CN104008608B - A kind of method and system of any release identity - Google Patents
A kind of method and system of any release identity Download PDFInfo
- Publication number
- CN104008608B CN104008608B CN201410232795.9A CN201410232795A CN104008608B CN 104008608 B CN104008608 B CN 104008608B CN 201410232795 A CN201410232795 A CN 201410232795A CN 104008608 B CN104008608 B CN 104008608B
- Authority
- CN
- China
- Prior art keywords
- data
- release
- encapsulation
- terminal
- service end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses the method and system of a kind of any release identity, described method includes: the data of any release read are tested by terminal, data with privately owned encryption or not described any release of encryption are packaged with two kinds of different data forms respectively, and the data after encapsulation are sent to service end;The data form of the data after the described encapsulation that described service end will receive detects, according to two kinds of different data forms, the data after described encapsulation are carried out two kinds of different data to process, thus obtain and wherein as the identification information of user identity, and can be determined by the identification information of described user identity and registered to the described any release Yes/No of described terminal return.The invention also discloses the system of a kind of any release identity.Use embodiments of the invention, be not only able to reduce cost for enterprise and user, improve Consumer's Experience, and save resource.
Description
Technical field
The present invention relates to electronic information technical field, a kind of method particularly relating to any release identity
And system.
Background technology
At present, identity card common on market has magnetic stripe card, IC-card and nfc card, and these block
It is divided into encrypted card and unencryption card.In the case of the occasion needing authentication is more and more, the body of needs
Part tag card also gets more and more, such as some chain department stores or the member card etc. of club.User is different
Can handle different identity cards under functional requirement, increasing card not only brings user to card
Keeping, classify and use on puzzlement, also bring the waste of resource.
User is typically owned by the identity card that some are required, such as identity card, social security card or bank card,
The encryption often of these card informations, the information after encryption typically can not use.It is not desired to increase by one user
In the case of member card, if ciphertext secondary utilization can be read on the premise of not revealing personal information, make
It is member card with the information registering of these encrypted cards, is not only able to improve the experience of user, and can
Cost-effective and resource.
Summary of the invention
The many aspects of the present invention provide a kind of method of any release identity and any information clamp
The system of part mark, it is possible in the case of not revealing personal information, secondary utilizes the card of privately owned encryption.
One aspect of the present invention provides a kind of method of any release identity, including step:
The data of any release read are tested by A1, terminal, to privately owned encryption or do not have
The data of described any release of encryption are packaged with two kinds of different data forms respectively, and will encapsulation
After data be sent to service end;
The data form of the data after the described encapsulation that A2, described service end will receive detects, according to
Two kinds of different data forms carry out two kinds of different data and process the data after described encapsulation, thus obtain
Wherein can as the identification information of user identity, and determined by the identification information of described user identity and to
It is registered that described terminal returns described any release Yes/No.
Another aspect of the present invention provides the system of a kind of any card information identity, including:
Terminal, for testing the data of any release read, to privately owned encryption or do not have
The data having described any release of encryption are packaged with two kinds of different data forms respectively, and will envelope
Data after dress are sent to service end;
Service end, the data form of the data after the described encapsulation that will receive detects, according to two
Plant different data forms and the data after described encapsulation are carried out two kinds of different data process, thus obtain it
In as the identification information of user identity, and can be determined by the identification information of described user identity and to institute
State the described any release Yes/No of terminal return registered.
The embodiment of the present invention carries out follow-up secondary utilization to privately owned encrypted card, not only reduces into user for enterprise
This, improve Consumer's Experience, and save resource.
Accompanying drawing explanation
Fig. 1 is the step schematic diagram of a kind of method of any release identity in the embodiment of the present invention;
Fig. 2 is the data detection method for packing step schematic diagram of terminal in the embodiment of the present invention;
Fig. 3 is the data operation lookup method step schematic diagram of service end in the embodiment of the present invention;
Fig. 4 is the method step schematic diagram of S algorithm in the embodiment of the present invention;
Fig. 5 is the structural representation of the system of a kind of any release identity in the embodiment of the present invention;
Fig. 6 is the structural representation of the terminal of the system shown in Fig. 5;
Fig. 7 is the structural representation of the service end of the system shown in Fig. 5.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly
Chu, it is fully described by.
