CN106027469B - The processing method and identity card cloud authentication device of authentication ids information process request - Google Patents

The processing method and identity card cloud authentication device of authentication ids information process request Download PDF

Info

Publication number
CN106027469B
CN106027469B CN201610041125.8A CN201610041125A CN106027469B CN 106027469 B CN106027469 B CN 106027469B CN 201610041125 A CN201610041125 A CN 201610041125A CN 106027469 B CN106027469 B CN 106027469B
Authority
CN
China
Prior art keywords
sequence number
card reader
identity card
time interval
frequency control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610041125.8A
Other languages
Chinese (zh)
Other versions
CN106027469A (en
Inventor
李明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610041125.8A priority Critical patent/CN106027469B/en
Publication of CN106027469A publication Critical patent/CN106027469A/en
Application granted granted Critical
Publication of CN106027469B publication Critical patent/CN106027469B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention provides the processing method and device of a kind of authentication ids information process request, it receives authentication ids information process request and obtains blacklist, if identity card sequence number and card reader sequence number be not in blacklist, then obtain visiting frequency control list, whether the number for judging that identity card sequence number and/or card reader sequence number occur in visiting frequency control list in the prefixed time interval before getting visiting frequency control list is greater than preset value, blacklist is then deposited into if more than preset value, if the number occurred is 0, then obtain exception rules, judge whether identity card sequence number and/or card reader sequence number meet exception rules, visiting frequency control list is deposited into if meeting.To realize triple dynamic authentications to identity card and card reader, the safety and reliability to the processing of authentication ids information process request is improved.

