Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for processing identity card authentication information processing request

A technology of information processing requests and processing methods, applied in the electronic field, can solve problems such as the application value is far from being tapped, ID card loss, malicious use of ID card, etc., to achieve the effect of enhancing dynamics and real-time performance, and realizing short-term freezing

Active Publication Date: 2016-10-12
TENDYRON CORP
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current second-generation resident ID card is designed with a built-in smart chip, which is fully capable of realizing identity authentication based on the Internet. However, since its launch in 2004, its application value is far from being tapped. In recent years, ticketing systems have begun to be used on a large scale Internet Identity Authentication and Identification Based on ID Card
[0003] Due to the actual use of ID card-based Internet identity authentication technology, ID cards are lost or stolen, and there are hazards and risks of malicious use of ID cards that are not authorized by the person; at the same time, the transmission of network data is also faced with communication monitoring and data tampering. And the risk of a series of typical cyber attacks such as data replay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for processing identity card authentication information processing request
  • Method for processing identity card authentication information processing request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] This embodiment provides a method for processing a request for processing ID card authentication information, such as figure 1 shown, including the following steps:

[0024] S1: Receive the ID card authentication information processing request, the ID card authentication information processing request includes: the encrypted value of the ID card serial number and the serial number of the card reader;

[0025] The ID card processing request is a processing request initiated by the ID card reader. After judging that the ID card processing request is a legal processing request, according to the preset rules, an idle security authentication module is allocated for the ID card processing request. The allocated security authentication module Perform data interaction with the originator of the ID card processing request, where the ID card serial number encryption value is obtained by encrypting the ID card serial number obtained from the ID card reader, and the card reader ser...

Embodiment 2

[0103] This embodiment provides an ID card cloud authentication device, such as figure 2 shown, including:

[0104] The first communication module 201 is configured to receive an ID card authentication information processing request, the ID card authentication information includes: an encrypted value of an ID card serial number and a card reader serial number, wherein the card reader serial number is ID card information Read the serial number of the terminal;

[0105] The ID card processing request is a processing request initiated by the ID card reader. After the ID card cloud authentication platform judges that the ID card processing request is a legal processing request, it allocates an idle security authentication module 210 for the ID card processing request according to preset rules, The assigned security authentication module 210 performs data interaction with the initiator of the ID card processing request, wherein the ID card serial number encryption value is obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for processing an identity card authentication information processing request, and the method comprises the steps: receiving the identity card authentication information processing request, obtaining a blacklist, and obtaining an access frequency management and control list if a serial number of an identity card and a serial number of a card reader are not in the blacklist; obtaining an exception rule if the access frequency management and control list does not contain storage record of the serial number of the identity card in a first preset time interval before the moment when the access frequency management and control list is obtained and the access frequency management and control list does not contain the storage record of the serial number of the card reader in a second preset time interval before the moment when the access frequency management and control list is obtained; carrying out the processing of the identity card authentication information processing request if the serial number of the identity card and the serial number of the card reader do not accord with the exception rule, thereby achieving the triple dynamic verification of the identity card and the identity card reader, and improving the processing safety and reliability of the identity card authentication information processing request.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method for processing a processing request of ID card authentication information. Background technique [0002] With the rapid development of my country's economy, people's lives have been greatly improved. Regardless of employment, business, tourism, education, etc., identity authentication is required, and handling of money, property, application for benefits, medical treatment, etc. also requires authentication. Authentication. The current second-generation resident ID card is designed with a built-in smart chip, which is fully capable of realizing identity authentication based on the Internet. However, since its launch in 2004, its application value is far from being tapped. In recent years, ticketing systems have begun to be used on a large scale Internet identity authentication and identification based on ID card. [0003] Due to the actual use of ID card-based Inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0853H04L63/0876H04L63/10H04L63/1466
Inventor 李明
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products