Seeing Fig. 1, the present embodiment provides a kind of method of any release identity, including step:
The data of any release read are tested by S1, terminal, to privately owned encryption or do not have
The data of described any release of encryption are packaged with two kinds of different data forms respectively, and will encapsulation
After data be sent to service end;
The data form of the data after the described encapsulation that S2, described service end will receive detects, according to
Two kinds of different data forms carry out two kinds of different data and process the data after described encapsulation, thus obtain
Wherein can as the identification information of user identity, and determined by the identification information of described user identity and to
It is registered that described terminal returns described any release Yes/No.
Wherein, described identification information be the card number of described any release or other there is the serial number of mark.
Further, seeing Fig. 2, operating procedure S1 of described terminal can specifically include following steps:
S11, the omnipotent card reader of described terminal are read after being mated with described any release by corresponding agreement
The data of described any release;
Whether the described data read are examined by S12, the data checking module of described terminal by privately owned encryption
Testing, if then jumping to step S14, otherwise continuing step S13;
The described data of not encryption are packaged by S13, the data package module of described terminal with B form,
Then jump to step S15;Wherein, described B form is a kind of self-defining data encapsulation format, specially to not having
Data after having by privately owned encryption carry out secondary encapsulation, and are provided with the mark of this form in encapsulation fields beginning
Character learning section;
Described data after privately owned encryption are sealed by S14, the data package module of described terminal with A form
Dress;Wherein, described A form is a kind of self-defining data encapsulation format, specially to by after privately owned encryption
Data carry out secondary encapsulation, are provided with the identification field of this form in encapsulation fields beginning simultaneously;
S15, by terminal communications interface encapsulation after data message be sent to service end.
Concrete, in described step S12, the data checking module of described terminal is in the following way to reading
Whether the described data taken are tested by privately owned encryption: described in the detection reading of corresponding card protocol format
Whether data meet regulation in agreement, if meeting, it is believed that data are unencrypteds, otherwise are then considered
Encrypted processed.
By above-mentioned steps, described terminal can be by the data after the unencryption read and privately owned encryption with two
Plant different forms to be packaged, and be provided with the identification field of corresponding format in corresponding encapsulation fields, then
Data after secondary encapsulation are sent to described service end.
Seeing Fig. 3, operating procedure S2 of described service end specifically includes following steps:
S21, the communication interface of described service end receive the data of any release that described terminal sends and carry
Send to operation processing unit;
Data are detected by S22, the operation processing unit of described service end, according to encapsulation fields beginning
Identification field judge that encapsulation of data is described A form or described B form, if A form then jump to step
Rapid S25, if B form then continues step S23;Wherein, described A form is a kind of self-defining data
Encapsulation format, carries out secondary encapsulation to by the data after privately owned encryption specially, simultaneously in encapsulation fields beginning
It is provided with the identification field of this form;Described B form is a kind of self-defining data encapsulation format, specially to not having
Carried out secondary encapsulation by the data after privately owned encryption, and be provided with the mark of this form in encapsulation fields beginning
Field;
S23, data to described B form obtain the real information of described any release after carrying out inverse operation;
S24, the card number obtained in the real information of described any release or other there is the sequence of mark action
Number is as described identification information;Then go to step S27;
S25, data to described A form obtain the cipher-text information of described any release after carrying out inverse operation,
S26, the data with mark action obtained by S algorithm are as described identification information;
S27, the described mark letter obtained in lookup above step in the data storage cell of described service end
Breath, if finding, then jumps to step 29, otherwise continues step 28;
S28, point out described any release unregistered, described any release can be registered.
S29, pointing out described any release registered, authentication is passed through.
Concrete, seeing Fig. 4, described S algorithm comprises the following steps:
S31, obtain the cipher-text information of described any release, it is judged that whether its data length is more than L (unit
For bit), if more than L, continuing step S32, otherwise jumping to step S33;
If S32 is more than L, in front after intercept L1, L2, L3 data so that L1+L2+L3=L
As described identification information;
S33, directly using all cipher-text information as described identification information.
That use that the data that get of this method either can be cracked or can not be cracked, obtain wherein
Representative data (either in plain text or ciphertext) carry out secondary utilization, and as unique identities registration and
Authentication information, all as user's registration information and identity, thus can reduce cost, be substantially improved use
Family is experienced.
The embodiment of the present invention also provides for the system of a kind of any card information identity, sees Fig. 5, described system
Including:
Terminal 1, for testing the data of any release read, to privately owned encryption or do not have
The data having described any release of encryption are packaged with two kinds of different data forms respectively, and will envelope
Data after dress are sent to service end.