Description

The processing method and identity card cloud authentication device of authentication ids information process request
Technical field
The present invention relates to a kind of electronic technology field more particularly to a kind of processing sides of authentication ids information process request Method and identity card cloud authentication device.
Background technique
With China's rapid development of economy, people's lives have very big improvement, no matter obtain employment, engage in trade, travel, enter a higher school Etc., it requires to carry out authentication, and money, property, application welfare, medical treatment etc. are handled, it also needs progress identity and recognizes Card.Current No.2 residence card is designed using built-in intelligence chip, has the ability to realize identity Internet-based completely Certification, however released so far from 2004, application value is also mined far away, and in recent years, ticket sale system has started on a large scale Internet authentication and identification using identity-based card.
The Internet authentication technology of identity-based card is since in actual use, there are the feelings such as identity card loss, stolen Condition, there are harm and risk that the malice of my non-authorization of identity card uses;The transmission of network data also faces communication simultaneously A series of risk of typical network attacks such as monitoring, data tampering and data playback.Therefore, how to prevent on exit passageway It the attack of modes such as eavesdrops, distort or resets, screen the attacker of malice in real time, protection authentication module (SAM) becomes safely Need first technical problems to be solved.
Summary of the invention
One of present invention seek to address that the above problem/.
The main purpose of the present invention is to provide a kind of processing methods of authentication ids information process request, on reaching State purpose, technical solution of the present invention specifically includes the following steps:
S1: receive authentication ids information process request, authentication ids information include: identity card serial number encryption value and Card reader sequence number, wherein the sequence number of card reader Serial No. ID card information reading terminals;S2: decryption identity card is obtained The identity card sequence number that serial number encryption value obtains;S3: blacklist is obtained;S4: judge identity card sequence number or card reader sequence Number whether it is included in blacklist, if identity card sequence number or card reader sequence number are included in blacklist, termination stream Journey thens follow the steps S5 if identity card sequence number and card reader sequence number are not included in blacklist;S5: access frequency is obtained Degree control list;S6: judge access before distance gets the visiting frequency control list moment in the first prefixed time interval Frequency manages in list whether the deposit comprising identity card sequence number records, or when distance gets visiting frequency control list Before quarter in the second prefixed time interval, visiting frequency manages in list whether the deposit comprising card reader sequence number records, if Judge that visiting frequency is managed in list before distance gets the visiting frequency control list moment in the first prefixed time interval Deposit record comprising identity card sequence number, or the second preset time before distance gets the visiting frequency control list moment In interval, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then termination process, if judge away from From getting before the visiting frequency control list moment in the first prefixed time interval, visiting frequency, which is managed, does not include body in list The deposit record of part card sequence number, and the second prefixed time interval before distance gets the visiting frequency control list moment Interior, visiting frequency manages the deposit record for not including card reader sequence number in list, thens follow the steps S7;S7 obtains abnormal rule Then;S8: judging whether identity card sequence number or card reader sequence number meet exception rules, if identity card sequence number or card reader sequence Row number meets exception rules, then termination process;If identity card sequence number and card reader sequence number do not meet exception rules, Then follow the steps S9;S9: authentication ids information process request is handled.
Optionally, in step S4, judge whether identity card sequence number or card reader sequence number are included in blacklist, if body Part card sequence number or card reader sequence number are included in blacklist, then termination process, including step S401 or step S402:S401: judging whether identity card sequence number is included in blacklist, if identity card sequence number is included in blacklist, Termination process;If identity card sequence number is not comprised in blacklist, it is black to judge whether card reader sequence number is included in In list, if card reader sequence number is included in blacklist, termination process;S402: whether judge card reader sequence number In blacklist, if card reader sequence number is included in blacklist, termination process;If card reader sequence number does not have In blacklist, then judge whether identity card sequence number is included in blacklist, if identity card sequence number is included in black name In list, then termination process.
Optionally, in step S6, judge the first preset time before distance gets the visiting frequency control list moment In interval, visiting frequency manages in list whether the deposit comprising identity card sequence number records, or gets access frequency in distance Before the degree control list moment in the second prefixed time interval, whether it includes card reader sequence number that visiting frequency is managed in list Deposit record, if judging before distance gets the visiting frequency control list moment in the first prefixed time interval, access frequency The deposit comprising identity card sequence number records in degree control list, or before distance gets the visiting frequency control list moment In second prefixed time interval, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then termination stream Journey, including step S601 or step S602, S601: judge first before distance gets the visiting frequency control list moment In prefixed time interval, visiting frequency manages in list whether the deposit comprising identity card sequence number records, if obtaining in distance Before managing the list moment to visiting frequency in the first prefixed time interval, it includes identity card sequence in list that visiting frequency, which is managed, Number deposit record, then termination process;If distance get visiting frequency control the list moment before first it is default when Between interval in, visiting frequency manage list in do not include identity card sequence number deposit record, then judge distance obtain visit Ask whether it includes card reader sequence that visiting frequency is managed in list before the frequency control list moment in the second prefixed time interval Number deposit record, if before distance gets the visiting frequency control list moment in the second prefixed time interval, access frequency The deposit comprising card reader sequence number records in degree control list, then termination process;S602: judge to obtain visiting in distance Ask whether it includes card reader sequence that visiting frequency is managed in list before the frequency control list moment in the second prefixed time interval Number deposit record, if before distance gets the visiting frequency control list moment in the second prefixed time interval, access frequency The deposit comprising card reader sequence number records in degree control list, then termination process;If getting visiting frequency in distance Before the control list moment in the second prefixed time interval, visiting frequency manages the deposit for not including card reader sequence number in list Record then judges before distance gets the visiting frequency control list moment in the first prefixed time interval, visiting frequency pipe Control in list whether the deposit comprising identity card sequence number records, if before distance gets the visiting frequency control list moment In first prefixed time interval, visiting frequency is managed the deposit in list comprising identity card sequence number and is recorded, then termination stream Journey.
Optionally, in step S8, judge whether identity card sequence number or card reader sequence number meet exception rules, if identity Card sequence number or card reader sequence number meet exception rules, then termination process, including step S801 or step S802; S801: judging whether identity card sequence number meets exception rules, if identity card sequence number meets exception rules, termination stream Journey;If identity card sequence number does not meet exception rules, judge whether card reader sequence number meets exception rules, if card reader sequence Row number meets exception rules, then termination process;S802: judging whether card reader sequence number meets exception rules, if card reading Device sequence number meets exception rules, then termination process;If card reader sequence number does not meet exception rules, identity card is judged Whether sequence number meets exception rules, if identity card sequence number meets exception rules, termination process.
Optionally, in step S601 and/or step S602, if step gets the visiting frequency control list moment in distance Before in the first prefixed time interval, visiting frequency is managed the deposit in list comprising identity card sequence number and is recorded, then termination Process is managed, comprising steps of if accessing in the first prefixed time interval before distance gets the visiting frequency control list moment Frequency is managed the deposit in list comprising identity card sequence number and is recorded, then obtains when distance gets visiting frequency control list Before quarter in third prefixed time interval, the deposit that visiting frequency manages identity card sequence number in list records frequency of occurrence, if The deposit record frequency of occurrence of identity card sequence number then returns to the first prompt information and termination stream less than the first preset value Journey;If the deposit record frequency of occurrence of identity card sequence number is greater than or equal to the first preset value, identity card sequence number is stored in Blacklist returns to error message and termination process;If step is before distance gets the visiting frequency control list moment In second prefixed time interval, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then termination stream Journey, comprising steps of if being got before visiting frequency manages the list moment in the second prefixed time interval in distance, visiting frequency Manage list in comprising card reader sequence number deposit record, then obtain distance get visiting frequency control the list moment it In preceding 4th prefixed time interval, the deposit that visiting frequency manages card reader sequence number in list records frequency of occurrence, if card reading The deposit record frequency of occurrence of device sequence number then returns to the second prompt information and termination process less than the second preset value;If The deposit record frequency of occurrence of card reader sequence number is greater than or equal to the second preset value, then card reader sequence number is stored in black name It is single, return to error message and termination process.6, according to the method for claim 4 or 5, which is characterized in that in step S801 And/or in step S802, if step identity card sequence number meets exception rules, termination process, comprising steps of if identity Card sequence number meets exception rules, then identity card sequence number deposit visiting frequency is managed list, return to the first prompt information simultaneously Termination process;If step card reader sequence number meets exception rules, termination process, comprising steps of if card reader Sequence number meets exception rules, then card reader sequence number deposit visiting frequency is managed list, and the second prompt information of return is simultaneously whole Only process flow.
Optionally, in step S601, if first pre- before distance gets the visiting frequency control list moment in step If in time interval, after visiting frequency manages the deposit record in list comprising identity card sequence number, further comprising the steps of: judgement Before distance gets the visiting frequency control list moment in the second prefixed time interval, visiting frequency manage in list whether Deposit record comprising card reader sequence number, if the second preset time before distance gets the visiting frequency control list moment In interval, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then obtains and get access frequency in distance Before the degree control list moment in the 4th prefixed time interval, visiting frequency manages the deposit record of card reader sequence number in list Frequency of occurrence, if the deposit record frequency of occurrence of card reader sequence number is greater than or equal to the second preset value, by card reader sequence Number deposit blacklist;In step 602, if step distance get visiting frequency control the list moment before second it is default when Between interval in, visiting frequency manage list in comprising card reader sequence number deposit record after, further comprise the steps of: judge away from From getting before the visiting frequency control list moment in the first prefixed time interval, in visiting frequency control list whether include The deposit of identity card sequence number records, if the first prefixed time interval before distance gets the visiting frequency control list moment Interior, visiting frequency is managed the deposit in list comprising identity card sequence number and is recorded, then obtains and get visiting frequency pipe in distance Before the control list moment in third prefixed time interval, the deposit that visiting frequency manages identity card sequence number in list, which records, to be occurred Number deposits identity card sequence number if the deposit record frequency of occurrence of identity card sequence number is greater than or equal to the first preset value Enter blacklist.
Optionally, in step S801, if further comprising the steps of: and sentencing after step identity card sequence number meets exception rules Whether disconnected card reader sequence number meets exception rules, if card reader sequence number meets exception rules, card reader sequence number is write Enter visiting frequency control list;In step S802, if further including step after step card reader sequence number meets exception rules It is rapid: to judge whether identity card sequence number meets exception rules, if identity card sequence number meets exception rules, by identity card sequence Number write-access frequency manages list.
Optionally, authentication ids information further include: timestamp secret value and card reader count secret value;Step S2 is also wrapped It includes, obtains decryption time stamp secret value and card reader counts the timestamp and card reader count value that secret value obtains, wherein the time Stamp is raw by the generation moment of the card reader identity-based identification card information process request of generation authentication ids information process request At;Card reader count value is generated by the history processing request number of times that card reader is initiated based on card reader;Judge identity card sequence number Whether exception rules are met, comprising: at the time of based on timestamp and receiving authentication ids information process request, generate first Time interval judges whether first time interval is greater than the 5th prefixed time interval and less than the 6th prefixed time interval, if One time interval is greater than the 5th prefixed time interval and less than the 6th prefixed time interval, then judges that identity card sequence number is legal, Otherwise, judge that identity card sequence number meets exception rules;Or, being based on timestamp and card reader count value, judge that distance is got Visiting frequency manages the body comprising identity card serial number encryption value in the 7th prefixed time interval, received before the list moment Whether the request number of times of part identification card information process request is less than third preset value, if what is received adds comprising identity card sequence number The request number of times of the authentication ids information process request of close value is less than third preset value, then judges that identity card sequence number is legal, Otherwise, judge that identity card sequence number meets exception rules;Judge whether card reader sequence number meets exception rules, comprising: be based on Timestamp generates first time interval, judges first time interval at the time of receiving authentication ids information process request Whether greater than the 8th prefixed time interval and less than the 9th prefixed time interval, if first time interval is greater than the 8th preset time Interval and less than the 9th prefixed time interval, then judge that card reader sequence number is legal, otherwise, it is different to judge that card reader sequence number meets It is conventional then;Or, being based on timestamp and card reader count value, judge to get the before visiting frequency manages the list moment in distance In ten prefixed time intervals, the request number of times of the authentication ids information process request comprising card reader sequence number received is It is no less than the 4th preset value, if the request number of times of the authentication ids information process request comprising card reader sequence number received Less than the 4th preset value, then judge that card reader sequence number is legal, otherwise, judges that card reader sequence number meets exception rules;Or, base In card reader count value, the reading in the authentication ids information process request continuously received with card reader sequence numbers match is judged Whether card device count value meets preset rules, if card reader count value meets preset rules, judges that card reader sequence number is legal, Otherwise, judge that card reader sequence number meets exception rules.
It is in order to achieve the above objectives, of the invention another object of the present invention is to provide a kind of identity card cloud authentication device Technical solution is specifically achieved in that
First communication module, for receiving authentication ids information process request, authentication ids information includes: identity card Serial number encryption value and card reader sequence number, wherein the sequence number of card reader Serial No. ID card information reading terminals;Second Communication module, the identity card sequence number obtained for obtaining decryption identity card serial number encryption value;Third communication module, for obtaining Take blacklist;First judgment module, for judging whether identity card sequence number or card reader sequence number are included in blacklist, if Identity card sequence number or card reader sequence number are included in blacklist, then termination process;Fourth communication module, in body When part card sequence number and card reader sequence number are not included in blacklist, obtain visiting frequency and manage list;Second judges mould Block, for judging before distance gets the visiting frequency control list moment in the first prefixed time interval, visiting frequency Manage list in whether comprising identity card sequence number deposit record, or distance get visiting frequency control the list moment it In preceding second prefixed time interval, visiting frequency manages in list whether the deposit comprising card reader sequence number records;If judgement Before distance gets the visiting frequency control list moment in the first prefixed time interval, include in visiting frequency control list The deposit of identity card sequence number records, or the second prefixed time interval before distance gets the visiting frequency control list moment Interior, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then termination process;Fifth communication module, For judging visiting frequency control before distance gets the visiting frequency control list moment in the first prefixed time interval Deposit in list not comprising identity card sequence number records, and second before distance gets the visiting frequency control list moment In prefixed time interval, when visiting frequency manages the deposit record for not including card reader sequence number in list, exception rules are obtained; Third judgment module, for judging whether identity card sequence number or card reader sequence number meet exception rules, if identity card sequence Number or card reader sequence number meet exception rules, then termination process;Processing module, in identity card sequence number and card reading When device sequence number does not meet exception rules, authentication ids information process request is handled.
Optionally, first judgment module is also used to judge identity card sequence number whether in packet blacklist, if identity card sequence It number is included in blacklist, then termination process;If identity card sequence number is not comprised in blacklist, card reader is judged Whether sequence number is included in blacklist, if card reader sequence number is included in blacklist, termination process;First judgement Module, is also used to judge whether card reader sequence number is included in blacklist, if card reader sequence number is included in blacklist, Termination process;If card reader sequence number is not comprised in blacklist, it is black to judge whether identity card sequence number is included in In list, if identity card sequence number is included in blacklist, termination process.
Optionally, the second judgment module is also used to judge the before distance gets the visiting frequency control list moment In one prefixed time interval, visiting frequency manages in list whether the deposit comprising identity card sequence number records, if obtaining in distance It gets before the visiting frequency control list moment in the first prefixed time interval, it includes identity card sequence in list that visiting frequency, which is managed, The deposit of row number records, then termination process;If first is default before distance gets the visiting frequency control list moment In time interval, visiting frequency manages the deposit record for not including identity card sequence number in list, then judges to get in distance Before the visiting frequency control list moment in the second prefixed time interval, whether it includes card reader sequence that visiting frequency is managed in list The deposit of row number records, if before distance gets the visiting frequency control list moment in the second prefixed time interval, access Frequency is managed the deposit in list comprising card reader sequence number and is recorded, then termination process;Second judgment module is also used to sentence Break before distance gets the visiting frequency control list moment in the second prefixed time interval, is in visiting frequency control list It is no comprising card reader sequence number deposit record, if distance get visiting frequency control the list moment before second it is default when Between in interval, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then termination process;If in distance It gets before the visiting frequency control list moment in the second prefixed time interval, visiting frequency, which is managed, does not include card reading in list The deposit of device sequence number records, then judges the first prefixed time interval before distance gets the visiting frequency control list moment Interior, visiting frequency manages in list whether the deposit comprising identity card sequence number records, if getting visiting frequency pipe in distance Before the control list moment in the first prefixed time interval, visiting frequency is managed the deposit in list comprising identity card sequence number and is remembered It records, then termination process.
Optionally, third judgment module, is also used to judge whether identity card sequence number meets exception rules, if identity card sequence Row number meets exception rules, then termination process;If identity card sequence number does not meet exception rules, card reader sequence is judged Number whether meet exception rules, if card reader sequence number meets exception rules, termination process;Third judgment module, also For judging whether card reader sequence number meets exception rules, if card reader sequence number meets exception rules, termination stream Journey;If card reader sequence number does not meet exception rules, judge whether identity card sequence number meets exception rules, if identity card sequence Row number meets exception rules, then termination process.
Optionally, it is pre- to be also used to before distance gets the visiting frequency control list moment first for the second judgment module If in time interval, if the deposit comprising identity card sequence number records in visiting frequency control list, obtaining and being obtained in distance Before managing the list moment to visiting frequency in third prefixed time interval, visiting frequency manages identity card sequence number in list Deposit record frequency of occurrence, if the deposit record frequency of occurrence of identity card sequence number returns to first and mention less than the first preset value Show information and termination process;If the deposit record frequency of occurrence of identity card sequence number is greater than or equal to the first preset value, Identity card sequence number is stored in blacklist, returns to error message and termination process;Second judgment module, is also used in distance It gets before the visiting frequency control list moment in the second prefixed time interval, it includes card reader in list that visiting frequency, which is managed, When the deposit record of sequence number, the 4th prefixed time interval before distance gets the visiting frequency control list moment is obtained Interior, the deposit that visiting frequency manages card reader sequence number in list records frequency of occurrence, if the deposit of card reader sequence number records Frequency of occurrence then returns to the second prompt information and termination process less than the second preset value;If the deposit of card reader sequence number It records frequency of occurrence and is greater than or equal to the second preset value, then card reader sequence number is stored in blacklist, return error message is simultaneously whole Only process flow.
