Access frequency management and control device for identity card authentication information

A technology of access frequency and authentication information, applied in the electronic field, can solve problems such as theft, loss of ID card, and application value that is far from being tapped, so as to avoid security risks, improve security and reliability, and enhance dynamics and real-time effect

Active Publication Date: 2016-10-12
TENDYRON CORP
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current second-generation resident ID card is designed with a built-in smart chip, which is fully capable of realizing identity authentication based on the Internet. However, since its launch in 2004, its application value is far from being tapped. In recent years, ticketing systems have begun to be used on a large scale Internet Identity Authentication and Identification Based on ID Card
[0003] Due to the actual use of ID card-based Internet identity authentication technology, ID cards are lost or stolen, and there are hazards and risks of malicious use of ID cards that are not authorized by the person; at the same time, the transmission of network data is also faced with communication monitoring and data tampering. And the risk of a series of typical cyber attacks such as data replay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access frequency management and control device for identity card authentication information
  • Access frequency management and control device for identity card authentication information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] This embodiment provides a method for processing a request for processing ID card authentication information, such as figure 1 shown, including the following steps:

[0024] S1: Receive the ID card authentication information processing request, the ID card authentication information processing request includes: the encrypted value of the ID card serial number and the serial number of the card reader;

[0025] The ID card processing request is a processing request initiated by the ID card reader. After judging that the ID card processing request is a legal processing request, according to the preset rules, an idle security authentication module is allocated for the ID card processing request. The allocated security authentication module Perform data interaction with the originator of the ID card processing request, where the ID card serial number encryption value is obtained by encrypting the ID card serial number obtained from the ID card reader, and the card reader ser...

Embodiment 2

[0098] This embodiment provides an ID card cloud authentication device, such as figure 2 shown, including:

[0099] The first communication module 201 is configured to receive an ID card authentication information processing request, the ID card authentication information includes: an encrypted value of an ID card serial number and a card reader serial number, wherein the card reader serial number is ID card information Read the serial number of the terminal;

[0100] The ID card processing request is a processing request initiated by the ID card reader. After the ID card cloud authentication platform judges that the ID card processing request is a legal processing request, it allocates an idle security authentication module 210 for the ID card processing request according to preset rules, The assigned security authentication module 210 performs data interaction with the initiator of the ID card processing request, wherein the ID card serial number encryption value is obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access frequency management and control device for identity card authentication information, and the device comprises a fourth communication module which is used for obtaining an access frequency management and control list; a second judgment module which is used for judging whether the access frequency management and control list contains the storage record of the serial number of an identity card in a first preset time interval before the moment when the access frequency management and control list is obtained or not, or judging whether the access frequency management and control list contains the storage record of the serial number of a card reader in a second preset time interval before the moment when the access frequency management and control list is obtained or not; a fifth communication module which is used for obtaining an except rule; a third judgment module which is used for judging whether the serial number of the identity card or the serial number of the card reader accords with the exception rule or not; and a processing module which is used for processing an identity card authentication information processing request, thereby achieving the dual dynamic verification of the identity card and the identity card reader, and improving the processing safety and reliability of the identity card authentication information processing request.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and device for controlling access frequency of ID card authentication information. Background technique [0002] With the rapid development of my country's economy, people's lives have been greatly improved. Regardless of employment, business, tourism, education, etc., identity authentication is required, and handling of money, property, application for benefits, medical treatment, etc. also requires authentication. Authentication. The current second-generation resident ID card is designed with a built-in smart chip, which is fully capable of realizing identity authentication based on the Internet. However, since its launch in 2004, its application value is far from being tapped. In recent years, ticketing systems have begun to be used on a large scale Internet identity authentication and identification based on ID card. [0003] Due to the actual use of ID card-bas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/321H04L9/3247H04L9/3263H04L63/0807H04L63/0823H04L67/10
Inventor 李明
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products