Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization system and method and card

A card, the same technology, applied in the field of authorization system, method and card

Active Publication Date: 2017-12-01
TENDYRON CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the time required for criminals to break through each card reader is almost the same, that is, the card reader with a higher level of authorization in the prior art does not achieve a higher security guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization system and method and card
  • Authorization system and method and card
  • Authorization system and method and card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0108] This embodiment provides an authorization method, such as figure 1 Said, the method includes the following steps (S101-S105):

[0109] S101: The card receives an authentication instruction sent by the first card reader, wherein the authentication instruction carries identification information and first authentication information.

[0110] S102: The card determines the control authority according to the identification information, wherein the control authority includes: a precondition for authorization by the first card reader.

[0111] S103: The card acquires the currently recorded first security status, where the first security status includes: the authorization that the card has successfully obtained.

[0112] S104: The card judges whether the card satisfies the control authority according to the first security status, and if so, then authenticates the first authentication information, and if the authentication is passed, sends the second authentication information t...

Embodiment 2

[0175] This embodiment provides a card 20, figure 2 The schematic diagram of the structure of the card 20 provided in this embodiment, as figure 2 As shown, the card 20 provided in this embodiment includes: a first receiving module 2001, configured to receive an authentication instruction sent by a first card reader, wherein the authentication instruction carries identification information and first authentication information; a determination module 2002 , used to determine the control authority according to the identification information, wherein the control authority includes: the precondition for the authorization given by the first card reader; the first obtaining module 2003, used to obtain the first security state of the current record, wherein the first security state Including: the authorization that the card 20 has successfully obtained; the first judging module 2004 is used to judge whether the card 20 satisfies the control authority according to the first security...

Embodiment 3

[0202] This embodiment provides an authorization system, such as Figure 4 As shown, the authorization system includes a card 20 and a first card reader 21 . The card 20 in this embodiment is the same as the card 20 provided in Embodiment 2, and will not be repeated here.

[0203] Such as Figure 4 As shown, the first card reader 21 includes: a second receiving module 211 for receiving the second authentication information sent by the card 20; an authorization module 212 for judging whether the card is authorized according to at least the second authentication information.

[0204] Through the authorization system provided in this embodiment, the card 20 responds to the authentication instruction of the first card reader 21 only when it is determined that the control authority is satisfied, and sends the second authentication information to the first card reader 21 in order to obtain The authorization of the first card reader 21, therefore, for the card reader with higher se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization system and method and a card. The authorization method includes: receiving an authentication instruction, which is sent by a first card reader, by the card, wherein the authentication instruction carries identification information and first authentication information; determining control authority by the card according to the identification information, wherein the control authority includes preconditions of giving an authorization by the first card reader; acquiring currently recorded first security status by the card, wherein the first security status includes successfully obtaining the authorization by the card; judging, by the card according to the first security status, whether the card meets the control authority, authenticating the first authentication information if yes, and in a case where authentication passes, sending second authentication information to the first card reader, updating the first security status, and recording successfully obtaining the authorization of the first card reader by the card; and receiving the second authentication information by the first card reader, and judging, at least according to the second authentication information, whether the card is authorized.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an authorization system, method and card. Background technique [0002] In the authorization system, in order to achieve different levels of authorization, it is often necessary to set up multiple card readers, and each card reader can achieve a specific level of authorization. However, in the existing authorization system, each card reader is independent of each other and has no association with other card readers. Therefore, criminals only need to break through a card reader to obtain the authorization that the card reader can achieve. However, the time required for criminals to break through each card reader is almost the same, that is, the card reader with a higher level of authorization in the prior art does not achieve a higher security guarantee. Contents of the invention [0003] The present invention aims to solve / one of the above problems. [0004] The main pur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34G06F21/45
CPCG06F21/34G06F21/45H04L9/32
Inventor 李东声
Owner TENDYRON CORP