Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity card information safety transmission method and system

A technology of information security and transmission method, applied in the field of ID card information security transmission method and system, can solve the problems of vulnerability to attack, waste of time and resources, occupation, etc.

Active Publication Date: 2016-10-12
TENDYRON CORP
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, when going to a bank or a securities institution to handle business, it is necessary to read the information of the ID card multiple times. In the current technology, every time the ID card reader is read, it needs to perform interactive authentication with the background server. During the authentication process, the server will Random passwords are generated to encrypt interactive information. However, this interactive authentication process is vulnerable to attacks. Attackers usually make dictionary guesses on random passwords. This is a "replay attack". When the server is attacked by replay, it can pass The random password generated by itself identifies the replay attack and terminates the process. However, in the current interactive authentication scheme, when the server identifies the replay attack, there are often many interactions and multiple interactions between the card reader and the server. That is to say, when the server recognizes that a certain transaction is an illegal transaction, the transaction has occupied a considerable amount of transaction time and system resources, resulting in waste of time and resources. In addition, due to the large amount of ID card information, In the process of reading the ID card information, the information reading is often interrupted due to factors such as the network or the card reader. Based on the reading mechanism of the ID card information, the card reader needs to re-read the ID card and reconnect with the server. Perform interactive authentication, further causing waste of time and resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity card information safety transmission method and system
  • Identity card information safety transmission method and system
  • Identity card information safety transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] This embodiment provides a method for securely transmitting ID card information. figure 1 A flow chart of a method for securely transmitting ID card information provided in this embodiment, as shown in figure 1 shown, including the following steps:

[0054] S101. The card reader that is not equipped with a SAM (safety control for identity card verification) module receives the card reading instruction, and sends the transmission key generation request to the background server;

[0055] In this embodiment, the card reader that is not provided with the SAM module can be an ID card reader that is not provided with the SAM module, and is used to read ID card information. For ease of description, it is referred to as a card reader hereinafter. The card reader can have an input device such as a button for receiving a card reading instruction, a touch screen, etc. When the user inputs a card reading instruction, the card reader receives the card reading instruction, and the c...

Embodiment 2

[0089] This embodiment provides an ID card information security transmission system. figure 2 A schematic structural diagram of an ID card information security transmission system provided in this embodiment, as shown in figure 2 As shown, the system includes a card reader 201 and a background server 202 that are not provided with a SAM (resident ID card verification safety control) module, wherein:

[0090] The card reader 201 that is not provided with the SAM (resident identity card verification security control) module is used to receive the card reading instruction and send the transmission key generation request to the background server 202;

[0091] In this embodiment, the card reader that is not provided with a SAM module can be an ID card reader that is not provided with a SAM module, and is used to read ID card information. For ease of description, it is referred to as a card reader hereinafter. The card reader 201 can have input devices such as keys and touch scre...

Embodiment 3

[0123] This embodiment provides a method for securely transmitting ID card information. image 3 A flow chart of a method for securely transmitting ID card information provided in this embodiment, as shown in image 3 shown, including the following steps:

[0124] S301: The card reader not equipped with a SAM (safety control for authentication of resident identity card) module receives the card reading instruction, and sends a transmission key generation request to the background server;

[0125] In this embodiment, the card reader that is not provided with a SAM module can be an ID card reader that is not provided with a SAM module, and is used to read ID card information. For ease of description, it is referred to as a card reader hereinafter. The card reader can have an input device such as a key device and a touch screen for receiving card reading instructions. When the user inputs the card reading instruction, the card reader receives the card reading instruction, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity card information safety transmission method and system. The method comprises the steps that a card reader receives a card reading instruction and then transmits a transmission secret key generation request to a background server; the background server generates and transmits a first random factor; the card reader carries out the signing of first to-be-signed data, generates first signature data, and transmits first authentication data; the background server carries out the verification of the validity of a digital certificate of the card reader; and the flow is ended if the verification is not passed. After the card reader receives the first random factor, a private key is used at once to sign the first random factor, and the first random factor is transmitted to the server, thereby enabling the background server to receive and verify the first authentication data in shortest time, improving the authentication efficiency of the background server for the card reader. Therefore, the background server instantly determines whether the card reader is legal at the initial stage of the mutual authentication of the card reader and the background server or not. The flow is ended if the card reader is illegal, thereby preventing illegal transaction from occupying resources of the background server.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and system for securely transmitting ID card information. Background technique [0002] The ciphertext of the ID card information is stored in the second-generation resident ID card, and the security control module authorized by the Ministry of Public Security is required to decrypt the ciphertext of the ID card information stored in the resident ID card. The card reader needs to exchange information with the background server to obtain the plaintext information of the ID card. At present, when going to a bank or a securities institution to handle business, it is necessary to read the information of the ID card multiple times. In the current technology, every time the ID card reader is read, it needs to perform interactive authentication with the background server. During the authentication process, the server will Random passwords are generated to encrypt interacti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L29/06G06K7/00
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products