CN102201070A - Integrated Cards, Card Readers and Combinations - Google Patents
Integrated Cards, Card Readers and Combinations Download PDFInfo
- Publication number
- CN102201070A CN102201070A CN2011100951018A CN201110095101A CN102201070A CN 102201070 A CN102201070 A CN 102201070A CN 2011100951018 A CN2011100951018 A CN 2011100951018A CN 201110095101 A CN201110095101 A CN 201110095101A CN 102201070 A CN102201070 A CN 102201070A
- Authority
- CN
- China
- Prior art keywords
- card
- integrated
- module
- interface
- slot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013475 authorization Methods 0.000 claims abstract description 14
- 239000013078 crystal Substances 0.000 claims abstract description 13
- 238000012546 transfer Methods 0.000 claims description 17
- 238000005516 engineering process Methods 0.000 claims description 15
- 230000005540 biological transmission Effects 0.000 claims description 13
- 238000004891 communication Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 5
- 230000007246 mechanism Effects 0.000 claims description 3
- 238000007726 management method Methods 0.000 description 21
- 238000000034 method Methods 0.000 description 19
- 230000008520 organization Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 3
- 230000036541 health Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本发明涉及一种移动储存装置,尤其涉及一种普及性广、存储容量大的集成卡、读卡器及其组合。The invention relates to a mobile storage device, in particular to an integrated card with wide popularity and large storage capacity, a card reader and a combination thereof.
背景技术Background technique
随着科学技术的飞速发展,特别是电子计算机的运用,片式卡以其便携优势在各行各业中得到了日益广泛的应用。片式卡主要是在需要发生相关业务时对持卡人进行身份识别。然而,当个人信息量增加到一定程度时,片式卡的存储容量难以满足实际应用要求。With the rapid development of science and technology, especially the use of electronic computers, chip cards have been increasingly widely used in various industries due to their portability advantages. The chip card is mainly used to identify the cardholder when relevant business needs to occur. However, when the amount of personal information increases to a certain extent, the storage capacity of the chip card is difficult to meet the requirements of practical applications.
继U盘、SD卡技术之后,TF卡以其体积小、存储容量大、价格便宜、使用方便而日渐成为主要的移存储媒体,能供包括移动电话、数码相机、PC、笔记本电脑等多种数码产品内置的TF读写适配器进行数据的读写与交换。而TF卡携带方便性和现行随身普适性不如现行的片式卡。Following U disk and SD card technology, TF card has gradually become the main mobile storage media due to its small size, large storage capacity, low price and convenient use. It can be used for mobile phones, digital cameras, PCs, notebook computers, etc. The built-in TF read-write adapter of digital products can read, write and exchange data. However, the portability and universality of the TF card are not as good as the current chip card.
由于片式卡的应用普及和TF卡的高性价比,目前开始出现拟将两者有机结合的趋势,以用于需要高储量数据存储的业务,而目前一般的实现方法是采用活动方式,通过推抽或翻开操作,凸现出TF卡的措施,这种活动式内置TF卡的方法,容易使片式卡破损或TF小卡连接线路折断。Due to the popularity of chip cards and the high cost performance of TF cards, there is a trend to combine the two organically for services that require high-volume data storage. At present, the general implementation method is to use activities. Pull or open the operation to highlight the shape of the TF card. This kind of movable built-in TF card method is easy to damage the chip card or break the connection line of the TF small card.
当用户共享业务时,通常会考虑个人隐私保护而不是随意的共享,或是通对输入密码将整份资料进行加密,一般采用对称加密,容易被破解。从以上的现有技术可以看出,由于需要将密钥读入计算机内存中,可能导致该密钥被他人在计算机内使用木马等不法手段窃取,现有技术存在安全隐患。When users share services, they usually consider personal privacy protection instead of random sharing, or encrypt the entire data by entering a password. Symmetric encryption is generally used, which is easy to be cracked. It can be seen from the above prior art that because the key needs to be read into the computer memory, the key may be stolen by others in the computer by illegal means such as a Trojan horse, and there is a security risk in the prior art.
发明内容Contents of the invention
针对现有技术存在的问题,本发明的目的之一在于克服上述现有技术中的不足,提供一种普及性广、存储容量大的集成卡。Aiming at the problems existing in the prior art, one of the purposes of the present invention is to overcome the aforementioned deficiencies in the prior art and provide an integrated card with wide popularity and large storage capacity.
本发明的目的之二在于提供一种可读取、管理集成卡内信息的读卡器。The second object of the present invention is to provide a card reader capable of reading and managing the information in the integrated card.