Optionally, third judgment module is also used to when identity card sequence number meets exception rules, then by identity card sequence Number deposit visiting frequency manages list, returns to the first prompt information and termination process;Meet exception in card reader sequence number When regular, then card reader sequence number deposit visiting frequency managed into list, return to the second prompt information and termination process.
Optionally, authentication ids information process request further include: timestamp secret value and card reader count secret value;The One communication module, is also used to obtain decryption time stamp secret value and card reader counts timestamp and card reader meter that secret value obtains Numerical value, wherein timestamp is asked by the card reader identity-based identification card information processing of generation authentication ids information process request The generation moment asked generates;Card reader count value is generated by the history processing request number of times that card reader is initiated based on card reader;The Three judgment modules at the time of being also used to based on timestamp and receive authentication ids information process request, generate at the first time Interval judges whether first time interval is greater than the 5th prefixed time interval and less than the 6th prefixed time interval, if when first Between interval be greater than the 5th prefixed time interval and less than the 6th prefixed time interval, then judge that identity card sequence number is legal, otherwise, Judge that identity card sequence number meets exception rules;Third judgment module is also used to based on timestamp and card reader count value, judgement Distance is got before the visiting frequency control list moment in the 7th prefixed time interval, receive comprising identity card sequence number Whether the request number of times of the authentication ids information process request of secret value is less than third preset value, if what is received includes identity The request number of times for demonstrate,proving the authentication ids information process request of serial number encryption value is less than third preset value, then judges identity card sequence Row number is legal, otherwise, judges that identity card sequence number meets exception rules;Third judgment module is also used to based on timestamp and connects At the time of receiving authentication ids information process request, first time interval is generated, judges whether first time interval is greater than the Eight prefixed time intervals and less than the 9th prefixed time interval, if first time interval is greater than the 8th prefixed time interval and is less than 9th prefixed time interval then judges that card reader sequence number is legal, otherwise, judges that card reader sequence number meets exception rules;The Three judgment modules are also used to judge based on timestamp and card reader count value when distance gets visiting frequency control list Before quarter in the tenth prefixed time interval, the authentication ids information process request comprising card reader sequence number that receives is asked Ask number whether less than the 4th preset value, if the authentication ids information process request comprising card reader sequence number received Request number of times then judges that card reader sequence number is legal less than the 4th preset value, otherwise, judges that card reader sequence number meets abnormal rule Then;Third judgment module is also used to judge the authentication ids information process request continuously received based on card reader count value In with the card reader count value of card reader sequence numbers match whether meet preset rules, if card reader count value meets default rule Then, then judge that card reader sequence number is legal, otherwise, judge that card reader sequence number meets exception rules.
It optionally, also include authentication module, wherein first communication module is also used to believe the authentication ids received Breath processing request is sent to authentication module;Authentication module, for extracting the identity card sequence in authentication ids information process request Row number secret value, timestamp secret value and/or card reader count secret value, encrypt to identity card serial number encryption value, timestamp Value and/or card reader count secret value and operation are decrypted, and obtain identity card sequence number, timestamp and/or card reader count value, And identity card sequence number, timestamp and/or card reader count value are sent to first communication module.
It optionally, also include memory module, wherein memory module, for storing blacklist and frequency control list;Third Communication module is also used in request blacklist, generates blacklist acquisition request, and be sent to memory module;Four-way Believe module, is also used to generate frequency when request frequency manages list and manage list acquisition request, and be sent to storage mould Block;Memory module, is also used to when receiving blacklist acquisition request, and blacklist is sent to third communication module;Store mould Block, is also used to when receiving frequency control list acquisition request, and frequency control list is sent to fourth communication module;Third Communication module is also used to after carrying out write operation to blacklist, generates updated blacklist, and by updated blacklist It is sent to memory module;Fourth communication module is also used to after carrying out write operation to frequency control list, generates updated Frequency manages list, and updated frequency control list is sent to memory module;Memory module is also used to receive and store Updated blacklist or frequency manage list.
The method or apparatus provided through the invention can be realized to being generated based on abnormal identity card or abnormal card reader Authentication ids information process request carries out effective abnormality processing, is made using identity card sequence number and/or card reader sequence number It is managed, is avoided because of other factors, the legitimate request as caused by the variation of IP address or the variation of card type for key value It can not be executed, by blacklist, can be asked in the processing for preventing illegal identity card or illegal card reader initiation at the first time Ask, abnormality eliminating method through the invention can be realized blacklist dynamic update, enhance abnormality processing dynamic and Real-time;Managing list by frequency can be realized to the exception for occurring abnormal identity card or card reader in a short time before Reason is realized and is freezed in short-term to Short Term Anomalous identity card or card reader, avoids the security risk caused by the processing of illegal request, The dynamic that abnormality eliminating method through the invention can be realized frequency control list updates, and enhances the dynamic of abnormality processing And real-time;It can be realized the abnormal judgement to current identity card or card reader by exception rules, even if this processing request In identity card or card reader be not included in blacklist or the control of frequency control list within the scope of, equally can recognize that different Normal identity card or card reader improve and believe authentication ids to realize triple dynamic authentications to identity card and card reader The safety and reliability of breath processing request processing.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the processing method flow chart for the authentication ids information process request that the embodiment of the present invention 1 provides;
Fig. 2 is the structural schematic diagram for the identity card cloud authentication device that the embodiment of the present invention 2 provides.
Specific embodiment
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, belongs to protection scope of the present invention.
In the description of the present invention, it is to be understood that, term " center ", " longitudinal direction ", " transverse direction ", "upper", "lower", The orientation or positional relationship of the instructions such as "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outside" is It is based on the orientation or positional relationship shown in the drawings, is merely for convenience of description of the present invention and simplification of the description, rather than instruction or dark Show that signified device or element must have a particular orientation, be constructed and operated in a specific orientation, therefore should not be understood as pair Limitation of the invention.In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply opposite Importance or quantity or position.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with attached drawing.
Embodiment 1
The present embodiment provides a kind of authentication ids information process request processing methods, as shown in Figure 1, including following step It is rapid:
S1: authentication ids information process request is received, authentication ids information process request includes: identity card sequence number Secret value and card reader sequence number;
Identity card processing request is the processing request that card reader of ID card is initiated, and judges identity card processing request for legal place After reason request, according to preset rules, for the idle security authentication module of identity card processing request distribution, assigned safety is recognized The originating end for demonstrate,proving module and identity card processing request carries out data interaction, wherein identity card serial number encryption value is identity card Card reader obtains the identity card serial number encryption obtained from identity card, card reader Serial No. card reader of ID card itself Sequence number.
S2: the identity card sequence number that decryption identity card serial number encryption value obtains is obtained;
Operation is decrypted to the identity card serial number encryption value received, if card reader of ID card is calculated using symmetric cryptography Method encryption identity card sequence number is then solved the identity card serial number encryption value received using corresponding symmetrical decipherment algorithm Close operation;If card reader of ID card uses own private key encryption identity card sequence number, the identity card sequence number received is added Operation is decrypted using the public key of card reader of ID card in close value;Identity card serial number encryption value is decrypted the main body of operation It can be itself, be also possible to external equipment or external chip.
S3: obtaining blacklist, executes step S401 or step S402;
Blacklist can be obtained from itself storage, blacklist can also be obtained from outside, includes illegal in blacklist Identity card sequence number and illegal card reader sequence number;If in the authentication ids information process request received including illegal body Part card sequence number or illegal card reader sequence number, then the authentication ids information process request is in illegal state, it can not It is normally accepted by server.
S401: judging whether identity card sequence number is included in blacklist, if identity card sequence number is included in blacklist, Then termination process;
Have illegal identity card sequence number in blacklist, for example, the identity card being reported the loss sequence number, continuously occur it is different The sequence number etc. of the identity card occurred in the sequence number of normal identity card or short time in multiple areas, the processing meeting that it is requested Greater risk is brought, identity card sequence number is included in blacklist if judging, illustrates that the identity card Serial No. illegal identity is demonstrate,proved Sequence number, server are disregarded, termination process.Optionally, server can return to prompt information to prompt user, be somebody's turn to do Identity card has been added into blacklist, carries out subsequent operation and Resolving probiems convenient for user;
Optionally, it if identity card sequence number is included in blacklist, further comprises the steps of: and obtains visiting frequency control name It is single, judge that visiting frequency manages name before distance gets the visiting frequency control list moment in the second prefixed time interval Whether the deposit comprising card reader sequence number records in list, if second before distance gets the visiting frequency control list moment In prefixed time interval, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then obtains and obtain in distance Before managing the list moment to visiting frequency in the 4th prefixed time interval, visiting frequency manages card reader sequence number in list Deposit record frequency of occurrence will be read if the deposit record frequency of occurrence of card reader sequence number is greater than or equal to the second preset value Card device sequence number is stored in blacklist;If judging before distance gets the visiting frequency control list moment between the second preset time Every interior, in visiting frequency control list not comprising card reader sequence number deposit record, then exception rules are obtained, judge card reader Whether sequence number meets exception rules, if card reader sequence number meets exception rules, by card reader sequence number write-access frequency Degree control list;
If identity card sequence number is not comprised in blacklist, judge whether card reader sequence number is included in blacklist It is interior, if card reader sequence number is included in blacklist, termination process;
If identity card sequence number is not comprised in blacklist, the legitimacy of card reader sequence number is further judged, with Determine whether identity card sequence number and card reader sequence number are legal, has illegal card reader sequence number in blacklist, such as The sequence number for the card reader being reported the loss, the continuous sequence number for abnormal card reader occur, more than service life card reader sequence The sequence number etc. of row number or the card reader occurred in short-term in multiple areas, the processing requested it can bring greater risk, if sentencing Disconnected card reader sequence number is included in blacklist, illustrates that the card reader Serial No. illegal identity demonstrate,proves sequence number, server is refused Processing, termination process.Optionally, server can return to prompt information to prompt user, which has been added into black List carries out subsequent operation and Resolving probiems convenient for user;
Optionally, it after step judges that identity card sequence number is not comprised in blacklist, further comprises the steps of: acquisition and visits It asks that frequency manages list, judges in the first prefixed time interval, to visit before distance gets the visiting frequency control list moment Ask whether the deposit comprising identity card sequence number records in frequency control list, if getting visiting frequency control list in distance Before moment in the first prefixed time interval, visiting frequency is managed the deposit in list comprising identity card sequence number and is recorded, then obtains It takes before distance gets the visiting frequency control list moment in third prefixed time interval, visiting frequency manages body in list The deposit of part card sequence number records frequency of occurrence, if the deposit record frequency of occurrence of identity card sequence number is greater than or equal to first in advance If identity card sequence number is then stored in blacklist by value;If judging the before distance gets the visiting frequency control list moment In one prefixed time interval, visiting frequency manages the deposit record for not including identity card sequence number in list, then obtains abnormal rule Then, judge whether identity card sequence number meets exception rules, if identity card sequence number meets exception rules, by identity card sequence Number write-access frequency manages list;
S402: judging whether card reader sequence number is included in blacklist, if card reader sequence number is included in blacklist, Then termination process;
Have illegal card reader sequence number in blacklist, for example, the card reader being reported the loss sequence number, continuously occur it is different The sequence number of normal card reader, the card reader that occur more than the sequence number of the card reader of service life or in short-term in multiple areas Sequence number etc., the processing requested it can bring greater risk, if judging, card reader sequence number is included in blacklist, illustrate this Card reader Serial No. illegal identity demonstrate,proves sequence number, and server is disregarded, termination process.Optionally, server can be with Prompt information is returned to prompt user, which has been added into blacklist, carries out subsequent operation and Resolving probiems convenient for user;
Optionally, it if card reader sequence number is included in blacklist, further comprises the steps of: and obtains visiting frequency control name It is single, judge that visiting frequency manages name before distance gets the visiting frequency control list moment in the first prefixed time interval Whether the deposit comprising identity card sequence number records in list, if first before distance gets the visiting frequency control list moment In prefixed time interval, visiting frequency is managed the deposit in list comprising identity card sequence number and is recorded, then obtains and obtain in distance Before managing the list moment to visiting frequency in third prefixed time interval, visiting frequency manages identity card sequence number in list Deposit record frequency of occurrence, if the deposit record frequency of occurrence of identity card sequence number is greater than or equal to the first preset value, by body Part card sequence number is stored in blacklist;If judging before distance gets the visiting frequency control list moment between the first preset time Every interior, in visiting frequency control list not comprising identity card sequence number deposit record, then exception rules are obtained, judge identity card Whether sequence number meets exception rules, if identity card sequence number meets exception rules, by identity card sequence number write-access frequency Degree control list;
If card reader sequence number is not comprised in blacklist, judge whether identity card sequence number is included in blacklist It is interior, if identity card sequence number is included in blacklist, termination process;
If card reader sequence number is not comprised in blacklist, the legitimacy of identity card sequence number is further judged, with Determine whether identity card sequence number and card reader sequence number are legal, has illegal identity card sequence number in blacklist, such as The sequence number for the identity card being reported the loss continuously occurs in the sequence number or short time of abnormal identity card in multiple area appearance The sequence number etc. of identity card, the processing requested it can bring greater risk, if judging, identity card sequence number is included in blacklist It is interior, illustrate that the identity card Serial No. illegal identity demonstrate,proves sequence number, server is disregarded, termination process.Optionally, it takes Business device can return to prompt information to prompt user, which has been added into blacklist, convenient for user carry out subsequent operation and Resolving probiems;
Optionally, it after step judges that card reader sequence number is not comprised in blacklist, further comprises the steps of: acquisition and visits It asks that frequency manages list, judges in the second prefixed time interval, to visit before distance gets the visiting frequency control list moment Ask whether the deposit comprising card reader sequence number records in frequency control list, if getting visiting frequency control list in distance Before moment in the second prefixed time interval, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then obtains It takes before distance gets the visiting frequency control list moment in the 4th prefixed time interval, is read in visiting frequency control list The deposit of card device sequence number records frequency of occurrence, if the deposit record frequency of occurrence of card reader sequence number is greater than or equal to second in advance If card reader sequence number is then stored in blacklist by value;If judging the before distance gets the visiting frequency control list moment In two prefixed time intervals, visiting frequency manages the deposit record for not including card reader sequence number in list, then obtains abnormal rule Then, judge whether card reader sequence number meets exception rules, if card reader sequence number meets exception rules, by card reader sequence Number write-access frequency manages list;
If judging, identity card sequence number and card reader sequence number are not included in blacklist, then follow the steps S5;
If judging, identity card sequence number and card reader sequence number are not included in blacklist, illustrate identity card sequence number and Card reader sequence number is all legal, that is to say, that the authentication ids information process request is in legal state, needs further Judge whether the authentication ids information process request is in by control state;
S5: it obtains visiting frequency and manages list, and execute step S601 or step S602;
Visiting frequency can be obtained from itself storage and manage list, can also obtain visiting frequency from outside and manage name Single, it includes the identity card sequence number managed and the card reader sequence number managed that visiting frequency, which is managed in list,;If receiving To authentication ids information process request in comprising the identity card sequence number managed or the card reader sequence number managed, that The authentication ids information process request is in by control state, could be thawed after need to being frozen certain time length, currently can not It is normally accepted by server.
S601: judge access before distance gets the visiting frequency control list moment in the first prefixed time interval Frequency manages in list whether the deposit comprising identity card sequence number records, if when distance gets visiting frequency control list Before quarter in the first prefixed time interval, visiting frequency is managed the deposit in list comprising identity card sequence number and is recorded, then terminates Process flow;
To avoid by Replay Attack, abnormal identity card sequence number and abnormal card reader sequence number can be frozen control centainly Duration is not handled the request that it is initiated under control state, can first determine whether to get visiting frequency pipe in distance Control before the list moment in the first prefixed time interval, visiting frequency manage in list whether include identity card sequence number deposit Record, if visiting frequency manages name before distance gets the visiting frequency control list moment in the first prefixed time interval Deposit in list comprising identity card sequence number records, and illustrates the identity card sequence number also in freezing control state, termination Process;Wherein, the first prefixed time interval is preset value, can be configured according to specific application scenarios, for example, when card reading is whole When end is automatic ticket taking machine, the first prefixed time interval can be set as 1 minute, that is to say, that certain specific identity demonstrate,proves sequence when discovery Row number be in frequency control list when, within next 1 minute, not to the request initiated based on the identity card sequence number into Row processing operation;Optionally, when finding that certain specific identity card sequence number is in frequency control list, prompt information prompt is returned User's identity card abnormal state, is please tried again later;
Optionally, if step is got before visiting frequency manages the list moment in the first prefixed time interval in distance, Visiting frequency is managed the deposit in list comprising identity card sequence number and is recorded, then termination process, comprising steps of if in distance It gets before the visiting frequency control list moment in the first prefixed time interval, it includes identity card in list that visiting frequency, which is managed, The deposit of sequence number records, then obtains the third prefixed time interval before distance gets the visiting frequency control list moment Interior, the deposit that visiting frequency manages identity card sequence number in list records frequency of occurrence, if the deposit of identity card sequence number records Frequency of occurrence then returns to the first prompt information and termination process less than the first preset value;If the deposit of identity card sequence number It records frequency of occurrence and is greater than or equal to the first preset value, then identity card sequence number is stored in blacklist, return error message is simultaneously whole Only process flow;
In order to further ensure the integrality of abnormal data, it is ensured that processing safety gets access frequency in distance when determining Before the degree control list moment in the first prefixed time interval, visiting frequency manages the deposit in list comprising identity card sequence number In the case where record, the third prefixed time interval before distance gets the visiting frequency control list moment can be further judged Interior, visiting frequency manages the deposit in list comprising identity card sequence number and records number;In one section of preset time, if repeatedly When receiving the processing request based on a certain identity card sequence number initiation being specifically present in frequency control list, it is believed that Blacklist is added in the identity card Serial No. illegal sequence number;Specifically, if judging first before receiving processing request In prefixed time interval, once it was written in frequency control list according to the identity card sequence number that processing request obtains, then into One step judges in the third prefixed time interval before receiving processing request, according to the identity card sequence of processing request acquisition Whether the number number being once written in frequency control list reaches the first preset value, wherein third prefixed time interval and first Preset value is preset value, can be set according to application scenarios, such as: third prefixed time interval is 5 minutes, and the first preset value is It 100 times, if that judging receiving in processing request first 5 minutes initiated based on specific identity card sequence number, has received The number requested to the processing initiated based on the identity card sequence number then returns to the first prompt information prompt user less than 100 times Try simultaneously termination process again later;The number for the processing request initiated if it has been received based on the identity card sequence number is greater than Or be equal to 100 times, then blacklist is written into the identity card sequence number, returns to error message prompt user's identity card and be added into Blacklist, and termination process;
