CN106453363A - Network coding and decoding system based on bus technology for plurality of 2nd-generation ID cards - Google Patents

Network coding and decoding system based on bus technology for plurality of 2nd-generation ID cards Download PDF

Info

Publication number
CN106453363A
CN106453363A CN201610951109.2A CN201610951109A CN106453363A CN 106453363 A CN106453363 A CN 106453363A CN 201610951109 A CN201610951109 A CN 201610951109A CN 106453363 A CN106453363 A CN 106453363A
Authority
CN
China
Prior art keywords
module
communication system
decoding
information
sam
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610951109.2A
Other languages
Chinese (zh)
Other versions
CN106453363B (en
Inventor
路向阳
李永杰
陈帅军
吴泽强
邓博阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Soft Tech Information Technology Co Ltd
Original Assignee
Zhengzhou Soft Tech Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Soft Tech Information Technology Co Ltd filed Critical Zhengzhou Soft Tech Information Technology Co Ltd
Priority to CN201610951109.2A priority Critical patent/CN106453363B/en
Publication of CN106453363A publication Critical patent/CN106453363A/en
Application granted granted Critical
Publication of CN106453363B publication Critical patent/CN106453363B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a network coding and decoding system based on a bus technology for a plurality of 2nd-generation ID cards. The network coding and decoding system comprises a shell, wherein the shell is provided with a display screen; a lower part of the shell is provided with buttons; an upper part of the shell is provided with normal working status indicator lamps; the display screen is provided with failure status indicator lamps; and an embedded MCU (Microprogrammed Control Unit), a storage, a TCP/IP (Transmission Control Protocol/Internet Protocol) communication system, a display driving circuit, a CAN (Controller Area Network) bus communication system, an intelligent charging system, a scheduling module and at least one SAM (Secure Access Module) safety module are arranged in the shell. In the network coding and decoding system, a conventional coding and decoding module for the 2-generation ID cards is networked, so that content of the conventional coding and decoding module is enriched; demands of a user can be met to the maximum extent; and the cost is lowered. The network coding and decoding system has a simple structure, is reliable in performance, low in price and powerful in function, and can work stably for a long time. A working status of the network coding and decoding system can be transmitted, so that a technician can get a running status of equipment without getting to a site, make accurate judgements and take immediate actions.

