Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for transmitting ID card information

A transmission system and transmission method technology, applied in the transmission system, electrical components, etc., can solve problems such as uneven task distribution, theft or even tampering, and overloading

Active Publication Date: 2019-09-27
TENDYRON CORP
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since each front-end ID card reader is provided with a resident ID card verification safety control module, the manufacturing cost of the existing front-end ID card reader is high; and a resident ID card verification safety control module can only be used for one reader The identity card information read by the module is used for identity verification. Therefore, the utilization rate of the existing front-end ID card reader is low. To solve this problem, there is currently an improvement plan: the front-end ID card reader no longer includes the resident ID card verification security control module, and set the resident ID card verification security control module on the background side, thereby improving the utilization rate of the resident ID card verification security control module
[0003] However, since the network environment in the background is an open network, any card reader can request the background to connect to the security control module for identity card verification, which greatly increases the security risk of the security control module for identity card verification. If the card verification security control module is breached by an illegal card reader, the root certificate of the ID card stored in the resident ID card verification security control module will be stolen or even tampered with by criminals, and the consequences will be disastrous
In addition, since the background side may be equipped with multiple ID card verification security control modules, due to uneven task distribution, some ID card verification security control modules will be idle and some ID card verification security control modules will be overloaded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for transmitting ID card information
  • A method and system for transmitting ID card information
  • A method and system for transmitting ID card information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] This embodiment provides two systems, figure 1 A key acquisition system provided in this embodiment, figure 2 Provided for this embodiment is based on figure 1 The transmission system of the ID card information of the key acquisition system. Such as figure 2 As shown, the transmission system of the ID card information provided by this embodiment includes: a card reader terminal 10, an authentication safety control module 30 and a verification safety control module 40, and the present embodiment is between the verification safety control module 40 and the card reader terminal 10 An authentication security control module 30 is added in between, and all data flowing through the authentication security control module 40 need to undergo security operations such as verification, decryption, encryption, etc. of the authentication security control module 30, and the risk of the data flowing through the authentication security control module 40 It is minimized, and the veri...

Embodiment 2

[0074] This embodiment provides a method for obtaining a key, which can use the two systems provided in Embodiment 1. Such as Figure 4 As shown, the method includes the following steps S101-S105:

[0075] S101: The authentication security control module sends authentication data to the authorization server, the authentication data at least includes: signature data obtained by the authentication security control module signing the data to be signed, digital certificates for signature verification and digital certificates for encryption;

[0076] In this embodiment, as an optional implementation in this embodiment, the authentication security control module can be a security chip, such as Z8D64U (national secret batch number SSX43), Z32 (national secret batch number) of National Technology Co., Ltd. Batch number SSX20)) has an independent processor and storage unit inside, which can store PKI digital certificates and corresponding private keys, as well as other characteristic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret key acquisition method and an identity card information transmission method and system. The secret key acquisition method comprises the steps that an authorization server receives authentication data transmitted by an authentication security control module, and the authentication data at least include signature data obtained in a way that the authentication security control module signs data to be signed, a digital certificate used for signature verification and a digital certificate used for encryption; the authorization server inquires the survival state of the digital certificate used for signature verification and the digital certificate used for encryption, if the survival state is the normal survival state, signature verification is performed on the signature data after the judgment result indicates that the digital certificate used for signature verification and the digital certificate used for encryption belong to the same user, and an authorization secret key is acquired after passing of signature verification; the authorization server encrypts the authorization secret key so that an authorization secret key ciphertext is generated and transmitted to the authentication security control module; and the authentication security control module decrypts the authorization secret key ciphertext so that the authorization secret key is obtained and saved in the random access memory of the authentication security control module.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and system for transmitting ID card information. Background technique [0002] The ciphertext of the ID card information is stored in the second-generation resident ID card, and the verification security control module authorized by the Ministry of Public Security is required to decrypt the ciphertext of the ID card information stored in the resident ID card. The existing front-end ID card reading terminal has at least two modules, including a reading module and a resident ID card verification security control module. Since each front-end ID card reader is provided with a resident ID card verification safety control module, the manufacturing cost of the existing front-end ID card reader is high; and a resident ID card verification safety control module can only be used for one reader The identity card information read by the module is used for identity verification....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李明
Owner TENDYRON CORP