Check patentability & draft patents in minutes with Patsnap Eureka AI!

ID card reading method and system

A technology of ID cards and certificates, applied in the field of ID cards, can solve the problems of complex implementation and high cost

Active Publication Date: 2019-02-15
TENDYRON CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, banks, stations and other industries that need to use ID card information reading usually need to deploy a large number of card readers and verification security control modules locally, and corresponding correspondence needs to be set between card readers and verification security control modules. The implementation of the scheme is more complicated and the cost is higher

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ID card reading method and system
  • ID card reading method and system
  • ID card reading method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] This embodiment provides a method for reading an ID card;

[0041] figure 1 It is a flow chart of the ID card reading method in this embodiment. The ID card reading method in this embodiment includes the following steps (101-109):

[0042] Step 101: the card reading terminal receives the basic information of the ID card sent by the ID card, performs security processing on the basic information of the ID card, and obtains the first data packet; and sends the first data packet to the authentication verification terminal;

[0043] In this embodiment, the card reading terminal may be a card reader, or other terminals with a card reading function (such as a mobile phone integrated with a card reading function, a USBKEY integrated with a card reading function, etc.).

[0044] In this embodiment, the basic information of the ID card can be the serial number of the ID card, the application data used to indicate the relevant information of the application set in the ID card, t...

Embodiment approach

[0103] As an optional implementation of this embodiment, the card reader terminal sends a card search request to the scheduling device, and after the scheduling device selects the authentication verification terminal, it sends the port number of the selected authentication verification terminal to the card reader terminal. Specifically, there are the following implementation methods: Mode 1: After the scheduling device selects the authentication verification terminal, the port number of the selected certification verification terminal is directly sent to the card reader terminal; Mode 2: the scheduling device carries the port number of the selected certification verification terminal in the card search Send it to the card reader terminal in the request response; method 3: carry the port number of the authentication verification terminal selected by the dispatching device in the card search request and send it to the authentication verification terminal, and the authentication ve...

Embodiment 2

[0148] This embodiment provides another ID card reading method.

[0149] figure 2 It is a working flow chart of an ID card reading method provided in this embodiment. The ID card reading method provided in this embodiment mainly includes the following steps (201-214):

[0150] In this embodiment, the authentication verifier in the cloud authentication platform includes an authenticator and a verifier. Wherein, the authentication terminal may be a security chip, which is used to store digital certificates, private keys, session keys, authentication and decryption keys, and perform encryption and decryption operations to ensure the security of data transmission. The verification end is the verification security control module, which is used to decrypt the ciphertext data read from the ID card to obtain the plain text of the ID card data that can be displayed.

[0151] Step 201: the card reading terminal receives the basic information of the ID card sent by the ID card, perfo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for reading an identity card. The method comprises: an authentication verification end authenticating first authentication data; an identity card authenticating second authentication data; after the identity card authenticating second authentication data is passed, sending identity card data ciphertext to a card reading terminal; the card reading terminal performing safety processing on the identity card data ciphertext, and transmitting the identity card data ciphertext to the authentication verification end, the authentication verification end performing safety verification to obtain the identity card data ciphertext, and decoding the identity card data ciphertext to obtain identity card data cleartext; the authentication verification end performing safety processing on the identity card data cleartext, and then transmitting the identity card data cleartext to the card reading terminal, and the card reading terminal performing safety verification to obtain the identity card data cleartext.

Description

technical field [0001] The invention relates to the field of ID cards, in particular to a method and system for reading ID cards. Background technique [0002] In the existing ID card information reading scheme, the card reader needs to cooperate with the verification security control module to realize the reading and display of the ID card information. For example, banks, stations and other industries that need to use ID card information reading usually need to deploy a large number of card readers and verification security control modules locally, and corresponding correspondence needs to be set between card readers and verification security control modules. The implementation of the scheme is more complicated and the cost is higher. Contents of the invention [0003] The present invention aims to solve / one of the above problems. [0004] The main purpose of the present invention is to provide a method for reading an ID card; [0005] Another object of the present inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/35
CPCG06F21/35G06F21/606
Inventor 李明
Owner TENDYRON CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More