Multi-second-generation identity card network coding and decoding system based on bus technology
Technical Field
The invention relates to the technical field of second-generation identification card identification technology, in particular to a multi-second-generation identification card network coding and decoding system based on bus technology, which utilizes an embedded MCU (microprogrammed control Unit) main controller to carry out real-time transmission, real-time coding and real-time decoding and real-time communication.
Background
In recent years, globalization trend is increasingly obvious, people are handed over and flow more and more closely, along with malicious damage events such as violence and terrorism, the people are more and more understood, the identity card reader is really made into necessary requirements of various industries, the application of the identity card reader in the market of China is increasingly wide, and the supply capacity of the identity card reader is continuously improved along with the huge demands of the market.
With the formal start of the second generation ID card exchange work in China, an attractive new ID card appears in the hands of residents quickly. The second generation of resident identification cards are many variations and differences from the first generation of resident identification cards. The second generation resident identification card is a single-page card type identification card compounded by multiple layers of polyester materials, is manufactured by adopting a non-contact IC card technology, and has two functions of visual reading and machine reading. The dimension design of the certificate has the length of 85.6 mm, the width of 54 mm and the thickness of 1.0 mm. The front of the certificate is provided with 2 registration items of issuing authority and valid period, and is printed with national emblem patterns, certificate names, ideographic great wall patterns and colorful patterns; the back of the certificate has 7 registration items of name, sex, ethnicity, date of birth, residence address of resident, citizen's ID number and personal photo, and is printed with color pattern. The universal issuing of the second-generation identity card brings great business opportunity for the identity card reader industry.
The second generation identity card is a smart card conforming to ISO/IEC 14443TypeB protocol, and according to the stipulations of 'resident identity card law', identity information of nine residents is stored in the second generation identity card, and the second generation identity card comprises the following steps: name, sex, ethnicity, date of birth, residence address of resident family, citizen ID number, personal photo, validity period of certificate and issuing authority. Compared with the first generation identity card which can only be read visually, the second generation identity card can also be read automatically by a non-contact machine due to the adoption of the RFID technology, except the visual reading function, so that the identification efficiency is improved. In addition, the public security department can also change the resident identity information stored in the card through the card reader, so that the resident information can be directly changed and written without re-making the card when the resident information is changed, such as when the resident address is changed. Another important advantage of the second generation of identification cards is that they are well-protected against forgery, the communication between the identification card and the reader is encrypted, the technical and financial thresholds for decryption are quite high, and forgery and tampering of the identification card can be prevented to a considerable extent.
The vigorous development of the demand of the second generation identity card provides huge business opportunities for the second generation identity card reading and other services, the defects of high cost and great reconstruction difficulty are increasingly obvious because each machine terminal of the traditional on-line equipment needs to be connected with an SAM security module, the development of information and network technology provides a good solution for solving the problem, and the comprehensive analysis is carried out on the use, demand and other conditions of the card reading terminal, and the design risk assessment and the like. The investigation finds that the prior on-line second-generation identification card has complex structure, single function and difficult reconstruction, and is difficult to solve the problems safely and conveniently.
Meanwhile, the development of information technology is different day by day, and the full application of the information technology to the life of people is the target of cumin of science and technology workers. With the help of the new achievement of information technology development, to the various functional defects of current two take place ofs ID card reader, redesign has carried out, has released decoding, encryption and decryption, communication, charge, functions such as wireless communication are as an organic whole, and the novel multi-functional intelligent two take place ofs ID card reading system of safer, convenient, intellectuality changes the restriction that traditional on-line type product must every machine be equipped with SAM safety module, has given two take place ofs ID card reader new effects, new connotation.
The MCU controller has the advantages of simple design structure, powerful functions and the like, is often applied to intelligent design, can utilize the requirements of reaching industrial practicality for control precision and test precision, is convenient, simple in calculation and easy for real-time control, and is widely applied to the development of measurement and control systems. The second-generation ID card decoding module is mature, miniaturized hardware is realized, the use is very convenient, and the method is widely applied to various accurate decoding systems. Short message service (sms) has been increasingly viewed as a basic data service of GSM networks, and a short message-based remote wireless communication technology plays an important role in remote monitoring, and is widely used in various industries, particularly, remote monitoring, because it can transmit information in time and is low in cost. Through the combination of the technologies, the second-generation ID card coding and decoding system based on the informatization technology is designed, the basic requirements of users with different characteristics are met, technical support is provided for the promotion of real-name systems in various industries, and convenience is brought to the travel and daily life of people.
