CN104008608B - A kind of method and system of any release identity - Google Patents

A kind of method and system of any release identity Download PDF

Info

Publication number
CN104008608B
CN104008608B CN201410232795.9A CN201410232795A CN104008608B CN 104008608 B CN104008608 B CN 104008608B CN 201410232795 A CN201410232795 A CN 201410232795A CN 104008608 B CN104008608 B CN 104008608B
Authority
CN
China
Prior art keywords
data
release
encapsulation
terminal
service end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410232795.9A
Other languages
Chinese (zh)
Other versions
CN104008608A (en
Inventor
刘淦明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Original Assignee
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shiyuan Electronics Thecnology Co Ltd filed Critical Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority to CN201410232795.9A priority Critical patent/CN104008608B/en
Publication of CN104008608A publication Critical patent/CN104008608A/en
Application granted granted Critical
Publication of CN104008608B publication Critical patent/CN104008608B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses the method and system of a kind of any release identity, described method includes: the data of any release read are tested by terminal, data with privately owned encryption or not described any release of encryption are packaged with two kinds of different data forms respectively, and the data after encapsulation are sent to service end;The data form of the data after the described encapsulation that described service end will receive detects, according to two kinds of different data forms, the data after described encapsulation are carried out two kinds of different data to process, thus obtain and wherein as the identification information of user identity, and can be determined by the identification information of described user identity and registered to the described any release Yes/No of described terminal return.The invention also discloses the system of a kind of any release identity.Use embodiments of the invention, be not only able to reduce cost for enterprise and user, improve Consumer's Experience, and save resource.

