A key acquisition method, ID card information transmission method and system
An acquisition method and acquisition system technology are applied in the fields of ID card information transmission method and system, and key acquisition method, and can solve the problems of overload, uneven task distribution, and low utilization rate of front-end ID card readers.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] This embodiment provides two systems, figure 1 A key acquisition system provided in this embodiment, figure 2 Provided for this embodiment is based on figure 1 The transmission system of the ID card information of the key acquisition system. Such as figure 2 As shown, the transmission system of the ID card information provided by the present embodiment includes: a card reader terminal 10, a dispatch server 20, an authentication security control module 30 and a verification security control module 40. In this embodiment, the verification security control module 40 and the dispatch server 20 (and the card reader terminal 10) has increased authentication safety control module 30, and all the data that flow through verification safety control module 40 all need pass through authentication safety control module 30 safety operations such as verification, decryption, encryption, will flow through authentication safety control module 30. The danger of the data of the safet...
Embodiment 2
[0065] This embodiment provides a method for obtaining a key, which can use the two systems provided in Embodiment 1. Such as image 3 As shown, the method includes the following steps S101-S105:
[0066] S101: The authentication security control module sends authentication data to the scheduling server, the authentication data at least includes: the signature data obtained by the authentication security control module signing the data to be signed, and a digital certificate for signature verification and a digital certificate for encryption;
[0067]In this embodiment, as an optional implementation in this embodiment, the authentication security control module can be a security chip, such as Z8D64U (national secret batch number SSX43), Z32 (national secret batch number) of National Technology Co., Ltd. Batch number SSX20)) has an independent processor and storage unit inside, which can store PKI digital certificates and corresponding private keys, as well as other characteri...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


