Unlock instant, AI-driven research and patent intelligence for your innovation.

Secret key acquisition method and identity card information transmission method and system

An acquisition method and technology of an acquisition system, applied in the key acquisition method, ID card information transmission method and system field, can solve the problem of stealing or even tampering, low utilization rate of front-end ID card readers, and manufacturing of front-end ID card readers high cost

Active Publication Date: 2016-10-05
TENDYRON CORP
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since each front-end ID card reader is provided with a resident ID card verification safety control module, the manufacturing cost of the existing front-end ID card reader is high; and a resident ID card verification safety control module can only be used for one reader The identity card information read by the module is used for identity verification. Therefore, the utilization rate of the existing front-end ID card reader is low. To solve this problem, there is currently an improvement plan: the front-end ID card reader no longer includes the resident ID card verification security control module, and set the resident ID card verification security control module on the background side, thereby improving the utilization rate of the resident ID card verification security control module
[0003] However, since the network environment in the background is an open network, any card reader can request the background to connect to the security control module for identity card verification, which greatly increases the security risk of the security control module for identity card verification. If the card verification security control module is breached by an illegal card reader, the root certificate of the ID card stored in the resident ID card verification security control module will be stolen or even tampered with by criminals, and the consequences will be disastrous
In addition, since the background side may be equipped with multiple ID card verification security control modules, due to uneven task distribution, some ID card verification security control modules will be idle and some ID card verification security control modules will be overloaded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key acquisition method and identity card information transmission method and system
  • Secret key acquisition method and identity card information transmission method and system
  • Secret key acquisition method and identity card information transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] This embodiment provides two systems, figure 1 A key acquisition system provided in this embodiment, figure 2 A kind of based on the figure 1 The key acquisition system in the transmission system of the ID card information. like figure 2 As shown, the transmission system for ID card information provided by this embodiment includes: a card reading terminal 10, an authentication security control module 30 and a verification security control module 40. In this embodiment, the authentication security control module 40 and the card reading terminal 10 are connected The authentication security control module 30 is added in between, and all the data flowing through the authentication security control module 40 needs to be verified, decrypted, encrypted and other security operations by the authentication security control module 30, and the danger of the data flowing through the authentication security control module 40 To the minimum, the verification security control modu...

Embodiment 2

[0074] This embodiment provides a method for obtaining a key, and the method can adopt the two systems provided in Embodiment 1. like Figure 4 As shown, the method includes the following steps S101-S105:

[0075] S101: The authentication security control module sends authentication data to the authorization server, and the authentication data at least includes: signature data obtained by the authentication security control module signing the signature data to be signed, and a digital certificate for signature verification and a digital certificate for encryption;

[0076] In this embodiment, as an optional implementation in this embodiment, the authentication security control module may be a security chip, such as Z8D64U (National Secret Batch No. SSX43), Z32 (National Secret The batch number SSX20)) has an independent processor and storage unit inside, which can store PKI digital certificates and corresponding private keys, as well as other characteristic data, perform encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret key acquisition method and an identity card information transmission method and system. The secret key acquisition method comprises the steps that an authorization server receives authentication data transmitted by an authentication security control module, and the authentication data at least include signature data obtained in a way that the authentication security control module signs data to be signed, a digital certificate used for signature verification and a digital certificate used for encryption; the authorization server inquires the survival state of the digital certificate used for signature verification and the digital certificate used for encryption, if the survival state is the normal survival state, signature verification is performed on the signature data after the judgment result indicates that the digital certificate used for signature verification and the digital certificate used for encryption belong to the same user, and an authorization secret key is acquired after passing of signature verification; the authorization server encrypts the authorization secret key so that an authorization secret key ciphertext is generated and transmitted to the authentication security control module; and the authentication security control module decrypts the authorization secret key ciphertext so that the authorization secret key is obtained and saved in the random access memory of the authentication security control module.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method for obtaining a key, a method and a system for transmitting ID card information. Background technique [0002] The second-generation resident ID card stores the cipher text of the ID card information, which needs to be decrypted by the verification security control module authorized by the Ministry of Public Security. The existing front-end ID card reader terminal has at least two modules, including a reading module and a resident ID card verification security control module. Since each front-end ID card reader is provided with a resident ID card verification security control module, the manufacturing cost of the existing front-end ID card reader is high; and one resident ID card verification security control module can only read one The resident ID card information read by the module is used for identity verification. Therefore, the utilization rate of the existing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 李明
Owner TENDYRON CORP