Method and product for using ciphertext as electronic identity code of electronic marker

An electronic marker and electronic identity technology, applied in the field of electronic identity codes, can solve problems such as pipeline accidents, underground pipeline data and location leakage, poor security and other problems, and achieve enhanced security, high security, and security high effect

Inactive Publication Date: 2018-11-27
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the application of underground electronic markers has brought convenience to the management of the underground pipeline industry and can avoid some pipeline accidents, the safety of the underground electronic marker products currently in use and the safety of the product application process are poor. , it is easy to lead to the leakage of underground pipeline data and location, and there is a risk of pipeline accidents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and product for using ciphertext as electronic identity code of electronic marker
  • Method and product for using ciphertext as electronic identity code of electronic marker

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0019] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.

[0020] Such as figure 1 As shown, according to the preferred embodiment of the present invention, the method for using the ciphertext as the electronic identity code of the underground electronic marker includes the following steps: Step 101: use the key management system to generate a key through the national secret algorithm; In the key management system, the application key is used to encrypt the TID identification code...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and product for using ciphertext as electronic identity code of an electronic marker. The method comprises the following steps of generating a secret key through a state secret algorithm by using a key management system; using the key to encrypt the TID recognition code information in the key management system so as to generate ciphertext; writing the ciphertext into a radio frequency chip of the underground electronic marker to be used as the electronic identity code of the underground electronic marker; processing the underground electronic marker product byusing the radio frequency chip containing the ciphertext according to the production process of the underground electronic marker. The method and product by using the ciphertext as the electronic identity code of the underground electronic marker have the advantages that the safety of the underground electronic marker product can be obviously enhanced; the potential pipeline data file and pipelinepractical position leakage risk of the underground electronic marker product in the practical application can be eliminated to the great degree.

Description

technical field [0001] The invention relates to an underground electronic marker, in particular to a method and product using ciphertext as the electronic identity code of the underground electronic marker. Background technique [0002] Underground pipelines are important infrastructure in cities. Once an accident occurs in an underground pipeline, it will cause direct economic losses to the pipeline management unit on the one hand, and seriously affect the normal production of urban industrial and mining enterprises and the normal life of urban residents on the other hand. How to improve management efficiency in daily management, discover and eliminate potential safety hazards in pipeline operation in a timely manner, and quickly and accurately find faulty pipelines during pipeline maintenance, avoid random excavation, wrong digging or broken pipelines, and improve the efficiency of emergency response to pipeline accidents Capacity has always been the focus of the pipeline ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06K19/077
CPCG06K19/07749H04L9/0861H04L9/0866
Inventor 宁昕王于波王鹤陈泽贵金学明刘国华庞振江王文赫
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products