Disclosure of Invention
The invention aims to solve the problem of providing a multi-second-generation identity card network coding and decoding system based on a bus technology, which has the functions of real-time decoding, real-time encryption and decryption processing, real-time transmission, wireless communication and the like, thereby realizing the identification of second-generation identity cards.
In order to solve the technical problems, the technical scheme of the invention is as follows: a multi-second-generation identity card network coding and decoding system based on a bus technology comprises a shell, wherein a display screen is arranged on the shell, keys are arranged on the lower portion of the shell, a normal working state indicator lamp is arranged on the upper portion of the shell, a fault state indicator lamp is arranged on the display screen, an embedded MCU controller, a memory, a TCP/IP communication system, a display driving circuit, a CAN bus communication system, an intelligent charging system, a scheduling module and at least one SAM safety module are arranged in the shell, the intelligent charging system comprises a power controller, a charging module and a battery, the power controller is respectively connected with the charging module and the battery, and the charging module is connected with the battery; the embedded MCU controller is respectively connected with the keys, the memory, the TCP/IP communication system, the display driving circuit and the power supply controller, and the display driving circuit is connected with the display screen through the interface conversion device; the power controller is connected with the SAM safety module, the embedded MCU controller is connected with the unpacking module, the unpacking module is connected with the scheduling module, the scheduling module is respectively connected with the SAM safety module through a CAN bus, and the SAM safety module is connected with the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface; the embedded MCU controller is connected with a CAN bus communication system through a decoding module and a packaging module, the CAN bus communication system is connected with a database server, and a TCP/IP communication system is connected with an NFC card reading device through an upper computer.
The number of the keys is two, and the distance between the keys is 1 cm; the keys comprise a first key of the power switch and a second key of the system reset.
The number of the normal working state indicator lamps is three, and the normal working state indicator lamps comprise LED lamps for displaying the working of the charging module, LED lamps for displaying the working of the wireless communication system and LED lamps for displaying whether a power supply is connected or not; the number of the fault state indicating lamps is three, and the fault state indicating lamps comprise LED lamps for displaying a power supply, LED lamps for displaying abnormity and LED lamps for displaying work; the battery is charged through the charging module after the power supply is switched on, the LED lamp for displaying the work of the charging module is turned on, and the LED lamp for displaying the work of the charging module is turned off after the charging is finished.
After the MCU controller is electrified, judging whether the SAM safety module is successfully operated and whether the TCP/IP communication system is successfully started; when the SAM safety module is successfully operated and the TCP/IP communication system is successfully started, displaying that a working LED lamp is on, and when the SAM safety module is failed to operate or the TCP/IP communication system is failed to start, displaying that an abnormal LED lamp is on; when the wireless communication system transmits the decoded information, an LED lamp for displaying the work of the wireless communication system is on; when the wireless communication system does not transmit the decoded information, the LED lamp for displaying the work of the wireless communication system is turned off; when a fault occurs, the wireless communication system reports the fault, and the LED lamp for displaying the work of the wireless communication system flickers.
The unpacking module divides the ciphertext information into four parts of prefix, code length, data and verification according to a transmission protocol, and the packing module packs the ciphertext information divided into four parts of prefix, code length, data and verification according to the transmission protocol.
