Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An exception handling method for ID card authentication information processing request

A technology for information processing request and exception handling, applied in the electronic field, which can solve the problems of theft, loss of ID card, malicious use of ID card, etc.

Active Publication Date: 2019-06-28
TENDYRON CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current second-generation resident ID card is designed with a built-in smart chip, which is fully capable of realizing identity authentication based on the Internet. However, since its launch in 2004, its application value is far from being tapped. In recent years, ticketing systems have begun to be used on a large scale Internet Identity Authentication and Identification Based on ID Card
[0003] Due to the actual use of ID card-based Internet identity authentication technology, ID cards are lost or stolen, and there are hazards and risks of malicious use of ID cards that are not authorized by the person; at the same time, the transmission of network data is also faced with communication monitoring and data tampering. And the risk of a series of typical cyber attacks such as data replay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An exception handling method for ID card authentication information processing request
  • An exception handling method for ID card authentication information processing request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] This embodiment provides a method for processing a request for processing ID card authentication information, such as figure 1 shown, including the following steps:

[0025] S1: The scheduling server receives the ID card authentication information processing request, and the ID card authentication information processing request includes: the encrypted value of the ID card serial number and the card reader serial number;

[0026] The ID card processing request is a processing request initiated by the ID card reader. After the scheduling server determines that the ID card processing request is a legal processing request, it allocates an idle security authentication module for the ID card processing request according to the preset rules. The authentication module performs data interaction with the originator of the ID card processing request. The encrypted ID card serial number is obtained by encrypting the ID card serial number obtained from the ID card by the ID card rea...

Embodiment 2

[0104] This embodiment provides an ID card authentication information processing request exception handling system, such as figure 2 As shown, including dispatching server 201 and ID card reader 202:

[0105] Wherein, the ID card reader 202 is used to generate an ID card authentication information processing request, and send the ID card processing request to the scheduling server 201; wherein, the ID card authentication information processing request includes: ID card serial number encryption value and card reading device serial number;

[0106] The scheduling server 201 is configured to receive an ID card authentication information processing request, and obtain the ID card serial number obtained by decrypting the encrypted value of the ID card serial number;

[0107] The scheduling server 201 is also used to obtain the blacklist, and judge whether the ID card serial number is included in the blacklist, and if the ID card serial number is included in the blacklist, then te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an exception handling method for an identity card authentication information processing request. The method comprises the steps: enabling a dispatch server to receive the identity card authentication information processing request, obtaining a blacklist, and obtaining an access frequency management and control list if a serial number of an identity card and a serial number of a card reader are not in the blacklist; obtaining an exception rule if the access frequency management and control list does not contain storage record of the serial number of the identity card in a first preset time interval before the moment when the access frequency management and control list is obtained and the access frequency management and control list does not contain the storage record of the serial number of the card reader in a second preset time interval before the moment when the access frequency management and control list is obtained; carrying out the processing of the identity card authentication information processing request if the serial number of the identity card and the serial number of the card reader do not accord with the exception rule, thereby achieving the triple dynamic verification of the identity card and the identity card reader, and improving the processing safety and reliability of the identity card authentication information processing request.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an abnormal processing method for an ID card authentication information processing request. Background technique [0002] With the rapid development of my country's economy, people's lives have been greatly improved. Regardless of employment, business, tourism, education, etc., identity authentication is required, and handling of money, property, application for benefits, medical treatment, etc. also requires authentication. Authentication. The current second-generation resident ID card is designed with a built-in smart chip, which is fully capable of realizing identity authentication based on the Internet. However, since its launch in 2004, its application value is far from being tapped. In recent years, ticketing systems have begun to be used on a large scale Internet identity authentication and identification based on ID card. [0003] Due to the actual use of ID card-bas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0245H04L63/1425
Inventor 李明
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products