Optionally, if step is got before visiting frequency manages the list moment in the first prefixed time interval in distance, Visiting frequency is managed the deposit in list comprising identity card sequence number and is recorded, then further comprises the steps of: and judge to obtain visiting in distance Ask whether it includes card reader sequence that visiting frequency is managed in list before the frequency control list moment in the second prefixed time interval Number deposit record, if before distance gets the visiting frequency control list moment in the second prefixed time interval, access frequency The deposit comprising card reader sequence number records in degree control list, then obtains and get the visiting frequency control list moment in distance Before in the 4th prefixed time interval, the deposit that visiting frequency manages card reader sequence number in list records frequency of occurrence, if reading The deposit record frequency of occurrence of card device sequence number is greater than or equal to the second preset value, then card reader sequence number is stored in blacklist;
In order to further ensure the integrality of abnormal data, it is ensured that processing safety gets access frequency in distance when determining Before the degree control list moment in the first prefixed time interval, visiting frequency manages the deposit in list comprising identity card sequence number In the case where record, the second preset time before distance gets the visiting frequency control list moment can be further judged In interval, whether the deposit comprising card reader sequence number records and judges to obtain visiting in distance in visiting frequency control list It asks before the frequency control list moment in the 4th prefixed time interval, what visiting frequency was managed in list comprising card reader sequence number Deposit record number is specifically present in frequency control list based on a certain if repeatedly received in one section of preset time In card reader sequence number initiate processing request when, it is believed that the card reader Serial No. illegal sequence number, be added blacklist; Specifically, if judging in the second prefixed time interval before receiving processing request, the card reading obtained according to processing request Device sequence number was once written in frequency control list, then further the 4th judged before receiving processing request presets In time interval, whether reached according to the number that the card reader sequence number that processing request obtains once was written in frequency control list To the second preset value, wherein the 4th prefixed time interval and the second preset value are preset value, can be set according to application scenarios, example Such as: the 4th prefixed time interval is 5 minutes, and the second preset value is 100 times, if that judging receiving based on specific card reading The processing that device sequence number is initiated is requested in first 5 minutes, and time for the processing request initiated based on the card reader sequence number is had received Number then returns to the second prompt information prompt user and tries simultaneously termination process again later less than 100 times;It is based on if it has been received The number for the processing request that the card reader sequence number is initiated is greater than or equal to 100 times, then black name is written in the card reader sequence number It is single, it returns to error message prompt user's card reader and has been added into blacklist, and termination process;
If before distance gets the visiting frequency control list moment in the first prefixed time interval, visiting frequency control Deposit in list not comprising identity card sequence number records, then judges before distance gets the visiting frequency control list moment In second prefixed time interval, visiting frequency manages in list whether the deposit comprising card reader sequence number records, if in distance It gets before the visiting frequency control list moment in the second prefixed time interval, it includes card reader in list that visiting frequency, which is managed, The deposit of sequence number records, then termination process;
Optionally, if step is got before visiting frequency manages the list moment in the second prefixed time interval in distance, Visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then termination process, comprising steps of if in distance It gets before the visiting frequency control list moment in the second prefixed time interval, it includes card reader in list that visiting frequency, which is managed, The deposit of sequence number records, then obtains the 4th prefixed time interval before distance gets the visiting frequency control list moment Interior, the deposit that visiting frequency manages card reader sequence number in list records frequency of occurrence, if the deposit of card reader sequence number records Frequency of occurrence then returns to the second prompt information and termination process less than the second preset value;If the deposit of card reader sequence number It records frequency of occurrence and is greater than or equal to the second preset value, then card reader sequence number is stored in blacklist, return error message is simultaneously whole Only process flow;
In order to further ensure the integrality of abnormal data, it is ensured that processing safety gets access frequency in distance when determining Before the degree control list moment in the first prefixed time interval, depositing for identity card sequence number is not included in visiting frequency control list In the case where entering record, can further judge distance get visiting frequency control the list moment before second it is default when Between interval in, visiting frequency control list in whether comprising card reader sequence number deposit record and judge to get in distance Before the visiting frequency control list moment in the 4th prefixed time interval, it includes card reader sequence number in list that visiting frequency, which is managed, Deposit record number, in one section of preset time, if repeatedly receive based on it is a certain specifically be present in frequency control name When the processing request that the card reader sequence number in list is initiated, it is believed that black name is added in the card reader Serial No. illegal sequence number It is single;Specifically, if judging in the second prefixed time interval before receiving processing request, the reading obtained according to processing request Card device sequence number was once written in frequency control list, then further judging receiving the before handling request the 4th in advance If in time interval, whether being once written to the number in frequency control list according to the card reader sequence number that processing request obtains Reach the second preset value, wherein the 4th prefixed time interval and the second preset value are preset value, can be set according to application scenarios, Such as: the 4th prefixed time interval is 5 minutes, and the second preset value is 100 times, if that judging receiving based on specific reading The processing that card device sequence number is initiated is requested in first 5 minutes, and the processing request initiated based on the card reader sequence number is had received Number then returns to the second prompt information prompt user and tries simultaneously termination process again later less than 100 times;Base if it has been received It is greater than or equal to 100 times in the number for the processing request that the card reader sequence number is initiated, then the card reader sequence number is written black List returns to error message prompt user's card reader and has been added into blacklist, and termination process;
S602: judge access before distance gets the visiting frequency control list moment in the second prefixed time interval Frequency manages in list whether the deposit comprising card reader sequence number records, if when distance gets visiting frequency control list Before quarter in the second prefixed time interval, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then terminates Process flow;
To avoid by Replay Attack, abnormal identity card sequence number and abnormal card reader sequence number can be frozen control centainly Duration is not handled the request that it is initiated under control state, can first determine whether to get visiting frequency pipe in distance Control before the list moment in the first prefixed time interval, visiting frequency manage in list whether include card reader sequence number deposit Record, if visiting frequency manages name before distance gets the visiting frequency control list moment in the first prefixed time interval Deposit in list comprising card reader sequence number records, and illustrates the card reader sequence number also in freezing control state, termination Process;Wherein, the first prefixed time interval is preset value, can be configured according to specific application scenarios, for example, when card reading is whole When end is automatic ticket taking machine, the first prefixed time interval can be set as 1 minute, that is to say, that when certain specific card reader sequence of discovery Row number be in frequency control list when, within next 1 minute, not to the request initiated based on the card reader sequence number into Row processing operation;Optionally, when finding that certain specific card reader sequence number is in frequency control list, prompt information prompt is returned User's Card reader status is abnormal, please tries again later;
Optionally, if step is got before visiting frequency manages the list moment in the second prefixed time interval in distance, Visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then termination process, comprising steps of if in distance It gets before the visiting frequency control list moment in the second prefixed time interval, it includes card reader in list that visiting frequency, which is managed, The deposit of sequence number records, then obtains the 4th prefixed time interval before distance gets the visiting frequency control list moment Interior, the deposit that visiting frequency manages card reader sequence number in list records frequency of occurrence, if the deposit of card reader sequence number records Frequency of occurrence then returns to the second prompt information and termination process less than the second preset value;If the deposit of card reader sequence number It records frequency of occurrence and is greater than or equal to the second preset value, then card reader sequence number is stored in blacklist, return error message is simultaneously whole Only process flow;
In order to further ensure the integrality of abnormal data, it is ensured that processing safety gets access frequency in distance when determining Before the degree control list moment in the second prefixed time interval, visiting frequency manages the deposit in list comprising card reader sequence number In the case where record, the 4th prefixed time interval before distance gets the visiting frequency control list moment can be further judged Interior, visiting frequency manages the deposit in list comprising card reader sequence number and records number;In one section of preset time, if repeatedly When receiving the processing request based on a certain card reader sequence number initiation being specifically present in frequency control list, it is believed that Blacklist is added in the card reader Serial No. illegal sequence number;Specifically, if judging second before receiving processing request In prefixed time interval, once it was written in frequency control list according to the card reader sequence number that processing request obtains, then into One step judges in the 4th prefixed time interval before receiving processing request, according to the card reader sequence of processing request acquisition Whether the number number being once written in frequency control list reaches the second preset value, wherein the 4th prefixed time interval and second Preset value is preset value, can be set according to application scenarios, such as: the 4th prefixed time interval is 5 minutes, and the second preset value is It 100 times, if that judging receiving in processing request first 5 minutes initiated based on specific card reader sequence number, has received The number requested to the processing initiated based on the card reader sequence number then returns to the second prompt information prompt user less than 100 times Try simultaneously termination process again later;The number for the processing request initiated if it has been received based on the card reader sequence number is greater than Or be equal to 100 times, then blacklist is written into the card reader sequence number, returns to error message prompt user's card reader and be added into Blacklist, and termination process;
Optionally, if step is got before visiting frequency manages the list moment in the second prefixed time interval in distance, Visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then further comprises the steps of: and judge to obtain visiting in distance Ask whether it includes identity card sequence that visiting frequency is managed in list before the frequency control list moment in the first prefixed time interval Number deposit record, if before distance gets the visiting frequency control list moment in the first prefixed time interval, access frequency The deposit comprising identity card sequence number records in degree control list, then obtains and get the visiting frequency control list moment in distance Before in third prefixed time interval, the deposit that visiting frequency manages identity card sequence number in list records frequency of occurrence, if body The deposit record frequency of occurrence of part card sequence number is greater than or equal to the first preset value, then identity card sequence number is stored in blacklist;
In order to further ensure the integrality of abnormal data, it is ensured that processing safety gets access frequency in distance when determining Before the degree control list moment in the second prefixed time interval, visiting frequency manages the deposit in list comprising card reader sequence number In the case where record, the first preset time before distance gets the visiting frequency control list moment can be further judged In interval, whether the deposit comprising identity card sequence number records and judges to obtain visiting in distance in visiting frequency control list It asks before the frequency control list moment in third prefixed time interval, what visiting frequency was managed in list comprising identity card sequence number Deposit record number is specifically present in frequency control list based on a certain if repeatedly received in one section of preset time In identity card sequence number initiate processing request when, it is believed that the identity card Serial No. illegal sequence number, be added blacklist; Specifically, if judging in the first prefixed time interval before receiving processing request, the identity obtained according to processing request Card sequence number was once written in frequency control list, then further judging that the third before receiving processing request is default In time interval, whether reached according to the number that the identity card sequence number that processing request obtains once was written in frequency control list To the first preset value, wherein third prefixed time interval and the first preset value are preset value, can be set according to application scenarios, example Such as: third prefixed time interval is 5 minutes, and the first preset value is 100 times, if that judging receiving based on specific identity It demonstrate,proves the processing that sequence number is initiated to request in first 5 minutes, has received time for the processing request initiated based on the identity card sequence number Number then returns to the first prompt information prompt user and tries simultaneously termination process again later less than 100 times;It is based on if it has been received The number for the processing request that the identity card sequence number is initiated is greater than or equal to 100 times, then black name is written in the identity card sequence number It is single, it returns to error message prompt user's identity card and has been added into blacklist, and termination process;
If before distance gets the visiting frequency control list moment in the second prefixed time interval, visiting frequency control Deposit in list not comprising card reader sequence number records, then judges before distance gets the visiting frequency control list moment In first prefixed time interval, visiting frequency manages in list whether the deposit comprising identity card sequence number records, if in distance It gets before the visiting frequency control list moment in the first prefixed time interval, it includes identity card in list that visiting frequency, which is managed, The deposit of sequence number records, then termination process;
Optionally, if step is got before visiting frequency manages the list moment in the first prefixed time interval in distance, Visiting frequency is managed the deposit in list comprising identity card sequence number and is recorded, then termination process, comprising steps of if in distance It gets before the visiting frequency control list moment in the first prefixed time interval, it includes identity card in list that visiting frequency, which is managed, The deposit of sequence number records, then obtains the third prefixed time interval before distance gets the visiting frequency control list moment Interior, the deposit that visiting frequency manages identity card sequence number in list records frequency of occurrence, if the deposit of identity card sequence number records Frequency of occurrence then returns to the first prompt information and termination process less than the first preset value;If the deposit of identity card sequence number It records frequency of occurrence and is greater than or equal to the first preset value, then identity card sequence number is stored in blacklist, return error message is simultaneously whole Only process flow;
In order to further ensure the integrality of abnormal data, it is ensured that processing safety gets access frequency in distance when determining Before the degree control list moment in the second prefixed time interval, depositing for card reader sequence number is not included in visiting frequency control list In the case where entering record, can further judge distance get visiting frequency control the list moment before first it is default when Between interval in, visiting frequency control list in whether comprising identity card sequence number deposit record and judge to get in distance Before the visiting frequency control list moment in third prefixed time interval, it includes identity card sequence number in list that visiting frequency, which is managed, Deposit record number, in one section of preset time, if repeatedly receive based on it is a certain specifically be present in frequency control name When the processing request that the identity card sequence number in list is initiated, it is believed that black name is added in the identity card Serial No. illegal sequence number It is single;Specifically, if judging in the first prefixed time interval before receiving processing request, the body obtained according to processing request Part card sequence number was once written in frequency control list, then further judging that the third before receiving processing and requesting is pre- If in time interval, whether being once written to the number in frequency control list according to the identity card sequence number that processing request obtains Reach the first preset value, wherein third prefixed time interval and the first preset value are preset value, it can be set according to application scenarios, Such as: third prefixed time interval is 5 minutes, and the first preset value is 100 times, if that judging receiving based on specific body Part is demonstrate,proved the processing that sequence number is initiated and is requested in first 5 minutes, has received what handling based on identity card sequence number initiation was requested Number then returns to the first prompt information prompt user and tries simultaneously termination process again later less than 100 times;Base if it has been received It is greater than or equal to 100 times in the number for the processing request that the identity card sequence number is initiated, then the identity card sequence number is written black List returns to error message prompt user's identity card and has been added into blacklist, and termination process;
If judging before distance gets the visiting frequency control list moment in the first prefixed time interval, visiting frequency The deposit record of identity card sequence number is not included in control list and before distance gets the visiting frequency control list moment In second prefixed time interval, visiting frequency manages the deposit record for not including card reader sequence number in list, thens follow the steps S7;
When judging before distance gets the visiting frequency control list moment in the first prefixed time interval, visiting frequency The deposit record of identity card sequence number is not included in control list and before distance gets the visiting frequency control list moment In second prefixed time interval, when visiting frequency manages the deposit record for not including card reader sequence number in list, it can determine The identity card sequence number and the card reader sequence number do not go out in the first prefixed time interval and in the second prefixed time interval Abnormality is now crossed, further judges the identity card sequence number or the card reader sequence number in this request whether in abnormal State;
S7 obtains exception rules, and executes step S801 or step S802;
S801: judging whether identity card sequence number meets exception rules, if identity card sequence number meets exception rules, eventually Only process flow;
Exception rules can store in itself storage, can also obtain, can be sentenced according to exception rules from external equipment Break this request in identity card sequence number or card reader sequence number whether be in abnormality;
Optionally, authentication ids information process request further include: timestamp secret value and card reader count secret value;Step Rapid S2 further includes obtaining the timestamp and card reader count value that decryption time stamp secret value and card reader counting secret value obtain, Wherein, timestamp is demonstrate,proved the production of information process request by the card reader identity-based identification of generation authentication ids information process request The raw moment generates;Card reader count value is generated by the history processing request number of times that card reader is initiated based on card reader;
Judge whether identity card sequence number meets exception rules and one of following manner or a variety of can be used:
Mode one: at the time of based on timestamp and receiving authentication ids information process request, between generation first time Every judging whether first time interval is greater than the 5th prefixed time interval and less than the 6th prefixed time interval, if at the first time Interval is greater than the 5th prefixed time interval and less than the 6th prefixed time interval, then judges that identity card sequence number is legal, otherwise, sentence Disconnected identity card sequence number meets exception rules;
It include the generation moment of authentication ids information process request in timestamp, it, can be with when receiving processing request According to receive processing request at the time of and timestamp obtain first time interval, first time interval represent the processing request from It is generated to the time for being received intermediate experience, if first time interval is too short or too long, all indicates that transmission process is requested in this time Middle appearance is abnormal, for the security and reliability for guaranteeing processing, judges the identity card for including in authentication ids information process request Sequence number is abnormal, and the zone of reasonableness of first time interval is preset value, can set according to specific application scenarios, such as: the 5th Prefixed time interval is 1 second, and the 6th prefixed time interval is 60 seconds, then when first time interval is less than 1 second or greater than 60 Second when, it is possible to determine that this time the identity card sequence number in authentication ids information process request meets exception rules;
Mode two: be based on timestamp and card reader count value, judge distance get visiting frequency control the list moment it In preceding 7th prefixed time interval, the authentication ids information process request comprising identity card serial number encryption value that receives Whether request number of times is less than third preset value, if at the authentication ids information comprising identity card serial number encryption value received The request number of times of reason request is less than third preset value, then judges that identity card sequence number is legal, otherwise, judges that identity card sequence number accords with Close exception rules;
When the authentication ids information process request generated based on a certain specific identity card sequence number is multiple in a short time When appearance, it is possible to determine that the identity card sequence number meets exception rules, and the 7th prefixed time interval and third preset value are pre- If value, can set according to concrete application scene, for example, the 7th prefixed time interval is 5 minutes, third preset value is 100 times, that It reads in the timestamp in this processing request and the request of the 100th processing before generated based on the identity card sequence number Timestamp judges that the time interval between two timestamps whether less than 5 minutes, if it is less than 5 minutes, then determines the identity card Sequence number meets exception rules;
Optionally, judge whether card reader sequence number meets one of exception rules following manner or a variety of:
Mode one: at the time of based on timestamp and receiving authentication ids information process request, between generation first time Every judging whether first time interval is greater than the 8th prefixed time interval and less than the 9th prefixed time interval, if at the first time Interval is greater than the 8th prefixed time interval and less than the 9th prefixed time interval, then judges that card reader sequence number is legal, otherwise, sentence Disconnected card reader sequence number meets exception rules;
It include the generation moment of authentication ids information process request in timestamp, it, can be with when receiving processing request According to receive processing request at the time of and timestamp obtain first time interval, first time interval represent the processing request from It is generated to the time for being received intermediate experience, if first time interval is too short or too long, all indicates that transmission process is requested in this time Middle appearance is abnormal, for the security and reliability for guaranteeing processing, judges the card reader for including in authentication ids information process request Sequence number is abnormal, and the zone of reasonableness of first time interval is preset value, can set according to specific application scenarios, such as: the 8th Prefixed time interval is 1 second, and the 9th prefixed time interval is 60 seconds, then when first time interval is less than 1 second or greater than 60 Second when, it is possible to determine that this time the card reader sequence number in authentication ids information process request meets exception rules;
Mode two: being based on timestamp and card reader count value, judges to get the visiting frequency control list moment in distance Before in the tenth prefixed time interval, the request of the authentication ids information process request comprising card reader sequence number received Whether number is less than the 4th preset value, if the authentication ids information process request comprising card reader sequence number received is asked It asks number less than the 4th preset value, then judges that card reader sequence number is legal, otherwise, judge that card reader sequence number meets abnormal rule Then;
When the authentication ids information process request generated based on a certain specific card reader sequence number is multiple in a short time When appearance, it is possible to determine that the card reader sequence number meets exception rules, and the tenth prefixed time interval and the 4th preset value are pre- If value, can set according to concrete application scene, for example, the tenth prefixed time interval is 5 minutes, the 4th preset value is 100 times, that It reads in the timestamp in this processing request and the request of the 100th processing before generated based on the card reader sequence number Timestamp judges that the time interval between two timestamps whether less than 5 minutes, if it is less than 5 minutes, then determines the card reader Sequence number meets exception rules;
Mode three: be based on card reader count value, judge in the authentication ids information process request continuously received with reading Whether the card reader count value of card device sequence numbers match meets preset rules, if card reader count value meets preset rules, sentences Disconnected card reader sequence number is legal, otherwise, judges that card reader sequence number meets exception rules;
When card reader initiates authentication ids information process request, card reader count value can be become according to preset rules Change, for example, every initiation single treatment is requested, card reader count value adds one;After receiving processing request, card reader sequence number is extracted With card reader count value, card reader count value and this reading in last time processing request corresponding with the card reader sequence number are judged Whether card device count value meets preset rules, if not meeting preset rules, illustrates that the card reader has exception, card reader sequence Row number meets exception rules;
Optionally, if step identity card sequence number meets exception rules, termination process, comprising steps of if identity Card sequence number meets exception rules, then identity card sequence number deposit visiting frequency is managed list, return to the first prompt information simultaneously Termination process;
In order to further ensure the integrality of abnormal data, the dynamic and intelligence of processing are promoted, it is ensured that processing safety, In the case where determining that identity card sequence number meets exception rules, identity card sequence number write-in frequency further can be managed into name Single, return information prompt user's identity card please tries again later in the presence of abnormal, and termination process, to realize that frequency is managed The dynamic change of list promotes the intelligence of authentication ids information process request treatment process;
Optionally, it if step identity card sequence number meets exception rules, further comprises the steps of: and judges that card reader sequence number is It is no to meet exception rules, if card reader sequence number meets exception rules, card reader sequence number write-access frequency is managed into name It is single;
In order to further ensure the integrality of abnormal data, the dynamic and intelligence of processing are promoted, it is ensured that processing safety, In the case where determining that identity card sequence number meets exception rules, it can further judge whether card reader sequence number meets abnormal rule Then, if whether card reader sequence number meets exception rules, card reader sequence number write-access frequency control list is returned into letter Breath prompt user's card reader is please tried again later in the presence of abnormal, and termination process, to realize the dynamic of frequency control list State variation, promotes the intelligence of authentication ids information process request treatment process;
If identity card sequence number does not meet exception rules, judge whether card reader sequence number meets exception rules, if reading Card device sequence number meets exception rules, then termination process;
Optionally, if step card reader sequence number meets exception rules, termination process, comprising steps of if card reading Device sequence number meets exception rules, then card reader sequence number deposit visiting frequency is managed list, return to the second prompt information simultaneously Termination process;
In order to further ensure the integrality of abnormal data, the dynamic and intelligence of processing are promoted, it is ensured that processing safety, In the case where determining that identity card sequence number does not meet exception rules, it can further judge whether card reader sequence number meets exception Rule returns to card reader sequence number write-access frequency control list if whether card reader sequence number meets exception rules The information alert user card reader is please tried again later in the presence of abnormal, and termination process, to realize frequency control list Dynamic change promotes the intelligence of authentication ids information process request treatment process;
S802: judging whether card reader sequence number meets exception rules, if card reader sequence number meets exception rules, eventually Only process flow;
With S801 correspondingly, can also first judge whether card reader sequence number meets exception rules,
Optionally, if step card reader sequence number meets exception rules, termination process, comprising steps of if card reading Device sequence number meets exception rules, then card reader sequence number deposit visiting frequency is managed list, return to the second prompt information simultaneously Termination process;
In order to further ensure the integrality of abnormal data, the dynamic and intelligence of processing are promoted, it is ensured that processing safety, In the case where determining that card reader sequence number meets exception rules, card reader sequence number write-in frequency further can be managed into name Single, return information prompt user's card reader is please tried again later in the presence of abnormal, and termination process, to realize that frequency is managed The dynamic change of list promotes the intelligence of authentication ids information process request treatment process;
Optionally, it if step card reader sequence number meets exception rules, further comprises the steps of: and judges that identity card sequence number is It is no to meet exception rules, if whether identity card sequence number meets exception rules, by identity card sequence number write-access frequency pipe Control list;
In order to further ensure the integrality of abnormal data, the dynamic and intelligence of processing are promoted, it is ensured that processing safety, In the case where determining that card reader sequence number meets exception rules, it can further judge whether identity card sequence number meets abnormal rule Then, if whether identity card sequence number meets exception rules, identity card sequence number write-access frequency control list is returned into letter Breath prompt user's identity card please tries again later in the presence of abnormal, and termination process, to realize the dynamic of frequency control list State variation, promotes the intelligence of authentication ids information process request treatment process;
If card reader sequence number does not meet exception rules, judge whether identity card sequence number meets exception rules, if body Part card sequence number meets exception rules, then termination process;
Optionally, if step identity card sequence number meets exception rules, termination process, comprising steps of if identity Card sequence number meets exception rules, then identity card sequence number deposit visiting frequency is managed list, return to the first prompt information simultaneously Termination process;
In order to further ensure the integrality of abnormal data, the dynamic and intelligence of processing are promoted, it is ensured that processing safety, In the case where determining that card reader sequence number does not meet exception rules, it can further judge whether identity card sequence number meets exception Rule returns to identity card sequence number write-access frequency control list if whether identity card sequence number meets exception rules The information alert user identity card please tries again later in the presence of abnormal, and termination process, to realize frequency control list Dynamic change promotes the intelligence of authentication ids information process request treatment process;
If judging, identity card sequence number and card reader sequence number do not meet exception rules, then follow the steps S9;
S9: authentication ids information process request is handled;
When judging that identity card sequence number and card reader sequence number do not meet exception rules, then illustrate identity card sequence number It does not appear in blacklist with card reader sequence number, and does not occur in the prefixed time interval before receiving processing request In frequency control list, while exception rules are not met, that is to say, that identity card sequence number and card reader sequence number are equal at this time It is legal, at this point, to based on the identity card sequence number and the card reader sequence number generation authentication ids information process request into Row processing operation.
The method provided through the embodiment of the present invention can be realized to being generated based on abnormal identity card or abnormal card reader Authentication ids information process request carries out effective abnormality processing, is made using identity card sequence number and/or card reader sequence number It is managed, is avoided because of other factors, the legitimate request as caused by the variation of IP address or the variation of card type for key value It can not be executed, by blacklist, can be asked in the processing for preventing illegal identity card or illegal card reader initiation at the first time Ask, abnormality eliminating method through the invention can be realized blacklist dynamic update, enhance abnormality processing dynamic and Real-time;Managing list by frequency can be realized to the exception for occurring abnormal identity card or card reader in a short time before Reason is realized and is freezed in short-term to Short Term Anomalous identity card or card reader, avoids the security risk caused by the processing of illegal request, The dynamic that abnormality eliminating method through the invention can be realized frequency control list updates, and enhances the dynamic of abnormality processing And real-time;It can be realized the abnormal judgement to current identity card or card reader by exception rules, even if this processing request In identity card or card reader be not included in blacklist or the control of frequency control list within the scope of, equally can recognize that different Normal identity card or card reader improve and believe authentication ids to realize triple dynamic authentications to identity card and card reader The safety and reliability of breath processing request processing.
Embodiment 2:
The present embodiment provides a kind of identity card cloud authentication devices, as shown in Figure 2, comprising:
First communication module 201, for receiving authentication ids information process request, the authentication ids packet It includes: identity card serial number encryption value and card reader sequence number, wherein the card reader Serial No. ID card information reading terminals Sequence number;
Identity card processing request is the processing request that card reader of ID card is initiated, and identity card cloud authentication platform judges identity card Processing request is after legal processes are requested, according to preset rules, for the idle safety certification mould of identity card processing request distribution The originating end of block 210, assigned security authentication module 210 and identity card processing request carries out data interaction, wherein identity Card serial number encryption value is that card reader of ID card obtains the identity card serial number encryption obtained from identity card, card reader sequence Number be card reader of ID card itself sequence number.
Second communication module 202, for obtaining the identity card sequence number decrypting the identity card serial number encryption value and obtaining;
Operation is decrypted to the identity card serial number encryption value received, if card reader of ID card is calculated using symmetric cryptography Method encryption identity card sequence number is then solved the identity card serial number encryption value received using corresponding symmetrical decipherment algorithm Close operation;If card reader of ID card uses own private key encryption identity card sequence number, the identity card sequence number received is added Operation is decrypted using the public key of card reader of ID card in close value;Identity card serial number encryption value is decrypted the main body of operation It can be itself, be also possible to external equipment or external chip.
Third communication module 203, for obtaining blacklist;
First judgment module 206, for judging whether the identity card sequence number is included in the blacklist, if described Identity card sequence number is included in the blacklist, then 209 termination process of processing module;
Third communication module 203 can obtain blacklist from itself storage, can also obtain blacklist, black name from outside It include illegal identity card sequence number and illegal card reader sequence number in list;If the identity card that first communication module 201 receives It include illegal identity card sequence number or illegal card reader sequence number in authentication information processing request, then the authentication ids Information process request is in illegal state, can not normally be accepted by server.
Have illegal identity card sequence number in blacklist, for example, the identity card being reported the loss sequence number, continuously occur it is different The sequence number etc. of the identity card occurred in the sequence number of normal identity card or short time in multiple areas, the processing meeting that it is requested Greater risk is brought, if first judgment module 206 judges that identity card sequence number is included in blacklist, illustrates the identity card sequence Number sequence number is demonstrate,proved for illegal identity, server disregards, 209 termination process of processing module.Optionally, first judges mould Block 206 can return to prompt information to prompt user, which has been added into blacklist, convenient for user carry out subsequent operation and Resolving probiems;
Optionally, when first judgment module 206 judges that identity card sequence number is included in blacklist, fourth communication module 204, for obtaining visiting frequency control list, the second judgment module 207 judges obtaining visiting apart from fourth communication module 204 Ask whether it includes card reader sequence that visiting frequency is managed in list before the frequency control list moment in the second prefixed time interval Number deposit record, if apart from fourth communication module 204 get visiting frequency control the list moment before second it is default when Between interval in, visiting frequency manage list in comprising card reader sequence number deposit record, then the second judgment module 207 obtain exists It is got before the visiting frequency control list moment in the 4th prefixed time interval apart from fourth communication module 204, visiting frequency The deposit for managing card reader sequence number in list records frequency of occurrence, if the deposit record frequency of occurrence of card reader sequence number is greater than Or be equal to the second preset value, then card reader sequence number is stored in blacklist;If the second judgment module 207 judges in distance four-way Letter module 204 is got before the visiting frequency control list moment in the second prefixed time interval, and visiting frequency is managed in list Deposit record not comprising card reader sequence number, then fifth communication module 205 obtains exception rules, judges that card reader sequence number is It is no to meet exception rules, if card reader sequence number meets exception rules, card reader sequence number write-access frequency is managed into name It is single;
If identity card sequence number is not comprised in blacklist, first judgment module 206 judges that card reader sequence number is It is no to be included in blacklist, if card reader sequence number is included in blacklist, 209 termination process of processing module;
If identity card sequence number is not comprised in blacklist, first judgment module 206 further judges card reader sequence The legitimacy of row number, to determine whether identity card sequence number and card reader sequence number are legal, have illegal reading in blacklist Card device sequence number, for example, the card reader that is reported the loss sequence number, the continuous sequence number for abnormal card reader occur, be more than to use year The sequence number etc. of the sequence number of the card reader of limit or the card reader occurred in short-term in multiple areas, the processing requested it can be brought Greater risk illustrates the card reader Serial No. if first judgment module 206 judges that card reader sequence number is included in blacklist Illegal identity demonstrate,proves sequence number, and server is disregarded, 209 termination process of processing module.Optionally, first judgment module 206 can return to prompt information to prompt user, which has been added into blacklist, carry out subsequent operation convenient for user and ask The key to exercises is determined;
Optionally, if first judgment module 206 judges that card reader sequence number is included in blacklist, fourth communication module 204 for obtaining visiting frequency control list, and the second judgment module 207 judges obtaining visiting apart from fourth communication module 204 Ask whether it includes identity card sequence that visiting frequency is managed in list before the frequency control list moment in the first prefixed time interval Number deposit record, if apart from fourth communication module 204 get visiting frequency control the list moment before first it is default when Between interval in, visiting frequency manage list in comprising identity card sequence number deposit record, then the second judgment module 207 obtain exists It is got before the visiting frequency control list moment in third prefixed time interval apart from fourth communication module 204, visiting frequency The deposit for managing identity card sequence number in list records frequency of occurrence, if the deposit record frequency of occurrence of identity card sequence number is greater than Or be equal to the first preset value, then identity card sequence number is stored in blacklist;If the second judgment module 207 judges in distance four-way Letter module 204 is got before the visiting frequency control list moment in the first prefixed time interval, and visiting frequency is managed in list Deposit record not comprising identity card sequence number, then fifth communication module 205 obtains exception rules, judges that identity card sequence number is It is no to meet exception rules, if identity card sequence number meets exception rules, identity card sequence number write-access frequency is managed into name It is single;
Third communication module 203, for obtaining blacklist,
First judgment module 206, for judging whether the card reader sequence number is included in the blacklist, if described Card reader sequence number is included in the blacklist, then 209 termination process of processing module;
Have illegal card reader sequence number in blacklist, for example, the card reader being reported the loss sequence number, continuously occur it is different The sequence number of normal card reader, the card reader that occur more than the sequence number of the card reader of service life or in short-term in multiple areas Sequence number etc., the processing requested it can bring greater risk, if first judgment module 206 judges that card reader sequence number is included in In blacklist, illustrate that the card reader Serial No. illegal identity demonstrate,proves sequence number, server is disregarded, and processing module 209 terminates Process flow.Optionally, server can return to prompt information to prompt user, which has been added into blacklist, be convenient for User carries out subsequent operation and Resolving probiems;
Optionally, if card reader sequence number is included in blacklist, fourth communication module 204 is also used to obtain access frequency Degree control list, the second judgment module 207 judge getting the visiting frequency control list moment apart from fourth communication module 204 Before in the first prefixed time interval, visiting frequency manages in list whether the deposit comprising identity card sequence number records, if It is got before the visiting frequency control list moment in the first prefixed time interval apart from fourth communication module 204, visiting frequency It manages the deposit in list comprising identity card sequence number to record, then the second judgment module 207 is obtained apart from fourth communication module 204 get before the visiting frequency control list moment in third prefixed time interval, and visiting frequency manages identity card in list The deposit of sequence number records frequency of occurrence, if the deposit record frequency of occurrence of identity card sequence number is greater than or equal to first and presets Identity card sequence number is then stored in blacklist by value;If the second judgment module 207 judges to obtain apart from fourth communication module 204 Before managing the list moment to visiting frequency in the first prefixed time interval, visiting frequency, which is managed, does not include identity card sequence in list The deposit of row number records, then fifth communication module 205 obtains exception rules, judges whether identity card sequence number meets abnormal rule Then, if identity card sequence number meets exception rules, identity card sequence number write-access frequency is managed into list;
If card reader sequence number is not comprised in blacklist, first judgment module 206 judges that identity card sequence number is It is no to be included in blacklist, if identity card sequence number is included in blacklist, 209 termination process of processing module;
If card reader sequence number is not comprised in blacklist, first judgment module 206 further judges identity card sequence The legitimacy of row number, to determine whether identity card sequence number and card reader sequence number are legal, have illegal body in blacklist Part card sequence number, such as the sequence number of the identity card that is reported the loss, the continuous sequence number for abnormal identity card occur or in the short time In the sequence number etc. for the identity card that multiple areas occur, the processing requested it can bring greater risk, if first judgment module 206 judge that identity card sequence number is included in blacklist, illustrate that the identity card Serial No. illegal identity demonstrate,proves sequence number, server It disregards, 209 termination process of processing module.Optionally, server can return to prompt information to prompt user, the body Part card has been added into blacklist, carries out subsequent operation and Resolving probiems convenient for user;
Optionally, after first judgment module 206 judges that card reader sequence number is not comprised in blacklist, four-way Letter module 204 is also used to obtain visiting frequency control list, and the second judgment module 207 judges apart from fourth communication module 204 It gets before the visiting frequency control list moment in the second prefixed time interval, whether visiting frequency is managed in list comprising reading The deposit of card device sequence number records, if the before getting the visiting frequency control list moment apart from fourth communication module 204 In two prefixed time intervals, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then the second judgment module 207 obtain before getting the visiting frequency control list moment apart from fourth communication module 204 in the 4th prefixed time interval, The deposit that visiting frequency manages card reader sequence number in list records frequency of occurrence, occurs if the deposit of card reader sequence number records Number is greater than or equal to the second preset value, then card reader sequence number is stored in blacklist;If the second judgment module 207 judge away from It is got before the visiting frequency control list moment in the second prefixed time interval from fourth communication module 204, visiting frequency pipe The deposit record for not including card reader sequence number in list is controlled, then fifth communication module 205 obtains exception rules, judges card reader Whether sequence number meets exception rules, if card reader sequence number meets exception rules, by card reader sequence number write-access frequency Degree control list;
