System and method for preventing unauthorized use of IC card

A testing system and card number technology, applied in the direction of instruments, inductive record carriers, internal/peripheral computer component protection, etc., can solve problems such as hidden dangers of life and property safety, falsified data, user losses, etc., so as to reduce the use risk and improve the safety. The effect of security and confidentiality, principle and operation is simple and clear

Active Publication Date: 2016-10-12
SHAANXI UNIV OF SCI & TECH
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although IC cards provide convenience to people's lives, some lawbreakers use illegal means to steal people's IC card information to make huge profits, and even use forged IC cards to carry out criminal activities, which brings great security to people's lives and property. hidden dangers, so the security of IC cards has always been a hot spot of social concern
Now the commonly used security measure in the market is to encrypt the IC card, but this encryption method is easy to be cracked by criminals, and then forged false data, causing incalculable losses to users
[0003] The IC card is mainly composed of 16 sectors, and each sector has 4 blocks. The data reading and writing of the IC card is realized through the operation of each block. The data of the 0 sector and 0 block of the ordinary IC card is formulated by the manufacturer. Intrinsic data, limited to write operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for preventing unauthorized use of IC card
  • System and method for preventing unauthorized use of IC card
  • System and method for preventing unauthorized use of IC card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The implementation of the present invention will be described in detail below in conjunction with the drawings and examples.

[0032] see figure 1 , a device and method for preventing IC card theft, including IC card reader 1, test UID card 2, power supply module 3, microprocessor 4, automatic alarm device 5, display module 6, etc., microprocessor 4 and The card reader 1, the power module 3, the automatic alarm device 5, and the display module 6 are connected, and the IC card reader 1 communicates wirelessly with the test UID card 2 through magnetic field energy. The test UID card 2 is divided into 16 sectors, each sector has 4 blocks, a total of 64 blocks; among them, sector 0 and block 0 can perform data writing operations.

[0033] After the system was normally opened, the microprocessor 4 set up a database for storing the user's mobile phone number and its IC card number and all information in the card. First use the test UID card to test whether the system is norm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system for preventing unauthorized use of an IC card. The system comprises an IC card reader-writer, a microprocessor, a testing UID card, a power supply module, a display module, and an automatic alarming device. The device is capable of preventing the unauthorized use of the IC card mainly by determining whether the data writing-in state of the 0 block data of the 0 sector of the IC card, the number of the IC card, and information stored in the IC card are consistent with related information of a system database. The UID card is tested to determined whether the working of the system is normal. When the working of the system is normal, user IC card operation is carried out. When the IC card is not the original card, the system is capable of forbidding the writing and reading operation of the card, and is used to transmit IC card leakage prompting information to a cell phone of a user and a public security organ by short messages. The principle and the operation of the device for preventing the unauthorized use of the IC card are simple and clear, and therefore whether the IC card information is leaked can be determined accurately, and the safety and the confidentiality of the IC card are greatly improved.

Description

technical field [0001] The invention belongs to the technical field of IC card security, and in particular relates to a system and method for preventing IC card fraudulent swiping. Background technique [0002] With the rapid development of modern electronic information, IC cards are widely used in people's daily life, such as bus cards, bank cards, telephone cards and access control cards that people usually use. Although IC cards provide convenience to people's lives, some criminals use illegal means to steal people's IC card information to make huge profits, and even use forged IC cards to carry out criminal activities, which brings great safety to people's lives and property. hidden dangers, so the security of IC cards has always been a hot spot of social concern. The commonly used security measure on the market is to encrypt the IC card, but this encryption method is easily cracked by criminals, and then forged false data, causing incalculable losses to users. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/00G06F21/77
CPCG06F21/77G06K7/0095
Inventor 张开生王静郭国法
Owner SHAANXI UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products