The method for calculating the number of the scheduled SAM security modules by the scheduling module comprises the following steps: the state balance equation of the scheduling algorithm system is as follows:
wherein λ is0、λn-1、λnRepresents the arrival rate, mu, of the 0 th, n-1 th and n-th data streams to be decoded1、μn、μn+1Representing the first, nth and n +1 decoding service rates, p0Indicating the probability that the system is idle, p1Representing the probability of the number of decodes of the system service being 1, pn-1Representing the probability that the number of service decodings is n-1, pn、pn+1Respectively representing the probabilities that the service decoding numbers are n and n + 1;
let N (t) be the number of second generation identities to be decoded that need to be scheduled in the time interval [0, t ], pn(t1,t2) Is shown in the interval (t)1,t2) If there are n requests to be decoded coming, then there are:
pn(t1,t2)=p{N(t2)-N(t1)=n}(t2>t1,n≥0);
if the above equation satisfies the aftereffect, any one decoding request is not related to time in any short time, and two decoding requests do not arrive at the same time, then the probability of the request n to be decoded is poisson distribution as follows according to the state equilibrium equation of the system:
where λ denotes the stream of information to be decoded, which is achieved on average per unit time, pkRepresenting the probability of the k-th service arrival;
when an incoming request to decode satisfies the poisson distribution, the time interval p (T ≦ T) at which decoding can occur satisfies the exponential distribution:
the time probability required for scheduling a certain decoding module is calculated by the above formula, and the number L which can be called outsComprises the following steps:
wherein,ρ represents a service time that each decoding module can decode per unit time, and μ represents an average decoding time per decoding module.
The dispatching module is connected with 12 SAM safety modules in a hanging mode through a CAN bus, the 12 SAM safety modules are divided into 4 groups, and the dispatching module sends ciphertext information unpacked by the unpacking module according to a TCP/IP protocol to the corresponding SAM safety modules; each group of SAM security modules respectively compiles addresses 01, 02, 03 and 04, each group comprises 3 SAM security modules which respectively compile addresses 011, 012 and 013; 021, 022, 023; 031, 032, 033; 041, 042, 043; the scheduling module sends the first to fourth ciphertext information to the SAM security modules with addresses 011, 021, 031, 041, the fifth to eighth ciphertext information to the SAM security modules with addresses 012, 022, 032, 042, and the ninth to twelfth ciphertext information to the SAM security modules with addresses 013, 023, 033, 043; if the SAM security module of a certain address is transmitted last time, the scheduling module records the position, and next ciphertext information transmission starts from the recorded position, so that the utilization efficiency of each SAM security module is basically equivalent.
The encryption module encrypts the decoded identity information by using a random phase encryption algorithm, and the method comprises the following steps: the kernel function of the transform is:
where x (t) denotes the function to be encrypted, Fp[x(t)]Encrypted transformation kernel, u transformation domain where encryption kernel function is located, t represents time, Kp(t, u) kernel function of transform kernel, Xp(u) the result of the encrypted transformation, and
wherein A isαJ, α and n respectively represent an encryption operator, the encryption is transformed for many times, and the encryption method is as follows:
wherein,representing the result after quadratic transformation, Fα、FβIndicating encryption using the results of the kernel functions at α, β, respectively, C denotes a transformed function, x0Independent variable, xβThe expression is represented by β th transformation kernel function, f represents a desired function, M1Representing a first order transformation function, M2Representing a quadratic transformation function;
and the encrypted identity information is packaged through a packaging module and is transmitted to a database server through a CAN bus communication system.
The embedded MCU controls and receives the identity information of the TCP/IP communication system and decrypts by using a random phase decryption algorithm, and the method comprises the following steps:
wherein, Xp(u) primitive function to be decrypted, x (t) decrypted result, K-p(t, u) represents a transformation kernel;
wherein x isαAn argument at α, F (x) representing the result after the second decryption, F-α、F-βRepresenting the transformed kernel functions with decryption angles of- α, - β, respectively.
The decoding method of the identity information comprises the following steps: the NFC card reading device collects identity card information and uploads the identity card information to an upper computer, the embedded MCU controller judges whether a TCP/IP communication system is successfully started or not, if the TCP/IP communication system is successfully started, the identity information in the upper computer is transmitted to the embedded MCU controller through the TCP/IP communication system, the embedded MCU controller receives and judges whether the identity information is complete or not, if the identity information is not successful, the embedded MCU controller transmits the identity information to an unpacking module for unpacking, required data information is transmitted to a scheduling module, the scheduling module selects a corresponding SAM safety module for decoding, the SAM safety module decodes the unpacked data information, and when the information is successfully decoded, the information is transmitted to the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface, the decoded identity card information of the embedded MCU controller is transmitted to an identity card information encryption module for encryption, And packaging by a packaging module, transmitting the packaged identity card plaintext information to a database server through a CAN bus communication system, and simultaneously displaying that an LED lamp of the wireless communication system works is on.
