Unlock instant, AI-driven research and patent intelligence for your innovation.

Networking type hand-hold identification method of identity card

An identification method and ID card technology, applied in the field of handheld identification of the second-generation ID card, can solve the problem of not using background database support, and achieve the effect of facilitating on-site management

Inactive Publication Date: 2009-11-18
XIAMEN YAXON NETWORKS CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the current ID card identification method, it can only verify the authenticity of the card itself, without the support of the background database

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Networking type hand-hold identification method of identity card
  • Networking type hand-hold identification method of identity card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] A networked handheld identification method for an ID card of the present invention, in specific implementation, in order to ensure the legitimacy of the user of the handheld terminal, the legitimacy of the handheld terminal, and the legitimacy of the central database, the specific operation process is as follows:

[0010] When a user uses a handheld terminal, the user is required to enter a password (the password is stored in the SIM card) to verify the legal right of the cardholder (SIM card) to use the handheld terminal; when the terminal accesses the private network system, an encrypted Identity verification information, the system verifies the legitimacy of the terminal after decryption, and returns the system reserved information verification code, and the terminal operator makes a judgment on the legitimacy of the system. After the three-party verification is completed, the terminal transmits the encrypted card information to the private network for background data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a networking type hand-hold identification method of an identity card, comprising the following steps: firstly, reading the relevant information of the identity card by a RF card reading device of a hand-hold terminal to verify the truth of the read identity card and uploading the relevant information of the identity card to a central database of a private network through a GSM / CDMA network when in need; then, obtaining the relevant information of the identity card from the central database of the private network and downloading the relevant information of the identity card to a the hand-hold terminal to be displayed, therefore, the relevant information can be obtained from different central databases of the private network according to different users so as to be convenient for the field management of the users.

Description

technical field [0001] The invention relates to a hand-held identification method for a second-generation ID card, in particular to a networked hand-held identification method for a second-generation ID card. technical background [0002] Most of the identification methods of the current second-generation ID card are stand-alone versions, that is, the identification device is not connected to the outside through the Internet or wireless network. According to the current ID card identification method, only the authenticity of the verification card itself can be achieved, and the support of the background database is not utilized. In fact, the huge background private network database itself can have a wealth of information corresponding to ID numbers, such as whether there are fugitives, traffic offenders, etc. Database information, and a method for expanding the terminal to identify the use effect of the device. Contents of the invention [0003] A networked hand-held ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00H04L29/06H04L29/08
Inventor 李江余建成李家祥刘彤陈学炜郑琳
Owner XIAMEN YAXON NETWORKS CO LTD