本发明的目的之三在于提供一种可读取、控制管理集成卡内的信息的读卡器的组合。通过以有线或无线方式与服务器连接获取数据,在本装置内分别以强密、弱密、公开等不同层别的信息配置,然后将处理后的数据供PC终端选择性地读取,方便用户对自身信息的安全掌控。The third object of the present invention is to provide a combination of card readers that can read, control and manage the information in the integrated card. Obtain data by connecting to the server in a wired or wireless manner, and configure it with different levels of information such as strong secret, weak secret, and public, and then provide the processed data for PC terminals to selectively read, which is convenient for users Control the security of your own information.
为实现上述目的之一,本发明提供一种集成卡,包括一片体卡及一存储卡,片体卡上开设有一收容槽,存储卡内嵌固定于收容槽内,该存储卡的厚度不大于片体卡的厚度;存储卡为TF卡,所述体卡中设有一个连接电路单元,连接电路单元连接片式卡的磁条或SIM卡与存储卡,连接电路单元连通状态时可以使两卡有物理连接。In order to achieve one of the above objects, the present invention provides an integrated card, which includes a body card and a memory card. The body card is provided with a receiving groove, and the memory card is embedded and fixed in the receiving groove. The thickness of the memory card is not more than The thickness of the chip card; the memory card is a TF card, and a connection circuit unit is provided in the body card, and the connection circuit unit connects the magnetic strip of the chip card or the SIM card and the memory card, and the two can be connected when the connection circuit unit is connected. Cards are physically connected.
为实现上述目的之二,本发明所提供读卡器,包括一卡座、一CPU、一读卡模块、晶振及一无线收发模块或一转接口;读卡模块、晶振及无线收发模块或转接口分别与CPU相连;所述卡座上开设有一卡槽,读卡装置设置于卡槽内;所述CPU内置有一分层授权模块,为一配置数据加解密集安全算法芯片;所述卡槽为矩形,至少有两面为开放面;所述转接口为USB接口可以旋转或伸缩等可方式活动于卡座的内外。In order to achieve the above-mentioned purpose two, the card reader provided by the present invention includes a card holder, a CPU, a card reading module, a crystal oscillator and a wireless transceiver module or a transfer interface; a card reader module, a crystal oscillator and a wireless transceiver module or a transfer interface The interfaces are respectively connected to the CPU; a card slot is provided on the card holder, and the card reading device is arranged in the card slot; a layered authorization module is built in the CPU, which is a configuration data encryption and decryption intensive security algorithm chip; the card slot It is rectangular, and at least two sides are open sides; the transfer interface is a USB interface, which can be rotated or telescopically moved inside and outside the deck.
为实现上述目的之三,本发明所提供集成卡组合,包括一集成卡及一读卡器,该集成卡包括一片体卡及一存储卡,片体卡设有一收容槽;存储卡内嵌固定于片式卡的收容槽内,该读卡器一卡座、一CPU、一读卡模块、晶振及一无线收发模块或一转接口;CPU内置有一分层授权模块;读卡模块、晶振及无线收发模块或转接口分别与CPU相连;读卡模块包括一读卡装置及一读卡驱动电路,读卡驱动电路连接读卡装置,其特征在于:卡座上开设有一卡槽,读卡装置设置于卡槽内对应存储卡的位置处,卡座表面设有若干个按钮。In order to achieve the third purpose above, the integrated card combination provided by the present invention includes an integrated card and a card reader, the integrated card includes a body card and a memory card, the body card is provided with a receiving slot; In the storage slot of the chip card, the card reader has a card holder, a CPU, a card reading module, a crystal oscillator and a wireless transceiver module or a transfer interface; the CPU has a built-in hierarchical authorization module; the card reading module, crystal oscillator and The wireless transceiver module or the transfer interface are connected to the CPU respectively; the card reading module includes a card reading device and a card reading drive circuit, and the card reading drive circuit is connected to the card reading device, and is characterized in that: a card slot is provided on the card holder, and the card reading device It is arranged at the position corresponding to the memory card in the card slot, and several buttons are arranged on the surface of the card holder.