The invention carries out networking on the traditional second-generation identity card coding and decoding module, and endows the traditional second-generation identity card coding and decoding module with richer connotation by additionally arranging an informatization product, thereby meeting the requirements of users to the maximum extent; meanwhile, a universal chip is adopted in the design, so that the cost is reduced as much as possible, and a product with low price and powerful functions is provided for social groups. The invention has simple structure, reliable performance, low price and powerful function, can not only work stably for a long time and carry out encryption and decryption processing and communication, but also can transmit the working state of the device, so that a technician can know the running state of the device without going to the site, and the technician can make accurate judgment and timely processing.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic structural diagram of the present invention.
Fig. 2 is a schematic block diagram of the present invention.
FIG. 3 is a flow chart of the present invention.
Fig. 4 is a flow chart of the charging module of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive effort based on the embodiments of the present invention, are within the scope of the present invention.
A multi-second-generation identity card network coding and decoding system based on a bus technology is shown in figures 1 and 2 and comprises a shell 1, wherein a display screen 2 is arranged on the shell 1, and a key 3 is arranged at the lower part of the shell 1. The number of the keys 3 is two, and the distance between the keys 3 is 1 cm. The keys 3 comprise a first key of a power switch and a second key of system reset, and are respectively used for controlling the starting of the whole system and the resetting of the system. The upper part of the shell 1 is provided with a normal working state indicator lamp 5, and the display screen 2 is provided with a fault state indicator lamp 4. The number of the normal working state indicator lamps 5 is three, and the normal working state indicator lamps 5 comprise LED lamps for displaying the working of the charging module, LED lamps for displaying the working of the wireless communication system and LED lamps for displaying whether a power supply is connected or not; the number of the fault state indicating lamps 4 is three, and the fault state indicating lamps 4 comprise LED lamps for displaying a power supply, LED lamps for displaying abnormity and LED lamps for displaying work. The battery is charged through the charging module after the power supply is switched on, the LED lamp for displaying the work of the charging module is turned on, and the LED lamp for displaying the work of the charging module is turned off after the charging is finished.
An embedded MCU controller, a memory, a TCP/IP communication system, a display driving circuit, a CAN bus communication system, an intelligent charging system, a scheduling module and at least one SAM safety module are arranged in the shell 1, the intelligent charging system comprises a power supply controller, a charging module and a battery, the power supply controller is respectively connected with the charging module and the battery, and the charging module is connected with the battery. The embedded MCU controller is respectively connected with the key 3, the memory, the TCP/IP communication system, the display driving circuit and the power supply controller, and the display driving circuit is connected with the display screen 2 through the interface conversion device. The whole device can directly utilize a standby battery to supply power after power failure, and the normal work of the device is ensured. The display screen 2 displays the specific working state and the specific decoding result. The power controller is connected with the SAM safety module, the embedded MCU controller is connected with the unpacking module, the unpacking module is connected with the scheduling module, the scheduling module is respectively connected with the SAM safety module through a CAN bus, and the SAM safety module is connected with the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface. Each SAM safety module comprises a decoding read-write head and a related circuit, and is connected to a scheduling module of the embedded MCU controller through a CAN bus. The embedded MCU controller is connected with a CAN bus communication system through a decoding module and a packaging module, the CAN bus communication system is connected with a database server, and the TCP/IP communication system is connected with an NFC card reading device through an upper computer. The TCP/IP communication system utilizes a TCP/IP protocol chip to realize encryption and decryption transmission of information. The embedded MCU controller receives the identity information transmitted by the TCP/IP communication system, the unpacking module unpacks the corresponding information and extracts the data information, the scheduling module transmits the data of the identity information to the corresponding SAM safety module through a bus by utilizing a scheduling algorithm, the SAM safety module transmits the decoded result information to the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface, and the embedded MCU controller transmits the decoded information to the encryption module to be encrypted and the packing module to be packed and then transmits the information to the CAN bus communication system and uploads the information to the database server.
After the MCU controller is electrified, judging whether the SAM safety module is successfully operated and whether the TCP/IP communication system is successfully started; when the SAM safety module is successfully operated and the TCP/IP communication system is successfully started, displaying that a working LED lamp is on, and when the SAM safety module is failed to operate or the TCP/IP communication system is failed to start, displaying that an abnormal LED lamp is on; when the wireless communication system transmits the decoded information, an LED lamp for displaying the work of the wireless communication system is on; when the wireless communication system does not transmit the decoded information, the LED lamp for displaying the work of the wireless communication system is turned off; when a fault occurs, the wireless communication system reports the fault, and the LED lamp for displaying the work of the wireless communication system flickers.