Description

Multi-second-generation identity card network coding and decoding system based on bus technology
Technical Field
The invention relates to the technical field of second-generation identification card identification technology, in particular to a multi-second-generation identification card network coding and decoding system based on bus technology, which utilizes an embedded MCU (microprogrammed control Unit) main controller to carry out real-time transmission, real-time coding and real-time decoding and real-time communication.
Background
In recent years, globalization trend is increasingly obvious, people are handed over and flow more and more closely, along with malicious damage events such as violence and terrorism, the people are more and more understood, the identity card reader is really made into necessary requirements of various industries, the application of the identity card reader in the market of China is increasingly wide, and the supply capacity of the identity card reader is continuously improved along with the huge demands of the market.
With the formal start of the second generation ID card exchange work in China, an attractive new ID card appears in the hands of residents quickly. The second generation of resident identification cards are many variations and differences from the first generation of resident identification cards. The second generation resident identification card is a single-page card type identification card compounded by multiple layers of polyester materials, is manufactured by adopting a non-contact IC card technology, and has two functions of visual reading and machine reading. The dimension design of the certificate has the length of 85.6 mm, the width of 54 mm and the thickness of 1.0 mm. The front of the certificate is provided with 2 registration items of issuing authority and valid period, and is printed with national emblem patterns, certificate names, ideographic great wall patterns and colorful patterns; the back of the certificate has 7 registration items of name, sex, ethnicity, date of birth, residence address of resident, citizen's ID number and personal photo, and is printed with color pattern. The universal issuing of the second-generation identity card brings great business opportunity for the identity card reader industry.
The second generation identity card is a smart card conforming to ISO/IEC 14443TypeB protocol, and according to the stipulations of 'resident identity card law', identity information of nine residents is stored in the second generation identity card, and the second generation identity card comprises the following steps: name, sex, ethnicity, date of birth, residence address of resident family, citizen ID number, personal photo, validity period of certificate and issuing authority. Compared with the first generation identity card which can only be read visually, the second generation identity card can also be read automatically by a non-contact machine due to the adoption of the RFID technology, except the visual reading function, so that the identification efficiency is improved. In addition, the public security department can also change the resident identity information stored in the card through the card reader, so that the resident information can be directly changed and written without re-making the card when the resident information is changed, such as when the resident address is changed. Another important advantage of the second generation of identification cards is that they are well-protected against forgery, the communication between the identification card and the reader is encrypted, the technical and financial thresholds for decryption are quite high, and forgery and tampering of the identification card can be prevented to a considerable extent.
The vigorous development of the demand of the second generation identity card provides huge business opportunities for the second generation identity card reading and other services, the defects of high cost and great reconstruction difficulty are increasingly obvious because each machine terminal of the traditional on-line equipment needs to be connected with an SAM security module, the development of information and network technology provides a good solution for solving the problem, and the comprehensive analysis is carried out on the use, demand and other conditions of the card reading terminal, and the design risk assessment and the like. The investigation finds that the prior on-line second-generation identification card has complex structure, single function and difficult reconstruction, and is difficult to solve the problems safely and conveniently.
Meanwhile, the development of information technology is different day by day, and the full application of the information technology to the life of people is the target of cumin of science and technology workers. With the help of the new achievement of information technology development, to the various functional defects of current two take place ofs ID card reader, redesign has carried out, has released decoding, encryption and decryption, communication, charge, functions such as wireless communication are as an organic whole, and the novel multi-functional intelligent two take place ofs ID card reading system of safer, convenient, intellectuality changes the restriction that traditional on-line type product must every machine be equipped with SAM safety module, has given two take place ofs ID card reader new effects, new connotation.
The MCU controller has the advantages of simple design structure, powerful functions and the like, is often applied to intelligent design, can utilize the requirements of reaching industrial practicality for control precision and test precision, is convenient, simple in calculation and easy for real-time control, and is widely applied to the development of measurement and control systems. The second-generation ID card decoding module is mature, miniaturized hardware is realized, the use is very convenient, and the method is widely applied to various accurate decoding systems. Short message service (sms) has been increasingly viewed as a basic data service of GSM networks, and a short message-based remote wireless communication technology plays an important role in remote monitoring, and is widely used in various industries, particularly, remote monitoring, because it can transmit information in time and is low in cost. Through the combination of the technologies, the second-generation ID card coding and decoding system based on the informatization technology is designed, the basic requirements of users with different characteristics are met, technical support is provided for the promotion of real-name systems in various industries, and convenience is brought to the travel and daily life of people.
Disclosure of Invention
The invention aims to solve the problem of providing a multi-second-generation identity card network coding and decoding system based on a bus technology, which has the functions of real-time decoding, real-time encryption and decryption processing, real-time transmission, wireless communication and the like, thereby realizing the identification of second-generation identity cards.
In order to solve the technical problems, the technical scheme of the invention is as follows: a multi-second-generation identity card network coding and decoding system based on a bus technology comprises a shell, wherein a display screen is arranged on the shell, keys are arranged on the lower portion of the shell, a normal working state indicator lamp is arranged on the upper portion of the shell, a fault state indicator lamp is arranged on the display screen, an embedded MCU controller, a memory, a TCP/IP communication system, a display driving circuit, a CAN bus communication system, an intelligent charging system, a scheduling module and at least one SAM safety module are arranged in the shell, the intelligent charging system comprises a power controller, a charging module and a battery, the power controller is respectively connected with the charging module and the battery, and the charging module is connected with the battery; the embedded MCU controller is respectively connected with the keys, the memory, the TCP/IP communication system, the display driving circuit and the power supply controller, and the display driving circuit is connected with the display screen through the interface conversion device; the power controller is connected with the SAM safety module, the embedded MCU controller is connected with the unpacking module, the unpacking module is connected with the scheduling module, the scheduling module is respectively connected with the SAM safety module through a CAN bus, and the SAM safety module is connected with the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface; the embedded MCU controller is connected with a CAN bus communication system through a decoding module and a packaging module, the CAN bus communication system is connected with a database server, and a TCP/IP communication system is connected with an NFC card reading device through an upper computer.
The number of the keys is two, and the distance between the keys is 1 cm; the keys comprise a first key of the power switch and a second key of the system reset.
The number of the normal working state indicator lamps is three, and the normal working state indicator lamps comprise LED lamps for displaying the working of the charging module, LED lamps for displaying the working of the wireless communication system and LED lamps for displaying whether a power supply is connected or not; the number of the fault state indicating lamps is three, and the fault state indicating lamps comprise LED lamps for displaying a power supply, LED lamps for displaying abnormity and LED lamps for displaying work; the battery is charged through the charging module after the power supply is switched on, the LED lamp for displaying the work of the charging module is turned on, and the LED lamp for displaying the work of the charging module is turned off after the charging is finished.
After the MCU controller is electrified, judging whether the SAM safety module is successfully operated and whether the TCP/IP communication system is successfully started; when the SAM safety module is successfully operated and the TCP/IP communication system is successfully started, displaying that a working LED lamp is on, and when the SAM safety module is failed to operate or the TCP/IP communication system is failed to start, displaying that an abnormal LED lamp is on; when the wireless communication system transmits the decoded information, an LED lamp for displaying the work of the wireless communication system is on; when the wireless communication system does not transmit the decoded information, the LED lamp for displaying the work of the wireless communication system is turned off; when a fault occurs, the wireless communication system reports the fault, and the LED lamp for displaying the work of the wireless communication system flickers.
The unpacking module divides the ciphertext information into four parts of prefix, code length, data and verification according to a transmission protocol, and the packing module packs the ciphertext information divided into four parts of prefix, code length, data and verification according to the transmission protocol.
The method for calculating the number of the scheduled SAM security modules by the scheduling module comprises the following steps: the state balance equation of the scheduling algorithm system is as follows:
wherein λ is0、λn-1、λnRepresents the arrival rate, mu, of the 0 th, n-1 th and n-th data streams to be decoded1、μn、μn+1Representing the first, nth and n +1 decoding service rates, p0Indicating the probability that the system is idle, p1Representing the probability of the number of decodes of the system service being 1, pn-1Representing the probability that the number of service decodings is n-1, pn、pn+1Respectively representing the probabilities that the service decoding numbers are n and n + 1;
let N (t) be the number of second generation identities to be decoded that need to be scheduled in the time interval [0, t ], pn(t1,t2) Is shown in the interval (t)1,t2) If there are n requests to be decoded coming, then there are:
pn(t1,t2)=p{N(t2)-N(t1)=n}(t2>t1,n≥0);
if the above equation satisfies the aftereffect, any one decoding request is not related to time in any short time, and two decoding requests do not arrive at the same time, then the probability of the request n to be decoded is poisson distribution as follows according to the state equilibrium equation of the system:
where λ denotes the stream of information to be decoded, which is achieved on average per unit time, pkRepresenting the probability of the k-th service arrival;
when an incoming request to decode satisfies the poisson distribution, the time interval p (T ≦ T) at which decoding can occur satisfies the exponential distribution:
the time probability required for scheduling a certain decoding module is calculated by the above formula, and the number L which can be called outsComprises the following steps:
wherein,ρ represents a service time that each decoding module can decode per unit time, and μ represents an average decoding time per decoding module.
The dispatching module is connected with 12 SAM safety modules in a hanging mode through a CAN bus, the 12 SAM safety modules are divided into 4 groups, and the dispatching module sends ciphertext information unpacked by the unpacking module according to a TCP/IP protocol to the corresponding SAM safety modules; each group of SAM security modules respectively compiles addresses 01, 02, 03 and 04, each group comprises 3 SAM security modules which respectively compile addresses 011, 012 and 013; 021, 022, 023; 031, 032, 033; 041, 042, 043; the scheduling module sends the first to fourth ciphertext information to the SAM security modules with addresses 011, 021, 031, 041, the fifth to eighth ciphertext information to the SAM security modules with addresses 012, 022, 032, 042, and the ninth to twelfth ciphertext information to the SAM security modules with addresses 013, 023, 033, 043; if the SAM security module of a certain address is transmitted last time, the scheduling module records the position, and next ciphertext information transmission starts from the recorded position, so that the utilization efficiency of each SAM security module is basically equivalent.
The encryption module encrypts the decoded identity information by using a random phase encryption algorithm, and the method comprises the following steps: the kernel function of the transform is:
where x (t) denotes the function to be encrypted, Fp[x(t)]Encrypted transformation kernel, u transformation domain where encryption kernel function is located, t represents time, Kp(t, u) kernel function of transform kernel, Xp(u) the result of the encrypted transformation, and
wherein A isαJ, α and n respectively represent an encryption operator, the encryption is transformed for many times, and the encryption method is as follows:
wherein,representing the result after quadratic transformation, Fα、FβIndicating encryption using the results of the kernel functions at α, β, respectively, C denotes a transformed function, x0Independent variable, xβThe expression is represented by β th transformation kernel function, f represents a desired function, M1Representing a first order transformation function, M2Representing a quadratic transformation function;
and the encrypted identity information is packaged through a packaging module and is transmitted to a database server through a CAN bus communication system.
The embedded MCU controls and receives the identity information of the TCP/IP communication system and decrypts by using a random phase decryption algorithm, and the method comprises the following steps:
wherein, Xp(u) primitive function to be decrypted, x (t) decrypted result, K-p(t, u) represents a transformation kernel;
wherein x isαAn argument at α, F (x) representing the result after the second decryption, F、FRepresenting the transformed kernel functions with decryption angles of- α, - β, respectively.
The decoding method of the identity information comprises the following steps: the NFC card reading device collects identity card information and uploads the identity card information to an upper computer, the embedded MCU controller judges whether a TCP/IP communication system is successfully started or not, if the TCP/IP communication system is successfully started, the identity information in the upper computer is transmitted to the embedded MCU controller through the TCP/IP communication system, the embedded MCU controller receives and judges whether the identity information is complete or not, if the identity information is not successful, the embedded MCU controller transmits the identity information to an unpacking module for unpacking, required data information is transmitted to a scheduling module, the scheduling module selects a corresponding SAM safety module for decoding, the SAM safety module decodes the unpacked data information, and when the information is successfully decoded, the information is transmitted to the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface, the decoded identity card information of the embedded MCU controller is transmitted to an identity card information encryption module for encryption, And packaging by a packaging module, transmitting the packaged identity card plaintext information to a database server through a CAN bus communication system, and simultaneously displaying that an LED lamp of the wireless communication system works is on.
The invention carries out networking on the traditional second-generation identity card coding and decoding module, and endows the traditional second-generation identity card coding and decoding module with richer connotation by additionally arranging an informatization product, thereby meeting the requirements of users to the maximum extent; meanwhile, a universal chip is adopted in the design, so that the cost is reduced as much as possible, and a product with low price and powerful functions is provided for social groups. The invention has simple structure, reliable performance, low price and powerful function, can not only work stably for a long time and carry out encryption and decryption processing and communication, but also can transmit the working state of the device, so that a technician can know the running state of the device without going to the site, and the technician can make accurate judgment and timely processing.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic structural diagram of the present invention.
Fig. 2 is a schematic block diagram of the present invention.
FIG. 3 is a flow chart of the present invention.
Fig. 4 is a flow chart of the charging module of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive effort based on the embodiments of the present invention, are within the scope of the present invention.
A multi-second-generation identity card network coding and decoding system based on a bus technology is shown in figures 1 and 2 and comprises a shell 1, wherein a display screen 2 is arranged on the shell 1, and a key 3 is arranged at the lower part of the shell 1. The number of the keys 3 is two, and the distance between the keys 3 is 1 cm. The keys 3 comprise a first key of a power switch and a second key of system reset, and are respectively used for controlling the starting of the whole system and the resetting of the system. The upper part of the shell 1 is provided with a normal working state indicator lamp 5, and the display screen 2 is provided with a fault state indicator lamp 4. The number of the normal working state indicator lamps 5 is three, and the normal working state indicator lamps 5 comprise LED lamps for displaying the working of the charging module, LED lamps for displaying the working of the wireless communication system and LED lamps for displaying whether a power supply is connected or not; the number of the fault state indicating lamps 4 is three, and the fault state indicating lamps 4 comprise LED lamps for displaying a power supply, LED lamps for displaying abnormity and LED lamps for displaying work. The battery is charged through the charging module after the power supply is switched on, the LED lamp for displaying the work of the charging module is turned on, and the LED lamp for displaying the work of the charging module is turned off after the charging is finished.
An embedded MCU controller, a memory, a TCP/IP communication system, a display driving circuit, a CAN bus communication system, an intelligent charging system, a scheduling module and at least one SAM safety module are arranged in the shell 1, the intelligent charging system comprises a power supply controller, a charging module and a battery, the power supply controller is respectively connected with the charging module and the battery, and the charging module is connected with the battery. The embedded MCU controller is respectively connected with the key 3, the memory, the TCP/IP communication system, the display driving circuit and the power supply controller, and the display driving circuit is connected with the display screen 2 through the interface conversion device. The whole device can directly utilize a standby battery to supply power after power failure, and the normal work of the device is ensured. The display screen 2 displays the specific working state and the specific decoding result. The power controller is connected with the SAM safety module, the embedded MCU controller is connected with the unpacking module, the unpacking module is connected with the scheduling module, the scheduling module is respectively connected with the SAM safety module through a CAN bus, and the SAM safety module is connected with the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface. Each SAM safety module comprises a decoding read-write head and a related circuit, and is connected to a scheduling module of the embedded MCU controller through a CAN bus. The embedded MCU controller is connected with a CAN bus communication system through a decoding module and a packaging module, the CAN bus communication system is connected with a database server, and the TCP/IP communication system is connected with an NFC card reading device through an upper computer. The TCP/IP communication system utilizes a TCP/IP protocol chip to realize encryption and decryption transmission of information. The embedded MCU controller receives the identity information transmitted by the TCP/IP communication system, the unpacking module unpacks the corresponding information and extracts the data information, the scheduling module transmits the data of the identity information to the corresponding SAM safety module through a bus by utilizing a scheduling algorithm, the SAM safety module transmits the decoded result information to the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface, and the embedded MCU controller transmits the decoded information to the encryption module to be encrypted and the packing module to be packed and then transmits the information to the CAN bus communication system and uploads the information to the database server.
After the MCU controller is electrified, judging whether the SAM safety module is successfully operated and whether the TCP/IP communication system is successfully started; when the SAM safety module is successfully operated and the TCP/IP communication system is successfully started, displaying that a working LED lamp is on, and when the SAM safety module is failed to operate or the TCP/IP communication system is failed to start, displaying that an abnormal LED lamp is on; when the wireless communication system transmits the decoded information, an LED lamp for displaying the work of the wireless communication system is on; when the wireless communication system does not transmit the decoded information, the LED lamp for displaying the work of the wireless communication system is turned off; when a fault occurs, the wireless communication system reports the fault, and the LED lamp for displaying the work of the wireless communication system flickers.
The unpacking module divides the ciphertext information into four parts of prefix, code length, data and verification according to a transmission protocol, and the packing module packs the ciphertext information divided into four parts of prefix, code length, data and verification according to the transmission protocol.
The method for calculating the number of the scheduled SAM security modules by the scheduling module comprises the following steps: the state balance equation of the scheduling algorithm system is as follows:
wherein λ is0、λn-1、λnRepresents the arrival rate, mu, of the 0 th, n-1 th and n-th data streams to be decoded1、μn、μn+1Representing the first, nth and n +1 decoding service rates, p0Indicating the probability that the system is idle, p1Representing the probability of the number of decodes of the system service being 1, pn-1Representing the probability that the number of decodes is n-1, pn、pn+1Respectively representing the probability that the decoding number is n and n + 1;
let N (t) be the number of second generation identities to be decoded that need to be scheduled in the time interval [0, t ], pn(t1,t2) Is shown in the interval (t)1,t2) If there are n requests to be decoded coming, then there are:
pn(t1,t2)=p{N(t2)-N(t1)=n}(t2>t1,n≥0);
if the above equation satisfies the aftereffect, any one decoding request is not related to time in any short time, and two decoding requests do not arrive at the same time, then the probability of the request n to be decoded is poisson distribution as follows according to the state equilibrium equation of the system:
where λ denotes the stream of information to be decoded, which is achieved on average per unit time, pkRepresenting the probability of the k-th service arrival;
when an incoming request to decode satisfies the poisson distribution, the time interval p (T ≦ T) at which decoding can occur satisfies the exponential distribution:
the time probability p required by the scheduling and the number L capable of being called are calculated by the formulasComprises the following steps:
wherein,ρ represents a service time that each decoding module can decode per unit time, and μ represents an average decoding time per decoding module.
The dispatching module is connected with 12 SAM safety modules in a hanging mode through a CAN bus, the 12 SAM safety modules are divided into 4 groups, and the dispatching module sends ciphertext information unpacked by the unpacking module according to a TCP/IP protocol to the corresponding SAM safety modules; each group of SAM security modules respectively compiles addresses 01, 02, 03 and 04, each group comprises 3 SAM security modules which respectively compile addresses 011, 012 and 013; 021, 022, 023; 031, 032, 033; 041, 042, 043; the scheduling module sends the first to fourth ciphertext information to the SAM security modules with addresses 011, 021, 031, 041, the fifth to eighth ciphertext information to the SAM security modules with addresses 012, 022, 032, 042, and the ninth to twelfth ciphertext information to the SAM security modules with addresses 013, 023, 033, 043; if the SAM security module of a certain address is transmitted last time, the scheduling module records the position, and next ciphertext information transmission starts from the recorded position, so that the utilization efficiency of each SAM security module is basically equivalent.
The encryption module encrypts the decoded identity information by using a random phase encryption algorithm, and the method comprises the following steps: the kernel function of the transform is:
where x (t) denotes the function to be encrypted, Fp[x(t)]Encrypted transformation kernel, u transformation domain where encryption kernel function is located, t represents time, Kp(t, u) kernel function of transform kernel, Xp(u) the result of the encrypted transformation, and
wherein A isαJ, α and n respectively represent an encryption operator, and the encryption method is as follows:
wherein,representing the result after quadratic transformation, Fα、FβIndicating encryption using the results of the kernel functions at α, β, respectively, C denotes a transformed function, x0Independent variable, xβExpressed as the β th transformation kernel function, f is a desired function, M1Representing a first order transformation function, M2Representing a quadratic transformation function.
And the encrypted identity information is packaged through a packaging module and is transmitted to a database server through a CAN bus communication system. The embedded MCU controller receives decoded information transmitted by the SAM security module scheduled by the scheduling module, the encryption module encrypts the information by using an encryption algorithm, and the information is packaged by the packaging module and uploaded to a data server or a client through the CAN bus communication system, so that company technicians CAN conveniently inspect the running condition of each system and check the information by clients. After the embedded MCU successfully receives the decoding information of the SAM safety module, the display screen displays the successfully received information, the information is successfully uploaded through the CAN bus communication system, the LED lamp for displaying the work of the wireless communication system is on, and the information is successfully uploaded.
The embedded MCU controls and receives the identity information of the TCP/IP communication system and decrypts by using a random phase decryption algorithm, and the method comprises the following steps:
wherein, Xp(u) primitive function to be decrypted, x (t) decrypted result, K-p(t, u) represents a transformation kernel;
wherein x isαAn argument at α, F (x) representing the result after the second decryption, F、FRepresenting the transformed kernel functions with decryption angles of- α, - β, respectively.
The working process is as shown in fig. 3, the embedded MCU controller is turned on to control, the power supply controller is turned on the charging module to display that the LED lamp of the charging module works is on; the embedded MCU controller searches whether the TCP/IP communication system sends information or not, if the information is not continuously searched, if second-generation identity card information is searched, the embedded MCU controller codes and encapsulates ciphertext information, transmits the ciphertext information to the unpacking module to carry out coding and unpacking through a TCP/IP protocol, transmits the unpacked information to the scheduling module, the scheduling module selects an SAM security module which uses the next address decoded last time according to a scheduling algorithm, the SAM security module decodes the second-generation identity card information and then directly transmits the second-generation identity card information to the embedded MCU controller through a USB interface or a COM interface, the embedded MCU controller transmits the decoded second-generation identity card information to the encryption module to carry out encryption and packing through the packing module, and the second-generation identity card information after being packaged is transmitted to the data server through the CAN bus communication system. The embedded MCU controller transmits the running information thereof to the company server through the wireless communication system at regular time, so that the company technicians can conveniently patrol the running conditions of the systems.
After the embedded MCU controller completes self-checking after the first key is used for starting up, whether the battery is normal or not is detected through the power controller, the battery is charged after the battery is connected, and the charging working flow is shown in fig. 3. The power supply controller enters an interrupt inlet, the interrupt is closed, whether the battery is full of the battery or not is judged, the charging module is started without being full of the battery, the LED lamp for displaying the work of the charging module on the display host is bright, if the battery is full of the battery, the power supply controller disconnects the charging module, the interrupt is turned on simultaneously, the LED lamp for displaying the work of the charging module is not bright, and the corresponding working mode is entered after the charging is finished.
The decoding method of the identity information comprises the following steps: the NFC card reading device collects identity card information and uploads the identity card information to an upper computer, the embedded MCU controller judges whether a TCP/IP communication system is successfully started or not, if the TCP/IP communication system is successfully started, the identity information in the upper computer is transmitted to the embedded MCU controller through the TCP/IP communication system, the embedded MCU controller receives and judges whether the identity information is complete or not, if the identity information is not successful, the embedded MCU controller transmits the identity information to an unpacking module for unpacking, required data information is transmitted to a scheduling module, the scheduling module selects a corresponding SAM safety module for decoding, the SAM safety module decodes the unpacked data information, and when the information is successfully decoded, the information is transmitted to the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface, the decoded identity card information of the embedded MCU controller is transmitted to an identity card information encryption module for encryption, And packaging by a packaging module, transmitting the packaged identity card plaintext information to a database server through a CAN bus communication system, and simultaneously displaying that an LED lamp of the wireless communication system works is on.
The invention utilizes the development achievement of the latest information technology, is closely combined with the daily life of people, belongs to a high-end product of electronic equipment with the close combination of the information technology and the life of people, is combined with mechanical structure innovation on the basis of the electronic technology, has the characteristics of intellectualization and function diversification, is incomparable with the traditional on-line product, is in support of the current unprecedented electronic product, and is also in the development direction of the electronic technology in a period of time. The invention can supply power through the rechargeable battery, and has low power; the circuit integration level is high, the technology is mature, the plate manufacturing process is less, and the production is easy; the structure is compact and firm, the appearance design is reasonable, and the input-output ratio is high; the method is a product of the development of the information technology and a requirement of social development, effectively overcomes the defects of the traditional online type, provides a good solution for encoding and decoding of the second-generation identity card, and has great social benefit; meanwhile, the population of China is large, and the inevitable demand of real-name system requirements also provides wide space for product marketing.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.