Service end 2, the data form of the data after the described encapsulation that will receive detects, according to two
Plant different data forms and the data after described encapsulation are carried out two kinds of different data process, thus obtain it
In as the identification information of user identity, and can be determined by the identification information of described user identity and to institute
State the described any release Yes/No of terminal return registered.
Further, see figure, 6, described terminal includes following functions device or module:
Omnipotent card reader 11
See Fig. 2, support various different cards agreement, for by corresponding agreement and described any release
The data of described any release are read after joining.
Data checking module 12
Whether the described data read are tested by privately owned encryption.Concrete, see Fig. 2, described terminal
Data checking module in the following way to read described data whether tested by privately owned encryption: with
Whether the described data that corresponding card protocol format detection is read meet regulation in agreement, if meeting, can recognize
It is unencrypted for data, otherwise is then considered by privately owned encryption.
Data package module 13
See Fig. 2, receive the testing result of described data checking module, according to testing result with A, B form
Specially the described data after privately owned encryption or do not encrypted are carried out secondary encapsulation, start in encapsulation fields simultaneously
Part is provided with the identification field of corresponding format.
Terminal communications interface 14
Data communication is carried out, for the data message after encapsulation is sent to service end with service end communication interface.
Communication modes wherein and between service end interface can be wired, it is also possible to is wireless.
It has to be noted that described terminal can be by increasing data checking module in existing omnipotent card reader
Realize with described data package module.
Seeing Fig. 7, described service end includes following functions unit:
Service end communication interface 21
Data communication is carried out, for receiving the number of any release that described terminal sends with terminal communications interface
According to and be submitted to operation processing unit.
Data storage cell 22
For storing all registered card informations.
Operation processing unit 23
See Fig. 3, carry out data detecting data, judge envelope according to the identification field of encapsulation fields beginning
Dress data are described A form or described B form;If described B form, then data are carried out inverse operation
After obtain the real information of described any release, obtain the card number of described any release or other have mark
The serial number of knowledge effect is as described identification information;If described A form, then after data carry out inverse operation
Obtain the cipher-text information of described any release, the data conduct with mark action obtained by S algorithm
Described identification information;It is additionally operable to store in described data according to the identification information that operation processing unit obtains
Unit makes a look up, if finding, then points out described any release registered, and authentication is passed through;Otherwise
Point out described any release unregistered, described any release can be registered.Wherein, see Fig. 4,
Described S algorithm is in the cipher-text information obtaining described any release, it is judged that whether its data length is more than L,
If more than L, in front after intercept L1, L2, L3 data so that L1+L2+L3=L is as described
Identification information;Otherwise directly using all cipher-text information as described identification information.
In the case of using this device to can be implemented in and do not reveal personal information, secondary utilizes unencryption or privately owned
The card of encryption, obtains by the way of two kinds are different and makees unique identities registration and the information of certification, thus by it
As new user's registration information and identity, thus reduce cost, be substantially improved user and embody.
The above is the preferred embodiment of the present invention, it is noted that for the common skill of the art
For art personnel, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, this
A little improvements and modifications are also considered as protection scope of the present invention.
Claims (8)
1. the method for any release identity, it is characterised in that include step:
The data of any release read are tested by A1, terminal, to privately owned encryption or do not have
The data of described any release of encryption are packaged with two kinds of different data forms respectively, and will encapsulation
After data be sent to service end;
The data form of the data after the described encapsulation that A2, described service end will receive detects, according to
Two kinds of different data forms carry out two kinds of different data and process the data after described encapsulation, thus obtain
Wherein can as the identification information of user identity, and determined by the identification information of described user identity and to
It is registered that described terminal returns described any release Yes/No.
The method of a kind of any release identity the most as claimed in claim 1, it is characterised in that institute
State step A1 and include step:
A11, the omnipotent card reader of described terminal are read after being mated with described any release by corresponding agreement
The data of described any release;
Whether the described data read are examined by A12, the data checking module of described terminal by privately owned encryption
Testing, if then jumping to step A14, otherwise continuing step A13;
The described data of not encryption are packaged by A13, the data package module of described terminal with B form,
Then jump to step A15;Wherein, described B form is a kind of self-defining data encapsulation format, specially to not having
Data after having by privately owned encryption carry out secondary encapsulation, and are provided with the mark of this form in encapsulation fields beginning
Character learning section;
Described data after privately owned encryption are sealed by A14, the data package module of described terminal with A form
Dress;Wherein, described A form is a kind of self-defining data encapsulation format, specially to by after privately owned encryption
Data carry out secondary encapsulation, are provided with the identification field of this form in encapsulation fields beginning simultaneously;
A15, by terminal communications interface encapsulation after data message be sent to service end.