进一步,所述分层授权模块,包括:用于识别、处理不同层次信息的微处理器控制单元、用于配置1-n层次加解密筛板单元、筛板管理接口、可供加密数据传输的加密信道单元、可供非加密数据传输的非加密信道单元、用于管理密钥的密钥管理单元、用于供PC终端通讯的数据交换接口;筛板管理接口、密钥管理单元、数据交换接口分别与微处理器控制单元相连,筛板管理接口与1-n层次加解密筛板单元相连,密钥管理单元与加密信道单元、非加密信道单元相连;Further, the hierarchical authorization module includes: a microprocessor control unit for identifying and processing different levels of information, a sieve unit for configuring 1-n levels of encryption and decryption, a sieve management interface, and a sieve for encrypted data transmission Encrypted channel unit, non-encrypted channel unit for non-encrypted data transmission, key management unit for key management, data exchange interface for PC terminal communication; sieve plate management interface, key management unit, data exchange The interfaces are respectively connected to the microprocessor control unit, the sieve plate management interface is connected to the 1-n level encryption and decryption sieve plate unit, and the key management unit is connected to the encrypted channel unit and the non-encrypted channel unit;
进一步,所述分层授权模块,采用共认的对称、非对称、DES、RSA、GPG、IDES信息加解密、数字签名技术和认证机制,结合服务器可配置强密、弱密、公开等不同层别的信息,供PC终端选择性地读取或转阅;Further, the hierarchical authorization module adopts commonly recognized symmetric, asymmetric, DES, RSA, GPG, IDES information encryption and decryption, digital signature technology and authentication mechanism, and can configure different layers such as strong encryption, weak encryption, and publicity in combination with the server Other information, for PC terminals to selectively read or forward;
进一步,所述集成卡组合与服务器或集成卡组合与PC终端通讯的数据传输接口,其物理层可以是有限或无限任一一种方式,实现相互之间的数据传输。Further, the physical layer of the data transmission interface for communication between the integrated card combination and the server or between the integrated card combination and the PC terminal can be either limited or unlimited to realize mutual data transmission.
如上所述,本发明集成卡、读卡器及其组合通过片式卡上内嵌固定一存储卡,读卡器的矩形卡槽内于存储卡对应位置处设一读卡装置,从而实现读取管理普及性广、存储容量大的集成卡内的信息;持卡者通过该集成卡组合,以有线或无线方式与服务器连接获取数据,并在本装置内分别以强密、弱密、公开等不同层别的信息配置,然后将配置处理后的数据供PC终端选择性地读取,方便用户对自身信息的安全掌控。As mentioned above, the integrated card, card reader and their combination of the present invention fix a memory card embedded in the chip card, and a card reader device is set at the corresponding position of the memory card in the rectangular card slot of the card reader, so as to realize reading Access the information in the integrated card with wide management popularity and large storage capacity; through the integrated card combination, the cardholder connects to the server in a wired or wireless way to obtain data, and uses strong encryption, weak encryption, and public encryption respectively in this device. Wait for the information configuration of different layers, and then provide the PC terminal to selectively read the configured data, which is convenient for users to control the security of their own information.
附图说明Description of drawings
图1为本发明集成卡的示意图。Fig. 1 is a schematic diagram of the integrated card of the present invention.
图2为本发明读卡器的立体图。Fig. 2 is a perspective view of the card reader of the present invention.
图3为图2所示读卡器的示意图。FIG. 3 is a schematic diagram of the card reader shown in FIG. 2 .
图4为本发明集成卡组合的工作示意图。Fig. 4 is a working schematic diagram of the integrated card combination of the present invention.
图中各零部件的附图标记说明如下:The reference signs of each component in the figure are explained as follows:
集成卡1、片式卡11、存储卡12、磁条13、读卡器2、卡座21、卡槽211、读卡装置22、读卡驱动电路23、1-n管理按钮24、转接口25、CPU26、分层授权模块261、晶振27、无线收发模块28、微处理控制单元 2611、筛板管理接口2612、1-n加解密控制筛板2613、密码管理单元2614、加密信道2615、非加密信道2616、数据交换接口2617、服务器5、PC电脑6、工作站7。Integrated card 1,
具体实施方式Detailed ways
为能进一步了解本发明的特征、技术手段以及所达到的具体目的、功能,解析本发明的优点与精神,藉由以下结合附图与具体实施方式对本发明的详述得到进一步的了解。In order to further understand the features, technical means, specific objectives and functions achieved by the present invention, and to analyze the advantages and spirit of the present invention, a further understanding of the present invention can be obtained through the following detailed description of the present invention in conjunction with the accompanying drawings and specific embodiments.
请参阅图1及图2,本发明集成卡组合包括一集成卡1及一读卡器2。Please refer to FIG. 1 and FIG. 2 , the integrated card combination of the present invention includes an integrated card 1 and a card reader 2 .
