, 0 piece, 0 sector of this IC-card is carried out write operation;
If write operation can be carried out, then this IC-card is clone's card, and to this card card labelled notation in data base
Abnormal information;
If write operation can not be carried out, it is judged that whether the card number of this IC-card prestores data base, as do not prestored,
Then it is judged as copy card, and to this card card labelled notation abnormal information in data base;
As prestored, then continue judge whether this card exists abnormal information labelling, if not existing, then this
Card is former card, can carry out normal operating, if existing, then according to abnormal information marker for judgment for cloning card
Or copy card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610370943.2A CN106022181B (en) | 2016-05-30 | 2016-05-30 | A kind of system for preventing IC card from stealing brush |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610370943.2A CN106022181B (en) | 2016-05-30 | 2016-05-30 | A kind of system for preventing IC card from stealing brush |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106022181A true CN106022181A (en) | 2016-10-12 |
CN106022181B CN106022181B (en) | 2018-08-31 |
Family
ID=57092672
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610370943.2A Active CN106022181B (en) | 2016-05-30 | 2016-05-30 | A kind of system for preventing IC card from stealing brush |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106022181B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600280A (en) * | 2016-12-13 | 2017-04-26 | 中国人民解放军信息工程大学 | IC card identifying system and card reading equipment |
CN106997638A (en) * | 2017-03-21 | 2017-08-01 | 陕西科技大学 | A kind of automatic drawing machine management system of achievable pseudo- card capture |
CN107341534A (en) * | 2017-07-18 | 2017-11-10 | 南京唯捷豪信息科技有限公司 | A kind of electronic card copy prevention method, device and management server |
CN107454972A (en) * | 2016-11-07 | 2017-12-08 | 深圳市迈斯云门禁网络科技有限公司 | A kind of IC-card management method, system and access controller |
CN107945324A (en) * | 2017-11-14 | 2018-04-20 | 广东安居宝数码科技股份有限公司 | Card writing method, card reading method and the device of access control system |
CN108280504A (en) * | 2017-01-06 | 2018-07-13 | 广州市西迈信息科技有限公司 | The anti-copying encrypted method of access control system IC card |
CN109753837A (en) * | 2018-12-27 | 2019-05-14 | 佛山市伟邦电子科技有限公司 | A kind of anti-copying and tamper resistant method of IC card |
CN110598818A (en) * | 2019-09-20 | 2019-12-20 | 刘伟 | Safety IC card management system and method thereof |
CN110738284A (en) * | 2019-10-16 | 2020-01-31 | 上海应用技术大学 | IC card full-automatic card issuing, writing and recycling method |
CN110910133A (en) * | 2019-10-18 | 2020-03-24 | 北京智慧中网科技有限公司 | Non-replicable city all-purpose card with balance reminding function |
CN111461275A (en) * | 2020-04-26 | 2020-07-28 | 厦门浩邈科技有限公司 | Method for detecting copy IC card |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030033485A1 (en) * | 2001-08-07 | 2003-02-13 | James Ohr | System and method for preventing sector slipping in a storage area network |
CN1717099A (en) * | 2004-06-28 | 2006-01-04 | 华为技术有限公司 | SIM card anti-cloning method |
CN1741074A (en) * | 2005-10-08 | 2006-03-01 | 胡阳 | Method for preventing bank credit cards from unauthorized use |
CN101848462A (en) * | 2009-03-23 | 2010-09-29 | ***通信集团公司 | Clone card location server, location detection method and system |
CN101860847A (en) * | 2010-06-09 | 2010-10-13 | 中兴通讯股份有限公司 | Cloned subscriber identity module card test method and system |
US20150031302A1 (en) * | 2013-07-25 | 2015-01-29 | Olympus Corporation | Wireless communication terminal with an rfid module, wireless communication system, wireless communication method, and a device storing a program |
CN104615967A (en) * | 2015-02-10 | 2015-05-13 | 陕西科技大学 | Rolling code system and double encrypting method based on rolling code |
CN105101211A (en) * | 2014-05-23 | 2015-11-25 | 中国电信股份有限公司 | Method and device for finding copied card |
-
2016
- 2016-05-30 CN CN201610370943.2A patent/CN106022181B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030033485A1 (en) * | 2001-08-07 | 2003-02-13 | James Ohr | System and method for preventing sector slipping in a storage area network |
CN1717099A (en) * | 2004-06-28 | 2006-01-04 | 华为技术有限公司 | SIM card anti-cloning method |
CN1741074A (en) * | 2005-10-08 | 2006-03-01 | 胡阳 | Method for preventing bank credit cards from unauthorized use |
CN101848462A (en) * | 2009-03-23 | 2010-09-29 | ***通信集团公司 | Clone card location server, location detection method and system |
CN101860847A (en) * | 2010-06-09 | 2010-10-13 | 中兴通讯股份有限公司 | Cloned subscriber identity module card test method and system |
US20150031302A1 (en) * | 2013-07-25 | 2015-01-29 | Olympus Corporation | Wireless communication terminal with an rfid module, wireless communication system, wireless communication method, and a device storing a program |