Claims (10)

1. A multi-second-generation identity card network coding and decoding system based on a bus technology comprises a shell (1), wherein a display screen (2) is arranged on the shell (1), and a key (3) is arranged at the lower part of the shell (1), and is characterized in that a normal working state indicator lamp (5) is arranged at the upper part of the shell (1), a fault state indicator lamp (4) is arranged on the display screen (2), an embedded MCU (microprogrammed control unit) controller, a memory, a TCP/IP (transmission control protocol/internet protocol) communication system, a display driving circuit, a CAN (controller area network) bus communication system, an intelligent charging system, a scheduling module and at least one SAM (sample access network) safety module are arranged in the shell (1), the intelligent charging system comprises a power controller, a charging module and a battery, the; the embedded MCU controller is respectively connected with the key (3), the memory, the TCP/IP communication system, the display driving circuit and the power supply controller, and the display driving circuit is connected with the display screen (2) through the interface conversion device; the power controller is connected with the SAM safety module, the embedded MCU controller is connected with the unpacking module, the unpacking module is connected with the scheduling module, the scheduling module is connected with the SAM safety module through a CAN bus, and the SAM safety module is connected with the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface; the embedded MCU controller is connected with a CAN bus communication system through a decoding module and a packaging module, the CAN bus communication system is connected with a database server, and a TCP/IP communication system is connected with an NFC card reading device through an upper computer.
2. The multi-generation identity card network coding and decoding system based on the bus technology is characterized in that the number of the keys (3) is two, and the distance between the keys (3) is 1 cm; the keys (3) comprise a first key of a power switch and a second key of system reset.
3. The bus-technology-based multi-generation ID card network coding and decoding system according to claim 1, wherein the number of the normal operation status indicator lamps (5) is three, and the normal operation status indicator lamps (5) include an LED lamp for displaying the operation of the charging module, an LED lamp for displaying the operation of the wireless communication system, and an LED lamp for displaying whether a power supply is connected; the number of the fault state indicating lamps (4) is three, and the fault state indicating lamps (4) comprise LED lamps for displaying a power supply, LED lamps for displaying abnormity and LED lamps for displaying work; the battery is charged through the charging module after the power supply is switched on, the LED lamp for displaying the work of the charging module is turned on, and the LED lamp for displaying the work of the charging module is turned off after the charging is finished.
4. The multi-generation network coding and decoding system of identity cards based on bus technology as claimed in claim 1, wherein the MCU controller after power-on determines whether the SAM security module is successfully operated and whether the TCP/IP communication system is successfully started; when the SAM safety module is successfully operated and the TCP/IP communication system is successfully started, displaying that a working LED lamp is on, and when the SAM safety module is failed to operate or the TCP/IP communication system is failed to start, displaying that an abnormal LED lamp is on; when the wireless communication system transmits the decoded information, an LED lamp for displaying the work of the wireless communication system is on; when the wireless communication system does not transmit the decoded information, the LED lamp for displaying the work of the wireless communication system is turned off; when a fault occurs, the wireless communication system reports the fault, and the LED lamp for displaying the work of the wireless communication system flickers.
5. The multi-generation identity card network coding and decoding system based on the bus technology as claimed in claim 1, wherein the unpacking module splits the ciphertext information into four parts of prefix, code length, data and check according to the transmission protocol, and the packing module packs the ciphertext information split into four parts of prefix, code length, data and check according to the transmission protocol.
6. The multi-generation ID card network coding and decoding system based on bus technology as claimed in claim 1, wherein the method for the scheduling module to calculate the number of the SAM security modules is: the state balance equation of the scheduling algorithm system is as follows:
λ n - 1 p n - 1 - ( λ n + μ n ) p m + ( μ n + 1 ) p n + 1 = 0 λ 0 p 0 - μ 1 p 1 = 0 ;
wherein λ is0、λn-1、λnRepresents the arrival rate, mu, of the 0 th, n-1 th and n-th data streams to be decoded1、μn、μn+1Representing the first, nth and n +1 decoding service rates, p0Indicating the probability that the system is idle, p1Representing the probability of the number of decodes of the system service being 1, pn-1Representing the probability that the number of service decodings is n-1, pn、pn+1Respectively representing the probabilities that the service decoding numbers are n and n + 1;
let N (t) be in a time intervalNumber of scheduled secondary identities to decode, p, required within [0, t)n(t1,t2) Is shown in the interval (t)1,t2) If there are n requests to be decoded coming, then there are:
pn(t1,t2)=p{N(t2)-N(t1)=n}(t2>t1,n≥0);
if the above equation satisfies the aftereffect, any one decoding request is not related to time in any short time, and two decoding requests do not arrive at the same time, then the probability of the request n to be decoded is poisson distribution as follows according to the state equilibrium equation of the system:
p k = λ k e - λ k ! , k = 0 , 1 , 2 , ... ;
where λ denotes the stream of information to be decoded, which is achieved on average per unit time, pkRepresenting the probability of the k-th service arrival;
when an incoming request to decode satisfies the poisson distribution, the time interval p (T ≦ T) at which decoding can occur satisfies the exponential distribution:
p ( T &le; t ) = 1 - e - &lambda; t , ( t &GreaterEqual; 0 ) 0 , ( t < 0 ) ;
the time probability required for scheduling a certain decoding module is calculated by the above formula, and the number L which can be called outsComprises the following steps:
L s = &Sigma; n = 1 &infin; np n = &rho; 1 - &rho; = &lambda; &mu; - &lambda; ;
wherein,ρ represents a service time that each decoding module can decode per unit time, and μ represents an average decoding time per decoding module.
7. The multi-generation ID card network coding and decoding system based on bus technology as claimed in claim 6, wherein the scheduling module is connected with 12 SAM security modules via CAN bus, the 12 SAM security modules are divided into 4 groups, the scheduling module sends the ciphertext message unpacked by the unpacking module according to TCP/IP protocol to the corresponding SAM security module; each group of SAM security modules respectively compiles addresses 01, 02, 03 and 04, each group comprises 3 SAM security modules which respectively compile addresses 011, 012 and 013; 021, 022, 023; 031, 032, 033; 041, 042, 043; the scheduling module sends the first to fourth ciphertext information to the SAM security modules with addresses 011, 021, 031, 041, the fifth to eighth ciphertext information to the SAM security modules with addresses 012, 022, 032, 042, and the ninth to twelfth ciphertext information to the SAM security modules with addresses 013, 023, 033, 043; if the SAM security module of a certain address is transmitted last time, the scheduling module records the position, and next ciphertext information transmission starts from the recorded position, so that the utilization efficiency of each SAM security module is basically equivalent.
8. The multi-generation identity card network coding and decoding system based on the bus technology as claimed in claim 6, wherein the encryption module encrypts the decoded identity information by using a random phase encryption algorithm, and the method is as follows: the kernel function of the transform is:
X p ( u ) = { F p &lsqb; x ( t ) &rsqb; } ( u ) = &Integral; &infin; + &infin; x ( t ) &CenterDot; K p ( t , u ) d t ;
where x (t) denotes the function to be encrypted, Fp[x(t)]Encrypted transformation kernel, u transformation domain where encryption kernel function is located, t represents time, Kp(t, u) kernel function of transform kernel, Xp(u) the result of the encrypted transformation, and
K p ( t , u ) = A &alpha; &CenterDot; exp ( j &CenterDot; t 2 + u 2 2 &CenterDot; cot &alpha; - j &CenterDot; u &CenterDot; t &CenterDot; csc &alpha; ) &alpha; &NotEqual; n &pi; &delta; ( t - u ) &alpha; = 2 n &pi; &delta; ( t + u ) &alpha; = ( 2 n &PlusMinus; 1 ) &pi; ;
wherein A isαJ, α and n respectively represent an encryption operator, the encryption is transformed for many times, and the encryption method is as follows:
wherein,representing the result after quadratic transformation, Fα、FβIndicating encryption using the results of the kernel functions at α, β, respectively, C denotes a transformed function, x0Independent variable, xβThe expression is represented by β th transformation kernel function, f represents a desired function, M1Representing a first order transformation function, M2Representing a quadratic transformation function;
and the encrypted identity information is packaged through a packaging module and is transmitted to a database server through a CAN bus communication system.
9. The multi-generation identity card network coding and decoding system based on the bus technology as claimed in claim 1, wherein the embedded MCU controls the receiving of the identity information of the TCP/IP communication system to decrypt by using a random phase decryption algorithm, and the method is as follows:
x ( t ) = &Integral; &infin; + &infin; X p ( u ) &CenterDot; K - p ( t , u ) d u ,
wherein, Xp(u) primitive function to be decrypted, x (t) decrypted result, K-p(t, u) represents a transformation kernel;
wherein x isαAn argument at α, F (x) representing the result after the second decryption, F、FRepresenting the transformed kernel functions with decryption angles of- α, - β, respectively.
10. The multi-generation ID card network coding and decoding system based on bus technology as claimed in claim 1, wherein the decoding method of ID information is: the NFC card reading device collects identity card information and uploads the identity card information to an upper computer, the embedded MCU controller judges whether a TCP/IP communication system is successfully started or not, if the TCP/IP communication system is successfully started, the identity information in the upper computer is transmitted to the embedded MCU controller through the TCP/IP communication system, the embedded MCU controller receives and judges whether the identity information is complete or not, if the identity information is not successful, the embedded MCU controller transmits the identity information to an unpacking module for unpacking, required data information is transmitted to a scheduling module, the scheduling module selects a corresponding SAM safety module for decoding, the SAM safety module decodes the unpacked data information, and when the information is successfully decoded, the information is transmitted to the embedded MCU controller through a USB (universal serial bus) or COM (component object model) interface, the decoded identity card information of the embedded MCU controller is transmitted to an identity card information encryption module for encryption, And packaging by a packaging module, transmitting the packaged identity card plaintext information to a database server through a CAN bus communication system, and simultaneously displaying that an LED lamp of the wireless communication system works is on.
CN201610951109.2A 2016-10-27 2016-10-27 Multi-second-generation identity card network decoding system based on bus technology Active CN106453363B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610951109.2A CN106453363B (en) 2016-10-27 2016-10-27 Multi-second-generation identity card network decoding system based on bus technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610951109.2A CN106453363B (en) 2016-10-27 2016-10-27 Multi-second-generation identity card network decoding system based on bus technology

