Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent security chip signature information transmission method and system based on 2-dimensional bar code

A security chip and signature information technology, applied in the field of authentication, can solve the problem of difficult data communication between the smart card and the background system, and achieve the effect of reducing user burden, wide application basis, and high security

Active Publication Date: 2016-11-09
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to overcome the shortcomings of the above-mentioned prior art, provide a method and system for transmitting signature information of intelligent security chips based on two-dimensional codes, and solve the problems caused by the unpopularity of card reading equipment in the existing smart card identity authentication application system. It is difficult to communicate data between the smart card and the background system, and realize the compatible transmission of smart card signature information without using a specific smart card reading device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent security chip signature information transmission method and system based on 2-dimensional bar code
  • Intelligent security chip signature information transmission method and system based on 2-dimensional bar code
  • Intelligent security chip signature information transmission method and system based on 2-dimensional bar code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053]In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0054] The purpose of the present invention is to provide a two-dimensional code authentication method based on an intelligent security chip and a cryptographic algorithm, so as to realize the security authentication function of the user login platform, so as to achieve the purpose of security login. At the same time, solve the problems existing in the current application mode, such as users need to write down the account password information under different platforms, if the mobile terminal is attacked by viruses and Trojan horses, and the communication between mobile terminal devices (especially iPhone devices) and smart cards requires an external card reader etc., and can safely log in to the platform system to complete a series of subsequent interactive operations. At present, there is no relevant soluti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an intelligent security chip signature information transmission method and system based on a 2-dimensional bar code. The 2-dimensional bar code is generated by the following steps: an intelligent security chip is inserted into a terminal device; the intelligent security chip is used to put a signature on the original data and thus signature value information is obtained; and the terminal device assemblies the original data, the signature value information and a message verification code to generate a 2-dimensional bar code, and displays the 2-dimensional bar code. Scanning authentication of the 2-dimensional bar code comprises the following steps: an application scans the 2-dimensional bar code, parses the data of the 2-dimensional bar code so as to obtain the to-be-authenticated data, and then sends the to-be-authenticated data to an application background; an authentication center verifies the to-be-authenticated data, and sends a verification result back to the application through the application background. With application of the intelligence security chip signature information transmission method and system based on a 2-dimensional bar code, in an intelligent card identity authentication application system, the problem of poor data communication between an intelligent card and a background system due to unavailable card reading devices is solved, so that comparative transmission of the signature information of the intelligent card is fulfilled without using a particular intelligent card reading device.

Description

technical field [0001] The present invention relates to the technical field of authentication, in particular to the technical field of two-dimensional code authentication, in particular to a method and system for transmitting signature information of an intelligent security chip based on a two-dimensional code. Background technique [0002] With the widespread use of mobile terminal equipment, the security of mobile terminal equipment has attracted more and more attention. When people use mobile terminal devices, they need to log in to websites such as Taobao, Weibo, Community, and Renren. Especially when logging in to a shopping network, the user needs to input a user name and a password. During the authentication process, the user only enters the user name and password, and passwords are used too frequently in people's daily life, so people need to remember many passwords, because if a single password is used, if one platform is compromised, all platforms will face disaste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06G06K7/10
CPCH04L9/3242G09C5/00H04L9/3226H04L9/3234H04L9/3247H04L9/3249G06K7/10821H04L9/0643
Inventor 胡永涛黄俊胥怡心
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products