Fourth communication module 204 is also used to judging that identity card sequence number and card reader sequence number be not included in black name When in list, obtains visiting frequency and manage list, the second judgment module 207 judges obtaining visiting apart from fourth communication module 204 Ask whether it includes identity card sequence that visiting frequency is managed in list before the frequency control list moment in the first prefixed time interval Number deposit record, if apart from fourth communication module 204 get visiting frequency control the list moment before first it is default when Between in interval, visiting frequency is managed the deposit in list comprising identity card sequence number and is recorded, then 209 termination stream of processing module Journey;
If first judgment module 206 judges that identity card sequence number and card reader sequence number are not included in blacklist, say Bright identity card sequence number and card reader sequence number are all legal, that is to say, that the authentication ids information process request is in Legal state, need to further judge whether the authentication ids information process request is in by control state;
Fourth communication module 204 can obtain visiting frequency from itself storage and manage list, can also obtain from outside Visiting frequency manages list, and it includes the identity card sequence number managed and the card reader managed that visiting frequency, which is managed in list, Sequence number;If the identity card sequence in the authentication ids information process request that first communication module 201 receives comprising being managed Row number or the card reader sequence number managed need to be frozen then the authentication ids information process request is in by control state It could thaw after knot certain time length, currently can not normally be accepted by server.
To avoid by Replay Attack, abnormal identity card sequence number and abnormal card reader sequence number can be frozen control centainly Duration, under control state, identity card cloud authentication device is not handled the request of initiation, and the second judgment module 207 can be with First determine whether first prefixed time interval before getting the visiting frequency control list moment apart from fourth communication module 204 Interior, visiting frequency manages in list whether the deposit comprising identity card sequence number records, if obtaining apart from fourth communication module 204 It gets before the visiting frequency control list moment in the first prefixed time interval, it includes identity card sequence in list that visiting frequency, which is managed, The deposit of row number records, and illustrates the identity card sequence number also in freezing control state, 209 termination process of processing module; Wherein, the first prefixed time interval is preset value, can be configured according to specific application scenarios, for example, when card-reading terminal is When automatic ticket taking machine, the first prefixed time interval can be set as 1 minute, that is to say, that certain specific identity demonstrate,proves sequence number when discovery In frequency manage list when, within next 1 minute, not to the request initiated based on the identity card sequence number at Reason operation;Optionally, it when finding that certain specific identity card sequence number is in frequency control list, returns to prompt information and prompts user The identity card abnormal state, is please tried again later;
If first prefixed time interval before getting the visiting frequency control list moment apart from fourth communication module 204 Interior, visiting frequency manages the deposit record for not including identity card sequence number in list, then the second judgment module 207 judges in distance Fourth communication module 204 gets visiting frequency control before the visiting frequency control list moment in the second prefixed time interval Whether the deposit comprising card reader sequence number records in list, if getting visiting frequency pipe apart from fourth communication module 204 Before the control list moment in the second prefixed time interval, visiting frequency is managed the deposit in list comprising card reader sequence number and is remembered It records, then 209 termination process of processing module;
Fourth communication module 204 is used to judge that identity card sequence number and card reader sequence number be not included in blacklist When, it obtains visiting frequency and manages list, the second judgment module 207 judges getting access frequency apart from fourth communication module 204 Before the degree control list moment in the second prefixed time interval, whether it includes card reader sequence number that visiting frequency is managed in list Deposit record, if before getting the visiting frequency control list moment apart from fourth communication module 204 between second preset time Every interior, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded, then 209 termination process of processing module;
To avoid by Replay Attack, abnormal identity card sequence number and abnormal card reader sequence number can be frozen control centainly Duration, under control state, identity card cloud authentication device is not handled the request of initiation, and the second judgment module 207 can be with First determine whether first prefixed time interval before getting the visiting frequency control list moment apart from fourth communication module 204 Interior, visiting frequency manages in list whether the deposit comprising card reader sequence number records, if obtaining apart from fourth communication module 204 It gets before the visiting frequency control list moment in the first prefixed time interval, it includes card reader sequence in list that visiting frequency, which is managed, The deposit of row number records, and illustrates the card reader sequence number also in freezing control state, 209 termination process of processing module; Wherein, the first prefixed time interval is preset value, can be configured according to specific application scenarios, for example, when card-reading terminal is When automatic ticket taking machine, the first prefixed time interval can be set as 1 minute, that is to say, that when certain specific card reader sequence number of discovery In frequency manage list when, within next 1 minute, not to the request initiated based on the card reader sequence number at Reason operation;Optionally, it when finding that certain specific card reader sequence number is in frequency control list, returns to prompt information and prompts user The Card reader status is abnormal, please tries again later;
If second prefixed time interval before getting the visiting frequency control list moment apart from fourth communication module 204 Interior, visiting frequency manages the deposit record for not including card reader sequence number in list, then the second judgment module 207 judges in distance Fourth communication module 204 gets visiting frequency control before the visiting frequency control list moment in the first prefixed time interval Whether the deposit comprising identity card sequence number records in list, if getting visiting frequency pipe apart from fourth communication module 204 Before the control list moment in the first prefixed time interval, visiting frequency is managed the deposit in list comprising identity card sequence number and is remembered It records, then 209 termination process of processing module;
The second judgment module 207 judge to get apart from fourth communication module 204 the visiting frequency control list moment it In preceding first prefixed time interval, visiting frequency manages the deposit record for not including identity card sequence number in list and in distance the Four communication modules 204 are got before the visiting frequency control list moment in the second prefixed time interval, and visiting frequency manages name When deposit in list not comprising card reader sequence number records, fifth communication module 205 obtains exception rules, and judges identity card sequence Whether row number meets exception rules, if identity card sequence number meets exception rules, 209 termination process of processing module;
Exception rules can store in memory module 211, can also obtain from external equipment, third judgment module 208 It can judge whether identity card sequence number or card reader sequence number in this request are in abnormality according to exception rules;
If identity card sequence number does not meet exception rules, third judgment module 208 judges whether card reader sequence number accords with Exception rules are closed, if card reader sequence number meets exception rules, 209 termination process of processing module;
When the second judgment module 207 judges getting the visiting frequency control list moment apart from fourth communication module 204 Before in the first prefixed time interval, visiting frequency manages the deposit record for not including identity card sequence number in list and in distance Fourth communication module 204 gets visiting frequency control before the visiting frequency control list moment in the second prefixed time interval When deposit in list not comprising card reader sequence number records, it can determine that the identity card sequence number and the card reader sequence number exist First prefixed time interval and do not occurred abnormality, third judgment module 208 into one in the second prefixed time interval Whether step judges the identity card sequence number or the card reader sequence number in this request in abnormality;
The second judgment module 207 judge to get apart from fourth communication module 204 the visiting frequency control list moment it In preceding first prefixed time interval, visiting frequency manages the deposit record for not including identity card sequence number in list and in distance the Four communication modules 204 are got before the visiting frequency control list moment in the second prefixed time interval, and visiting frequency manages name When deposit in list not comprising card reader sequence number records, fifth communication module 205 obtains exception rules, third judgment module 208 judge whether card reader sequence number meets exception rules, if card reader sequence number meets exception rules, processing module 209 Termination process;If card reader sequence number does not meet exception rules, third judgment module 208 judges that identity card sequence number is It is no to meet exception rules, if identity card sequence number meets exception rules, 209 termination process of processing module;
Processing module 209 is right for when judging that identity card sequence number and card reader sequence number do not meet exception rules Authentication ids information process request is handled.
Optionally, the second judgment module 207 is also used to getting visiting frequency control apart from fourth communication module 204 Before the list moment in the first prefixed time interval, if the deposit comprising identity card sequence number records in visiting frequency control list When, it obtains before getting the visiting frequency control list moment apart from fourth communication module 204 in third prefixed time interval, The deposit that visiting frequency manages identity card sequence number in list records frequency of occurrence, occurs if the deposit of identity card sequence number records Number then returns to the first prompt information and 209 termination process of processing module less than the first preset value;If identity card sequence number Deposit record frequency of occurrence be greater than or equal to the first preset value, then by identity card sequence number be stored in blacklist, return mistake letter Cease simultaneously 209 termination process of processing module;
In order to further ensure the integrality of abnormal data, it is ensured that processing safety, when determining apart from fourth communication module 204 get before the visiting frequency control list moment in the first prefixed time interval, and it includes body in list that visiting frequency, which is managed, In the case where the deposit record of part card sequence number, the second judgment module 207 can further judge apart from fourth communication module 204 It gets before the visiting frequency control list moment in third prefixed time interval, it includes identity card in list that visiting frequency, which is managed, The deposit of sequence number records number;In one section of preset time, if identity card cloud authentication device is repeatedly received based on a certain When the processing request that the identity card sequence number being specifically present in frequency control list is initiated, it is believed that the identity card sequence number For illegal sequence number, blacklist is added;Specifically, if the second judgment module 207 judges the before receiving processing request In one prefixed time interval, once it was written in frequency control list according to the identity card sequence number that processing request obtains, then Further judge in the third prefixed time interval before receiving processing request, the identity card sequence obtained according to processing request Whether the number that row number was once written in frequency control list reaches the first preset value, wherein third prefixed time interval and the One preset value is preset value, can be set according to application scenarios, such as: third prefixed time interval is 5 minutes, the first preset value It is 100 times, if that the second judgment module 207 judges receiving the processing request initiated based on specific identity card sequence number In first 5 minutes, the number for the processing request initiated based on the identity card sequence number is had received less than 100 times, then returns to first Prompt information prompt user tries again later and 209 termination process of processing module;It is based on the identity card sequence if it has been received The number for the processing request that row number is initiated is greater than or equal to 100 times, then blacklist is written in the identity card sequence number, returns to mistake The information alert user identity card has been added into blacklist, 209 termination process of processing module;
Optionally, the second judgment module 207 is also used to getting visiting frequency control apart from fourth communication module 204 Before the list moment in the second prefixed time interval, visiting frequency is managed the deposit in list comprising card reader sequence number and is recorded When, it obtains before getting the visiting frequency control list moment apart from fourth communication module 204 in the 4th prefixed time interval, The deposit that visiting frequency manages card reader sequence number in list records frequency of occurrence, occurs if the deposit of card reader sequence number records Number is less than the second preset value, then the second judgment module 207 returns to the second prompt information and 209 termination stream of processing module Journey;If the deposit record frequency of occurrence of card reader sequence number is greater than or equal to the second preset value, card reader sequence number is stored in Blacklist returns to error message and 209 termination process of processing module.
In order to further ensure the integrality of abnormal data, it is ensured that processing safety, when determining apart from fourth communication module 204 get before the visiting frequency control list moment in the first prefixed time interval, and it includes body in list that visiting frequency, which is managed, In the case where the deposit record of part card sequence number, the second judgment module 207 can further judge apart from fourth communication module 204 It gets before the visiting frequency control list moment in the second prefixed time interval, whether visiting frequency is managed in list comprising reading The deposit of card device sequence number record and judge apart from fourth communication module 204 get visiting frequency manage the list moment it In preceding 4th prefixed time interval, visiting frequency manages the deposit in list comprising card reader sequence number and records number, at one section In preset time, specifically it is present in frequency control list if identity card cloud authentication device is repeatedly received based on a certain When the processing request that card reader sequence number is initiated, it is believed that blacklist is added in the card reader Serial No. illegal sequence number;Specifically Ground, if the second judgment module 207 judges to be requested in the second prefixed time interval before receiving processing request according to processing The card reader sequence number of acquisition was once written in frequency control list, then further judging before receiving processing request The 4th prefixed time interval in, according to processing request obtain card reader sequence number be once written to frequency control list in Whether number reaches the second preset value, wherein the 4th prefixed time interval and the second preset value are preset value, it can be according to application Scene settings, such as: the 4th prefixed time interval is 5 minutes, and the second preset value is 100 times, if that the second judgment module 207 judge receiving in processing request first 5 minutes initiated based on specific card reader sequence number, have received based on the card reading The number for the processing request that device sequence number is initiated then returns to the second prompt information prompt user and tries and locate again later less than 100 times Manage 209 termination process of module;The number for the processing request initiated if it has been received based on the card reader sequence number is greater than Or be equal to 100 times, then blacklist is written into the card reader sequence number, returns to error message prompt user's card reader and be added into Blacklist, and 209 termination process of processing module;
Optionally, third judgment module 208 is also used to when identity card sequence number meets exception rules, then by identity card sequence Row number is stored in visiting frequency and manages list, returns to the first prompt information and 209 termination process of processing module;In card reader sequence When row number meets exception rules, then card reader sequence number deposit visiting frequency is managed into list, return to the second prompt information and locate Manage 209 termination process of module;
Optionally, authentication ids information process request further include: timestamp secret value and card reader count secret value;The Two communication modules 202 are also used to obtain decryption time stamp secret value and card reader counts the timestamp and card reader that secret value obtains Count value, wherein timestamp demonstrate,proves information processing by the card reader identity-based identification of generation authentication ids information process request The generation moment of request generates;Card reader count value is generated by the history processing request number of times that card reader is initiated based on card reader;
At the time of third judgment module 208 is also used to based on timestamp and receives authentication ids information process request, First time interval is generated, judges whether first time interval is greater than the 5th prefixed time interval and less than between the 6th preset time Every if first time interval judges identity card sequence greater than the 5th prefixed time interval and less than the 6th prefixed time interval It is number legal, otherwise, judge that identity card sequence number meets exception rules;
Third judgment module 208 is also used to judge based on timestamp and card reader count value apart from fourth communication module 204 Get before the visiting frequency control list moment in the 7th prefixed time interval, receive comprising identity card serial number encryption Whether the request number of times of the authentication ids information process request of value is less than third preset value, if what is received includes identity card sequence The request number of times of the authentication ids information process request of row number secret value is less than third preset value, then judges identity card sequence number It is legal, otherwise, judge that identity card sequence number meets exception rules;
At the time of third judgment module 208 is also used to based on timestamp and receives authentication ids information process request, First time interval is generated, judges whether first time interval is greater than the 8th prefixed time interval and less than between the 9th preset time Every if first time interval judges card reader sequence greater than the 8th prefixed time interval and less than the 9th prefixed time interval It is number legal, otherwise, judge that card reader sequence number meets exception rules;
Third judgment module 208 is also used to judge based on timestamp and card reader count value apart from fourth communication module 204 get before the visiting frequency control list moment in the tenth prefixed time interval, receive comprising card reader sequence number Authentication ids information process request request number of times whether less than the 4th preset value, if receive comprising card reader sequence Number authentication ids information process request request number of times less than the 4th preset value, then judge that card reader sequence number is legal, it is no Then, judge that card reader sequence number meets exception rules;
Third judgment module 208 is also used to judge the authentication ids information continuously received based on card reader count value Whether meet preset rules with the card reader count value of card reader sequence numbers match in processing request, if card reader count value meets Preset rules then judge that card reader sequence number is legal, otherwise, judge that card reader sequence number meets exception rules.
It optionally, also include authentication module 210, wherein the identity identification that second communication module 202 is also used to receive Card information process request is sent to authentication module 210;Authentication module 210, for extracting in authentication ids information process request Identity card serial number encryption value, timestamp secret value and/or card reader count secret value, to identity card serial number encryption value, Timestamp secret value and/or card reader count secret value and operation are decrypted, and obtain identity card sequence number, timestamp and/or reading Card device count value, and identity card sequence number, timestamp and/or card reader count value are sent to second communication module 202;
Operation is decrypted to secret value independently of identity card cloud authentication device in authentication module 210, on the one hand can reduce On the other hand the operation pressure of identity card cloud authentication device is able to ascend the safety of verification process.
It optionally, also include memory module 211, wherein memory module 211, for storing blacklist and frequency control name It is single;Third communication module 203 is also used in request blacklist, generates blacklist acquisition request, and be sent to storage mould Block 211;Fourth communication module 204 is also used to when request frequency manages list, is generated frequency control list acquisition and is asked It asks, and is sent to memory module 211;Memory module 211 is also used to send out blacklist when receiving blacklist acquisition request It send to third communication module 203;Memory module 211 is also used to when receiving frequency control list acquisition request, by frequency pipe Control list is sent to fourth communication module 204;Third communication module 203 is also used to after carrying out write operation to blacklist, raw Memory module 211 is sent at updated blacklist, and by updated blacklist;Fourth communication module 204, is also used to After carrying out write operation to frequency control list, updated frequency control list is generated, and updated frequency is managed into name Singly it is sent to memory module 211;Memory module 211 is also used to receive and store updated blacklist or frequency control list.
Blacklist and frequency control list can store in independent memory module 211, promote the safety of data, together When alleviate identity card cloud authentication device data processing pressure, memory module 211 to blacklist and frequency control list storage It can be stored for ciphertext, avoid by malicious access and distort.
The device provided through the embodiment of the present invention can be realized to being generated based on abnormal identity card or abnormal card reader Authentication ids information process request carries out effective abnormality processing, is made using identity card sequence number and/or card reader sequence number It is managed, is avoided because of other factors, the legitimate request as caused by the variation of IP address or the variation of card type for key value It can not be executed, by blacklist, can be asked in the processing for preventing illegal identity card or illegal card reader initiation at the first time Ask, abnormality eliminating method through the invention can be realized blacklist dynamic update, enhance abnormality processing dynamic and Real-time;Managing list by frequency can be realized to the exception for occurring abnormal identity card or card reader in a short time before Reason is realized and is freezed in short-term to Short Term Anomalous identity card or card reader, avoids the security risk caused by the processing of illegal request, The dynamic that abnormality eliminating method through the invention can be realized frequency control list updates, and enhances the dynamic of abnormality processing And real-time;It can be realized the abnormal judgement to current identity card or card reader by exception rules, even if this processing request In identity card or card reader be not included in blacklist or the control of frequency control list within the scope of, equally can recognize that different Normal identity card or card reader improve and believe authentication ids to realize triple dynamic authentications to identity card and card reader The safety and reliability of breath processing request processing.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiment or examples in can be combined in any suitable manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art are not departing from the principle of the present invention and objective In the case where can make changes, modifications, alterations, and variations to the above described embodiments within the scope of the invention.The scope of the present invention By appended claims and its equivalent limit.

