Card reader reading permission verification method based on block chain

A verification method and a technology of a card reader, which are applied in the directions of instruments, digital data authentication, and electronic digital data processing, etc., can solve problems such as low security and complex internal modules, and achieve enhanced security, simplified module structure, and enhanced reliability Effect

Inactive Publication Date: 2019-08-09
SHENZHEN ACAD OF AEROSPACE TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention is to solve the problem that the existing card reader has a built-in security module, resulting in complex internal modules and low security, and now provides a blockchain-based card reader reading authority verification method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Card reader reading permission verification method based on block chain
  • Card reader reading permission verification method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0029] Specific Embodiment 1: The block chain-based card reader reading permission verification method described in this embodiment requires a verification terminal (ie: a PC connected to the card reader), a card reader, The smart card, the upper-level system, the block chain and the various block chain servers that make up the block chain participate in the completion. As a node that makes up the blockchain, the blockchain server realizes data interaction with the verification terminal. The upper-level system has the authority to approve the card reader information, and can give the card reader permission to read the information in the smart card and complete the data interaction with the verification terminal.

[0030] Specifically, the above method includes the following steps:

[0031] Step 1: Use the current verification terminal to collect the information of the card reader to be verified, the information includes the current card reading time, and the current verificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a card reader reading permission verification method based on a block chain, and relates to the field of card reader safety card reading. The method aims to solve the problemsthat the internal module is complex and the safety degree is low due to the fact that a safety module is embedded in an existing card reader. According to the card reader reading permission verification method based on the block chain, an authentication certificate capable of confirming the reading permission is stored in the block chain in combination with a block chain technology, so that the authentication certificate is not easily tamper, and the security is enhanced. Meanwhile, even if the data of one block chain server side is damaged, the other block chain server sides in the block chain can be requested to obtain the verification data, that is, the data of the verification permission cannot be lost, and the reliability is further enhanced. Moreover, the verification information isstored in the block chain, and a security module does not need to be additionally arranged in the card reader, so that the module structure of the card reader is simplified.

Description

technical field [0001] The invention belongs to the field of safe card reading by a card reader. Background technique [0002] A smart card reader is a device with one or more connectors connected to a PC and receives instructions from the PC to operate a smart card or security module in each connector. The smart card reader is mainly used to obtain, modify or store relevant data in the smart card. Smart card readers are mostly used in hospitals, banks, transportation, hotels, social security, telecommunications and other industries. Some sensitive data will be involved in these industries, so most of them have higher requirements for information security. In application, smart cards that involve sensitive data need to be encrypted and decrypted with their corresponding security modules to obtain operation authority or plaintext data. For example, social security applications have security modules with social security specifications, banking applications have security modul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/44
CPCG06F21/44G06F21/6272
Inventor 闫泽涛岑祖龙
Owner SHENZHEN ACAD OF AEROSPACE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products