Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity card cloud authentication system and card reading system

An ID card and card reading terminal technology, applied in the electronic field, can solve the problems of uneven task distribution, overloading, stealing and even tampering, etc., to ensure security, improve security, and avoid illegal attacks.

Active Publication Date: 2016-10-12
TENDYRON CORP
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since each front-end ID card reader is provided with a resident ID card verification safety control module, the manufacturing cost of the existing front-end ID card reader is high; and a resident ID card verification safety control module can only be used for one reader The identity card information read by the module is used for identity verification. Therefore, the utilization rate of the existing front-end ID card reader is low. To solve this problem, there is currently an improvement plan: the front-end ID card reader no longer includes the resident ID card verification security control module, and set the resident ID card verification security control module on the background side, thereby improving the utilization rate of the resident ID card verification security control module
[0003] However, since the network environment in the background is an open network, any card reader can request the background to connect to the security control module for identity card verification, which greatly increases the security risk of the security control module for identity card verification. If the card verification security control module is breached by an illegal card reader, the root certificate of the ID card stored in the resident ID card verification security control module will be stolen or even tampered with by criminals, and the consequences will be disastrous
In addition, since the background side may be equipped with multiple ID card verification security control modules, due to uneven task distribution, some ID card verification security control modules will be idle and some ID card verification security control modules will be overloaded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity card cloud authentication system and card reading system
  • Identity card cloud authentication system and card reading system
  • Identity card cloud authentication system and card reading system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] This embodiment provides an ID card cloud authentication system. Such as figure 1 As shown, the ID card cloud authentication system provided by this embodiment can include three areas according to different functional areas: Internet access area 10, isolation area 20 and business area 30, and different technical measures are taken for each area to obtain from The network level improves the security of the entire system; wherein, the Internet access area 10 is positioned as the Internet entrance of the entire ID card cloud authentication system, and the Internet access area 10 includes at least: a border route 101 and a border firewall 102 . This Internet access area 10 is in an open network environment, and its main function is to be responsible for Internet access, to resist illegal access through border routing and border firewalls, and to be the first line of defense from the Internet into the intranet; the isolated area 20 is to solve the problem of installing a fir...

Embodiment 2

[0082] This embodiment provides a method for data transmission, and the method can use the system provided in Embodiment 1. Such as Figure 4 As shown, the method includes the following steps S101-S110:

[0083] S101: The border router receives the data packet sent by the card reader terminal, selects the border firewall to be sent according to the path selection strategy, and sends the data packet to the selected border firewall;

[0084] In this embodiment, in order to prevent a single point of failure, multiple border firewalls can be deployed. When there are multiple border firewalls, the border router needs to select a path to send the data packet to the core switch, that is, choose which border firewall to send to The core switch, in this embodiment, the border router selects the border firewall to be sent according to the path selection strategy. A border firewall with strong business processing capabilities, etc.

[0085] In this embodiment, the data packet sent by ...

Embodiment 3

[0134] This embodiment provides an internal management server, such as Figure 5 As shown, the internal management server may be a centralized server for centralized management, or a distributed server for integrating network resources. The internal management server includes: a security access unit, a display unit, a first input interface, a security processor, a main control processor, a system management unit, a parameter configuration unit and a second input interface.

[0135] The security access unit is configured to detect a user request, and when it is detected that the user request is a user login request, obtain prompt information corresponding to the user login request, and send the prompt information to the display unit.

[0136] Specifically, the security access unit refreshes or detects whether a user request is received regularly or irregularly, and when a user request is received, judges the type of the user request, and judges whether it is a user login reques...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity card cloud authentication system and a card reading system. The identity card cloud authentication system comprises an edge router, an edge firewall, a core switcher, a dispatch server, a business region firewall, an authentication safety control module and a verification safety control module, wherein the edge router is used for transmitting a data package transmitted by a card reading terminal to the core switcher through the selected edge firewall. The core switcher transmits the data package to the dispatch server or the business region firewall. After the dispatch server receives the data package, the dispatch server selects an idle authentication safety control module, and transmits a corresponding identification to the card reading terminal. After the business region firewall receives the data package, the business region firewall transmits the data package to a first authentication safety module. A first authentication safety control module transmits a decrypted data package to a first verification safety control module. The first verification safety control module returns a corresponding first data package to the first authentication safety control module. The first authentication safety control module encrypts the first data package, and transmits the encrypted first data package to the card reading terminal.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an ID card cloud authentication system and a card reading system. Background technique [0002] The ciphertext of the ID card information is stored in the second-generation resident ID card, and the verification security control module authorized by the Ministry of Public Security is required to decrypt the ciphertext of the ID card information stored in the resident ID card. The existing front-end ID card reading terminal has at least two modules, including a reading module and a resident ID card verification security control module. Since each front-end ID card reader is provided with a resident ID card verification safety control module, the manufacturing cost of the existing front-end ID card reader is high; and a resident ID card verification safety control module can only be used for one reader The identity card information read by the module is used for identity verif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/0209H04L63/08H04L67/10
Inventor 李明
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products