Exception handling system for identity card authentication information processing request

A technology of information processing request and exception processing system, applied in the electronic field, can solve the problems such as application value is far from being tapped, stolen, lost ID card, etc., to enhance dynamic and real-time performance, avoid security risks, and improve security. and reliability effects

Active Publication Date: 2016-10-12
TENDYRON CORP
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current second-generation resident ID card is designed with a built-in smart chip, which is fully capable of realizing identity authentication based on the Internet. However, since its launch in 2004, its application value is far from being tapped. In recent years, ticketing systems have begun to be used on a large scale Internet Identity Authentication and Identification Based on ID Card
[0003] Due to the actual use of ID card-based Internet identity authentication technology, ID cards are lost or stolen, and there are hazards and risks of malicious use of ID cards that are not authorized by the person; at the same time, the transmission of network data is also faced with communication monitoring and data tampering. And the risk of a series of typical cyber attacks such as data replay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Exception handling system for identity card authentication information processing request
  • Exception handling system for identity card authentication information processing request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] This embodiment provides a method for handling exceptions in identity card authentication information processing requests, such as figure 1 shown, including the following steps:

[0024] S1: The scheduling server receives the ID card authentication information processing request, and the ID card authentication information processing request includes: the encrypted value of the ID card serial number and the card reader serial number;

[0025] The ID card processing request is a processing request initiated by the ID card reader. After the scheduling server determines that the ID card processing request is a legal processing request, it allocates an idle security authentication module for the ID card processing request according to the preset rules. The authentication module performs data interaction with the originator of the ID card processing request. The encrypted ID card serial number is obtained by encrypting the ID card serial number obtained from the ID card by th...

Embodiment 2

[0099] This embodiment provides an ID card authentication information processing request processing system, such as figure 2 As shown, including dispatching server 201 and ID card reader 202:

[0100] Wherein, the ID card reader 202 is used to generate an ID card authentication information processing request, and send the ID card processing request to the scheduling server 201; wherein, the ID card authentication information processing request includes: ID card serial number encryption value and card reading device serial number;

[0101] The ID card processing request is a processing request initiated by the ID card reader 202. After the scheduling server 201 judges that the ID card processing request is a legal processing request, it allocates an idle security authentication module for the ID card processing request according to preset rules, and is allocated The security authentication module of the ID card performs data interaction with the initiator of the ID card proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an exception handling system for an identity card authentication information processing request. A dispatch server receives the identity card authentication information processing request, obtains a blacklist, and obtains an access frequency management and control list if a serial number of an identity card and a serial number of a card reader are not in the blacklist. An exception rule is obtained if the access frequency management and control list does not contain storage record of the serial number of the identity card in a first preset time interval before the moment when the access frequency management and control list is obtained and the access frequency management and control list does not contain the storage record of the serial number of the card reader in a second preset time interval before the moment when the access frequency management and control list is obtained. The identity card authentication information processing request is processed if the serial number of the identity card and the serial number of the card reader do not accord with the exception rule, thereby achieving the triple dynamic verification of the identity card and the identity card reader, and improving the processing safety and reliability of the identity card authentication information processing request.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an ID card authentication information processing system. Background technique [0002] With the rapid development of my country's economy, people's lives have been greatly improved. Regardless of employment, business, tourism, education, etc., identity authentication is required, and handling of money, property, application for benefits, medical treatment, etc. also requires authentication. Authentication. The current second-generation resident ID card is designed with a built-in smart chip, which is fully capable of realizing identity authentication based on the Internet. However, since its launch in 2004, its application value is far from being tapped. In recent years, ticketing systems have begun to be used on a large scale Internet identity authentication and identification based on ID card. [0003] Due to the actual use of ID card-based Internet identity authentication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0245H04L63/1425
Inventor 李明
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products