Method for performing identity re-authentication on special operation of information system by IC (integrated circuit) card technology

A special operation and information system technology, applied in transmission systems, digital data authentication, electrical components, etc., can solve problems such as failure to identify normally, high cost of biometric authentication systems, and legal users cannot log in.

Inactive Publication Date: 2015-03-18
ZHENJIANG JINGYING SOFTWARE TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Biometric authentication is based on biometric identification technology, affected by the maturity of the current biometric identification technology, the use of biometric authentication still has great limitations
First of all, the accuracy and stability of biometric identification needs to be improved, especially if the user's body is affected by injuries or stains, it often leads to the failure of normal identification, resulting in the situation that legitimate users cannot log in
Secondly, due to the large investment in research and development and the small output, the cost of the biometric authentication system is very high. At present, it is only suitable for some occasions with very high security requirements, such as banks and troops, and it cannot be widely promoted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] The comprehensive toll collection system of the vehicle management office adopts the C / S development mode. When the user performs free operation, the system must carry out IC card authentication. Only after the authentication is passed, the free operation is allowed.

[0019] The process of this embodiment is:

[0020] When the system administrator authorizes the user, if there is free operation authority, the system prompts to insert an IC card, and the system reads the unique serial number of the IC card and writes it into the corresponding record of the user. When the user performs free operation, he must Insert the IC card for identity authentication, and only after passing can the free operation be performed.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to actual application of a method for performing identity re-authentication on a special operation (such as a free operation of a toll system and an information deletion operation of an illegal system) in a software system in the industry of public security traffic control. The method comprises the following steps: binding an IC (integrated circuit) card to a user with special operation authority; binding a unique sequence number of the IC card to information of the user; when the user performs the special operation, firstly checking whether the IC card is inserted or not, if not, withdrawing from the system; and if so, verifying whether the unique sequence number of the IC card is correct or not, and performing the operation only if the unique sequence number is correct, thereby avoiding the malicious operation by other people due to leakage of a password and further preventing huge loss.

Description

technical field [0001] The present invention relates to the practical application of the identity re-authentication method in the public security traffic management industry during special operations in the software system (such as free operation of the toll system and information deletion operation of the illegal system). Bind the unique serial number of the IC card with the user information. When the user performs a special operation, first check whether the IC card is inserted. If not, the system exits; if there is, verify whether the unique serial number of the IC card is correct. It can be operated to avoid malicious operations by others due to password leakage, resulting in huge losses. Background technique [0002] In the information system, the means of user identity authentication can be roughly divided into these three types. Proving a person’s identity only by meeting one condition is called single-factor authentication. Since only one condition is used to judge t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/34
Inventor 曾凡玉
Owner ZHENJIANG JINGYING SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products