Description

A kind of method and system of any release identity
Technical field
The present invention relates to electronic information technical field, a kind of method particularly relating to any release identity And system.
Background technology
At present, identity card common on market has magnetic stripe card, IC-card and nfc card, and these block It is divided into encrypted card and unencryption card.In the case of the occasion needing authentication is more and more, the body of needs Part tag card also gets more and more, such as some chain department stores or the member card etc. of club.User is different Can handle different identity cards under functional requirement, increasing card not only brings user to card Keeping, classify and use on puzzlement, also bring the waste of resource.
User is typically owned by the identity card that some are required, such as identity card, social security card or bank card, The encryption often of these card informations, the information after encryption typically can not use.It is not desired to increase by one user In the case of member card, if ciphertext secondary utilization can be read on the premise of not revealing personal information, make It is member card with the information registering of these encrypted cards, is not only able to improve the experience of user, and can Cost-effective and resource.
Summary of the invention
The many aspects of the present invention provide a kind of method of any release identity and any information clamp The system of part mark, it is possible in the case of not revealing personal information, secondary utilizes the card of privately owned encryption.
One aspect of the present invention provides a kind of method of any release identity, including step:
The data of any release read are tested by A1, terminal, to privately owned encryption or do not have The data of described any release of encryption are packaged with two kinds of different data forms respectively, and will encapsulation After data be sent to service end;
The data form of the data after the described encapsulation that A2, described service end will receive detects, according to Two kinds of different data forms carry out two kinds of different data and process the data after described encapsulation, thus obtain Wherein can as the identification information of user identity, and determined by the identification information of described user identity and to It is registered that described terminal returns described any release Yes/No.
Another aspect of the present invention provides the system of a kind of any card information identity, including:
Terminal, for testing the data of any release read, to privately owned encryption or do not have The data having described any release of encryption are packaged with two kinds of different data forms respectively, and will envelope Data after dress are sent to service end;
Service end, the data form of the data after the described encapsulation that will receive detects, according to two Plant different data forms and the data after described encapsulation are carried out two kinds of different data process, thus obtain it In as the identification information of user identity, and can be determined by the identification information of described user identity and to institute State the described any release Yes/No of terminal return registered.
The embodiment of the present invention carries out follow-up secondary utilization to privately owned encrypted card, not only reduces into user for enterprise This, improve Consumer's Experience, and save resource.
Accompanying drawing explanation
Fig. 1 is the step schematic diagram of a kind of method of any release identity in the embodiment of the present invention;
Fig. 2 is the data detection method for packing step schematic diagram of terminal in the embodiment of the present invention;
Fig. 3 is the data operation lookup method step schematic diagram of service end in the embodiment of the present invention;
Fig. 4 is the method step schematic diagram of S algorithm in the embodiment of the present invention;
Fig. 5 is the structural representation of the system of a kind of any release identity in the embodiment of the present invention;
Fig. 6 is the structural representation of the terminal of the system shown in Fig. 5;
Fig. 7 is the structural representation of the service end of the system shown in Fig. 5.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly Chu, it is fully described by.
Seeing Fig. 1, the present embodiment provides a kind of method of any release identity, including step:
The data of any release read are tested by S1, terminal, to privately owned encryption or do not have The data of described any release of encryption are packaged with two kinds of different data forms respectively, and will encapsulation After data be sent to service end;
The data form of the data after the described encapsulation that S2, described service end will receive detects, according to Two kinds of different data forms carry out two kinds of different data and process the data after described encapsulation, thus obtain Wherein can as the identification information of user identity, and determined by the identification information of described user identity and to It is registered that described terminal returns described any release Yes/No.
Wherein, described identification information be the card number of described any release or other there is the serial number of mark.
Further, seeing Fig. 2, operating procedure S1 of described terminal can specifically include following steps:
S11, the omnipotent card reader of described terminal are read after being mated with described any release by corresponding agreement The data of described any release;
Whether the described data read are examined by S12, the data checking module of described terminal by privately owned encryption Testing, if then jumping to step S14, otherwise continuing step S13;
The described data of not encryption are packaged by S13, the data package module of described terminal with B form, Then jump to step S15;Wherein, described B form is a kind of self-defining data encapsulation format, specially to not having Data after having by privately owned encryption carry out secondary encapsulation, and are provided with the mark of this form in encapsulation fields beginning Character learning section;
Described data after privately owned encryption are sealed by S14, the data package module of described terminal with A form Dress;Wherein, described A form is a kind of self-defining data encapsulation format, specially to by after privately owned encryption Data carry out secondary encapsulation, are provided with the identification field of this form in encapsulation fields beginning simultaneously;
S15, by terminal communications interface encapsulation after data message be sent to service end.
Concrete, in described step S12, the data checking module of described terminal is in the following way to reading Whether the described data taken are tested by privately owned encryption: described in the detection reading of corresponding card protocol format Whether data meet regulation in agreement, if meeting, it is believed that data are unencrypteds, otherwise are then considered Encrypted processed.
By above-mentioned steps, described terminal can be by the data after the unencryption read and privately owned encryption with two Plant different forms to be packaged, and be provided with the identification field of corresponding format in corresponding encapsulation fields, then Data after secondary encapsulation are sent to described service end.
Seeing Fig. 3, operating procedure S2 of described service end specifically includes following steps:
S21, the communication interface of described service end receive the data of any release that described terminal sends and carry Send to operation processing unit;
Data are detected by S22, the operation processing unit of described service end, according to encapsulation fields beginning Identification field judge that encapsulation of data is described A form or described B form, if A form then jump to step Rapid S25, if B form then continues step S23;Wherein, described A form is a kind of self-defining data Encapsulation format, carries out secondary encapsulation to by the data after privately owned encryption specially, simultaneously in encapsulation fields beginning It is provided with the identification field of this form;Described B form is a kind of self-defining data encapsulation format, specially to not having Carried out secondary encapsulation by the data after privately owned encryption, and be provided with the mark of this form in encapsulation fields beginning Field;
S23, data to described B form obtain the real information of described any release after carrying out inverse operation;
S24, the card number obtained in the real information of described any release or other there is the sequence of mark action Number is as described identification information;Then go to step S27;
S25, data to described A form obtain the cipher-text information of described any release after carrying out inverse operation,
S26, the data with mark action obtained by S algorithm are as described identification information;
S27, the described mark letter obtained in lookup above step in the data storage cell of described service end Breath, if finding, then jumps to step 29, otherwise continues step 28;
S28, point out described any release unregistered, described any release can be registered.
S29, pointing out described any release registered, authentication is passed through.
Concrete, seeing Fig. 4, described S algorithm comprises the following steps:
S31, obtain the cipher-text information of described any release, it is judged that whether its data length is more than L (unit For bit), if more than L, continuing step S32, otherwise jumping to step S33;
If S32 is more than L, in front after intercept L1, L2, L3 data so that L1+L2+L3=L As described identification information;
S33, directly using all cipher-text information as described identification information.
That use that the data that get of this method either can be cracked or can not be cracked, obtain wherein Representative data (either in plain text or ciphertext) carry out secondary utilization, and as unique identities registration and Authentication information, all as user's registration information and identity, thus can reduce cost, be substantially improved use Family is experienced.
The embodiment of the present invention also provides for the system of a kind of any card information identity, sees Fig. 5, described system Including:
Terminal 1, for testing the data of any release read, to privately owned encryption or do not have The data having described any release of encryption are packaged with two kinds of different data forms respectively, and will envelope Data after dress are sent to service end.
Service end 2, the data form of the data after the described encapsulation that will receive detects, according to two Plant different data forms and the data after described encapsulation are carried out two kinds of different data process, thus obtain it In as the identification information of user identity, and can be determined by the identification information of described user identity and to institute State the described any release Yes/No of terminal return registered.
Further, see figure, 6, described terminal includes following functions device or module:
Omnipotent card reader 11
See Fig. 2, support various different cards agreement, for by corresponding agreement and described any release The data of described any release are read after joining.
Data checking module 12
Whether the described data read are tested by privately owned encryption.Concrete, see Fig. 2, described terminal Data checking module in the following way to read described data whether tested by privately owned encryption: with Whether the described data that corresponding card protocol format detection is read meet regulation in agreement, if meeting, can recognize It is unencrypted for data, otherwise is then considered by privately owned encryption.
Data package module 13
See Fig. 2, receive the testing result of described data checking module, according to testing result with A, B form Specially the described data after privately owned encryption or do not encrypted are carried out secondary encapsulation, start in encapsulation fields simultaneously Part is provided with the identification field of corresponding format.
Terminal communications interface 14
Data communication is carried out, for the data message after encapsulation is sent to service end with service end communication interface. Communication modes wherein and between service end interface can be wired, it is also possible to is wireless.
It has to be noted that described terminal can be by increasing data checking module in existing omnipotent card reader Realize with described data package module.
Seeing Fig. 7, described service end includes following functions unit:
Service end communication interface 21
Data communication is carried out, for receiving the number of any release that described terminal sends with terminal communications interface According to and be submitted to operation processing unit.
Data storage cell 22
For storing all registered card informations.
Operation processing unit 23
See Fig. 3, carry out data detecting data, judge envelope according to the identification field of encapsulation fields beginning Dress data are described A form or described B form;If described B form, then data are carried out inverse operation After obtain the real information of described any release, obtain the card number of described any release or other have mark The serial number of knowledge effect is as described identification information;If described A form, then after data carry out inverse operation Obtain the cipher-text information of described any release, the data conduct with mark action obtained by S algorithm Described identification information;It is additionally operable to store in described data according to the identification information that operation processing unit obtains Unit makes a look up, if finding, then points out described any release registered, and authentication is passed through;Otherwise Point out described any release unregistered, described any release can be registered.Wherein, see Fig. 4, Described S algorithm is in the cipher-text information obtaining described any release, it is judged that whether its data length is more than L, If more than L, in front after intercept L1, L2, L3 data so that L1+L2+L3=L is as described Identification information;Otherwise directly using all cipher-text information as described identification information.
In the case of using this device to can be implemented in and do not reveal personal information, secondary utilizes unencryption or privately owned The card of encryption, obtains by the way of two kinds are different and makees unique identities registration and the information of certification, thus by it As new user's registration information and identity, thus reduce cost, be substantially improved user and embody.
The above is the preferred embodiment of the present invention, it is noted that for the common skill of the art For art personnel, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, this A little improvements and modifications are also considered as protection scope of the present invention.

