The Cracking Method of the Non-Touched IC Card

Article Preview

Abstract:

The core principle of the operation of the non-touched IC card is the mechanism of the three times of identification. In the 16 sectors, the key and the control for storage and access of each sector are independent. With the key generated by the Crypto-1 privacy encryption algorithm, the location of the keys and the table of the control to storage and access are given beforehand. The Crypto-1 privacy encryption algorithm can be used to manage the information of the non-touched IC card by C# calling code in the managed execution environment or DLL calling code in the unmanaged execution environment. As a conclusion, the technical monopoly can be broke down by feasible methods.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2678-2683

Citation:

Online since:

June 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Xiu-Hua Han, Jin LiLi-Li Zheng, Transit trip dynamic characteristics based on IC card information. Journal of Jilin University (Engineering and Technology Edition), 2009. 39(SUPPL.1): pp.124-128.

Google Scholar

[2] Shoshi Hashimoto, Recent developments in IC card tickets in Japan. Public Transport International, 2004. 53(6): pp.38-39.

Google Scholar

[3] Hirofumi HottaRyoji Ono, NTT's RD strategy for IC card technologies. NTT's RD strategy for IC card technologies. NTT R and D, 2000. 49(12): pp.728-732.

Google Scholar

[4] Ying Li, et al. Research and implementation of IC card read-write device with USB interface.Journal of Northeastern University, 2004. 25(11): pp.1046-1049.

Google Scholar

[5] Bin Ma, et al. Application of C# serial port class between PC and IC card read-writer in serial communications.Journal of Shenyang Jianzhu University (Natural Science), 2008. 24(3): pp.508-511.

Google Scholar

[6] Yoshimitsu Ohtani. International standardization of contactless IC card.NTT Review, 2002. 14(5): pp.61-63.

Google Scholar

[7] Akio Shiibashi, High-speed processing in wired-and-wireless integrated autonomous decentralized system and its application to IC card ticket system. Naoki MizoguchiKinji Mori. Innovations in Systems and Software Engineering, 2007. 3(1): pp.53-60.

DOI: 10.1007/s11334-006-0014-8

Google Scholar

[8] Koji Tsuru, et al., Combination IC card system. NTT R and D, 2000. 49(12): pp.745-749.

Google Scholar

[9] Jun Wang, et al. Adjustment and control for replacing IC card module based on dynamic supervision control network in centralized heating system. Journal of Shanghai Jiaotong University, 2009. 43(2): pp.330-332.

Google Scholar

[10] Jiaorong Wu, Jiandong Feng JianhongYe. Capacity analysis of magnetic card and contactless IC card automatic fare gate in railway stations.Journal of Tongji University, 2010. 38(1): pp.85-91.

Google Scholar

[11] Hideaki Yamamoto, et al. Trends in ISO/IEC standardization of IC card technology. NTT Technical Review, 2007. 5(6).

Google Scholar

[12] Yigang Zhang, et al. The design of fingerprint vault based IC card access control system.WSEAS Transactions on Electronics, 2006. 3(3): pp.117-120.

Google Scholar

[13] Qiuyong Zhao, Xuemei YinFu Duan,. The research of an IC card consumption system with integrated video surveillance and intelligence analysis.Journal of Computational Information Systems. 7(16): pp.5932-5939.

Google Scholar