Unlock instant, AI-driven research and patent intelligence for your innovation.

A key acquisition method, ID card information transmission method and system

An acquisition method and acquisition system technology are applied in the fields of ID card information transmission method and system, and key acquisition method, and can solve the problems of overload, uneven task distribution, and low utilization rate of front-end ID card readers.

Active Publication Date: 2019-06-28
TENDYRON CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since each front-end ID card reader is provided with a resident ID card verification safety control module, the manufacturing cost of the existing front-end ID card reader is high; and a resident ID card verification safety control module can only be used for one reader The identity card information read by the module is used for identity verification. Therefore, the utilization rate of the existing front-end ID card reader is low. To solve this problem, there is currently an improvement plan: the front-end ID card reader no longer includes the resident ID card verification security control module, and set the resident ID card verification security control module on the background side, thereby improving the utilization rate of the resident ID card verification security control module
[0003] However, since the network environment in the background is an open network, any card reader can request the background to connect to the security control module for identity card verification, which greatly increases the security risk of the security control module for identity card verification. If the card verification security control module is breached by an illegal card reader, the root certificate of the ID card stored in the resident ID card verification security control module will be stolen or even tampered with by criminals, and the consequences will be disastrous
In addition, since the background side may be equipped with multiple ID card verification security control modules, due to uneven task distribution, some ID card verification security control modules will be idle and some ID card verification security control modules will be overloaded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key acquisition method, ID card information transmission method and system
  • A key acquisition method, ID card information transmission method and system
  • A key acquisition method, ID card information transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] This embodiment provides two systems, figure 1 A key acquisition system provided in this embodiment, figure 2 Provided for this embodiment is based on figure 1 The transmission system of the ID card information of the key acquisition system. Such as figure 2 As shown, the transmission system of the ID card information provided by the present embodiment includes: a card reader terminal 10, a dispatch server 20, an authentication security control module 30 and a verification security control module 40. In this embodiment, the verification security control module 40 and the dispatch server 20 (and the card reader terminal 10) has increased authentication safety control module 30, and all the data that flow through verification safety control module 40 all need pass through authentication safety control module 30 safety operations such as verification, decryption, encryption, will flow through authentication safety control module 30. The danger of the data of the safet...

Embodiment 2

[0065] This embodiment provides a method for obtaining a key, which can use the two systems provided in Embodiment 1. Such as image 3 As shown, the method includes the following steps S101-S105:

[0066] S101: The authentication security control module sends authentication data to the scheduling server, the authentication data at least includes: the signature data obtained by the authentication security control module signing the data to be signed, and a digital certificate for signature verification and a digital certificate for encryption;

[0067]In this embodiment, as an optional implementation in this embodiment, the authentication security control module can be a security chip, such as Z8D64U (national secret batch number SSX43), Z32 (national secret batch number) of National Technology Co., Ltd. Batch number SSX20)) has an independent processor and storage unit inside, which can store PKI digital certificates and corresponding private keys, as well as other characteri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret key obtaining method and an identity card information transmission method and system. The secret key obtaining method comprises the steps that a dispatching server receives authentication data transmitted by an authentication safety control module; the dispatching server queries the survival condition of a digital certificate for signature verification and the survival condition of a digital certificate for encryption, and transmits the authentication data to an authorization server if the survival conditions are normal survival conditions; the authorization server carries out the authentication of signature data after judging that the digital certificate for signature verification and the digital certificate for encryption belong to the same user, and then obtains an authorization secret key after signature verification; the authorization server carries out the encryption of the authorization secret key, generates an authorization secret key ciphertext, and transmits the authorization secret key ciphertext to the dispatching server; the dispatching server enables the authorization secret key ciphertext to be transmitted to the authentication safety control module; the authentication safety control module carries out the decryption of the authorization secret key ciphertext, obtains the authorization secret key, and stores the authorization secret key in a random access memory of the authentication safety control module.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a key acquisition method, an ID card information transmission method and a system. Background technique [0002] The ciphertext of the ID card information is stored in the second-generation resident ID card, and the verification security control module authorized by the Ministry of Public Security is required to decrypt the ciphertext of the ID card information stored in the resident ID card. The existing front-end ID card reading terminal has at least two modules, including a reading module and a resident ID card verification security control module. Since each front-end ID card reader is provided with a resident ID card verification safety control module, the manufacturing cost of the existing front-end ID card reader is high; and a resident ID card verification safety control module can only be used for one reader The identity card information read by the module is used f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3263H04L63/06H04L63/0823H04L63/0892
Inventor 李明
Owner TENDYRON CORP