Claims (10)

1. a kind of processing method of authentication ids information process request, which comprises the following steps:
S1: receive authentication ids information process request, the authentication ids information include: identity card serial number encryption value and Card reader sequence number, wherein the sequence number of the card reader Serial No. ID card information reading terminals;
S2: it obtains and decrypts the identity card sequence number that the identity card serial number encryption value obtains;
S3: blacklist is obtained, judges whether the identity card sequence number or the card reader sequence number are included in the blacklist In, if the identity card sequence number and the card reader sequence number are not included in the blacklist, then follow the steps S5;
S5: it obtains visiting frequency and manages list, and execute step S601 or step S602;
S601: judging before distance gets the visiting frequency control list moment in the first prefixed time interval, described Visiting frequency manages in list whether the deposit comprising the identity card sequence number records, if including the identity card sequence number Deposit record, thens follow the steps S6001;If the deposit for not including the identity card sequence number records, judge to obtain in distance Before managing the list moment to the visiting frequency in the second prefixed time interval, whether wrapped in the visiting frequency control list Deposit record containing the card reader sequence number, if the deposit comprising the card reader sequence number records, thens follow the steps S6002;If judging the visit before distance gets the visiting frequency control list moment in the first prefixed time interval It asks that the deposit for not including the identity card sequence number in frequency control list records, and gets the visiting frequency pipe in distance Before the control list moment in the second prefixed time interval, the card reader sequence number is not included in the visiting frequency control list Deposit record, then follow the steps S7;
S602: judging to get in visiting frequency control second prefixed time interval of the list moment foregoing description in distance, Whether the deposit comprising the card reader sequence number records in the visiting frequency control list, if including the card reader sequence Number deposit record, then execute the step S6002;If the deposit for not including the card reader sequence number records, judge Distance is got in visiting frequency control first prefixed time interval of the list moment foregoing description, the visiting frequency control Whether the deposit comprising the identity card sequence number records in list, if the deposit comprising the identity card sequence number records, Execute the step S6001, and termination process;If judge distance get the visiting frequency control list moment it In preceding first prefixed time interval, the deposit that the identity card sequence number is not included in the visiting frequency control list is recorded, And before distance gets the visiting frequency control list moment in the second prefixed time interval, the visiting frequency control Deposit in list not comprising the card reader sequence number records, and thens follow the steps S7;
S6001: obtaining before distance gets the visiting frequency control list moment in third prefixed time interval, described The deposit that visiting frequency manages identity card sequence number described in list records frequency of occurrence, if the deposit of the identity card sequence number It records frequency of occurrence and is greater than or equal to the first preset value, then the identity card sequence number is stored in the blacklist;
S6002: obtaining before distance gets the visiting frequency control list moment in the 4th prefixed time interval, described The deposit that visiting frequency manages card reader sequence number described in list records frequency of occurrence, if the deposit of the card reader sequence number It records frequency of occurrence and is greater than or equal to the second preset value, then the card reader sequence number is stored in the blacklist;
S7 obtains exception rules, and executes step S801 or step S802;
S801: judging whether the identity card sequence number meets exception rules, if the identity card sequence number meets exception rules, The identity card sequence number is then stored in the visiting frequency control list and termination process;If the identity card sequence number Exception rules are not met with the card reader sequence number, then follow the steps S9;
S802: judging whether the card reader sequence number meets exception rules, if the card reader sequence number meets exception rules, The card reader sequence number is then stored in the visiting frequency control list and termination process;If the identity card sequence number Exception rules are not met with the card reader sequence number, then follow the steps S9;
S9: the authentication ids information process request is handled.
2. the method according to claim 1, wherein in the step S3, judge the identity card sequence number or Whether the card reader sequence number is included in the blacklist, including step S401 or step S402;
S401: judging whether the identity card sequence number is included in the blacklist,
If the identity card sequence number is included in the blacklist, it is described to judge whether the card reader sequence number is included in In blacklist, if the card reader sequence number is not included in the blacklist, S4001, and termination stream are thened follow the steps Journey;
If the identity card sequence number is not included in the blacklist, judge whether the card reader sequence number is included in institute It states in blacklist, if the card reader sequence number is included in the blacklist, thens follow the steps S4002, and termination stream Journey;
If the identity card sequence number and the card reader sequence number are not included in the blacklist, S5 is thened follow the steps;
S402: judging whether the card reader sequence number is included in the blacklist,
If the card reader sequence number is included in the blacklist, it is described to judge whether the identity card sequence number is included in In blacklist, if the identity card sequence number is not included in the blacklist, S4002, and termination stream are thened follow the steps Journey;
If the card reader sequence number is not included in the blacklist, judge whether the identity card sequence number is included in institute It states in blacklist, if the identity card sequence number is included in the blacklist, thens follow the steps S4001, and termination stream Journey;
If the identity card sequence number and the card reader sequence number are not included in the blacklist, S5 is thened follow the steps;
S4001: obtaining and access the frequency and manage list, judge distance get the visiting frequency manage the list moment it In preceding second prefixed time interval, in visiting frequency control list whether include the card reader sequence number deposit Record, if before distance gets the visiting frequency control list moment in the second prefixed time interval, the access frequency The deposit comprising the card reader sequence number records in degree control list, then obtains and get the visiting frequency control in distance In the 4th prefixed time interval of the list moment foregoing description, card reader sequence number described in the visiting frequency control list is deposited Enter to record frequency of occurrence, if the deposit record frequency of occurrence of the card reader sequence number is greater than or equal to second preset value, The card reader sequence number is then stored in blacklist;If judging before distance gets the visiting frequency control list moment In second prefixed time interval, the deposit that the card reader sequence number is not included in the visiting frequency control list is remembered Record, then obtain exception rules, judge whether the card reader sequence number meets exception rules, if the card reader sequence number meets The card reader sequence number write-access frequency is then managed list by exception rules;
S4002: obtaining visiting frequency and manage list, judges the institute before distance gets the visiting frequency control list moment It states in the first prefixed time interval, whether the deposit comprising the identity card sequence number is remembered in the visiting frequency control list Record, if being got in visiting frequency control first prefixed time interval of the list moment foregoing description in distance, the access Frequency is managed the deposit in list comprising the identity card sequence number and is recorded, then obtains and get the visiting frequency pipe in distance It controls in list moment foregoing description third prefixed time interval, identity card sequence number described in the visiting frequency control list Deposit record frequency of occurrence, if the deposit record frequency of occurrence of the identity card sequence number is greater than or equal to described first and presets The identity card sequence number is then stored in the blacklist by value;If judging to get the visiting frequency control list in distance In the first prefixed time interval of the moment foregoing description, the identity card sequence number is not included in the visiting frequency control list Deposit record, then obtain exception rules, judge whether the identity card sequence number meets exception rules, if the identity card sequence Number meet exception rules, then the visiting frequency is written into the identity card sequence number and manages list.
3. method according to claim 1 or 2, which is characterized in that
In the step S601, if the step is first default before distance gets the visiting frequency control list moment In time interval, the deposit comprising the identity card sequence number is recorded in the visiting frequency control list, is thened follow the steps After S6001, further comprise the steps of:
Judge to get in visiting frequency control first prefixed time interval of the list moment foregoing description in distance, the visit Ask whether the deposit comprising the card reader sequence number records in frequency control list, if getting the visiting frequency in distance It manages in the first prefixed time interval of the list moment foregoing description, includes the card reader sequence in the visiting frequency control list The deposit of row number records, and thens follow the steps S6002;
In the step S602, if the step gets the visiting frequency control list moment foregoing description first in distance In prefixed time interval, the deposit comprising the card reader sequence number is recorded in the visiting frequency control list, then executes step After rapid S6002, further comprise the steps of:
Judge to get in visiting frequency control first prefixed time interval of the list moment foregoing description in distance, the visit Ask whether the deposit comprising the identity card sequence number records in frequency control list, if getting the visiting frequency in distance It manages in the first prefixed time interval of the list moment foregoing description, includes the identity card sequence in the visiting frequency control list The deposit of row number records, and thens follow the steps S6001.
4. method according to claim 1 or 2, which is characterized in that
In the step S801, judge whether the identity card sequence number meets exception rules, if the identity card sequence number accords with Exception rules are closed, then after the identity card sequence number being stored in the visiting frequency control list, are further comprised the steps of:
Judge whether the card reader sequence number meets exception rules, it, will if the card reader sequence number meets exception rules The card reader sequence number is stored in the visiting frequency and manages list;
In the step S802, judge whether the card reader sequence number meets exception rules, if the card reader sequence number accords with Exception rules are closed, then after the card reader sequence number being stored in the visiting frequency control list, are further comprised the steps of:
Judge whether the identity card sequence number meets exception rules, it, will if the identity card sequence number meets exception rules The identity card sequence number is stored in the visiting frequency and manages list.
5. method according to claim 1 or 2, which is characterized in that the authentication ids information further include: timestamp adds Close value and card reader count secret value;The step S2 further includes obtaining and decrypting the timestamp secret value and the card reader Count the timestamp and card reader count value that secret value obtains, wherein the timestamp is by generating the authentication ids information The card reader for handling request is generated based on the generation moment of the authentication ids information process request;The card reader count value It is generated by the history processing request number of times that the card reader is initiated based on the card reader;
Judge whether the identity card sequence number meets exception rules, comprising:
At the time of based on the timestamp and receiving the authentication ids information process request, first time interval is generated, Judge whether the first time interval is greater than the 5th prefixed time interval and less than the 6th prefixed time interval, if described first Time interval is greater than the 5th prefixed time interval and is less than the 6th prefixed time interval, then judges the identity card sequence Row number is legal, otherwise, judges that the identity card sequence number meets exception rules;Or,
Based on the timestamp and the card reader count value, judge distance get the visiting frequency control list moment it In preceding 7th prefixed time interval, the authentication ids information processing comprising the identity card serial number encryption value received is asked Whether the request number of times asked is less than third preset value, if the identity identification comprising the identity card serial number encryption value received The request number of times for demonstrate,proving information process request is less than the third preset value, then judges that the identity card sequence number is legal, otherwise, sentence The identity card sequence number that breaks meets exception rules;
Judge whether the card reader sequence number meets exception rules, comprising:
Based on the timestamp and at the time of receive the authentication ids information process request, generate between the first time Every judging whether the first time interval is greater than the 8th prefixed time interval and less than the 9th prefixed time interval, if described First time interval is greater than the 8th prefixed time interval and is less than the 9th prefixed time interval, then judges the card reading Device sequence number is legal, otherwise, judges that the card reader sequence number meets exception rules;Or,
Based on the timestamp and the card reader count value, judge to get the visiting frequency control list moment in distance Before in the tenth prefixed time interval, the authentication ids information process request comprising the card reader sequence number that receives Whether request number of times is less than the 4th preset value, if the authentication ids information processing comprising the card reader sequence number received The request number of times of request is less than the 4th preset value, then judges that the card reader sequence number is legal, otherwise, judge the card reading Device sequence number meets exception rules;Or,
Based on the card reader count value, judge in the authentication ids information process request continuously received with the reading Whether the card reader count value of card device sequence numbers match meets preset rules, if the card reader count value meets default rule Then, then judge that the card reader sequence number is legal, otherwise, judge that the card reader sequence number meets exception rules.
6. a kind of identity card cloud authentication device characterized by comprising
First communication module, for receiving authentication ids information process request, wherein the authentication ids information processing is asked Ask includes: identity card serial number encryption value and card reader sequence number;
Second communication module, for obtaining the identity card sequence number decrypting the identity card serial number encryption value and obtaining;
Third communication module judges whether the identity card sequence number or the card reader sequence number wrap for obtaining blacklist It is contained in the blacklist;
First judgment module, for judging whether the identity card sequence number or the card reader sequence number are included in the black name Dan Zhong, if the identity card sequence number or the card reader sequence number are included in the blacklist, termination process;
Fourth communication module, for obtaining visiting frequency control list;
Second judgment module, for judging the first preset time before distance gets the visiting frequency control list moment In interval, whether the deposit comprising the identity card sequence number is recorded in the visiting frequency control list, if including the body The deposit of part card sequence number records, then termination process;If the deposit for not including the identity card sequence number records, described Second judgment module is also used to judge before distance gets the visiting frequency control list moment between the second preset time Every interior, whether the deposit comprising the card reader sequence number is recorded in the visiting frequency control list, if including the card reading The deposit of device sequence number records, then termination process;Alternatively,
Second judgment module is also used to judge to get the visiting frequency control list moment foregoing description the in distance In two prefixed time intervals, whether the deposit comprising the card reader sequence number is recorded in the visiting frequency control list, if Deposit comprising the card reader sequence number records, then termination process;If not including the deposit of the card reader sequence number Record, then second judgment module, is also used to judge the institute before distance gets the visiting frequency control list moment It states in the first prefixed time interval, whether the deposit comprising the identity card sequence number is remembered in the visiting frequency control list Record, if the deposit comprising the identity card sequence number records, termination process;
It is pre- to be also used to obtain the third before distance gets the visiting frequency control list moment for second judgment module If in time interval, the deposit of identity card sequence number described in the visiting frequency control list records frequency of occurrence, if described The deposit record frequency of occurrence of identity card sequence number is greater than or equal to the first preset value, then the identity card sequence number is stored in institute State blacklist;
It is pre- to be also used to obtain before distance gets the visiting frequency control list moment the 4th for second judgment module If in time interval, the deposit of card reader sequence number described in the visiting frequency control list records frequency of occurrence, if described The deposit record frequency of occurrence of card reader sequence number is greater than or equal to the second preset value, then the card reader sequence number is stored in institute State blacklist;Alternatively,
Fifth communication module, for obtaining exception rules,
Third judgment module, for judging whether the identity card sequence number meets exception rules, if the identity card sequence number Meet exception rules, then the identity card sequence number is stored in the visiting frequency control list and termination process;Alternatively,
The third judgment module, for judging whether the card reader sequence number meets exception rules, if the card reader sequence Row number meets exception rules, then the card reader sequence number is stored in the visiting frequency control list and termination process;
Processing module, for handling the authentication ids information process request.
7. device according to claim 6, which is characterized in that
The first judgment module, is also used to judge whether the identity card sequence number is included in the blacklist,
If the identity card sequence number is included in the blacklist, the first judgment module is also used to judge the reading Whether card device sequence number is included in the blacklist, if the card reader sequence number is not included in the blacklist, eventually Only process flow;
If the identity card sequence number is not included in the blacklist, the first judgment module, it is also used to judge described Whether card reader sequence number is included in the blacklist, if the card reader sequence number is included in the blacklist, eventually Only process flow;
The first judgment module, is also used to judge whether the card reader sequence number is included in the blacklist,
If the card reader sequence number is included in the blacklist, the first judgment module is also used to judge the body Whether part card sequence number is included in the blacklist, if the identity card sequence number is not included in the blacklist, eventually Only process flow;
If the card reader sequence number is not included in the blacklist, the first judgment module, it is also used to judge described Whether identity card sequence number is included in the blacklist, if the identity card sequence number is included in the blacklist, eventually Only process flow;
The fourth communication module is also used to obtain the access frequency control list;
Second judgment module is also used to judge to get the visiting frequency control list moment foregoing description the in distance In two prefixed time intervals, whether the deposit comprising the card reader sequence number is recorded in the visiting frequency control list, if Before distance gets the visiting frequency control list moment in the second prefixed time interval, the visiting frequency manages name Deposit in list comprising the card reader sequence number records, then second judgment module, is also used to acquisition and gets in distance In visiting frequency control the 4th prefixed time interval of the list moment foregoing description, described in the visiting frequency control list The deposit of card reader sequence number records frequency of occurrence, if the deposit record frequency of occurrence of the card reader sequence number is greater than or equal to The card reader sequence number is then stored in blacklist by second preset value;If second judgment module judges to obtain in distance It gets in visiting frequency control second prefixed time interval of the list moment foregoing description, in the visiting frequency control list Deposit record not comprising the card reader sequence number, then the fifth communication module are also used to obtain exception rules, and described the Three judgment modules, are also used to judge whether the card reader sequence number meets exception rules, if the card reader sequence number meets The card reader sequence number write-access frequency is then managed list by exception rules;
The fourth communication module is also used to obtain visiting frequency control list;
Second judgment module is also used to judge to get the visiting frequency control list moment foregoing description the in distance In one prefixed time interval, whether the deposit comprising the identity card sequence number is recorded in the visiting frequency control list, if It is got in visiting frequency control first prefixed time interval of the list moment foregoing description in distance, the visiting frequency pipe It controls the deposit in list comprising the identity card sequence number to record, then obtains and get the visiting frequency control list in distance In moment foregoing description third prefixed time interval, the deposit note of identity card sequence number described in the visiting frequency control list Frequency of occurrence is recorded, it, will if the deposit record frequency of occurrence of the identity card sequence number is greater than or equal to first preset value The identity card sequence number is stored in the blacklist;If second judgment module judges to get the visiting frequency in distance It manages in the first prefixed time interval of the list moment foregoing description, does not include the identity card in the visiting frequency control list The deposit of sequence number records, then the fifth communication module, is also used to obtain exception rules, and the third judgment module judges institute State whether identity card sequence number meets exception rules, if the identity card sequence number meets exception rules, by the identity card Sequence number is written the visiting frequency and manages list.
8. device according to claim 6 or 7, which is characterized in that the authentication ids information process request further include: Timestamp secret value and card reader count secret value;The first communication module is also used to obtain the decryption timestamp encryption Value and the card reader count the timestamp and card reader count value that secret value obtains, wherein the timestamp is as described in generating The card reader of authentication ids information process request is generated based on the generation moment of the authentication ids information process request;Institute Card reader count value is stated to be generated by the history processing request number of times that the card reader is initiated based on the card reader;
The third judgment module is also used to based on the timestamp and receives the authentication ids information process request Moment generates first time interval, judges whether the first time interval is greater than the 5th prefixed time interval and less than the 6th Prefixed time interval, if the first time interval is greater than the 5th prefixed time interval and is less than the 6th preset time Interval, then judge that the identity card sequence number is legal, otherwise, judge that the identity card sequence number meets exception rules;
The third judgment module is also used to judge based on the timestamp and the card reader count value apart from the acquisition Before managing the list moment to the visiting frequency in the 7th prefixed time interval, what is received adds comprising the identity card sequence number Whether the request number of times of the authentication ids information process request of close value is less than third preset value, if what is received includes the body The request number of times of the authentication ids information process request of part card serial number encryption value is less than the third preset value, then judges institute It is legal to state identity card sequence number, otherwise, judges that the identity card sequence number meets exception rules;
The third judgment module is also used to based on the timestamp and receives the authentication ids information process request Moment generates the first time interval, judges whether the first time interval is greater than the 8th prefixed time interval and is less than 9th prefixed time interval is preset if the first time interval is greater than the 8th prefixed time interval and is less than the described 9th Time interval then judges that the card reader sequence number is legal, otherwise, judges that the card reader sequence number meets exception rules;
The third judgment module is also used to judge to get in distance based on the timestamp and the card reader count value Before the visiting frequency control list moment in the tenth prefixed time interval, what is received includes the card reader sequence number Whether the request number of times of authentication ids information process request is less than the 4th preset value, if what is received includes the card reader sequence The request number of times of the authentication ids information process request of row number is less than the 4th preset value, then judges the card reader sequence It is number legal, otherwise, judge that the card reader sequence number meets exception rules;
The third judgment module is also used to judge the identity identification continuously received based on the card reader count value Whether meet preset rules with the card reader count value of the card reader sequence numbers match in card information process request, if institute It states card reader count value and meets preset rules, then judge that the card reader sequence number is legal, otherwise, judge the card reader sequence Number meet exception rules.
9. device according to claim 6 or 7, which is characterized in that it also include authentication module,
Wherein, the first communication module, the authentication ids information process request for being also used to receive are sent to institute State authentication module;
The authentication module, for extracting the identity card serial number encryption in the authentication ids information process request Value, the timestamp secret value and/or the card reader count secret value, to the identity card serial number encryption value, it is described when Between stab secret value and/or the card reader and count secret value operation is decrypted, obtain the identity card sequence number, the time Stamp and/or the card reader count value, and by the identity card sequence number, the timestamp and/or the card reader count value It is sent to the first communication module.
10. device according to claim 6 or 7, which is characterized in that it also include memory module,
Wherein, the memory module, for storing the blacklist and frequency control list;
The third communication module when being also used to the blacklist described in request, generates blacklist acquisition request, and be sent to The memory module;
The fourth communication module when being also used to the control list of the frequency described in request, generates frequency control list and obtains Request, and it is sent to the memory module;
The memory module is also used to when receiving the blacklist acquisition request, and the blacklist is sent to described Three communication modules;
The memory module is also used to that the frequency is managed list when receiving the frequency control list acquisition request It is sent to the fourth communication module;
The third communication module is also used to after carrying out write operation to the blacklist, generates the updated black name It is single, and the updated blacklist is sent to the memory module;
The fourth communication module is also used to after carrying out write operation to frequency control list, generates updated institute Frequency control list is stated, and the updated frequency control list is sent to the memory module;
The memory module is also used to receive and store the updated blacklist or frequency control list.
CN201610041125.8A 2016-01-21 2016-01-21 The processing method and identity card cloud authentication device of authentication ids information process request Active CN106027469B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610041125.8A CN106027469B (en) 2016-01-21 2016-01-21 The processing method and identity card cloud authentication device of authentication ids information process request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610041125.8A CN106027469B (en) 2016-01-21 2016-01-21 The processing method and identity card cloud authentication device of authentication ids information process request

