A method, background and system for accessing a SAM device
A technology of access location and background, applied in the electronic field, can solve the problems of tampering, high manufacturing cost of card readers, theft of ID card root certificate, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0064] This embodiment provides a method for accessing a SAM device, such as figure 1 shown, including the following steps:
[0065] S101. The background receives a request for accessing a SAM device sent by a card reader without a SAM module;
[0066] As an optional implementation in this embodiment, the request for accessing the SAM device at least includes: first authentication data, first signature data, and a digital certificate of a card reader without a SAM module, wherein the first authentication The data at least includes: ID card basic information (can be in the form of plaintext or ciphertext), and the first signature data includes: the signature data obtained by signing the first authentication data with its private key by a card reader without a SAM module, which is obtained by Therefore, authentication information may be provided for subsequent authentication of a request to access the SAM device.
[0067] As an optional implementation in this embodiment, the b...
Embodiment 2
[0129] Such as figure 2 As shown, this embodiment provides a background 10 , including: a receiving device 101 , an authentication device 102 and an access device 103 .
[0130] In this embodiment, the receiving device 101 receives a request for accessing the SAM device sent by a card reader without a SAM module, and the request for accessing the SAM device includes at least: first authentication data and first signature data, and a card reader without a SAM module. The digital certificate of the card reader of the module, wherein, the first authentication data includes at least: ID card basic information (can be the form of plain text or cipher text), the first signature data includes: the card reader that does not have SAM module utilizes its private The signature data obtained by signing the first authentication data with the key, thus, can provide authentication information for the subsequent authentication of the access SAM device request; the authentication device 102 i...
Embodiment 3
[0190] This embodiment provides two systems for accessing the SAM device based on the background provided in Embodiment 2. Figure 4 and Figure 5 It is a schematic structural diagram of a system for accessing a SAM device.
[0191] Such as Figure 4 As shown, this embodiment provides a system for accessing a SAM device, and the system includes: the background 10 in Embodiment 2 (such as image 3 As shown), the card reader 20 without the SAM module, in this embodiment, the card reader without the SAM module can be the card reader without the SAM module for the ID card that is not provided with the SAM module, for reading Get the relevant information of the ID card, such as the basic information of the ID card, the ciphertext of the ID card information, etc., among which:
[0192] The card reader 20 without a SAM module is used to send a request for accessing the SAM device and access information to the background.
[0193] In this embodiment, the card reader 20 without the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


