Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, background and system for accessing a SAM device

A technology of access location and background, applied in the electronic field, can solve the problems of tampering, high manufacturing cost of card readers, theft of ID card root certificate, etc.

Active Publication Date: 2019-10-01
TENDYRON CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because each front-end ID card does not have the card reader of SAM module all is provided with SAM module, therefore, the manufacturing cost height of existing front-end ID card does not have the card reader of SAM module; And, a SAM module can only be to a reader The identity card information read by the module is used for identity verification. Therefore, the utilization rate of the existing front-end ID cards without SAM modules is low. To solve this problem, there is currently an improved solution: the front-end ID cards do not have SAM The card reader of the module no longer includes the SAM module, and the SAM module is set on the background side, thereby improving the utilization rate of the SAM module
[0003] However, since the network environment in the background is an open network, any card reader without a SAM module can request the background to connect to the SAM module, which greatly increases the security risk of the SAM module. Once the SAM module is illegal and does not have a SAM If the card reader of the module is compromised, the root certificate of the ID card stored in the SAM module will be stolen or even tampered by criminals, and the consequences will be disastrous

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, background and system for accessing a SAM device
  • A method, background and system for accessing a SAM device
  • A method, background and system for accessing a SAM device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] This embodiment provides a method for accessing a SAM device, such as figure 1 shown, including the following steps:

[0065] S101. The background receives a request for accessing a SAM device sent by a card reader without a SAM module;

[0066] As an optional implementation in this embodiment, the request for accessing the SAM device at least includes: first authentication data, first signature data, and a digital certificate of a card reader without a SAM module, wherein the first authentication The data at least includes: ID card basic information (can be in the form of plaintext or ciphertext), and the first signature data includes: the signature data obtained by signing the first authentication data with its private key by a card reader without a SAM module, which is obtained by Therefore, authentication information may be provided for subsequent authentication of a request to access the SAM device.

[0067] As an optional implementation in this embodiment, the b...

Embodiment 2

[0129] Such as figure 2 As shown, this embodiment provides a background 10 , including: a receiving device 101 , an authentication device 102 and an access device 103 .

[0130] In this embodiment, the receiving device 101 receives a request for accessing the SAM device sent by a card reader without a SAM module, and the request for accessing the SAM device includes at least: first authentication data and first signature data, and a card reader without a SAM module. The digital certificate of the card reader of the module, wherein, the first authentication data includes at least: ID card basic information (can be the form of plain text or cipher text), the first signature data includes: the card reader that does not have SAM module utilizes its private The signature data obtained by signing the first authentication data with the key, thus, can provide authentication information for the subsequent authentication of the access SAM device request; the authentication device 102 i...

Embodiment 3

[0190] This embodiment provides two systems for accessing the SAM device based on the background provided in Embodiment 2. Figure 4 and Figure 5 It is a schematic structural diagram of a system for accessing a SAM device.

[0191] Such as Figure 4 As shown, this embodiment provides a system for accessing a SAM device, and the system includes: the background 10 in Embodiment 2 (such as image 3 As shown), the card reader 20 without the SAM module, in this embodiment, the card reader without the SAM module can be the card reader without the SAM module for the ID card that is not provided with the SAM module, for reading Get the relevant information of the ID card, such as the basic information of the ID card, the ciphertext of the ID card information, etc., among which:

[0192] The card reader 20 without a SAM module is used to send a request for accessing the SAM device and access information to the background.

[0193] In this embodiment, the card reader 20 without the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for accessing an SAM device, a background, and a system for accessing an SAM device. The method comprises the following steps: the background receives a request for accessing an SAM device sent by a card reader having no SAM module; the background verifies the legitimacy of the digital certificate of the card reader having no SAM module, uses the public key of the card reader having no SAM module and first authentication data to authenticate first signature data, and confirms the authenticity of an ID card according to the basic information of the ID card, and a secure channel is established between the background and the card reader having no SAM module after the digital certificate of the card reader having no SAM module passes verification, the first signature data passes authentication and the authenticity of the ID card is confirmed; and after the secure channel is established, the background sends access information, which is to be sent by the card reader having no SAM module to the SAM device, to the SAM device. According to the invention, illegal attack of the card reader having no SAM module to the SAM device can be avoided. In addition, the background carries out risk control management for the card reader having no SAM module, and the safety of the SAM device is further enhanced.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method, background and system for accessing a SAM device. Background technique [0002] The existing front-end card reader without a SAM module has at least two modules, including a reading module and a SAM (security control for identity card authentication) module. Because each front-end ID card does not have the card reader of SAM module all is provided with SAM module, therefore, the manufacturing cost height of existing front-end ID card does not have the card reader of SAM module; And, a SAM module can only be to a reader The identity card information read by the module is used for identity verification. Therefore, the utilization rate of the existing front-end ID cards without SAM modules is low. To solve this problem, there is currently an improved solution: the front-end ID cards do not have SAM The card reader of the module no longer includes the SAM module, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 李明
Owner TENDYRON CORP