System and method of non-contact IC card for defending relay attack

A non-contact card reader technology, applied in the field of information security, can solve the problems of potential safety hazards, intrusion into non-contact IC cards, and the use of non-contact IC cards, to achieve defense against relay attacks, low cost, Wide range of effects

Active Publication Date: 2014-03-26
湖北警官学院
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing contactless IC card has the following defects in use: the existing contactless IC card usually adopts the ISO14443 standard, the ISO14443 standard is an open communication protocol, and the ISO14443 standard can be adopted by relay attack equipment, so the Since the attacking device can invade the contactless IC card, there is a security risk in the use of the contactless IC card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method of non-contact IC card for defending relay attack
  • System and method of non-contact IC card for defending relay attack
  • System and method of non-contact IC card for defending relay attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0032]An embodiment of the present invention provides a non-contact IC card defense relay attack system, including a non-contact IC card and a card reader, when the distance between the non-contact IC card and the card reader is 5mm to 10mm, the non-contact The non-contact IC card and the card reader establish a non-contact communication connection. The non-contact IC card detects that the magnetic field strength of the card reader is the first actual magnetic field strength H1, and H1 is within the range of 1.5A / m to 7.5A / m. The card reader sends H1 to the non-contact IC card, and starts timing, waiting for the response of the non-contact IC card; the non-contact IC card defines the received magnetic field strength as the first received magnetic field strength H1', ​​and then calculates H1 and H1 'The difference between ΔH1, judge wh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and method of a non-contact IC card for defending a relay attack, and relates to the field of information security. The system comprises the non-contact IC card and a card reader. The card reader sends three-time magnetic field intensity information to the non-contact IC card and records sending time, the non-contact IC card detects actual magnetic field intensity of the card reader for three times, and the actual magnetic field intensity is compared with the received corresponding magnetic field intensity to judge whether the non-contact IC card is under attack or not; meanwhile, the card reader calculates the received time difference of the non-contact IC card returning to a normal instruction, the time difference is compared with a corresponding magnetic field intensity change time difference to judge whether the non-contact IC card is under the attack or not, and when the non-contact IC card is under the attack, the non-contact IC card sends out an abnormal instruction, and the card reader stops communicating and sends out an alerting signal. According to the system and method, the non-contact IC card can be effectively prevented from being subjected to the relay attack, safety of the non-contact IC card is guaranteed, and the system is wide in application range, low in cost and convenient to use.

Description

technical field [0001] The invention relates to the field of information security, in particular to a system and method for non-contact IC card defense against relay attacks. Background technique [0002] Contactless IC (Integrated Circuit Card, integrated circuit card) card, also known as radio frequency card, is composed of IC chip and induction antenna, and is packaged in a standard PVC (Poly Vinyl Chloride, polyvinyl chloride) card. The non-contact IC card can complete the read and write operations with the card reader through radio waves. As shown in 1, the card reader continuously emits a set of fixed-frequency electromagnetic waves to the surroundings. When the non-contact IC card is close to the reader, under the excitation of the electromagnetic wave, the non-contact IC card is activated to send and receive information and read and write operate. Since the non-contact IC card sends and receives information and reads and writes through radio waves, the non-contact ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/71
CPCG06F21/554G06F21/77G06F2221/2135
Inventor 张鹏麦永浩段冶李佟鸿李俊向大为
Owner 湖北警官学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products