CN105101211A (en) * | 2014-05-23 | 2015-11-25 | 中国电信股份有限公司 | Method and device for finding copied card |
CN104615967A (en) * | 2015-02-10 | 2015-05-13 | 陕西科技大学 | Rolling code system and double encrypting method based on rolling code |
Non-Patent Citations (2)
Title |
---|
HAERYONG PARK等: "The Security Requirement for off-line E-cash system based on IC Card", 《PROCEEDINGS OF THE 2005 11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS》 * |
周洪伟等: "一种IC卡应用***的防窜改技术", 《计算机应用研究》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018082095A1 (en) * | 2016-11-07 | 2018-05-11 | 深圳市迈斯云门禁网络科技有限公司 | Method and system for ic card management, and door access controller |
CN107454972B (en) * | 2016-11-07 | 2019-09-10 | 深圳市迈斯云门禁网络科技有限公司 | A kind of IC card management method, system and access controller |
CN107454972A (en) * | 2016-11-07 | 2017-12-08 | 深圳市迈斯云门禁网络科技有限公司 | A kind of IC-card management method, system and access controller |
CN106600280A (en) * | 2016-12-13 | 2017-04-26 | 中国人民解放军信息工程大学 | IC card identifying system and card reading equipment |
CN108280504A (en) * | 2017-01-06 | 2018-07-13 | 广州市西迈信息科技有限公司 | The anti-copying encrypted method of access control system IC card |
CN106997638A (en) * | 2017-03-21 | 2017-08-01 | 陕西科技大学 | A kind of automatic drawing machine management system of achievable pseudo- card capture |
CN107341534A (en) * | 2017-07-18 | 2017-11-10 | 南京唯捷豪信息科技有限公司 | A kind of electronic card copy prevention method, device and management server |
CN107341534B (en) * | 2017-07-18 | 2020-11-24 | 南京唯捷豪信息科技有限公司 | Electronic card anti-copy method and device and management server |
CN107945324A (en) * | 2017-11-14 | 2018-04-20 | 广东安居宝数码科技股份有限公司 | Card writing method, card reading method and the device of access control system |
CN109753837A (en) * | 2018-12-27 | 2019-05-14 | 佛山市伟邦电子科技有限公司 | A kind of anti-copying and tamper resistant method of IC card |
CN110598818A (en) * | 2019-09-20 | 2019-12-20 | 刘伟 | Safety IC card management system and method thereof |
CN110738284A (en) * | 2019-10-16 | 2020-01-31 | 上海应用技术大学 | IC card full-automatic card issuing, writing and recycling method |
CN110910133A (en) * | 2019-10-18 | 2020-03-24 | 北京智慧中网科技有限公司 | Non-replicable city all-purpose card with balance reminding function |
CN110910133B (en) * | 2019-10-18 | 2022-08-09 | 北京智慧中网科技有限公司 | Non-replicable city all-purpose card with balance reminding function |
CN111461275A (en) * | 2020-04-26 | 2020-07-28 | 厦门浩邈科技有限公司 | Method for detecting copy IC card |
Also Published As
Publication number | Publication date |
---|---|
CN106022181B (en) | 2018-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106022181A (en) | System and method for preventing unauthorized use of IC card | |
US20070226086A1 (en) | System and method for credit card lost-and-found notification | |
CN104023133B (en) | Anti-theft method and device for mobile terminal | |
US20100169151A1 (en) | Alarming system and method for protecting malicious access to bank accounts | |
JP2008544416A (en) | Analytical detection of mass information leaks / points of compromise and management system of information leaked card portfolio | |
CN205594622U (en) | Computer storage system | |
CN108304725A (en) | A kind of method and system to the desensitization of government data resource | |
CN103617668A (en) | Visitor management system and visitor management method | |
CN105205508A (en) | Self-service card issuing machine for intelligent card | |
CN107341534B (en) | Electronic card anti-copy method and device and management server | |
CN108694592A (en) | A kind of art work authentication registration method based on block chain technology | |
Price | The new surveillance normal: NSA and corporate surveillance in the age of global capitalism | |
CN205809895U (en) | A kind of clone's IC-card identification device | |
CN107147499A (en) | The method and system verified using phonetic entry | |
CN107943661A (en) | A kind of data storage management system | |
CN208521332U (en) | It is a kind of using Mobile phone storage cabinet as the University classroom attendance checking system of carrier | |
CN103544513B (en) | A kind of system and method preventing engineering equipment to be forged | |
CN104318665A (en) | System for precluding financial false cards | |
CN106251151A (en) | A kind of device and method identifying IC-card | |
CN108197515A (en) | Card Reader control method and device, terminal installation and computer readable storage medium | |
CN104902053B (en) | A kind of test method and system of encrypted card function | |
CN106355120A (en) | Method and device for preventing magnetic card information from being copied | |
CN103839026B (en) | Many equipment read can encryption identity card | |
CN1859083B (en) | Identity verifying system for time sharing shared internal nucleus multiple terminals | |
CN109636978A (en) | Ticket checking method, system and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |