Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application method of IC card in gate inhibition system based on financial criterion

The technology of an access control system and application method is applied in the direction of instruments, time registers, and individual input/output registers, etc., which can solve the problems of easy copying of access control cards, inconvenience for users, and low security level, so as to avoid The inconvenience of carrying a special access control card, reducing the link of card issuance, and the effect of preventing monitoring and camouflage

Active Publication Date: 2009-10-28
FEITIAN TECHNOLOGIES
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such a system needs to issue a special access control card, and the card cannot be used universally between different access control systems, and carrying a special access control card also brings inconvenience to the user; in addition, the security mechanism of the access control system is simple, and the communication line is easy to be monitored. The communication process is easy to be disguised, and the access control card is also easy to be copied, and the security level is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application method of IC card in gate inhibition system based on financial criterion
  • Application method of IC card in gate inhibition system based on financial criterion
  • Application method of IC card in gate inhibition system based on financial criterion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] By comparing the cardholder information in the IC card with the corresponding information in the memory cardholder information list, the identity recognition method is realized.

[0033] The processing flow is attached figure 2 Shown:

[0034] A. Connect the IC card based on financial norms to the card reader, so as to establish the communication between the controller and the IC card based on financial norms;

[0035] B. The controller sends a selection application command to the IC card based on financial regulations to select the application directory. If an error occurs, the cardholder is refused to enter;

[0036] C. If the command is sent successfully, the IC card based on the financial specification returns application-related information to the controller;

[0037] D. According to the above application-related information, the controller sends a read record command to the IC card based on financial regulations to read the user file record, and if an error occ...

Embodiment 2

[0044] By comparing the cardholder information in the IC card with the corresponding information in the memory cardholder information list and combining dynamic data authentication, the identity recognition method is realized.

[0045] The processing flow is attached image 3 Shown:

[0046] A. Connect the IC card based on financial norms to the card reader, so as to establish the communication between the controller and the IC card based on financial norms;

[0047] B. The controller sends a selection application command to the IC card based on financial regulations through the card reader to select the application directory. If an error occurs, the cardholder is refused to enter;

[0048] C. If the command is sent successfully, the IC card based on the financial specification returns application-related information to the controller;

[0049] D. According to the above application-related information, the controller sends a read record command to the IC card based on financ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an application method of an IC card based on financial norms in an access control system, and relates to the technical field of access control system security. In combination with the financial norms, the present invention proposes a technical scheme of applying IC cards to the access control system to replace the special access control cards of the original access control system, replacing the access control cards with IC cards based on financial norms, which can reduce the card issuance links of the access control system and prevent users from carrying The inconvenience of special access control cards, in addition, from a security point of view, the security level of the access control system that supports dynamic data authentication has also been greatly improved compared with the traditional access control system.

Description

technical field [0001] The invention relates to the technical field of access control system security, in particular to an application method of an IC card based on financial norms in an access control system. Background technique [0002] Most of the traditional access control systems use non-contact memory cards, which store the access control authentication information generated by the server, and compare it with the server-side authentication information list during access control processing. Such a system needs to issue a special access control card, and the card cannot be used universally between different access control systems, and carrying a special access control card also brings inconvenience to the user; in addition, the security mechanism of the access control system is simple, and the communication line is easy to be monitored. The communication process is easy to be disguised, and the access control card is also easy to be copied, and the security level is not...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products