The unpacking module divides the ciphertext information into four parts of prefix, code length, data and verification according to a transmission protocol, and the packing module packs the ciphertext information divided into four parts of prefix, code length, data and verification according to the transmission protocol.
The method for calculating the number of the scheduled SAM security modules by the scheduling module comprises the following steps: the state balance equation of the scheduling algorithm system is as follows:
wherein λ is0、λn-1、λnRepresents the arrival rate, mu, of the 0 th, n-1 th and n-th data streams to be decoded1、μn、μn+1Representing the first, nth and n +1 decoding service rates, p0Indicating the probability that the system is idle, p1Representing the probability of the number of decodes of the system service being 1, pn-1Representing the probability that the number of decodes is n-1, pn、pn+1Respectively representing the probability that the decoding number is n and n + 1;
let N (t) be the number of second generation identities to be decoded that need to be scheduled in the time interval [0, t ], pn(t1,t2) Is shown in the interval (t)1,t2) If there are n requests to be decoded coming, then there are:
pn(t1,t2)=p{N(t2)-N(t1)=n}(t2>t1,n≥0);
if the above equation satisfies the aftereffect, any one decoding request is not related to time in any short time, and two decoding requests do not arrive at the same time, then the probability of the request n to be decoded is poisson distribution as follows according to the state equilibrium equation of the system:
where λ denotes the stream of information to be decoded, which is achieved on average per unit time, pkRepresenting the probability of the k-th service arrival;
when an incoming request to decode satisfies the poisson distribution, the time interval p (T ≦ T) at which decoding can occur satisfies the exponential distribution:
the time probability p required by the scheduling and the number L capable of being called are calculated by the formulasComprises the following steps:
wherein,ρ represents a service time that each decoding module can decode per unit time, and μ represents an average decoding time per decoding module.
The dispatching module is connected with 12 SAM safety modules in a hanging mode through a CAN bus, the 12 SAM safety modules are divided into 4 groups, and the dispatching module sends ciphertext information unpacked by the unpacking module according to a TCP/IP protocol to the corresponding SAM safety modules; each group of SAM security modules respectively compiles addresses 01, 02, 03 and 04, each group comprises 3 SAM security modules which respectively compile addresses 011, 012 and 013; 021, 022, 023; 031, 032, 033; 041, 042, 043; the scheduling module sends the first to fourth ciphertext information to the SAM security modules with addresses 011, 021, 031, 041, the fifth to eighth ciphertext information to the SAM security modules with addresses 012, 022, 032, 042, and the ninth to twelfth ciphertext information to the SAM security modules with addresses 013, 023, 033, 043; if the SAM security module of a certain address is transmitted last time, the scheduling module records the position, and next ciphertext information transmission starts from the recorded position, so that the utilization efficiency of each SAM security module is basically equivalent.
The encryption module encrypts the decoded identity information by using a random phase encryption algorithm, and the method comprises the following steps: the kernel function of the transform is:
where x (t) denotes the function to be encrypted, Fp[x(t)]Encrypted transformation kernel, u transformation domain where encryption kernel function is located, t represents time, Kp(t, u) kernel function of transform kernel, Xp(u) the result of the encrypted transformation, and
wherein A isαJ, α and n respectively represent an encryption operator, and the encryption method is as follows:
wherein,representing the result after quadratic transformation, Fα、FβIndicating encryption using the results of the kernel functions at α, β, respectively, C denotes a transformed function, x0Independent variable, xβExpressed as the β th transformation kernel function, f is a desired function, M1Representing a first order transformation function, M2Representing a quadratic transformation function.
And the encrypted identity information is packaged through a packaging module and is transmitted to a database server through a CAN bus communication system. The embedded MCU controller receives decoded information transmitted by the SAM security module scheduled by the scheduling module, the encryption module encrypts the information by using an encryption algorithm, and the information is packaged by the packaging module and uploaded to a data server or a client through the CAN bus communication system, so that company technicians CAN conveniently inspect the running condition of each system and check the information by clients. After the embedded MCU successfully receives the decoding information of the SAM safety module, the display screen displays the successfully received information, the information is successfully uploaded through the CAN bus communication system, the LED lamp for displaying the work of the wireless communication system is on, and the information is successfully uploaded.
