Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity information processing method, system and corresponding server

An information processing method and identity information technology, applied in the field of identity information processing methods, systems and their corresponding servers, can solve the problems of user privacy leakage, inability to be widely used, and citizens' low awareness of eID, and achieve privacy protection, The effect of improving authenticity and security

Active Publication Date: 2020-12-04
EIDLINK INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] If the above-mentioned methods are adopted, the user's identity information and business information need to be stored in the computer or server. Once a system problem occurs, the user's privacy may be leaked
[0016] Although the eID method can avoid illegal tracking of personal identities, it cannot be widely used due to the low activation of eID carriers on the market and the low awareness of eID among citizens.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity information processing method, system and corresponding server
  • Identity information processing method, system and corresponding server
  • Identity information processing method, system and corresponding server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0129] In this example, if Figure 3-4 As shown, it is a schematic diagram of the overall architecture relationship and business process steps of this embodiment, including the following steps:

[0130] Wherein, the cloud decoding server assigns an application ID (appid) to the client in advance; the cloud decoding server provides the client with a business serial number generation rule.

[0131] 1. The ID card reader detects that there is an ID card that can be read;

[0132] 2. The client requests the cloud decoding server to obtain the card reading instruction and receives the returned card reading instruction;

[0133] 3. The client sends the card reading command to the ID card reader to read the ID card information;

[0134] 4. The ID card reader sends the read undecoded ID card ciphertext information to the client, and the client sends the pre-assigned appid and received undecoded ID card ciphertext information to the cloud decoding server;

[0135] Among them, the ab...

Embodiment 2

[0143] In this example, if Figure 5-6 As shown, it is a schematic diagram of the overall architecture relationship and business process steps of this embodiment, including the following steps:

[0144] Wherein, the cloud decoding server assigns an application number (appid) to the client in advance.

[0145] 1. The ID card reader detects that there is an ID card that can be read;

[0146] 2. The client requests the cloud decoding server to obtain the card reading instruction and receives the returned card reading instruction;

[0147] 3. The client sends the card reading command to the ID card reader to read the ID card information;

[0148] 4. The ID card reader sends the read undecoded ID card ciphertext information to the client, and the client sends the pre-assigned appid and received undecoded ID card ciphertext information to the cloud decoding server;

[0149] Among them, the above 2-4 process needs to be executed multiple times, so as to complete the information co...

Embodiment 3

[0156] In this example, if Figure 7-8 As shown, it is a schematic diagram of the overall architecture relationship and business process steps of this embodiment, including the following steps:

[0157] Wherein, the cloud decoding server assigns an application number (appid) to the client in advance.

[0158] 1. The ID card reader detects that there is an ID card that can be read;

[0159] 2. The client requests the cloud decoding server to obtain the card reading instruction and receives the returned card reading instruction;

[0160] 3. The client sends the card reading command to the ID card reader to read the ID card information;

[0161] 4. The ID card reader sends the read undecoded ID card ciphertext information to the client, and the client sends the pre-assigned appid, received undecoded ID card ciphertext information and business information to Cloud Decoding server;

[0162] Among them, the above 2-4 process needs to be executed multiple times, so as to complete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of Internet and provides an identity information processing method and system and a corresponding server. The identity information processing system comprises a terminal with an ID card reading function, a client for controlling the terminal to read an ID card and receive ID card ciphertext information which is not decoded and is received by the terminal, a cloud decoding server which carries out decoding related processing on the ID card ciphertext information which is not decoded and is received by the client and is remotely connected to the client through the Internet, an eID special device for generating an eID code, a client server for providing background service for the client, and a supervision server which receives identity information and the eID code uploaded by the cloud decoding server. In the invention, while the privacy of the real identity information of the user is protected, the authenticity and security of the identity authentication are improved, and the timely supervision of the identity information by the supervision server is ensured.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to an identity information processing method, system and corresponding server. Background technique [0002] The eID code is the abbreviation of the Ministry of Public Security's citizen network identity application identification (appeIDcode), which refers to the identity code used by users in specific network applications, and is widely used in privacy protection, real-name authentication and other fields. The code is generated by the identity information through a special device, and the same user will get different codes in different network applications, that is, appeIDcode. appeIDcode can effectively prevent users' behavioral data in different network applications from being aggregated, analyzed and tracked, and protect personal identity and privacy information to the greatest extent. [0003] Through the front-end third-party app or background service interface,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06G06F21/31G06F21/32
CPCG06F21/31G06F21/32H04L9/32H04L63/08H04L63/0853H04L63/0861
Inventor 董成根严硕刘海龙郭宏杰亓文华
Owner EIDLINK INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products