Supercharge Your Innovation With Domain-Expert AI Agents!

Method and system for identifying legitimate chip

An identification method and chip technology, which is applied in the legal chip identification method and system field, can solve problems such as illegal copying of chips, endangering user identity and property security, and achieve the effect of improving accuracy

Active Publication Date: 2019-11-15
TENDYRON CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the existing technology can prevent the chip from being illegally copied to a certain extent and ensure data security, it is difficult to guarantee that the chip will not be illegally copied. Algorithms and other methods to obtain information such as user security data and chip identification stored in the built-in chip of the legal device to be read, and store the illegally obtained data into the chip of the fake device to be read, so that the fake device to be read is Stored with the same user security data and chip identification information as the legal device to be read, in this case, the reading device will think that the fake device to be read is legitimate, and then perform corresponding operations, endangering the user's security. Identity and Property Security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identifying legitimate chip
  • Method and system for identifying legitimate chip
  • Method and system for identifying legitimate chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment provides a legal chip identification method, figure 1 The flow chart of the method for identifying legal chips provided by this embodiment, the method mainly includes the following steps (steps S101 to S105):

[0032] Step S101, the reading device sequentially sends M pending instructions to the chip to be read, and the M pending instructions include N preset instructions, where M≥N, and M and N are both positive integers;

[0033] In this embodiment, the reading device can be a POS machine, an ATM machine, a mobile phone with NFC function, a bus card reader, a stored value card reader, a combination of a mobile phone and a card reader, a combination of a PC and a card reader, etc. The reading chip is set in the device to be read, and the device to be read can be a second-generation resident ID card, a bus card, a smart card with a chip, a smart card with a chip and a magnetic stripe, an electronic wallet, etc. Insert the device to be read into the read...

Embodiment 2

[0154] This embodiment provides an identification system for a legal chip, and the identification system for a legal chip in this embodiment is implemented using the identification method for a legal chip provided in Embodiment 1 above; Figure 8 Schematic diagram of the structure of the legal chip identification system provided in this embodiment, such as Figure 8 As shown, the system mainly includes: a reading device 601, which is used to sequentially send M pending instructions to the chip 602 to be read, and the M pending instructions include N preset instructions, wherein, M≥N, M, N Both are positive integers; the chip to be read 602 is used to sequentially receive M instructions to be processed, and respond to each instruction to be processed respectively; the reading device 601 is also used to obtain the first element set, wherein the first element The collection includes: the signal characteristics of the response information that the chip 602 to be read responds to e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a legal chip recognition method and system. The legal chip recognition method comprises that a reading device sequentially sends M instructions to be handled including N preset instructions to a chip to be read; the chip to be read responds to each instruction to be handled; the reading device obtains a first essential factor set which includes the signal characteristic of a response message that the chip to be read gives to each preset instruction, the signal characteristic of each response message comprises at least one of the following essential factors of the level value, the level rising edge duration, the pulse width, the duty ratio, the state value, the moment of the differential signal intersection point, the signal frequency and signal jitter; the reading device carries out first handling on the first essential factor set to obtain the signal characteristic of the chip to be read, and obtains the result of comparing the signal characteristic of a legal chip corresponding to the identification of the chip to be read with the signal characteristic of the chip to be read, and under the condition that the comparison result is consistent, the chip to be read is recognized to be a legal chip.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a legal chip identification method and system. Background technique [0002] At present, devices to be read with built-in chips have been increasingly used in fields involving property security and identity authentication, such as smart cards, ID cards, etc. The chips built into these devices to be read often store the user's identity or property, etc. Secure data, therefore, the data security requirements for built-in chips will also be higher. [0003] Although the existing technology can prevent the chip from being illegally copied to a certain extent and ensure data security, it is difficult to guarantee that the chip will not be illegally copied. Algorithms and other methods to obtain information such as user security data and chip identification stored in the built-in chip of the legal device to be read, and store the illegally obtained data into the chip of the fake d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/72
CPCG06F21/72
Inventor 李东声
Owner TENDYRON CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More