A kind of anti-duplication and anti-tampering method of IC card

An anti-tampering and anti-copying technology, which is applied in the direction of electromagnetic radiation induction, can solve the problems of high deployment costs and high requirements for networking of business systems, and achieve the effect of improving the anti-tampering level

Inactive Publication Date: 2022-02-25
FOSHAN WABON ELECTRONICS TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, although there are some data verification methods that can prevent duplicating cards from entering the normal business system, these data verification methods basically require online data verification and identification with the data server. The process of data verification and identification is Network and sufficiently low latency are required, which has high requirements for the networking of the business system, and will undoubtedly increase the deployment cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of anti-duplication and anti-tampering method of IC card
  • A kind of anti-duplication and anti-tampering method of IC card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] An anti-copy and tamper-proof method for an IC card in this embodiment relates to an IC card and a reader / writer.

[0026] The first code book and the second code book are stored in the reader-writer.

[0027] As shown in Table 1, the first password book is a binding form of "successful card swiping number" and "rolling code", which is a piece of electronic data.

[0028] Table 1:

[0029]

[0030]

[0031] In this embodiment, n is a number reaching tens of millions, and the rolling code is randomly generated by a computer and does not repeat each other. The number of n is sufficient to meet the requirements of the business system to be used for 30 years under normal card swiping frequency.

[0032] As shown in Table 2, the second codebook is a binding form of "calculation result" and "encryption code", which is a piece of electronic data.

[0033] Table 2:

[0034] Calculation results encryption code 001 C2A0F0 002 A9C3E0 003 E4B7...

Embodiment 2

[0045] An anti-copy and tamper-proof method for an IC card in this embodiment relates to an IC card and a reader / writer. The main difference between it and Embodiment 1 is that the method of this embodiment does not write the number of times of successful card swiping to the IC card.

[0046] The first code book and the second code book are stored in the reader-writer.

[0047] As shown in Table 3, the first password book is a binding form of "successful card swiping number" and "rolling code", which is a piece of electronic data.

[0048] table 3:

[0049] Successfully swipe the card for the first time rolling code 1 A0B0C0 2 A0B0C1 3 B1B2C3 4 E3A0C5 5 D5B1F1 …… n A5E2B0

[0050] In this embodiment, n is a number reaching tens of millions, and the rolling code is randomly generated by a computer and does not repeat each other. The number of n is sufficient to meet the requirements of the business system to be used f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing anti-duplication and anti-tampering of IC cards at the reader-writer level. The first codebook and the second codebook are added to the reader-writer, and these two codebooks are only known by the manufacturer and are kept secret from the outside world, and the reader-writer will write the rolling code and the rolling code of the first codebook to the IC card. The encryption code of the second codebook is used as the authentication element for the next swiping of the IC card, which can ensure that the actual capacity of the business system will not increase due to a certain card being copied, or the actual capacity of the business system will not be increased due to a certain card being copied and the data has been tampered with. Management has lost. The present invention has the following advantages: 1) It can prevent the coexistence of the original card and the copy card in the business system; 2) The anti-tampering level of the data in the card is greatly improved; 3) There is no need to change the hardware structure of the reader-writer; 4) When authenticating There is no need for networking between different readers.

Description

technical field [0001] The invention relates to an IC card anti-duplication and anti-tampering method. Background technique [0002] An IC card (Integrated Circuit Card) is also called a Smart card, an Intelligent card, a Microcircuit card, or a microchip card. It is made into a card form by embedding a microelectronic chip in a card base conforming to the ISO 7816 standard. The communication mode between the IC card and the reader can be contact or non-contact. As a confidence carrier, the IC card has the advantages of convenient use, high security, and wide application scenarios. [0003] However, with the development of cracking technology, there has been a technology that can directly read the UID number of the IC card and the content stored in each sector and block of the IC card. Through such a technology hacker combined with the current new structure of the card, he A copy card can be made, and after inferring the meaning of the content based on the content read on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K7/10
Inventor 廖功富
Owner FOSHAN WABON ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products