Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security authentication method for a two-way authentication CPU card access control card reader

A technology for banning card readers and two-way authentication is applied in the security authentication field of CPU card access control card readers, which can solve the problems of imperfect card and card reader security authentication process, low efficiency, duplication and other problems, so as to reduce technical cheating. risk, saving interaction steps, and enhancing security

Active Publication Date: 2018-10-23
BEIJING DINGHE SIRUI SOFTWARE TECH CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in the access control application system, CPU cards and CPU card access control card readers are also used, but there are still many defects in the authentication method. Through corresponding technical means, operations such as card copying and deception can still be performed.
Due to the imperfect and inefficient process of security authentication of cards and card readers
The safety and ease of use of the existing CPU card access control system are not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication method for a two-way authentication CPU card access control card reader
  • A security authentication method for a two-way authentication CPU card access control card reader
  • A security authentication method for a two-way authentication CPU card access control card reader

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] see figure 1 , the present invention provides a technical solution: a security authentication method for a two-way authenticated CPU card access control card reader, comprising the following steps:

[0024] A. The CPU card access control card reader performs a power-on reset on the non-contact CPU card;

[0025] B. After the non-contact CPU card is normally powered on and reset, a 4-byte random number is obtained through the random number generator ins...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe authentication method of a CPU card entrance guard reader capable of implementing bidirectional authentication. The authentication method is specially designed for requirement characteristics of application of an entrance guard system, an authentication step between the card reader and a CPU card is simplified, meanwhile, a bidirectional authentication mode between the CPU card and the card reader is realized, safety is greatly improved, the technical difficulty of card copying is greatly increased, a plurality of groups of keys are used, encipherment protection modes are selected randomly, and risks of violent breaking of the keys are greatly reduced; and meanwhile, steps of authenticating and reading card entrance guard numbers are simplified, and an authentication process is simplified into a group of interaction commands by card reset information.

Description

technical field [0001] The invention relates to the technical field of access control card readers and access control cards, in particular to a security authentication method for a bidirectionally authenticated CPU card access control card reader. Background technique [0002] Currently, low-frequency ID card readers and high-frequency logic encryption card readers are mainstream in the access control field. Among them, the low-frequency ID card and its card reader have no security authentication process at all, only the back-end controller verifies after reading the card number, and the low-frequency ID card can be copied conveniently, which poses a great threat to the security of access control. Although the high-frequency logic encryption card has the logic encryption function, in industrial applications, most of them also use the card number of the high-frequency logic encryption card to check the back-end controller. There are multiple card numbers in the high-frequency...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
CPCG07C9/21G07C2209/41
Inventor 孙景峰常铖陈淼陈江陵陈伟吴善峰
Owner BEIJING DINGHE SIRUI SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products