Commercial cipher algorithm based security access control system and implementation method thereof

A technology of commercial encryption algorithm and implementation method, which is applied in the direction of instruments, time registers, single input port/output port registers, etc., can solve the problems that the access control system is easy to be cracked and copied, and achieve high commercial security level, Conducive to safety, the effect of ensuring safety

Active Publication Date: 2015-02-25
TOEC ANCHEN INFORMATION TECH
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a security access control system based on a commercial cryptographic algorithm and its implementation method, which fundamentally solves the problems existing in the existing access control system by implementing a secure card issuing process and a three-level bidirectional card swiping authentication process in the control of the access control system. The hidden dangers of being cracked and copied meet the security and confidentiality needs of important domestic access control, and can be widely used in important departments in various industries such as government agencies, military, finance, and telecommunications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Commercial cipher algorithm based security access control system and implementation method thereof
  • Commercial cipher algorithm based security access control system and implementation method thereof
  • Commercial cipher algorithm based security access control system and implementation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] In order to ensure the safety and reliability of the access control system, the embodiment of the present invention provides a security access control system based on commercial cryptographic algorithms, see figure 1 , the secure access control system includes: an access control application system 1 and a key management and card issuing system 2 .

[0046] The access control application system 1 includes: a business secret security access control card reader 11 , a business secret security access control controller 12 , a business secret CPU card 13 and a business secret access control management software 14 .

[0047] The key management and card issuing system 2 includes: a business secret card issuer 21 and an access control key management system 22 .

[0048] The commercial security access control card reader 11 includes: a first antenna module 111 , a first radio frequency interface module 112 , a first main control chip 113 , a first SAM (secure access) module 114 ...

Embodiment 2

[0065] In order to solve the realization of the security access control system, the embodiment of the present invention provides a method for implementing a security access control system based on commercial cryptographic algorithms, see the following description for details:

[0066] see figure 1 with figure 2 , the first SAM module 114 card issuing process in the commercial secret security access control card reader 11 is: the access control key management system 22 uses the commercial secret card issuer 21 to issue a card to the first SAM module 114 in the commercial secret security access control card reader 11 . When issuing a card, it is first necessary to verify the PIN code of the second password module 214 in the commercial secret card issuer 21. After the verification of the PIN code is successful, the commercial secret card issuer 21 obtains the PIN code from the first SAM module 114 in the commercial secret security access control card reader 11. Module identific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a commercial cipher algorithm based security access control system and an implementation method thereof. The commercial cipher algorithm based security access control system and the implementation method thereof have the advantages that a secure card issuing process and a three-level bidirectional card swiping authentication process are achieved in access control system control, potential safety hazards that existing access control systems are cracked and copied easily are overcome fundamentally, requirements of domestic important access control security and confidentiality are met, and the security access control system and the implementation method thereof can be widely applied to important departments and locations in all industries such as government agencies, military affairs, finance and telecommunications.

Description

technical field [0001] The invention relates to the field of access control systems, in particular to a secure access control system based on a commercial encryption algorithm and an implementation method thereof. Background technique [0002] At present, 90% of the access control products in our country use the UID number of the original IC card or the ID number of the ID card to make the access control card, and use the read-only characteristics of the ID and IC card for identification and use, without encryption authentication or development of special encryption key, little attention is paid to the encryption and authentication between the access control card and the access control card reader, and the design of the security key system is lacking, and the logic encryption card is an easy-to-copy carrier, which makes this type of access control easy to be cracked and destroyed in a very short time. copy. Illegal crackers only need to use the "access control duplicator" t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 胡双喜吕前进高友李一良王家良梁友仁杨才山吴彤
Owner TOEC ANCHEN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products