Claims (8)

1. the method for any release identity, it is characterised in that include step:
The data of any release read are tested by A1, terminal, to privately owned encryption or do not have The data of described any release of encryption are packaged with two kinds of different data forms respectively, and will encapsulation After data be sent to service end;
The data form of the data after the described encapsulation that A2, described service end will receive detects, according to Two kinds of different data forms carry out two kinds of different data and process the data after described encapsulation, thus obtain Wherein can as the identification information of user identity, and determined by the identification information of described user identity and to It is registered that described terminal returns described any release Yes/No.
The method of a kind of any release identity the most as claimed in claim 1, it is characterised in that institute State step A1 and include step:
A11, the omnipotent card reader of described terminal are read after being mated with described any release by corresponding agreement The data of described any release;
Whether the described data read are examined by A12, the data checking module of described terminal by privately owned encryption Testing, if then jumping to step A14, otherwise continuing step A13;
The described data of not encryption are packaged by A13, the data package module of described terminal with B form, Then jump to step A15;Wherein, described B form is a kind of self-defining data encapsulation format, specially to not having Data after having by privately owned encryption carry out secondary encapsulation, and are provided with the mark of this form in encapsulation fields beginning Character learning section;
Described data after privately owned encryption are sealed by A14, the data package module of described terminal with A form Dress;Wherein, described A form is a kind of self-defining data encapsulation format, specially to by after privately owned encryption Data carry out secondary encapsulation, are provided with the identification field of this form in encapsulation fields beginning simultaneously;
A15, by terminal communications interface encapsulation after data message be sent to service end.
The method of a kind of any release identity the most as claimed in claim 2, it is characterised in that In described step A12, the described data read are by the data checking module of described terminal in the following way No tested by privately owned encryption: whether meet association with the described data that the detection of corresponding card protocol format is read Regulation in view, if meeting, it is believed that data are unencrypteds, otherwise are then considered encrypted and processed.
The method of a kind of any release identity the most as claimed in claim 2, it is characterised in that institute State step A2 and specifically include step:
A21, the communication interface of described service end receive the data of any release that described terminal sends and carry Send to operation processing unit;
Data are carried out detecting data by A22, the operation processing unit of described service end, start according to encapsulation fields The identification field of part judges that encapsulation of data is described A form or described B form, if A form is then jumped To step A24, if B form then continues step A23;
A23, data to described B form obtain the real information of described any release after carrying out inverse operation, The card number or other serial numbers with mark action that obtain described any release are believed as described mark Breath;
A24, data to described A form obtain the cipher-text information of described any release after carrying out inverse operation, The data with mark action obtained by S algorithm are as described identification information;Described S algorithm is to obtain Cipher-text information to described any release, it is judged that whether its data length is more than L, if more than L, distinguishing L1, L2, L3 data so that L1+L2+L3=L is as described identification information are intercepted after Yu Qianzhong;Otherwise Directly using all cipher-text information as described identification information;
A25, the described mark letter obtained in lookup above step in the data storage cell of described service end Breath, if finding, then points out described any release registered, and authentication is passed through;Otherwise prompting is described appoints Meaning release is unregistered, can register described any release.
5. the system of any release identity, it is characterised in that including:
Terminal, for testing the data of any release read, to privately owned encryption or do not have The data having described any release of encryption are packaged with two kinds of different data forms respectively, and will envelope Data after dress are sent to service end;
Service end, the data form of the data after the described encapsulation that will receive detects, according to two Plant different data forms and the data after described encapsulation are carried out two kinds of different data process, thus obtain it In as the identification information of user identity, and can be determined by the identification information of described user identity and to institute State the described any release Yes/No of terminal return registered.
The system of a kind of any release identity the most as claimed in claim 5, it is characterised in that institute State terminal to include:
Omnipotent card reader, supports various different cards agreement, for by corresponding agreement and described any information The data of described any release are read after card coupling;
Whether the described data read are tested by data checking module by privately owned encryption;
Data package module, receives the testing result of described data checking module, according to testing result with A, B Form carries out secondary encapsulation, simultaneously in encapsulation fields to the described data after privately owned encryption or do not encrypted specially Beginning is provided with the identification field of corresponding format;
Terminal communications interface, carries out data communication with service end communication interface, for the data letter after encapsulation Breath is sent to service end.
The system of a kind of any release identity the most as claimed in claim 6, it is characterised in that institute Whether the described data read are examined by data checking module in the following way that state terminal by privately owned encryption Test: whether the described data read with the detection of corresponding card protocol format meet regulation in agreement, if meeting Then it is believed that data are unencrypteds, otherwise then it is considered by privately owned encryption.
The system of a kind of any release identity the most as claimed in claim 6, it is characterised in that institute State service end to include:
Service end communication interface, carries out data communication with terminal communications interface, is used for receiving described terminal and sends The data of any release and be submitted to operation processing unit;
Data storage cell, is used for storing all registered card informations;
Data are carried out detecting data, according to the identification field of encapsulation fields beginning by operation processing unit Judge that encapsulation of data is described A form or described B form;If described B form, then data are carried out Obtain the real information of described any release after inverse operation, obtain the card number of described any release or other There is the serial number of mark action as described identification information;If described A form, then data carry out inverse The cipher-text information of described any release is obtained, the number with mark action obtained by S algorithm after computing According to as described identification information;The identification information being additionally operable to obtain according to operation processing unit is at described number Making a look up according to memory cell, if finding, then pointing out described any release registered, authentication is passed through; Otherwise point out described any release unregistered, described any release can be registered;Described S calculates Method is in the cipher-text information obtaining described any release, it is judged that whether its data length is more than L, if more than L L1, L2, L3 data are intercepted so that L1+L2+L3=L is as described identification information after then in front; Otherwise directly using all cipher-text information as described identification information.
CN201410232795.9A 2014-05-28 2014-05-28 A kind of method and system of any release identity Active CN104008608B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410232795.9A CN104008608B (en) 2014-05-28 2014-05-28 A kind of method and system of any release identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410232795.9A CN104008608B (en) 2014-05-28 2014-05-28 A kind of method and system of any release identity

