Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication system, device and method and identity authentication requesting device

An identity authentication device and identity authentication technology, applied in the field of identity authentication request device and identity authentication system

Active Publication Date: 2014-05-21
KUANG CHI INTELLIGENT PHOTONIC TECH
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in the photon access control system, there is no practical and effective ID distribution or identity authentication mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system, device and method and identity authentication requesting device
  • Identity authentication system, device and method and identity authentication requesting device
  • Identity authentication system, device and method and identity authentication requesting device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084] image 3 It is a flow chart of adding and descrambling information and adding and decoding pseudocodes by the identity authentication system according to the preferred embodiment 1 of the present invention, as shown in image 3 As shown, the process includes:

[0085] S302: After the ID issuance software obtains the ID number and verification code through the network, it performs scrambling and pseudo-code operations on the two types of information, obtains two ciphertexts, and saves them in the relevant records in the ID allocation table of the database. The security of the content of the data table, wherein the scrambling code group used is composed of 16 scrambling codes, the scrambling algorithm uses an XOR operation, and the length of the pseudo-code scrambling code is 128 bits.

[0086] S304: In order to facilitate viewing of the ID distribution situation, a table is designed to display the assigned ID serial number and verification code list, so that the ciphert...

Embodiment 2

[0093] Figure 4 It is a flow chart of adding and descrambling information and adding and decoding pseudocodes by the identity authentication system according to the second preferred embodiment of the present invention, as shown in Figure 4 As shown, the process includes:

[0094] S402: After the ID issuance software obtains the ID number and verification code through the network, it performs scrambling and pseudo-code operations on the two types of information, obtains two ciphertexts and saves them in the relevant records in the ID allocation table of the database, ensuring The security of the content of the data table, wherein the scrambling code group used is composed of 64 scrambling codes, the scrambling algorithm uses an XOR operation, and the length of the pseudo-code scrambling code is 128 bits.

[0095] S404: In order to check the status of ID issuance conveniently, a table is designed to display the assigned ID serial number and verification code list, so that the...

Embodiment 3

[0102] Figure 5 It is a flow chart of adding and descrambling information and adding and decoding pseudocodes by the identity authentication system according to the third preferred embodiment of the present invention, as shown in Figure 5 As shown, the process includes:

[0103] S502: After the ID issuance software obtains the ID number and the verification code through the network, it performs scrambling and pseudo-code operations on the two types of information, obtains two ciphertexts, and saves them in the relevant records in the ID allocation table of the database. For the security of the content of the data table, the scrambling code group used is composed of 128 scrambling codes, the scrambling algorithm uses an XOR operation, and the length of the pseudo-code scrambling code is 256 bits.

[0104] S504: In order to facilitate viewing of ID issuance, a table is designed to display the assigned ID serial number and verification code list, so that the ciphertext in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication system, device and method and an identity authentication requesting device. The system comprises the identity authentication requesting device used for transmitting a verification code issuing request to the identity authentication device and the identity authentication device used for responding to the verification code issuing request transmitted by the identity authentication requesting device, generating an identity (ID) and a corresponding verification code according to the verification code issuing request, binding the generated ID and the generated verification code, storing the generated ID, the generated verification code and a binding record and feeding feedback information carrying the verification code back to the identity authentication requesting device, wherein the identity authentication requesting device is further used for receiving the feedback information from the identity authentication device and transmitting an ID issuing request to the identity authentication device. The ID issuing request comprises the verification code carried by the feedback information. The identity authentication device is further used for analyzing and judging whether the verification code included in the received ID issuing request is matched with the stored verification code, and the distribution information carrying the ID is transmitted to the identity authentication requesting device on yes judgment. A practical effective identity authentication mechanism is further provided.

Description

technical field [0001] The invention relates to the field of optoelectronics, in particular to an identity authentication system, device, method and identity authentication requesting device. Background technique [0002] When the light control system is applied to the access control system, it can be called the photonic access control system. The traditional access control management system is pre-registered on the distribution platform (network) through a smart card as the unique personal identification (the registration related data is passed through the device network. saved to the controller). When the user enters the door, shake the smart card in the effective range of the card reader for feature recognition. The card reader reads the data of the smart card and transmits it to the controller. The controller compares the saved registration information with the obtained data. Identity judgment, if the comparison is successful, it will be processed according to the norma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/06
CPCG06F21/35H04W12/04H04L2463/121H04L9/3215H04L2209/80H04L9/0656H04L63/0428H04W12/35H04W12/068H04L63/0884H04L63/123H04W12/06
Inventor 不公告发明人
Owner KUANG CHI INTELLIGENT PHOTONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products