The method of a kind of any release identity the most as claimed in claim 2, it is characterised in that
In described step A12, the described data read are by the data checking module of described terminal in the following way
No tested by privately owned encryption: whether meet association with the described data that the detection of corresponding card protocol format is read
Regulation in view, if meeting, it is believed that data are unencrypteds, otherwise are then considered encrypted and processed.
The method of a kind of any release identity the most as claimed in claim 2, it is characterised in that institute
State step A2 and specifically include step:
A21, the communication interface of described service end receive the data of any release that described terminal sends and carry
Send to operation processing unit;
Data are carried out detecting data by A22, the operation processing unit of described service end, start according to encapsulation fields
The identification field of part judges that encapsulation of data is described A form or described B form, if A form is then jumped
To step A24, if B form then continues step A23;
A23, data to described B form obtain the real information of described any release after carrying out inverse operation,
The card number or other serial numbers with mark action that obtain described any release are believed as described mark
Breath;
A24, data to described A form obtain the cipher-text information of described any release after carrying out inverse operation,
The data with mark action obtained by S algorithm are as described identification information;Described S algorithm is to obtain
Cipher-text information to described any release, it is judged that whether its data length is more than L, if more than L, distinguishing
L1, L2, L3 data so that L1+L2+L3=L is as described identification information are intercepted after Yu Qianzhong;Otherwise
Directly using all cipher-text information as described identification information;
A25, the described mark letter obtained in lookup above step in the data storage cell of described service end
Breath, if finding, then points out described any release registered, and authentication is passed through;Otherwise prompting is described appoints
Meaning release is unregistered, can register described any release.
5. the system of any release identity, it is characterised in that including:
Terminal, for testing the data of any release read, to privately owned encryption or do not have
The data having described any release of encryption are packaged with two kinds of different data forms respectively, and will envelope
Data after dress are sent to service end;
Service end, the data form of the data after the described encapsulation that will receive detects, according to two
Plant different data forms and the data after described encapsulation are carried out two kinds of different data process, thus obtain it
In as the identification information of user identity, and can be determined by the identification information of described user identity and to institute
State the described any release Yes/No of terminal return registered.
The system of a kind of any release identity the most as claimed in claim 5, it is characterised in that institute
State terminal to include:
Omnipotent card reader, supports various different cards agreement, for by corresponding agreement and described any information
The data of described any release are read after card coupling;
Whether the described data read are tested by data checking module by privately owned encryption;
Data package module, receives the testing result of described data checking module, according to testing result with A, B
Form carries out secondary encapsulation, simultaneously in encapsulation fields to the described data after privately owned encryption or do not encrypted specially
Beginning is provided with the identification field of corresponding format;
Terminal communications interface, carries out data communication with service end communication interface, for the data letter after encapsulation
Breath is sent to service end.
The system of a kind of any release identity the most as claimed in claim 6, it is characterised in that institute
Whether the described data read are examined by data checking module in the following way that state terminal by privately owned encryption
Test: whether the described data read with the detection of corresponding card protocol format meet regulation in agreement, if meeting
Then it is believed that data are unencrypteds, otherwise then it is considered by privately owned encryption.
