Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encipher / decipher method for identity information and recognition system

An identity information and identification system technology, applied in the usage of multiple keys/algorithms, digital marking through data transmission, electromagnetic radiation induction, etc., can solve problems such as inability to encrypt information, inability to exchange terminal equipment information, and easy to be stolen. , to achieve the effect of increasing difficulty, increasing security, and preventing information theft

Inactive Publication Date: 2005-03-23
ZHONGNAN RONGHAI TECH
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The information carrier can only complete the key confirmation and data exchange with the reader. The identity information exists in the clear state in the reader or during the process of data transmission from the reader to the terminal device, which is easy to be stolen.
Furthermore, the carrier can only passively accept the reader's card reading command to output identity information, and the carrier itself cannot encrypt the information, nor can it exchange information with the terminal device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encipher / decipher method for identity information and recognition system
  • Encipher / decipher method for identity information and recognition system
  • Encipher / decipher method for identity information and recognition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The identity information identification system in this example is a radio frequency identification system. The system composition includes: radio frequency identification card (or called electronic tag) as carrier, reader and terminal equipment. The reader is connected to the terminal device through the network.

[0033] RFID card for this example. It is formed by adding an encryption / decryption device to the existing radio frequency identification card circuit. The increased hardware structure includes: memory (RAM), used to store encrypted information ID1 and communication key K2; coprocessor, used to complete encryption and decryption processing and system control; interface circuit, used for radio frequency identification card circuit and encryption / decryption device interface. Circuit structure see image 3 . The above-mentioned memory is a non-volatile memory, and the dual-port RAMASIC IP core (unpackaged integrated circuit chip) of D&R Silicon Company is sel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to information encryption technology. It provides an identity information encryption and decryption method and an identification system to overcome shortcoming of low security, easy embezzlement, duplication and malversation. Its steps are memorize encrypted identify information into carrier; ulteriorly, encryption and decryption devices are set in carrier to encrypt and decrypt input and output information; especially, random time key is adopted to encrypt transferred information. With a very powerful function of anti-false and anti-pilfer, the system especially adapts to commodity anti-false, identify identification and other field.

Description

technical field [0001] The invention relates to information encryption technology, in particular to an encryption method and identification system for identity information in a carrier. Background technique [0002] Identity information can be a variety of data, such as anti-counterfeiting codes, identity IDs, bank account data, IDs of electronic door locks, personal identity data, balances in electronic monthly tickets or stored-value cards, and so on. [0003] Identity information identification technology has a wide range of uses in the modern information society. Various carriers for recording identity information, such as the popular IC cards, smart cards, electronic tags, etc., have been involved in all aspects of people's lives. The identity information used to record individuals or products is unique to a specific person or product. Using the identification system corresponding to the corresponding information carrier, the identity information can be read, and the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K1/16G06K7/10G06K19/07H04L9/14
Inventor 郭春生
Owner ZHONGNAN RONGHAI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products