Publications (2)

Publication Number Publication Date
CN104008608A CN104008608A (en) 2014-08-27
CN104008608B true CN104008608B (en) 2016-08-17

Family

ID=51369244

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410232795.9A Active CN104008608B (en) 2014-05-28 2014-05-28 A kind of method and system of any release identity

Country Status (1)

Country Link
CN (1) CN104008608B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108038995A (en) * 2017-12-08 2018-05-15 四川安亮科技有限公司 Terminating machine for financial authentication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101093548A (en) * 2007-07-13 2007-12-26 天津征信信息技术有限公司 Method and device by using identity card of residents in second generation as medium of ID authentication
CN202003424U (en) * 2011-03-31 2011-10-05 成都国腾实业集团有限公司 Access control system supporting second-generation ID card and residence permit
CN102567860A (en) * 2012-02-13 2012-07-11 黄启迪 Member function system based on identity card recognition function

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003162986A (en) * 2001-11-27 2003-06-06 Sanyo Electric Co Ltd Id generating device and id confirming device
GB2495704B (en) * 2011-10-12 2014-03-26 Technology Business Man Ltd ID Authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101093548A (en) * 2007-07-13 2007-12-26 天津征信信息技术有限公司 Method and device by using identity card of residents in second generation as medium of ID authentication
CN202003424U (en) * 2011-03-31 2011-10-05 成都国腾实业集团有限公司 Access control system supporting second-generation ID card and residence permit
CN102567860A (en) * 2012-02-13 2012-07-11 黄启迪 Member function system based on identity card recognition function

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A Modified Dynamic ID-based User Authentication Scheme;Xin Zhang et al;《Communications,Circuits and System Proceedings,2006 International Conference on》;20060630;第3卷;第1602-1604页 *
使用智能卡的动态口令认证机制;邓飞进等;《计算机工程》;20051220;第172-174页 *

Also Published As

Publication number Publication date
CN104008608A (en) 2014-08-27

Similar Documents

Publication Publication Date Title
CN105554037B (en) Authentication processing method and service platform
CN109417481A (en) Safety is improved by the temporary key of the virtual non-contact card of software in mobile phone
CN104301119B (en) Data signature method, signature verification method, data signature equipment and authentication server
CN103929411B (en) Information displaying method, terminal, safety server and system
EP3698535A1 (en) Privacy preserving tag
CN104935441B (en) A kind of authentication method and relevant apparatus, system
CN107018130A (en) A kind of identity card cloud recognizes Verification System
US20150278798A1 (en) Method for protecting sensitive data transmitted in an nfc system
CN106534171B (en) Security authentication method, device and terminal
CN103338110B (en) RFID safety authentication based on dynamic I D band search key
Markantonakis et al. Errata to: Secure smart embedded devices, platforms and applications
US20170366925A1 (en) Nfc-based communication device and method
SI23114A (en) Procedure for the verification of the authenticity of a rfid label
CN105844747A (en) Station entrance identity authentication method based on two-dimensional code
CN102711109A (en) Method for performing identity authentication on mobile terminal
KR101168272B1 (en) The system of issuing nfc ticket and method thereof
KR20130048695A (en) An authentication system, authentication method and authentication server
CN102790676A (en) Remote identity identification or security method utilizing mobile phone with near field communication (NFC) function
CN103856940A (en) Security authentication method and system
CN205845052U (en) Identity card card-reading system and be not provided with the card reader of SAM module
CN104754568A (en) Identity recognition method and device based on NFC (Near Field Communication)
CN105741116A (en) Fast payment method, apparatus and system
CN106203556B (en) A kind of method and device reading electronic labeling information
CN104008608B (en) A kind of method and system of any release identity
CN107302434A (en) The method of calibration and system of Electronic Signature

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant