Secret key acquisition method and identity card information transmission method and system
An acquisition method and technology of an acquisition system, applied in the key acquisition method, ID card information transmission method and system field, can solve the problem of stealing or even tampering, low utilization rate of front-end ID card readers, and manufacturing of front-end ID card readers high cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] This embodiment provides two systems, figure 1 A key acquisition system provided in this embodiment, figure 2 A kind of based on the figure 1 The key acquisition system in the transmission system of the ID card information. like figure 2 As shown, the transmission system for ID card information provided by this embodiment includes: a card reading terminal 10, an authentication security control module 30 and a verification security control module 40. In this embodiment, the authentication security control module 40 and the card reading terminal 10 are connected The authentication security control module 30 is added in between, and all the data flowing through the authentication security control module 40 needs to be verified, decrypted, encrypted and other security operations by the authentication security control module 30, and the danger of the data flowing through the authentication security control module 40 To the minimum, the verification security control modu...
Embodiment 2
[0074] This embodiment provides a method for obtaining a key, and the method can adopt the two systems provided in Embodiment 1. like Figure 4 As shown, the method includes the following steps S101-S105:
[0075] S101: The authentication security control module sends authentication data to the authorization server, and the authentication data at least includes: signature data obtained by the authentication security control module signing the signature data to be signed, and a digital certificate for signature verification and a digital certificate for encryption;
[0076] In this embodiment, as an optional implementation in this embodiment, the authentication security control module may be a security chip, such as Z8D64U (National Secret Batch No. SSX43), Z32 (National Secret The batch number SSX20)) has an independent processor and storage unit inside, which can store PKI digital certificates and corresponding private keys, as well as other characteristic data, perform encr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 