The embedded MCU controls and receives the identity information of the TCP/IP communication system and decrypts by using a random phase decryption algorithm, and the method comprises the following steps:
wherein, Xp(u) primitive function to be decrypted, x (t) decrypted result, K-p(t, u) represents a transformation kernel;
wherein x isαAn argument at α, F (x) representing the result after the second decryption, F-α、F-βRepresenting the transformed kernel functions with decryption angles of- α, - β, respectively.
The working process is as shown in fig. 3, the embedded MCU controller is turned on to control, the power supply controller is turned on the charging module to display that the LED lamp of the charging module works is on; the embedded MCU controller searches whether the TCP/IP communication system sends information or not, if the information is not continuously searched, if second-generation identity card information is searched, the embedded MCU controller codes and encapsulates ciphertext information, transmits the ciphertext information to the unpacking module to carry out coding and unpacking through a TCP/IP protocol, transmits the unpacked information to the scheduling module, the scheduling module selects an SAM security module which uses the next address decoded last time according to a scheduling algorithm, the SAM security module decodes the second-generation identity card information and then directly transmits the second-generation identity card information to the embedded MCU controller through a USB interface or a COM interface, the embedded MCU controller transmits the decoded second-generation identity card information to the encryption module to carry out encryption and packing through the packing module, and the second-generation identity card information after being packaged is transmitted to the data server through the CAN bus communication system. The embedded MCU controller transmits the running information thereof to the company server through the wireless communication system at regular time, so that the company technicians can conveniently patrol the running conditions of the systems.
After the embedded MCU controller completes self-checking after the first key is used for starting up, whether the battery is normal or not is detected through the power controller, the battery is charged after the battery is connected, and the charging working flow is shown in fig. 3. The power supply controller enters an interrupt inlet, the interrupt is closed, whether the battery is full of the battery or not is judged, the charging module is started without being full of the battery, the LED lamp for displaying the work of the charging module on the display host is bright, if the battery is full of the battery, the power supply controller disconnects the charging module, the interrupt is turned on simultaneously, the LED lamp for displaying the work of the charging module is not bright, and the corresponding working mode is entered after the charging is finished.
The decoding method of the identity information comprises the following steps: the NFC card reading device collects identity card information and uploads the identity card information to an upper computer, the embedded MCU controller judges whether a TCP/IP communication system is successfully started or not, if the TCP/IP communication system is successfully started, the identity information in the upper computer is transmitted to the embedded MCU controller through the TCP/IP communication system, the embedded MCU controller receives and judges whether the identity information is complete or not, if the identity information is not successful, the embedded MCU controller transmits the identity information to an unpacking module for unpacking, required data information is transmitted to a scheduling module, the scheduling module selects a corresponding SAM safety module for decoding, the SAM safety module decodes the unpacked data information, and when the information is successfully decoded, the information is transmitted to the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface, the decoded identity card information of the embedded MCU controller is transmitted to an identity card information encryption module for encryption, And packaging by a packaging module, transmitting the packaged identity card plaintext information to a database server through a CAN bus communication system, and simultaneously displaying that an LED lamp of the wireless communication system works is on.
The invention utilizes the development achievement of the latest information technology, is closely combined with the daily life of people, belongs to a high-end product of electronic equipment with the close combination of the information technology and the life of people, is combined with mechanical structure innovation on the basis of the electronic technology, has the characteristics of intellectualization and function diversification, is incomparable with the traditional on-line product, is in support of the current unprecedented electronic product, and is also in the development direction of the electronic technology in a period of time. The invention can supply power through the rechargeable battery, and has low power; the circuit integration level is high, the technology is mature, the plate manufacturing process is less, and the production is easy; the structure is compact and firm, the appearance design is reasonable, and the input-output ratio is high; the method is a product of the development of the information technology and a requirement of social development, effectively overcomes the defects of the traditional online type, provides a good solution for encoding and decoding of the second-generation identity card, and has great social benefit; meanwhile, the population of China is large, and the inevitable demand of real-name system requirements also provides wide space for product marketing.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.