集成卡1包括一片体卡11及一存储卡12。片式卡11与信用卡同规格,可为普通银行卡、健康卡、商务积分卡等,主要用途是为了在需要发生相关业务时对持卡人进行身份识别,片式卡11具有用以存储识别信息的磁条13或SIM卡(图中未示)。片式卡11上开设有一收容槽(图中未标示),收容槽距离片式卡11最近俩边缘小于5mm。存储卡12可为TF卡,存储卡12内嵌固定于片式卡11的收容槽内,存储卡12的厚度不大于片体卡11的厚度,其厚度范围为0.8~1.2mm。其体卡中可加有一个连接电路单元(图中未示),用于连接片式卡11的磁条或SIM卡与存储卡12,这个连接电路单元的连接状态不限于是断开或连通,连通状态时可以使两卡有物理连接。The integrated card 1 includes an
请参阅图2及图3,读卡器2包括一卡座21、一CPU26、一读卡模块、晶振27、一无线收发模块28或一转接口25;读卡模块、晶振27、无线收发模块28或转接口25分别与CPU26相连;所述CPU26置有一分层授权模块261,为一配置数据加解密安全算法芯片;Please refer to Fig. 2 and Fig. 3, card reader 2 comprises a
卡座21呈一长方体状,长约45mm~60mm,宽约20mm~30mm,高约5mm~8mm,卡座21的两相邻侧面向内开设有一矩形卡槽211,卡槽211至少有两面为开放面。读卡模块包括一读卡装置22及一读卡驱动电路23,读卡装置22设置于卡槽211的槽壁上对应存储卡的位置处,读卡装置22具有微微向卡槽211内凸起的读卡触点(图中未标示)。读卡驱动电路23连接读卡装置22、CPU26。卡座表面设有若干管理按钮1~N,可处理存储卡12存储数据中按基于XML标准格式的敏感保密信息,N个按钮按照排列组合分别解密所对应加密级别的保密信息,从而实现分层授权共享的功能。转接口25设置于卡座21的一端,可以旋转或伸缩等可方式活动于卡座21的内外,转接口25为普通USB接口。The
参阅图4,分层授权模块261包括:用于识别、处理不同层次信息的微处理器控制单元2611、用于配置1-n层次加解密筛板单元2613、筛板管理接口2612、可供加密数据传输的加密信道单元2615、可供非加密数据传输的非加密信道单元2616、用于管理密钥的密钥管理单元2614、用于供PC终端通讯的数据交换接口2617;筛板管理接口2612、密钥管理单元2615、数据交换接口2617分别与微处理器控制单元2611相连,筛板管理接口2612与1-n层次加解密筛板单元2613相连,密钥管理单元2615与加密信道2615单元、非加密信道单元2616相连。Referring to Fig. 4, the
本技术方案中,分层授权模块261,采用共认的对称、非对称、DES、RSA、GPG、IDES信息加解密、数字签名技术和认证机制。集成卡组合通过有线或无线方式与服务器连接获取数据,在本装置内配置强密、弱密、公开等不同层别的信息,然后将处理后的数据供PC终端选择性地读取,集成卡并没有直接被读取到计算机内存中,从而保障个人隐私安全,In this technical solution, the
本实施例中,集成卡组合与服务器5或集成卡组合与终端通讯(PC电脑6或工作站7)的数据传输接口,其物理层可以是有限或无限任一一种方式,实现相互之间的数据传输;需说明的是,所述无线收发模块28具体为,使用红外线技术、蓝牙技术、WiFi技术、WiMAX技术或无线射频识别(RFID,Radio Frequency Identification)技术的无线收发器。为避免外界信号干扰,推荐使用短距定向无线传输技术,比如RFID技术、红外线技术等具有良好的定向特点。除了这里列举的几种无线技术,本技术方案还可以使用其它无线技术。In this embodiment, the physical layer of the data transmission interface between the integrated card combination and the server 5 or the integrated card combination and the terminal communication (PC computer 6 or workstation 7) can be limited or unlimited, so as to realize mutual communication Data transmission; it should be noted that the
本实施例中,集成卡组合通过有线或无线方式与服务器连接获取数据,在本装置内配置强密、弱密、公开等不同层别的信息,其一方法为:将个人信息中需保护的敏感信息指定为敏感信息段(Ss),执行保护时,利用读卡器的1-n层次加解密命令按键对Ss作虚拟命名为隐私保护带(Pb),利用某密码(K),可再经对称加密算法(如DES)对Ss的明文(P)进行加密后,使Ss信息变为密文(S),与此同时,Ss在个人信息的原来位置不变,并变从角色Ss变换称为Pb,使原Ss的P数据变为Pb的S密文合并后的数据,使原来的Ss的P存储形式变为了Pb的S。当需阅时再用同一密码K将Pb的S解密还原出明文P,供阅于自己或共享至拟供阅方。此方法生成的密文可以供阅于任何一个获得S并知道K和加密所用对称算法方,此方法在无唯一供阅的定向性限制,适合于个人和各服务等机构双方或多方性共享,并且在交换含有密文S的信息同时,必须交换加密时所用过的密码K,才能解密出加密前的明文P,可以将这些加密过的信息按执行标准指定的位置写入到个人信息中。In this embodiment, the integrated card combination is connected to the server in a wired or wireless way to obtain data, and different levels of information such as strong secret, weak secret, and public are configured in the device. One method is: the personal information that needs to be protected Sensitive information is designated as a sensitive information segment (Ss). When performing protection, use the 1-n level encryption and decryption command buttons of the card reader to virtual name Ss as a privacy protection band (Pb), and use a certain password (K) to After the plaintext (P) of Ss is encrypted by a symmetric encryption algorithm (such as DES), the information of Ss becomes ciphertext (S). It is called Pb, so that the P data of the original Ss becomes the combined data of the S ciphertext of Pb, and the P storage form of the original Ss becomes the S of Pb. When it is necessary to read, use the same password K to decrypt the S of Pb and restore the plaintext P, which can be read by yourself or shared with the party who intends to read. The ciphertext generated by this method can be read by any party who obtains S and knows K and the symmetric algorithm used for encryption. This method has no unique directional restrictions for reading, and is suitable for two-way or multi-party sharing by individuals and various service organizations. And while exchanging the information containing the ciphertext S, the password K used for encryption must be exchanged to decrypt the plaintext P before encryption, and the encrypted information can be written into the personal information at the location specified by the implementation standard.
另一方法为:将个人信息档案中需保护的敏感信息指定为敏感信息段(Ss),执行保护时,利用读卡器的1-n层次加解密命令按键对Ss作虚拟命名为隐私保护带(Pb),利用从电子签名认证中心(CA)同步或预先获得或在卡匣内预设好的居民本人公钥(Kb),可采用非对称算法(如RSA算法)结合对称加密算法(如DES)对Ss的明文(P)进行加密操作:先用Kb将对称加密算法所需的初始数据值(Di)进行非对称算法加密后所产生的密文(S1),然后用对称加密算法对P作加密运算后产生密文(S2),与此同时,Ss在个人信息的原来位置不变,并从角色Ss变换称为Pb,使原Ss的P数据变为Pb的S1&S2密文合并后的数据,使原来的Ss的P存储形式变为了Pb的S1&S2。当需阅时,先从Pb的S1&S2分离出S1和S2,再用居民本人用其私钥(Kv)对S1经非对称算法解密还原出Di,再用Di及生成S2的对称加密算法对S2进行相同的算法后,还原出原来的明文P,供阅于自己或共享至拟供阅方。此方法可以供阅于任何一个获得S1&S2并知道Kv和加密所用非对称算法方,通常情况下,只有掌握Kv的居民本人才能将隐私保护带Pb的密文S1&S2解密还原出敏感信息段Ss中明文,此时的明文才可能供自阅或可供阅于他方,从而限制非指定阅方的滥权或越权地阅读,此方法有很强的唯一供阅的定向性,适用于:(1)居民可将有隐私权的信息加以保密并按执行标准指定的位置写入到个人信息档案中,在需要的时候供自己打开阅读,继而也可供阅于其他服务机构。(2)各服务机构定向性地向居民提供定向保密性发布或协定为定向保密性共享的信息,并且信息收发双方无须交换加密时所用过的密码Kb,因为Kb已经发布于外界,可以将这些加密过的信息按执行标准指定的位置写入到居民个人信息档案中,(3)居民可以选择来自于特定他方或服务机构按执行标准指定的位置写入、并且属于唯一供阅于自身的定向共享保密性信息,经其本人亲自解密后,首先供阅于自己,继而也可供阅于其他服务机构。Another method is: designate the sensitive information to be protected in the personal information file as a sensitive information segment (Ss), and use the 1-n level encryption and decryption command buttons of the card reader to virtual name Ss as a privacy protection segment when performing protection. (Pb), using the resident's own public key (Kb) that is synchronized or pre-obtained from the electronic signature certification center (CA) or preset in the card box, an asymmetric algorithm (such as the RSA algorithm) can be combined with a symmetric encryption algorithm (such as DES) to encrypt the plaintext (P) of Ss: first use Kb to encrypt the initial data value (Di) required by the symmetric encryption algorithm with an asymmetric algorithm to encrypt the ciphertext (S1), and then use the symmetric encryption algorithm to encrypt After P is encrypted, the ciphertext (S2) is generated. At the same time, the original position of Ss in the personal information remains unchanged, and it is transformed from the role of Ss to Pb, so that the P data of the original Ss becomes Pb's S1&S2 ciphertext after the combination data, so that the original P storage form of Ss is changed to S1&S2 of Pb. When it is necessary to read, first separate S1 and S2 from S1 & S2 of Pb, then use the resident himself to use his private key (Kv) to decrypt S1 through an asymmetric algorithm to restore Di, and then use Di and the symmetric encryption algorithm that generates S2 to encrypt S2 After performing the same algorithm, the original plaintext P is restored, which can be read by oneself or shared with the intended party. This method can be used by any party who obtains S1&S2 and knows Kv and the asymmetric algorithm used for encryption. Usually, only the residents who know Kv can decrypt the ciphertext S1&S2 with privacy protection band Pb to restore the plaintext in the sensitive information segment Ss At this time, the plain text may be available for self-reading or for others to read, so as to limit the abuse or ultra-authority reading of non-designated readers. This method has a strong unique orientation for reading, and is applicable to: (1) Residents can keep confidential information with privacy rights and write it into personal information files according to the location specified by the implementation standards, which can be opened and read by themselves when needed, and then can be read by other service agencies. (2) Each service agency provides residents with targeted confidential release or agreed confidentiality shared information, and the sending and receiving parties do not need to exchange the password Kb used for encryption, because Kb has already been released to the outside world, and these The encrypted information is written into the personal information files of residents according to the location specified by the implementation standard. (3) Residents can choose to write from a specific other party or service organization according to the location specified by the implementation standard, and it belongs to the only direction for their own reading. Shared confidential information, after being deciphered by the person himself, is first made available to himself, and then made available to other service organizations.
再一方法为:将个人信息中需保护的敏感信息指定为敏感信息段(Ss),执行保护时,对Ss作虚拟命名(如通过装置的设置功能控制操作)为隐私保护带(Pb),利用从电子签名认证中心(CA)同步或预先获得或在卡匣内预设好的服务机构公钥(Kb),可采用非对称算法(如RSA算法)结合对称加密算法(如DES)对Ss的明文(P)进行加密操作:先用Kb将对称加密算法所需的初始数据值(Di)进行非对称算法加密后所产生的密文(S1),然后用对称加密算法对P作加密运算后产生密文(S2),与此同时,Ss在个人信息的原来位置不变,并从角色Ss变换称为Pb,使原Ss的P数据变为Pb的S1&S2密文合并后的数据,使原来的Ss的P存储形式变为了Pb的S1&S2。当需阅时,先从Pb的S1&S2分离出S1和S2,再用居民本人用其私钥(Kv)对S1经非对称算法解密还原出Di,再用Di及生成S2的对称加密算法对S2进行相同的算法后,还原出原来的明文P,供阅于指定的服务机构方。此方法可以供阅于任何一个获得S1&S2并知道Kv和加密所用非对称算法方,通常情况下,只有掌握Kv的服务机构方能将隐私保护带Pb的密文S1&S2解密还原出敏感信息段Ss中明文,此时的明文才可能供阅于服务机构方,从而限制非指定阅方的滥权或越权地阅读,此方法有很强的唯一供阅的定向性,适用于:(1)各服务机构可将有属于己权的信息加以保密并之按执行标准指定的位置写入到健康档案中,在需要的时候供己方打开阅读,继而也可供阅于其他服务机构,(2) 居民定向性地向服务机构提供定向保密性发布或协定为定向保密性共享的信息,并且信息收发双方无须交换加密时所用过的密码Kb,因为Kb已经发布于外界,可以将这些加密过的信息按执行标准指定的位置写入到居民电子健康档案,也可以将这些加密过的信息传输至特定机构,(3)各机构可通过检索,选择来自于他方按执行标准指定的位置写入、并且属于唯一供阅的定向共享保密性信息,经服务等机构所持的私钥解密后,首先供阅于机构自身。Another method is: designate the sensitive information that needs to be protected in personal information as a sensitive information segment (Ss), and when performing protection, give a virtual name to Ss (such as controlling the operation through the setting function of the device) as a privacy protection band (Pb), Using the public key (Kb) of the service organization that is synchronized or pre-obtained from the electronic signature certification center (CA) or preset in the cassette, an asymmetric algorithm (such as RSA algorithm) combined with a symmetric encryption algorithm (such as DES) can be used to encrypt Ss The plaintext (P) is encrypted: first use Kb to encrypt the initial data value (Di) required by the symmetric encryption algorithm with an asymmetric algorithm to encrypt the ciphertext (S1), and then use the symmetric encryption algorithm to encrypt P After that, the ciphertext (S2) is generated. At the same time, the original position of Ss in the personal information remains unchanged, and it is changed from the role Ss to Pb, so that the P data of the original Ss becomes the combined data of the S1&S2 ciphertext of Pb, so that The original P storage form of Ss is changed to S1&S2 of Pb. When it is necessary to read, first separate S1 and S2 from S1 & S2 of Pb, then use the resident himself to use his private key (Kv) to decrypt S1 through an asymmetric algorithm to restore Di, and then use Di and the symmetric encryption algorithm that generates S2 to encrypt S2 After performing the same algorithm, the original plaintext P is restored and provided to the designated service organization. This method can be used by anyone who obtains S1&S2 and knows Kv and the asymmetric algorithm used for encryption. Usually, only the service organization that has Kv can decrypt and restore the ciphertext S1&S2 with privacy protection band Pb to the sensitive information segment Ss Clear text, at this time, the plain text may be available for reading by the service organization, thereby restricting the abuse or ultra-authority reading of non-designated readers. This method has a strong unique orientation for reading, and is applicable to: (1) each service Institutions can keep the information of their own rights confidential and write it into the health file in the location specified by the implementation standards, which can be opened and read by themselves when needed, and then can be read by other service agencies. (2) Resident Orientation Provide the service agency with directional confidentiality release or agreement for directional confidentiality sharing, and the sending and receiving parties do not need to exchange the encrypted password Kb, because Kb has been released to the outside world, and the encrypted information can be executed according to the The location specified by the standard is written into the electronic health file of the residents, and the encrypted information can also be transmitted to a specific institution. (3) Each institution can choose to write in the location specified by the implementation standard from other parties through retrieval and is unique. The targeted shared confidential information for reading is first made available to the organization itself after being decrypted by the private key held by the service and other institutions.
综合采用上述第几种方法,并根据敏感信息分层管理的需求,配以相应操作设置及其处理:将选定近核第一层的同一层所列需求的多个敏感信息分别按上述适当方法按段逐一处理后,所得密文作为第一层所需的管理结果,然后,将近核第二层的同层所列需求的多个敏感信息也分别按近核第一层方法处理,如此类推,可以形成多层的加密。Comprehensively adopt the above-mentioned first several methods, and according to the needs of sensitive information layered management, with corresponding operation settings and processing: multiple sensitive information listed in the same layer of the selected near-core first layer shall be appropriately processed according to the above-mentioned After the method is processed one by one, the obtained ciphertext is used as the management result required by the first layer, and then the multiple sensitive information required by the same layer of the second layer near the core are also processed according to the method of the first layer near the core, so By analogy, multiple layers of encryption can be formed.
请参阅图1至图4,当集成卡1插入读卡器2的卡槽211内时,卡槽211的矩形结构可使集成卡1一次插入到位,存储卡12抵接读卡装置的22的读卡触点,读卡器2经CPU26启动驱动电路23读取存储卡12内的信息,并根据个人所需处理加解密过程,其方法参上述实施例,最后转接口25或无线收发模收28转接存储卡12与电脑等外界数据处理终端,进行信息数据的交换。Referring to Fig. 1 to Fig. 4, when the integrated card 1 is inserted into the
综上所述,本发明通过片式卡11上内嵌固定存储卡12,读卡器2的卡槽211内对应存储卡12的位置处设置读卡装置22,从而实现读取、管理集成卡1的存储卡12内的信息。持卡者通过集成卡组合,以有线或无线方式与服务器5连接获取数据,并在本装置内分别以强密、弱密、公开等不同层别的信息配置,然后将处理后的数据供PC终端选择性地读取,方便用户对自身信息的安全掌控。In summary, the present invention embeds and fixes the
以上所述实施例仅表达了本发明的部分实施方式,于此所揭示的实施例与所有观点,应被视为用以说明本发明,其描述较为具体和详细,但并不能因此而理解为对本发明范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。因此,本发明的保护范围应以权利要求为准,并涵盖其合法均等物。The above-described embodiments only express some implementations of the present invention. The embodiments and all viewpoints disclosed herein should be regarded as used to illustrate the present invention. The descriptions are more specific and detailed, but should not be interpreted as limitations on the scope of the invention. It should be pointed out that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention, and these all belong to the protection scope of the present invention. Accordingly, the scope of protection of the present invention should be determined by the claims, including their legal equivalents.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110095101A CN102201070B (en) | 2011-04-15 | 2011-04-15 | Integrated card, card reader and combination thereof |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110095101A CN102201070B (en) | 2011-04-15 | 2011-04-15 | Integrated card, card reader and combination thereof |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102201070A true CN102201070A (en) | 2011-09-28 |
| CN102201070B CN102201070B (en) | 2012-10-03 |
Family
ID=44661729
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201110095101A Active CN102201070B (en) | 2011-04-15 | 2011-04-15 | Integrated card, card reader and combination thereof |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN102201070B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102436571A (en) * | 2011-12-22 | 2012-05-02 | 卢康 | Wireless storage card reader |
| CN102663470A (en) * | 2012-05-07 | 2012-09-12 | 东莞广州中医药大学中医药数理工程研究院 | Integrated card, card reader and combination thereof |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1845185A (en) * | 2006-02-05 | 2006-10-11 | 杨杰 | Method and system for online verification of anti-counterfeiting |
| CN101425145A (en) * | 2007-10-29 | 2009-05-06 | 钛文科技股份有限公司 | Card reading device of IC chip card |
| CN101655921A (en) * | 2009-08-06 | 2010-02-24 | 吴利明 | Slot type integrated card |
| CN101789068A (en) * | 2009-01-22 | 2010-07-28 | 深圳市景丰汇达科技有限公司 | Card reader safety certification device and method |
-
2011
- 2011-04-15 CN CN201110095101A patent/CN102201070B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1845185A (en) * | 2006-02-05 | 2006-10-11 | 杨杰 | Method and system for online verification of anti-counterfeiting |
| CN101425145A (en) * | 2007-10-29 | 2009-05-06 | 钛文科技股份有限公司 | Card reading device of IC chip card |
| CN101789068A (en) * | 2009-01-22 | 2010-07-28 | 深圳市景丰汇达科技有限公司 | Card reader safety certification device and method |
| CN101655921A (en) * | 2009-08-06 | 2010-02-24 | 吴利明 | Slot type integrated card |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102436571A (en) * | 2011-12-22 | 2012-05-02 | 卢康 | Wireless storage card reader |
| CN102663470A (en) * | 2012-05-07 | 2012-09-12 | 东莞广州中医药大学中医药数理工程研究院 | Integrated card, card reader and combination thereof |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102201070B (en) | 2012-10-03 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2583212B1 (en) | Mass storage device memory encryption methods, systems, and apparatus | |
| CN101010677A (en) | Portable storage device and method for exchanging data | |
| CN102542130B (en) | A private resident health record card and card reading device with layered authorization | |
| CN102081713B (en) | An Office System for Preventing Data Leakage | |
| KR20100096090A (en) | Mobile smartcard based authentication | |
| CN101308475A (en) | Safe mobile storage system and usage method thereof | |
| CN103310169A (en) | A method and protection system for protecting SD card data | |
| JP2012511265A (en) | Processing module operation method, processing module, and communication system | |
| TW201433996A (en) | Data protection in near field communications (NFC) transactions | |
| CN100454321C (en) | USB device with data memory and intelligent secret key and control method thereof | |
| CN105227299A (en) | A kind of data encrypting and deciphering management equipment and application process thereof | |
| CN104063333A (en) | Encrypted storage equipment and encrypted storage method | |
| CN102222254A (en) | Intelligent safe digital card | |
| CN206515828U (en) | The data storage device of safety encryption | |
| CN103606223A (en) | Card authentication method and device | |
| CN102053926A (en) | Storage device and data security control method thereof | |
| CN105389526A (en) | Mobile hard disk integrating encrypted area and non-encrypted area and data storage method for mobile hard disk | |
| US9154481B1 (en) | Decryption of a protected resource on a cryptographic device using wireless communication | |
| CN102201070A (en) | Integrated Cards, Card Readers and Combinations | |
| CN102768646A (en) | Serial port hard disk encryption and decryption device | |
| US20140223195A1 (en) | Encrypted Storage Device for Personal Information | |
| CN102831080A (en) | A data security protection method for a mobile storage device | |
| CN201662809U (en) | Conversion device for data encryption and decryption | |
| TW201828133A (en) | Intelligent hardware safety vehicle capable of performing identity verification and access control on users | |
| CN104104753A (en) | Double t card mobile phone |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| EE01 | Entry into force of recordation of patent licensing contract | ||
| EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20110928 Assignee: Dongguan Zhi Zhen Health Technology Co., Ltd. Assignor: Dongguan Institute of Traditional Chinese Medicine Engineering,Guangzhou Univers Contract record no.: 2018990000266 Denomination of invention: Integrated card, card reader and combination of integrated card and card reader Granted publication date: 20121003 License type: Common License Record date: 20180929 |