Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

IPA security certification-based access control system

An access control system and security authentication technology, which is applied to the public key of secure communication, user identity/authority verification, instruments, etc., can solve problems such as low security, data eavesdropping on communication lines, and no data encryption measures introduced in the access control system , to achieve the effect of improving data security transmission and solving the problem of security reduction

Active Publication Date: 2012-10-03
广东南方信息安全产业基地有限公司 +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While T5557 and HITAG-2 are directly transmitted in plain text, the security is lower
[0005] (2) The data is stolen after the card reader is stolen: the single-chip microcomputer and memory in the card reader usually contain IC card information and access control information. If it is stolen, it is very easy to steal information from it and clone the access control card
[0006] (3) The data of the communication line is eavesdropped: the usual access control system does not introduce data encryption measures, if criminals monitor the communication line, it is easy to obtain confidential information
However, because the USB Key must be in electrical contact, it is not convenient for actual use
Invention 200610098625.1 "Application method of IC card in access control system based on financial norms" adopts contact IC card, whose specification is proprietary to the banking system, and the data format is confidential, which is not only inconvenient to use but also difficult to apply in systems other than banks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IPA security certification-based access control system
  • IPA security certification-based access control system
  • IPA security certification-based access control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] like figure 1 Shown is the composition block diagram of principle of the present invention, mainly comprises radio frequency card 1, card reader and management computer 8, and wherein card reader comprises radio frequency interface module 2, storage module 3, keyboard display module 4, communication module 5, single-chip microcomputer module 6. The single-chip microcomputer module 6 carries out data reading and writing through the radio frequency interface module 2 and the radio frequency card 1, and is connected to the management computer 8 through the communication module 5 access communication network 7; the keyboard display module 4 is connected to the keyboard signal end of the single-chip microcomputer module 6; the storage module 3 is connected to the single-chip microcomputer Data signal terminal of module 6.

[0029] Radio frequency card 1 realizes authentication and data access with single-chip microcomputer module 6 by radio frequency interface module 2; Aft...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an IPA security certification-based access control system. When a radio frequency (RF) card closes to a card reader, a singlechip accesses the data in the card by a RF interface module in a random ciphertext manner, and data are encrypted and sent in accordance with an IPA-based combined public key sent by a management computer, the management computer decrypts and stores the received data by using a corresponding combined private key. The access control system has the advantages that RF card information is read in the random ciphertext manner, access control information is encrypted by an elliptic function encryption algorithm encrypts and a public / private key pair are generated on the basis of IPA, thereby improving data security transmission, realizing the elimination of potential safety hazards from three aspects of the RF card, an access card reader and a data transmission network; an IPA-based security authentication system is adopted to produce and manage keys, a lot of public / private key pairs are generated, thereby solving the problem that the reusing of a pair of key reduces security.

Description

technical field [0001] The invention relates to an access control system, in particular to an access control system based on IPA (Identity-based Public-key Authentication) security authentication. Background technique [0002] The application of the access control management system has been very extensive, and its security risks have attracted increasing attention. For departments with high security requirements, once a problem occurs, the consequences will be very serious. [0003] The existing access control system mainly has the following problems: [0004] (1) The access control card is copied (that is, cloned): Most of the existing access control machines use such as MF1, T5557 and HITAG-2. In 2007, Karsten Nohl et al. provided a cracking method for the MF1 card, making it possible to clone the MF1 card. However, T5557 and HITAG-2 are directly transmitted in plain text, which is less secure. [0005] (2) The data is stolen after the card reader is stolen: the single...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32G07C9/00
Inventor 杨振野余智文杨劼学陈坤城吴达义谭光雷
Owner 广东南方信息安全产业基地有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products