Access control authority identification method and device

An access control and authentication technology, applied in the field of access control, can solve problems such as key theft, lower security of the access control system, access control cards are easy to be copied and tampered, and achieve the effect of improving security

Active Publication Date: 2016-11-02
DATANG MICROELECTRONICS TECH CO LTD +1
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To sum up, the access control cards in the prior art are easy to be copied and tampered or the keys are stolen, which reduces the security of the access control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control authority identification method and device
  • Access control authority identification method and device
  • Access control authority identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0075] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0076] The described safe access module SAM card that the embodiment of the present invention relates to is the core part in the access control system, comprises smart card (CPU card), has microprocessor CPU, storage unit and chip operating system COS in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control authority identification method and device. The method and device are used for an access control terminal. The method comprises, through a private key in a key pair produced in a SAM card, carrying out signing on a first random number transmitted by a user card and verifying a digital certificate and a signature of the user card through a certification authority root certificate in the SAM card. The private key cannot be read and the certification authority root certificate is not easily tampered so that access control system safety is improved.

Description

technical field [0001] The invention relates to the technical field of access control, in particular to an access control authentication method and device. Background technique [0002] At present, the access control card is a card used in the access control system, such as the access card, access control card, parking card, membership card, etc., through the system administrator setting, the usable area and user rights are determined, and the user uses the access control card to enter the management area, thereby To achieve a safety management role. [0003] In the prior art, about 80% of the access control cards in my country use Identification Cards (ID cards for short) or M1 cards (abbreviations for chips produced by NXP, a subsidiary of Philips, and the full name is NXP Mifare1 series). The only identifier (unique identifier, referred to as: UID), and a little more advanced is to use the sectors of the M1 card for data operations, using the independent key of each secto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/23G07C9/28
Inventor 窦海勇
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products