Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity card authentication information processing request processing method and identity card cloud authentication device

A technology for information processing requests and processing methods, applied in the electronic field, can solve the problems that the application value is far from being mined, stolen, malicious use of ID cards, etc.

Active Publication Date: 2016-10-12
TENDYRON CORP
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current second-generation resident ID card is designed with a built-in smart chip, which is fully capable of realizing identity authentication based on the Internet. However, since its launch in 2004, its application value is far from being tapped. In recent years, ticketing systems have begun to be used on a large scale Internet Identity Authentication and Identification Based on ID Card
[0003] Due to the actual use of ID card-based Internet identity authentication technology, ID cards are lost or stolen, and there are hazards and risks of malicious use of ID cards that are not authorized by the person; at the same time, the transmission of network data is also faced with communication monitoring and data tampering. And the risk of a series of typical cyber attacks such as data replay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity card authentication information processing request processing method and identity card cloud authentication device
  • Identity card authentication information processing request processing method and identity card cloud authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] This embodiment provides an ID card authentication information processing request processing method, such as figure 1 shown, including the following steps:

[0034] S1: Receive the ID card authentication information processing request. The ID card authentication information processing request includes: the encrypted value of the ID card serial number and the card reader serial number;

[0035] The ID card processing request is a processing request initiated by the ID card reader. After judging that the ID card processing request is a legitimate processing request, according to preset rules, the ID card processing request is allocated an idle security authentication module, and the assigned security authentication module Perform data interaction with the initiator of the ID card processing request, wherein the encryption value of the ID card serial number is obtained by the ID card reader encrypting the ID card serial number obtained from the ID card, and the card reader...

Embodiment 2

[0113] This embodiment provides an ID card cloud authentication device, such as figure 2 shown, including:

[0114] The first communication module 201 is used to receive an ID card authentication information processing request. The ID card authentication information includes: an encrypted value of an ID card serial number and a card reader serial number, wherein the card reader serial number is ID card information Read the serial number of the terminal;

[0115] The ID card processing request is a processing request initiated by the ID card reader. After determining that the ID card processing request is a legitimate processing request, the ID card cloud authentication platform allocates an idle security authentication module 210 to the ID card processing request according to preset rules. The assigned security authentication module 210 interacts with the initiator of the ID card processing request, wherein the encryption value of the ID card serial number is obtained by the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity card authentication information processing request processing method and device. The method comprises the steps: receiving an identity card authentication information processing request, and obtaining a blacklist; obtaining an access frequency control list if an identity card sequential number and a card reader sequential number are not in the blacklist; judging whether the number of times that the identity card sequential number and / or the card reader sequential number appears in the access frequency control list in a preset time duration before the obtaining of the access frequency control list is greater than a preset value or not: adding the identity card sequential number and / or the card reader sequential number to the blacklist if the number of times that the identity card sequential number and / or the card reader sequential number appears in the access frequency control list are / is greater than the preset value, or obtaining an abnormal rule if the numbers of times that the identity card sequential number and the card reader sequential number appears in the access frequency control list are zero; judging whether the identity card sequential number and / or the card reader sequential number accord with the abnormal rule or not: adding the identity card sequential number and / or the card reader sequential number to the access frequency control list if the identity card sequential number and / or the card reader sequential number accord with the abnormal rule. Therefore, the method achieves the threefold dynamic verification of an identity card and a card reader, and improves the processing safety and reliability of the identity card authentication information processing request.

Description

technical field [0001] The invention relates to the field of electronic technology, and in particular, to a processing method for an ID card authentication information processing request and an ID card cloud authentication device. Background technique [0002] With the rapid development of my country's economy, people's lives have been greatly improved. Whether it is employment, business, tourism, education, etc., identity authentication is required, and processing money, property, applying for benefits, medical treatment, etc., also needs to be carried out. Authentication. The current second-generation resident ID card is designed with a built-in smart chip, which is fully capable of realizing Internet-based identity authentication. However, since its launch in 2004, its application value has not been tapped. In recent years, the ticketing system has begun to be applied on a large scale. ID-based Internet identity authentication and identification. [0003] Due to the actu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/101
Inventor 李明
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products