Publications (2)

Publication Number Publication Date
CN106453363A true CN106453363A (en) 2017-02-22
CN106453363B CN106453363B (en) 2023-07-21

Family

ID=58179189

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610951109.2A Active CN106453363B (en) 2016-10-27 2016-10-27 Multi-second-generation identity card network decoding system based on bus technology

Country Status (1)

Country Link
CN (1) CN106453363B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107317667A (en) * 2017-06-05 2017-11-03 国政通科技股份有限公司 Method for early warning and prior-warning device that a kind of identity document is lost
CN110418319A (en) * 2019-05-30 2019-11-05 郑州中软高科信息技术有限公司 One kind makes mobile phone have the decoded method of China second-generation identity card

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011035549A1 (en) * 2009-09-25 2011-03-31 Ye Gao Method for managing citizen information
CN202534028U (en) * 2012-03-21 2012-11-14 济南大学 Internet of things authorization identity (ID) and ID card confirmation-based networked access control system
CN104299017A (en) * 2014-10-23 2015-01-21 南京启旭电子科技有限公司 Identity card network decoding system based on mobile phone NFC
WO2015027550A1 (en) * 2013-08-26 2015-03-05 Geng Mingsheng Visitor register interactive system for courts, procuratorates or petition departments
CN204203995U (en) * 2014-10-23 2015-03-11 南京启旭电子科技有限公司 A kind of I.D. network decoding system based on mobile phone NFC
CN204791039U (en) * 2015-07-28 2015-11-18 深圳犹狐云数据技术有限公司 Card equipment is read to two take place of split type ID cards based on smart mobile phone
CN105426931A (en) * 2014-09-03 2016-03-23 南京启旭电子科技有限公司 Identity card network decoding system based on mobile phone
CN206181089U (en) * 2016-10-27 2017-05-17 郑州中软高科信息技术有限公司 Many two take place ofs ID card network coding and decoding system based on bus technique

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011035549A1 (en) * 2009-09-25 2011-03-31 Ye Gao Method for managing citizen information
CN202534028U (en) * 2012-03-21 2012-11-14 济南大学 Internet of things authorization identity (ID) and ID card confirmation-based networked access control system
WO2015027550A1 (en) * 2013-08-26 2015-03-05 Geng Mingsheng Visitor register interactive system for courts, procuratorates or petition departments
CN105426931A (en) * 2014-09-03 2016-03-23 南京启旭电子科技有限公司 Identity card network decoding system based on mobile phone
CN104299017A (en) * 2014-10-23 2015-01-21 南京启旭电子科技有限公司 Identity card network decoding system based on mobile phone NFC
CN204203995U (en) * 2014-10-23 2015-03-11 南京启旭电子科技有限公司 A kind of I.D. network decoding system based on mobile phone NFC
CN204791039U (en) * 2015-07-28 2015-11-18 深圳犹狐云数据技术有限公司 Card equipment is read to two take place of split type ID cards based on smart mobile phone
CN206181089U (en) * 2016-10-27 2017-05-17 郑州中软高科信息技术有限公司 Many two take place ofs ID card network coding and decoding system based on bus technique

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107317667A (en) * 2017-06-05 2017-11-03 国政通科技股份有限公司 Method for early warning and prior-warning device that a kind of identity document is lost
CN110418319A (en) * 2019-05-30 2019-11-05 郑州中软高科信息技术有限公司 One kind makes mobile phone have the decoded method of China second-generation identity card

Also Published As

Publication number Publication date
CN106453363B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
CN104022549B (en) A kind of electric automobile intelligent charge access system
CN102332120B (en) A kind of power intelligent business hall management system
CN102779284A (en) RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
CN106533619B (en) Distributed second-generation identity card management system based on cloud platform
CN102592364A (en) Encryption and decryption functions based field service terminal and application method thereof
CN103348696A (en) Secure utility metering monitoring module
Das Wireless communication system for energy meter reading
CN202854882U (en) Merchandise anti-counterfeiting system based on internet of tings technology
CN104495545A (en) Electronic elevator maintenance supervision and management system and method for elevator maintenance based on dynamic two-dimensional codes
CN209265678U (en) Power information acquiring and transmission system based on quantum cryptography
CN202563312U (en) Hand-held device used for on-site maintenance for intelligent electric energy meter
CA2857854A1 (en) System and method for obtaining indication information
CN107689871A (en) The Internet of Things mobile terminal veritified with identity and testimony of a witness unification checking method
WO2016201985A1 (en) Method of managing prepaid smart measurement and control terminal and prepaid smart measurement and control terminal utilizing same
CN106453363A (en) Network coding and decoding system based on bus technology for plurality of 2nd-generation ID cards
CN100589385C (en) Measurement authentication method based on digital signature
CN111031041A (en) Block chain-based data uplink storage method, system, medium and equipment
CN201152987Y (en) Police intelligent patrolling and checking apparatus
Wang et al. Ultralow-power sensing framework for internet of things: A smart gas meter as a case
CN109658619A (en) A kind of electric energy meter payment system based on two dimensional code payment
CN206181089U (en) Many two take place ofs ID card network coding and decoding system based on bus technique
Tang et al. Information security terminal architecture of power transportation mobile internet of things based on big data analysis
CN206100077U (en) Two take place ofs ID card network coding and decoding system based on MCU
CN106302831B (en) Second-generation identity card network coding and decoding system based on MCU
JP2010097577A (en) Greenhouse gas emissions trading system, greenhouse gas emissions trading method, and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 450001 Overseas Students Pioneer Park, No. 7, Holly Road, Zhengzhou hi tech Industrial Development Zone, Henan, A2-14F

Applicant after: ZHENGZHOU CSHT INFORMATION TECHNOLOGY CO.,LTD.

Address before: 450003 Huayuan Road Jinshui District, Henan, China, No. 27, No.

Applicant before: ZHENGZHOU CSHT INFORMATION TECHNOLOGY CO.,LTD.

CB02 Change of applicant information
CB03 Change of inventor or designer information

Inventor after: Li Yongjie

Inventor after: Chen Shuaijun

Inventor before: Lu Xiangyang

Inventor before: Li Yongjie

Inventor before: Chen Shuaijun

Inventor before: Wu Zeqiang

Inventor before: Deng Boyang

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant