Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity card reading terminal and cloud authentication platform authentication method and system

A technology of card reading terminal and ID card, which is applied in the electronic field, can solve the problems of high manufacturing cost of ID card reader and low utilization rate of ID card reader, etc., and achieve the effect of protecting security

Active Publication Date: 2016-10-12
TENDYRON CORP
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because each ID card reader is provided with a resident ID card verification safety control module, the manufacturing cost of the existing ID card reader is high; and a resident ID card verification safety control module can only read a reader module Therefore, the utilization rate of existing ID card readers is low. In order to solve this problem, there is currently an improvement plan: ID card readers no longer include security controls for ID card verification Module, set the security control module for identity card verification in the background server, thereby improving the utilization rate of the security control module for identity card verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity card reading terminal and cloud authentication platform authentication method and system
  • Identity card reading terminal and cloud authentication platform authentication method and system
  • Identity card reading terminal and cloud authentication platform authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] figure 1 An authentication method for an ID card reader terminal and a cloud authentication platform provided for this embodiment, such as figure 1 As shown, the authentication method between the ID card reader terminal and the cloud authentication platform provided by this embodiment mainly includes the following steps (101-109).

[0026] Step 101: The ID card reading terminal sends the ID card reading terminal transmission information to the cloud authentication platform, the ID card reading terminal transmission information includes at least the ID card reading terminal certificate, and the ID card reading terminal certificate includes at least: ID card reading terminal The terminal certificate content information is the signature information of the ID card reading terminal certificate obtained by signing the ID card reading terminal content information, wherein the ID card reading terminal content information includes at least the ID card reading terminal certificat...

Embodiment 2

[0048] An authentication method for an ID card reader terminal and a cloud authentication platform provided by this embodiment belongs to the same idea as Embodiment 1, and the similarities with Embodiment 1 will not be repeated. The following only focuses on the differences between this embodiment and Embodiment 1. to explain:

[0049] In this embodiment, the cloud authentication platform further includes at least one scheduling server and at least one authentication security control module. The scheduling server receives the information transmitted by the ID card reading terminal and verifies whether the certificate of the ID card reading terminal is normal. If the terminal certificate is normal, the scheduling server sends the transmission information of the ID card reader terminal to the authentication security control module that meets the preset conditions. The authentication security control module generates the transmission information of the cloud authentication platfo...

Embodiment 3

[0070] An authentication method for an ID card reader terminal and a cloud authentication platform provided by this embodiment belongs to the same idea as Embodiment 1 and Embodiment 2, and the same points as Embodiment 1 or Embodiment 2 will not be repeated here. The following is only for this embodiment The differences between embodiment 1 and embodiment 2 are described:

[0071] In this embodiment, the cloud authentication platform further includes at least one scheduling server and at least one authentication security control module, the scheduling server receives the transmission information of the ID card reader terminal, and sends the transmission information of the ID card reader terminal to the authentication security control module, by The authentication security control module verifies whether the ID card reader terminal certificate is normal, and the certification result of the authentication security control module certificate is sent to the dispatch server. If the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity card reading terminal and a cloud authentication platform authentication method and system. The method comprises the steps that the identity card reading terminal transmits the identity card reading terminal transmission information to a cloud authentication platform; the cloud authentication platform receives the identity card reading terminal transmission information, receives a query result of an identity card reading terminal certificate or an identity card reading terminal certificate number, obtains the abnormal prompt of the identity card reading terminal certificate if the query result is invalid, and carries out the processing of the information transmitted by the identity card reading terminal according to the abnormal prompt of the identity card reading terminal certificate; the cloud authentication platform obtains the effective prompt of the identity card reading terminal certificate if the query result is effective; the cloud authentication platform verifies whether the identity card reading terminal certificate is valid or not through employing a pre-stored root certificate: judging that the identity card reading terminal certificate is normal if the identity card reading terminal certificate is valid; the identity card reading terminal at least receives the cloud authentication platform transmission information transmitted by the cloud authentication platform, and verifies whether the authentication certificate is normal or not through employing the pre-stored root certificate.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an authentication method and system for an ID card reading terminal and a cloud authentication platform. Background technique [0002] The ciphertext of the ID card information is stored in the second-generation resident ID card, and the security control module authorized by the Ministry of Public Security is required to decrypt the ciphertext of the ID card information stored in the resident ID card. The existing ID card reader has at least two modules, including a reading module and a resident ID card verification security control module. Because each ID card reader is provided with a resident ID card verification safety control module, the manufacturing cost of the existing ID card reader is high; and a resident ID card verification safety control module can only read a reader module Therefore, the utilization rate of existing ID card readers is low. In order to solve thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3247H04L9/3263H04L63/0807H04L63/0823H04L67/10
Inventor 李明
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products