Publications (2)

Publication Number Publication Date
CN106027469A CN106027469A (en) 2016-10-12
CN106027469B true CN106027469B (en) 2019-05-21

Family

ID=57082694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610041125.8A Active CN106027469B (en) 2016-01-21 2016-01-21 The processing method and identity card cloud authentication device of authentication ids information process request

Country Status (1)

Country Link
CN (1) CN106027469B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234383B (en) * 2016-12-09 2021-01-08 中国电信股份有限公司 Information access method and security access server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1429373A (en) * 2000-03-08 2003-07-09 高利科技有限公司 Method and apparatus for readucing on-line fraud using personal digital identification
CN2722330Y (en) * 2004-06-24 2005-08-31 公安部第一研究所证件技术事业部 Personal identity certificating terminal
CN202632315U (en) * 2012-03-31 2012-12-26 成都因纳伟盛科技股份有限公司 Fingerprint verification module for second-generation identification card reader
CN103237235A (en) * 2013-03-18 2013-08-07 中国科学院信息工程研究所 Method and system for realizing identity authentication on Cloud TV terminals
CN104333560A (en) * 2014-11-20 2015-02-04 五八同城信息技术有限公司 Account number management method and management device
CN104980449A (en) * 2015-08-03 2015-10-14 携程计算机技术(上海)有限公司 Network request security certification method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009070430A2 (en) * 2007-11-08 2009-06-04 Suridx, Inc. Apparatus and methods for providing scalable, dynamic, individualized credential services using mobile telephones

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1429373A (en) * 2000-03-08 2003-07-09 高利科技有限公司 Method and apparatus for readucing on-line fraud using personal digital identification
CN2722330Y (en) * 2004-06-24 2005-08-31 公安部第一研究所证件技术事业部 Personal identity certificating terminal
CN202632315U (en) * 2012-03-31 2012-12-26 成都因纳伟盛科技股份有限公司 Fingerprint verification module for second-generation identification card reader
CN103237235A (en) * 2013-03-18 2013-08-07 中国科学院信息工程研究所 Method and system for realizing identity authentication on Cloud TV terminals
CN104333560A (en) * 2014-11-20 2015-02-04 五八同城信息技术有限公司 Account number management method and management device
CN104980449A (en) * 2015-08-03 2015-10-14 携程计算机技术(上海)有限公司 Network request security certification method and system

Also Published As

Publication number Publication date
CN106027469A (en) 2016-10-12

Similar Documents

Publication Publication Date Title
CN104641375B (en) The safe communication between medical treatment device and its remote-control device
CN105933280B (en) Identity identifying method and system
EP3941014A1 (en) Digital key-based identity authentication method, terminal apparatus, and medium
CN104618115B (en) ID card information acquisition methods and system
CN105488367B (en) A kind of guard method, backstage and the system of SAM device
CN106027457B (en) A kind of ID card information transmission method and system
CN106027250B (en) A kind of ID card information safe transmission method and system
CN110868294B (en) Key updating method, device and equipment
CN106027467B (en) A kind of identity card reading response system
CN108961501A (en) A kind of intelligent door lock control method, relevant device and system
CN107135205A (en) A kind of method for network access and system
CN106453329A (en) Wireless encryption smart home remote monitoring method and system
CN107392001B (en) Authorization method, system and card
CN106027253B (en) A kind of visiting frequency control device of authentication ids information
CN106878122A (en) A kind of method for network access and system
CN106027465B (en) A kind of processing method of authentication ids information process request
CN105024813A (en) Server, user equipment and interactive method of the user equipment and the server
CN106027469B (en) The processing method and identity card cloud authentication device of authentication ids information process request
CN105391555B (en) A kind of method, backstage and system accessing SAM device
CN106027479B (en) A kind of method for dynamically processing and system of authentication ids information process request
CN106034135B (en) Identity card cloud authentication device
CN108063748A (en) A kind of user authen method, apparatus and system
CN109246148A (en) Message processing method, device, system, equipment and computer readable storage medium
CN105959249B (en) The management method and system of electronic equipment
CN107026735A (en) Method and managed devices that a kind of password is automatically entered

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220415

Address after: Tiantianrong building, No. 1, Zhongguancun, Beiqing Road, Haidian District, Beijing 100094

Patentee after: TENDYRON Corp.

Address before: 100086 room 603, building 12, taiyueyuan, Haidian District, Beijing

Patentee before: Li Ming