A data security storage method applicable to IC cards and two-dimensional codes
A technology of data security storage and QR code, which is applied in the field of data security storage, can solve the problem of low data security and achieve the effect of enhancing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0064] In order to make the purpose, technical solution and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described below in conjunction with the accompanying drawings.
[0065] The overall module composition and interaction of the present invention are as follows: figure 1 shown.
[0066] The key center 110 is the core server of the system and also the security center of the entire system, and is composed of an authentication module 111 , a key management module 112 and an authorization module 113 . The card making / code making device 101 and the card reading / code reading device 131 are called the terminals of the system, and the key center 110 assigns a unique number to all terminals, then generates a pair of RSA public and private keys, and distributes the private keys to the terminals as Its unique identity key, while saving the public key in the database of the key center. This pair of RSA public...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com