The system of a kind of any release identity the most as claimed in claim 6, it is characterised in that institute
State service end to include:
Service end communication interface, carries out data communication with terminal communications interface, is used for receiving described terminal and sends
The data of any release and be submitted to operation processing unit;
Data storage cell, is used for storing all registered card informations;
Data are carried out detecting data, according to the identification field of encapsulation fields beginning by operation processing unit
Judge that encapsulation of data is described A form or described B form;If described B form, then data are carried out
Obtain the real information of described any release after inverse operation, obtain the card number of described any release or other
There is the serial number of mark action as described identification information;If described A form, then data carry out inverse
The cipher-text information of described any release is obtained, the number with mark action obtained by S algorithm after computing
According to as described identification information;The identification information being additionally operable to obtain according to operation processing unit is at described number
Making a look up according to memory cell, if finding, then pointing out described any release registered, authentication is passed through;
Otherwise point out described any release unregistered, described any release can be registered;Described S calculates
Method is in the cipher-text information obtaining described any release, it is judged that whether its data length is more than L, if more than L
L1, L2, L3 data are intercepted so that L1+L2+L3=L is as described identification information after then in front;
Otherwise directly using all cipher-text information as described identification information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410232795.9A CN104008608B (en) | 2014-05-28 | 2014-05-28 | A kind of method and system of any release identity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410232795.9A CN104008608B (en) | 2014-05-28 | 2014-05-28 | A kind of method and system of any release identity |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104008608A CN104008608A (en) | 2014-08-27 |
CN104008608B true CN104008608B (en) | 2016-08-17 |
Family
ID=51369244
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410232795.9A Active CN104008608B (en) | 2014-05-28 | 2014-05-28 | A kind of method and system of any release identity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104008608B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108038995A (en) * | 2017-12-08 | 2018-05-15 | 四川安亮科技有限公司 | Terminating machine for financial authentication |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101093548A (en) * | 2007-07-13 | 2007-12-26 | 天津征信信息技术有限公司 | Method and device by using identity card of residents in second generation as medium of ID authentication |
CN202003424U (en) * | 2011-03-31 | 2011-10-05 | 成都国腾实业集团有限公司 | Access control system supporting second-generation ID card and residence permit |
CN102567860A (en) * | 2012-02-13 | 2012-07-11 | 黄启迪 | Member function system based on identity card recognition function |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003162986A (en) * | 2001-11-27 | 2003-06-06 | Sanyo Electric Co Ltd | Id generating device and id confirming device |
GB2495704B (en) * | 2011-10-12 | 2014-03-26 | Technology Business Man Ltd | ID Authentication |
-
2014
- 2014-05-28 CN CN201410232795.9A patent/CN104008608B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101093548A (en) * | 2007-07-13 | 2007-12-26 | 天津征信信息技术有限公司 | Method and device by using identity card of residents in second generation as medium of ID authentication |
CN202003424U (en) * | 2011-03-31 | 2011-10-05 | 成都国腾实业集团有限公司 | Access control system supporting second-generation ID card and residence permit |
CN102567860A (en) * | 2012-02-13 | 2012-07-11 | 黄启迪 | Member function system based on identity card recognition function |
Non-Patent Citations (2)
Title |
---|
A Modified Dynamic ID-based User Authentication Scheme;Xin Zhang et al;《Communications,Circuits and System Proceedings,2006 International Conference on》;20060630;第3卷;第1602-1604页 * |
使用智能卡的动态口令认证机制;邓飞进等;《计算机工程》;20051220;第172-174页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104008608A (en) | 2014-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105554037B (en) | Authentication processing method and service platform | |
CN109417481A (en) | Safety is improved by the temporary key of the virtual non-contact card of software in mobile phone | |
CN104301119B (en) | Data signature method, signature verification method, data signature equipment and authentication server | |
CN103929411B (en) | Information displaying method, terminal, safety server and system | |
EP3698535A1 (en) | Privacy preserving tag | |
CN104935441B (en) | A kind of authentication method and relevant apparatus, system | |
CN107018130A (en) | A kind of identity card cloud recognizes Verification System | |
US20150278798A1 (en) | Method for protecting sensitive data transmitted in an nfc system | |
CN106534171B (en) | Security authentication method, device and terminal | |
CN103338110B (en) | RFID safety authentication based on dynamic I D band search key | |
Markantonakis et al. | Errata to: Secure smart embedded devices, platforms and applications | |
US20170366925A1 (en) | Nfc-based communication device and method | |
SI23114A (en) | Procedure for the verification of the authenticity of a rfid label | |
CN105844747A (en) | Station entrance identity authentication method based on two-dimensional code | |
CN102711109A (en) | Method for performing identity authentication on mobile terminal | |
KR101168272B1 (en) | The system of issuing nfc ticket and method thereof | |
KR20130048695A (en) | An authentication system, authentication method and authentication server | |
CN102790676A (en) | Remote identity identification or security method utilizing mobile phone with near field communication (NFC) function | |
CN103856940A (en) | Security authentication method and system | |
CN205845052U (en) | Identity card card-reading system and be not provided with the card reader of SAM module | |
CN104754568A (en) | Identity recognition method and device based on NFC (Near Field Communication) | |
CN105741116A (en) | Fast payment method, apparatus and system | |
CN106203556B (en) | A kind of method and device reading electronic labeling information | |
CN104008608B (en) | A kind of method and system of any release identity | |
CN107302434A (en) | The method of calibration and system of Electronic Signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |