![]()
专利摘要:
The invention provides a device, a system and a method for duplicating a wireless access card. The wireless access card replication system includes: a wireless access card reader, a wireless access card writing device; a processor connected to the wireless access card reader and the wireless access card writer; and a memory. The memory includes instruction code, executable by the processor, for: determining a first key of a first wireless access card; determining residual keys of the first wireless access card using nested authentication and the first key; read data from the first card using the wireless access card reader, the first key and the residual keys; and write the data to a second card using the wireless access card writer, the first key, and the residual keys. 公开号:FR3039296A1 申请号:FR1657128 申请日:2016-07-25 公开日:2017-01-27 发明作者:Simon Yorkston 申请人:Info Wise Ltd; IPC主号:
专利说明:
SYSTEM AND METHOD FOR DUPLICATING A WIRELESS ACCESS CARD. . TECHNICAL AREA The present invention relates to the duplication of wireless access cards. BACKGROUND TECHNOLOGY Locks and physical keys are used to limit access to buildings and other sites. In particular, a lock is typically placed on a door, so as to restrict access through the door unless a corresponding key is used. Keys and locks generally cooperate on the basis of the physical form of the key. In particular, a lock cylinder is configured to act on the basis of the physical form of the key. Thus, a key can easily be copied by duplicating the shape of the key. More recently, wireless access cards have become popular because they allow for more refined access control. For example, wireless access cards may be used to provide access to a building during office hours, but not after these hours, and may also be used to record access to the building. Such refined access control is, in general, impossible with usual keys alone. However, a problem with wireless access cards is that they are difficult to copy. For example, wireless access cards Mifare are encrypted, which prevents the cards from being easily read or duplicated. As a result, instead of being able to copy access cards, cardholders generally need to obtain additional unique cards that are programmed to provide the same access as the original card. This is usually expensive, time consuming and inconvenient. As a result, there is a need for an improved wireless access card duplication system and method. It will be clearly understood that, if a prior art publication is indicated here, this reference does not mean that it is accepted that the publication forms part of the current general knowledge of the art in Australia or any other country. SUMMARY OF THE PRESENT INVENTION The present invention relates to wireless access card duplication systems and methods that can, at least partially, overcome at least one of the aforementioned disadvantages or provide consumers with a useful or commercial choice. In view of the above, in a first aspect, the present invention broadly relates to a wireless access card duplication system comprising: a wireless access card reader; a wireless access card writing device; a processor coupled to the wireless access card reader and the wireless access card writer; and a memory including an executable code executable by the processor for: determining a first key of a first wireless access card; determining residual keys of the first wireless access card using nested authentication and the first key; read data from the first card using the wireless access card reader, the first key and the residual keys and write the data to a second card, using the wireless access card writer, the first key and the residual keys. Preferably, the first and second wireless access cards are wireless access cards. Suitably, the wireless access cards may be Mifare wireless access cards. Preferably, the first and second wireless access cards comprise a plurality of data segments, each data segment being associated with an encryption key. Preferably, the first key is determined using a known key database. Suitably, each key of the database can be tested on the first wireless access card. Alternatively, the first key can be determined using a brute force search. The brute force search may consist of trying to read data from the map to obtain several valid responses from the map; and exhaustively selecting a key that corresponds to the valid responses. Valid responses can be determined according to parity bits. Alternatively, the brute force search may consider known characteristics of the card to reduce the number of keys that are tried. The system can be configured to try to determine the first key from the database, and perform a brute force search only if the first key can not be determined from the database. Preferably, the at least one residual key is written in the known key database. Preferably, the system is configured to determine the type of the first wireless access card. The steps of determining the first key of the first wireless access card can be performed according to the types. The card type can, in general, be determined by trying to read data headers from the card. Preferably, the system is configured to determine a frequency of the first wireless access card. Data can be read from the wireless access card at the determined frequency. Preferably, determining the at least one residual key consists in authenticating a first sector of the card with the first key, and substantially triggering an authentication of a second sector of the card to obtain a response from the card, a key among the at least one residual keys being determined according to the answer. Preferably, the response is an encrypted challenge from the card. Preferably, several candidate keys are generated according to the encrypted challenge, and are checked against at least one other encrypted challenge to obtain the key of the at least one residual keys. Preferably, determining the at least one residual key furthermore substantially triggers an authentication of all the residual sectors of the card to obtain responses from the card, the keys of at least one residual key are determined according to the answers. . Preferably, the system comprises a screen. The screen may be for displaying instructions to the user. The screen may be for displaying to the user the progress of a map duplication. The screen may consist of a touch screen, allowing the user to interact with the system. A graphical user interface may be displayed on the screen, the reading of the first card being triggered by the graphical user interface. The system can be configured to check the contents written in the second card. In particular, the data of the second card can be read, and the read data can be compared with the data of the first card. The second card may include an unalterable card identifier field, wherein an identifier from an unalterable card identifier field of the first card is written to the unalterable card identifier field of the second card. The second card may include a card emulator. The card emulator may include data corresponding to several of the first cards. The system may include a data interface for establishing communication with an external system. Communication can be done via the Internet. The system can be authenticated online. In particular, the system may require online authentication of an account before reading or writing to or on a card. Preferably, a unique identifier is associated with the system and an account. The unique identifier can be determined from a system hardware. For example, the unique identifier may be determined in part according to a system CPU ID. The system may include a single card holder associated with both the wireless access card reader and the wireless access card writer. Alternatively, separate card holders are associated with the wireless access card reader and the wireless access card writer. Preferably, the system can be configured to write multiple copies of a card without reading the original card again. In a second aspect, the present invention broadly discloses a wireless access card duplicating device comprising: a wireless access card reader; a wireless access card writing device; a processor coupled to the wireless access card reader and the wireless access card writer; and a memory including an executable code executable by the processor for: determining a first key of a first wireless access card; determining residual keys of the first wireless access card using nested authentication and the first key; read data from the first card using the wireless access card reader, the first key and the residual keys and write the data to a second card, using a wireless access card writer, the first key and the residual keys. According to another aspect, the present invention broadly discloses a method for duplicating wireless access card, comprising: determining a first key of a first wireless access card; determining residual keys of the first wireless access card using nested authentication and the first key; read data from the first card using a wireless access card reader, the first key and the residual keys; and write the data to a second card using a wireless access card writer, the first key, and the residual keys. BRIEF DESCRIPTION OF THE DRAWINGS Various embodiments of the present invention will be described with reference to the accompanying drawings, in which: Figure 1 shows a wireless access card duplication system according to an embodiment of the present invention; Fig. 2a is a perspective view of a wireless access card duplicating device according to an embodiment of the present invention; Fig. 2b is a side view of the wireless access card duplicator of Fig. 2a; Fig. 3 shows a wireless access card duplication method according to an embodiment of the present invention; and Fig. 4 shows a method of determining encryption keys of a wireless access card according to an embodiment of the present invention. Preferred features, embodiments and variants of the present invention may be obtained from the following detailed description, which provides sufficient information for the skilled person to practice the invention. The detailed description should in no way be construed as limiting the scope of the foregoing summary of the present invention. DESCRIPTION OF EMBODIMENTS Figure 1 shows a wireless access card duplication system 100, in accordance with an embodiment of the present invention. System 100 allows users, such as security consultants, locksmiths and / or residents, to easily and quickly duplicate wireless access cards for keyless entry systems. The system 100 includes a wireless card reader / writer 105, which is configured to read and write data from wireless access cards. Examples of such wireless access cards include the family of MIFARE cards (including Mifare 1K, Mifare 4K, Mifare 8K, Ultralight Mifare, Mifare Ultralight C, Mifare Pro) NTAG card family (including NTAG210, NTAG212 , NTAG213, NTAG215, NTAG216). The reader / card writer 105 is connected to a processor 110, which in turn is connected to a memory 115 and a database 120. The memory 115 comprises an instruction code executable by the processor 110 for read and write cards, and the database 120 includes encryption keys, as described in more detail below. In use, an original card 125 is read by the system 100. This includes the determination of encryption keys, and the reading of the original card 125 using the determined encryption keys. A blank card 130 is then written using the data read from the original card 125. As will be readily appreciated by those skilled in the art, the reader / card writer 105, the processor 110, the memory 115, and the database 120 may form part of a single device. In such a case, the device can be portable, and thus used to duplicate cards on the fly. Fig. 2a is a perspective view of a wireless access card duplicating device 200 according to an embodiment of the present invention. Figure 2b is a side view of the wireless access card duplicating device 200. The wireless access card duplicating device 200 may be similar or identical to the system 100 of Figure 1. The device 200 includes a housing 205 for holding a card reader / device, such as the card reader / writer 105, a processor such as the processor 110, and a memory such as the memory 115. The housing 205 is formed of impact-resistant plastic to allow the device to be easily transported without damage. The housing 205 defines a wireless access card holder 210 for receiving a wireless access card. The wireless access card holder 210 is located directly above the reader / card writer, and is configured to hold a card adjacent to the reader / card writer. The device 200 further includes a touch screen 215, for displaying data to the user, and receiving inputs from the user. As described in more detail below, a graphical user interface can be used to allow a user to interact with the system, including to trigger a reading of a card, trigger a write to a card, provide accreditations to a user. user (such as the username and / or password), or interact with the device 200 in any other suitable manner. The device 200 further includes a LAN port in the form of an Ethernet jack RJ-45 220, and a pair of universal serial bus (USB) ports 225. The LAN port and the USB ports can be used to communicate with external systems, peripherals, or the like. For example, the LAN port may be coupled to a router providing Internet connectivity to the device 200. Similarly, the USB ports 225 may be used to connect a wireless MoDem, keyboard, or other suitable device to the device 200. . In use, the user places the card to be copied onto the wireless access card holder 210, and triggers a reading of the card data using the touch screen 215. In particular, a graphical user interface (GUI) is displayed, which includes a virtual button "start scanning". In short, the GUI guides the user through the card duplication process. Upon selecting the start scan button, the card data is read, as described in more detail below, and a progress bar is presented to the user on the touch screen 215. The progress bar provides instant feedback to the user indicating that the card is being scanned, which helps prevent the card from being removed prematurely from the wireless access card holder 210. At the end of the reading of the data from of the card, it is indicated on the touch screen 215 that the reading is complete, and that the user can remove the card. The graphical user interface then instructs the user to put a blank card on the wireless access card holder 210, and after this writing the data on the blank card is triggered. A progress bar is presented to the user on the touch screen 215, and upon completion of writing to the card, a message indicates this to the user. Thus, the user is notified of the progress of the writing of the card, as it exists, which avoids the problem due to the fact that the user prematurely removes the card access card holder without wire 210, and prevents completing the writing of the card. As described in more detail below, the device 200 may try to verify the data written on the card. In accordance with some embodiments, the device 200 automatically reads the written card upon completion, and compares the written data with the recorded data to verify that all data has been correctly written to the card. In accordance with other embodiments (not shown), the device 200 includes first and second wireless access card media, the first for the card being copied and the second for the blank card. This allows a completely automated duplication because the device is able to read the card being copied and automatically write the data from it to the blank card. The device 200 is compact and portable. Thus, the device can be transported and used as needed, including on-site, in mobile offices, or the like. Alternatively, the device may be attached to a counterpart, desk, or the like, to prevent unwanted movement. Fig. 3 shows a method of duplicating wireless access cards 300, according to an embodiment of the present invention. The card duplication method 300 may be incorporated into the system 100 of Figure 1 and / or the device 200 of Figure 2 to provide card duplication functionality. In step 305, a frequency of the card is determined. Typically, access cards operate at 125 kHz or 13.56 MHz, and therefore these frequencies are generally tested. In step 310, the type of the card is determined. Examples of card types include the Mifare 1K card as described above. The type of card is generally determined by attempting to read card headers using the previously determined frequency and known data protocols. If the card is an encrypted card type, encryption keys of the card are determined in step 315. In particular, the keys used to encrypt data on the card are determined at this step, which enables the keys to be recovered. card data. Figure 4, below, provides additional details of the method for determining card encryption keys that can be used in conjunction with method 300. In step 320, the card data is read. As will be readily appreciated by those skilled in the art, if the card type is an unencrypted card type, the method may proceed directly from step 310 to step 320, without determining any encryption key, such as this is not necessary for reading the data. The map can include multiple data segments, and each data segment can be read individually. Each segment of data can also be associated with a different encryption key. In the case of the Mifare Classic wireless access card, for example, the memory is divided into sectors, each sector having 64 bytes and having its own 48-bit encryption key. In step 325, the data from step 320 is written to the card. In the case where the card is encrypted, the data can be written to the card using the encryption key identified in step 315. The new card can then be used in place of the original card. In accordance with some embodiments, the data from the original map includes an identifier field, which contains an identifier that is unique to the map and immutable. In such a case, the new card may include a mutable identifier field, which makes it possible to write on it the identifier of the original card, making it possible to make perfect duplicates of the original card. According to some embodiments, the data of the new card is read, and the data read from the new card is compared with the data read from the old card. If any differences are found, a message may be displayed to the user. In some embodiments, the card may be automatically reset and written again. Fig. 4 shows a method 400 of determining encryption keys of a wireless access card, according to an embodiment of the present invention. As described above, method 400 may be used to determine the encryption keys at step 315 of method 300. The memory of the Mifare Classic wireless access card, for example, is divided into sectors, with each sector having its own 48-bit encryption key. To read data from a specific sector, the reader must first authenticate the sector using the encryption key associated with that sector. Thus, in order to read the entire wireless access card, all the encryption keys must be known. In step 405, it is determined whether one of the card encryption keys is in a key database. In particular, the database is stored and maintained for known wireless access card keys, and when a new key is determined, it is added to the database. If no known key is used on the wireless access card, a key of the access card is determined using a brute force search. In particular, read tests are performed on a sector using random data such as the key and parity bits. When the parity bits are correct, which is a possibility of 1/256 for 8 parity bits, the wireless access card responds to an encrypted 4-bit error code. By repeating the process, sufficient data can be obtained to validate a brute force attack, and each key combination can be tested to determine which produces the correct parity bits and a response received regarding the data obtained above. Those skilled in the art will readily note that the brute force attack need not necessarily consider each combination of keys, but may instead use a known feature of the card to reduce the number of keys considered, and thus increase the number of keys. process speed. As an illustrative example, predictions may be made in relation to certain bits of a bit stream, if it is found that some bits do not depend on other bits in the bit stream, which may reduce the number of bits in the bit stream. keys needed to test. Similarly, small levels of variability in bit stream creation can also be exploited to reduce the number of keys required to be tested. Since a brute force attack is intense at the processor level, it is desirable to avoid this step. As the pre-known key collection becomes larger, the possibility of being able to avoid a brute force search is reduced. In step 410, the residual keys are determined using nested authentication and the pre-known key or key determined in step 410 In the case of a Mifare Classic wireless access card, mentioned above, an encryption key known to one sector can be used to obtain information about the encryption key of another sector. In particular, a known encryption key can be used to authenticate the sector with which it is associated, and subsequently attempts to authenticate another sector provide about 32 bits of information regarding the secret key of that sector. This is because the random number generator has only a 16-bit state, because card parity bits disclose information, and because the card random number generator is in synchronization with the communication delay. . When the known encryption key is used to authenticate the first sector, the subsequent test 1 to identify the second sector is the result of a card challenge that is sent encrypted. Then, several candidate keys, in this case 216 candidate keys (just above 65,000) are produced based on the challenge and are verified using a second and possibly a third authentication attempt. All candidate keys can usually be tested in less than one second using ordinary hardware. In most cases, a candidate key can be determined based on two authentication attempts, however in some cases a third authentication attempt may be required if the intersection of the first and second tests results in more than one authentication attempt. 'a key. The above process is then repeated for all remaining sectors of the map. Although step 405 is shown before step 410 in the process flow, it will be readily apparent to those skilled in the art that step 410 may be performed in parallel with step 405. In such a case, no delay will occur. occurs by waiting for step 405 to complete before triggering step 410. An example of key determination of a Mifare Classic wireless access card is highlighted in Flavio D. Garcia, Peter Rossum, Roel Verdult, and Ronny Wichers Schreur "Wirelessly Pickpocketing a Mifare Classic Card, "IEEE Symposium on Security and Privacy, IEEE, 2009, which is incorporated herein by reference. In accordance with some embodiments, known keys are grouped in the database by a statistical record to reduce the time of the key test process. Improvements in key search can be obtained because, generally, each company that produces badges uses its own combination of keys. According to some embodiments, the system is connected to an online payment system. In such a case, a subscription may be used or each copy made involves a cost, and / or where the use of the system is paid by day, week, month or the like. As a representative example, a user may have to pay a monthly subscription fee as well as an individual card copy fee per card that is copied by the system. In accordance with some embodiments, the wireless access card replicator includes a unique identifier that is associated with an account. The unique identifier can be a central processing unit (CPU) identifier (ID) associated with the device, or by any other suitable means. Thus, the wireless access card duplicating device can identify itself online without necessarily needing details about a user. Alternatively, a username and password can be used as the means of authentication. The system may require access to the Internet to validate the device to be initialized, or validate the device to be able to write to a card. This is particularly advantageous when subscription templates may change over time, as the user may be forced to update the system to continue using a basic functionality of the device. Such subscription models can be used to enhance the cost of the wireless access card duplicating device. According to some embodiments, each new card is associated with a unique identifier, to prevent the use of counterfeit cards. Validation is performed on new cards before data is written to the new card, and data is only written after successful validation. In particular, a database of valid cards, and their associated identifiers, is kept centrally, and the respective identifier is stored on each valid card. When a user tries to use a new card with the system, the identifier is read from the card, and compared with the valid identifiers of the database, to ensure that the badge is genuine. If the identifier is authentic, then it is removed from the database (or marked as "used"), so that it can not be used to later check other cards, to prevent copying of multiple badges with a single identifier. In other embodiments, the blank cards can be rewritten. In such a case, to prevent fraudulent blank cards from being used with the system, while allowing legitimate cards to be written multiple times, a fingerprint (or hash) made on the basis of the card data and the card identifier, which is saved in the database. The fingerprint is then used later to verify that the same card is being rewritten. Alternatively, off-line variations of the system may be provided, where a one-time fee is provided for indefinitely using the technology. This is particularly advantageous when very many cards are copied, or when Internet access may be unavailable. In accordance with some embodiments, the system may be configured to provide multiple copies of the same card without requiring the card to be read multiple times. In such a case, the data of the card is stored in a memory and written as many times as necessary. According to some embodiments, the system allows remote management, for example to provide maintenance or help. In particular, each device can be remotely accessed through a reverse Secure Shell (SSH) tunnel, allowing a technician to remotely control the device for maintenance or assistance. Similarly, software updates may be provided automatically or manually over the Internet, or by a software update on a USB key. Updates can add functionality to the device, improve performance, fix deadlocks, and recover a complete system in the event of a software defect. The system can, at least partially, be based on a cloud. For example, data may be sent to a remote server to determine key data, and keys may be returned to the device for decoding. This is particularly advantageous for intensive processor activities such as brute force attacks. The term "map" is primarily used in the description above. However, wireless cards do not have to be in the form of a regular card, but can instead have any suitable shape. As a representative example, a wireless card may be in the form of a key ring. In this specification and in the claims (if any), the term "comprising" and its derivatives including "includes" and "includes" includes each of the established sets but does not exclude the introduction of a or more additional sets. Throughout the present description, a reference to "an embodiment" indicates that a particular element, structure, or feature described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearance of "in one embodiment" sentences in various places in the present description does not necessarily always refer to the same embodiment. In addition, the particular elements, structures, or features can be combined in any suitable manner in one or more combinations. In accordance with the articles, the present invention has been described in a language more or less specific to structural or method elements. It should be understood that the invention is not limited to specific features shown or described since the means described herein constitute preferred embodiments of the invention. The invention is, therefore, claimed in any of its forms or modifications within the scope of the appended claims (if any) properly interpreted by those skilled in the art.
权利要求:
Claims (12) [1" id="c-fr-0001] A wireless access card duplication system comprising: a wireless access card reader; a wireless access card writing device; a processor coupled to the wireless access card reader and the wireless access card writer; and a memory including an executable code executable by the processor for: determining a first key of a first wireless access card; determining residual keys of the first wireless access card using nested authentication and the first key; read data from the first card using the wireless access card reader, the first key and the residual keys and write the data to a second card, using the wireless access card writer, the first key and the residual keys. [2" id="c-fr-0002] The system of claim 1, wherein the first and second wireless access cards comprise a plurality of data segments, each data segment being associated with an encryption key. [3" id="c-fr-0003] 3. The system of claim 2 wherein one. first key of the first wireless access card is determined using a known key database. [4" id="c-fr-0004] The system of claim 2, wherein a first key of the wireless access card is determined using a brute force search on the first wireless access card. [5" id="c-fr-0005] The system of claim 4, wherein the brute force search is to attempt to read data from the first wireless access card to obtain several valid responses from the card; and exhaustively selecting a key that corresponds to the valid responses. [6" id="c-fr-0006] The system of claim 5, wherein the valid responses are determined in accordance with parity bits. [7" id="c-fr-0007] 7. System according to. claim 1, wherein determining the residual keys consists in authenticating a first sector of the card with the first key, and subsequently initiating an authentication of a second sector of the card to obtain a response from the card, a key among the residual keys being determined in accordance with the answer. [8" id="c-fr-0008] The system of claim 7, wherein the response is an encrypted challenge from the card. [9" id="c-fr-0009] The system of claim 8, wherein a plurality of candidate keys are generated according to the encrypted challenge, and are checked against at least one other encrypted challenge to obtain the key from the at least one residual keys. [10" id="c-fr-0010] The system of claim 9, wherein determining the residual keys is to trigger an authentication of all remaining sectors of the card to obtain responses from the card, the keys of the residual keys being determined according to the responses. [11" id="c-fr-0011] The system of claim 1, further comprising a data interface, for validating communication with an external system. [12" id="c-fr-0012] The system of claim 1, further configured to require online authentication before reading or writing to a card using a unique identifier associated with the system.
类似技术:
公开号 | 公开日 | 专利标题 FR3101167A1|2021-03-26|METHOD OF USING A DEVICE FOR UNLOCKING ANOTHER DEVICE US9253131B2|2016-02-02|System and method for authentication of communications FR3039296A1|2017-01-27| FR2647924A1|1990-12-07|METHOD FOR VERIFYING INTEGRITY OF SOFTWARE OR DATA, AND SYSTEM FOR IMPLEMENTING SAID METHOD US9882719B2|2018-01-30|Methods and systems for multi-factor authentication WO2013021107A1|2013-02-14|Method, server and system for authentication of a person FR2989799A1|2013-10-25|METHOD FOR TRANSFERRING A DEVICE TO ANOTHER RIGHTS OF ACCESS TO A SERVICE EP2772869B1|2017-07-19|Method and system for cryptographic processing using sensitive data FR2978002A1|2013-01-18|METHOD OF AUTHENTICALLY SIGNATURE OF A WORKING DOCUMENT EP1266359A1|2002-12-18|Biometric identification method, portable electronic device and electronic device acquiring biometric data therefor EP3731117A1|2020-10-28|Methods for enrolment of data from an identity document of an individual and for authenticating an identity document EP2795830B1|2020-04-08|Method of encrypted data exchange between a terminal and a machine US11282315B2|2022-03-22|Wireless access tag duplication system and method EP3262553B1|2019-04-10|Method of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers FR2913551A1|2008-09-12|User authenticating method for use in Internet network, involves authenticating authentication server by token and vice versa for each of web pages requested by user, by executing control script e.g. java script, in computer EP3742699B1|2022-03-09|Method for strong authentication of an individual EP3731116B1|2021-08-11|Method of authenticating an identification document of an individual and authenticating said individual. WO2014135519A1|2014-09-12|System and method for managing at least one online application, portable user object communicating via a radio protocol and remote device of the system Uzun2021|Security and Privacy in Biometrics-Based Systems EP1262860A1|2002-12-04|System and method for user authentication EP3803670A1|2021-04-14|A software application and a computer server for authenticating the identity of a digital content creator and the integrity of the creator's published content EP2413260A1|2012-02-01|Mobile telephone equipped with a secure identification system EP3272064A1|2018-01-24|Chained authentication via connected devices FR3028977A1|2016-05-27|METHOD FOR PREVENTING IDENTITY USURPATION DURING TRANSACTION AND SYSTEM THEREFOR
同族专利:
公开号 | 公开日 US10706653B2|2020-07-07| EP3326296A1|2018-05-30| AU2021201689A1|2021-04-08| CA2993346A1|2017-02-02| US20180253922A1|2018-09-06| AU2016299960A1|2018-02-01| US20200294335A1|2020-09-17| FR3039296B1|2021-12-03| AU2016299960B2|2020-12-17| EP3326296A4|2019-03-27| WO2017015698A1|2017-02-02|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 IL111151A|1994-10-03|1998-09-24|News Datacom Ltd|Secure access systems| JP3566630B2|2000-07-28|2004-09-15|Necマイクロシステム株式会社|Card system, IC card and card reader / writer used for it| JP2002245427A|2001-02-20|2002-08-30|Toshiba Corp|Ic card, ic card terminal device and method for duplicating ic card| US7188089B2|2002-07-26|2007-03-06|Way Systems, Inc.|System and method for securely storing, generating, transferring and printing electronic prepaid vouchers| JP4242398B2|2006-06-02|2009-03-25|フェリカネットワークス株式会社|Data communication system, information processing terminal, IC card, read / write device, and program| ITPN20070040A1|2007-05-29|2008-11-30|Bianchi 1770 S P A|"METHOD FOR THE DUPLICATION OF KEYS WITH ELECTRONIC CODE"| ITMI20080537A1|2008-03-28|2009-09-29|Incard Sa|DEVICE AND METHOD OF INITIALIZING AN IC CARD.| US8144725B2|2008-05-28|2012-03-27|Apple Inc.|Wireless femtocell setup methods and apparatus| JP5780361B2|2012-05-29|2015-09-16|株式会社村田製作所|Electronic key system and electronic equipment| JP5854138B2|2012-06-21|2016-02-09|富士通株式会社|Information processing system, information processing method, and communication device| US10706653B2|2015-07-24|2020-07-07|Info Wise Limited|Wireless access tag duplication system and method|US10706653B2|2015-07-24|2020-07-07|Info Wise Limited|Wireless access tag duplication system and method| JP6662134B2|2016-03-18|2020-03-11|日本電気株式会社|Tag management device, tag management method, and program| CN112149767A|2020-09-11|2020-12-29|杭州安恒信息技术股份有限公司|Automatic copying equipment for access control card|
法律状态:
2017-07-21| PLFP| Fee payment|Year of fee payment: 2 | 2018-07-28| PLFP| Fee payment|Year of fee payment: 3 | 2019-01-25| PLSC| Publication of the preliminary search report|Effective date: 20190125 | 2019-07-23| PLFP| Fee payment|Year of fee payment: 4 | 2020-07-27| PLFP| Fee payment|Year of fee payment: 5 | 2022-01-28| PLFP| Fee payment|Year of fee payment: 6 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 AU2015902950A|AU2015902950A0|2015-07-24|Wireless Access Tag Duplication System and Method| PCT/AU2016/050420|WO2017015698A1|2015-07-24|2016-05-27|Wireless access tag duplication system and method| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|