CN109214221B - Authentication method of identity card reader, upper computer and identity card reader - Google Patents

Authentication method of identity card reader, upper computer and identity card reader Download PDF

Info

Publication number
CN109214221B
CN109214221B CN201810967699.7A CN201810967699A CN109214221B CN 109214221 B CN109214221 B CN 109214221B CN 201810967699 A CN201810967699 A CN 201810967699A CN 109214221 B CN109214221 B CN 109214221B
Authority
CN
China
Prior art keywords
card reader
identification code
unique identification
identity card
version number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810967699.7A
Other languages
Chinese (zh)
Other versions
CN109214221A (en
Inventor
张立
张贝
彭骏
吉纲
任光响
王磊
张民瑶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Routon Electronic Co ltd
Wuhan Precision Business Machine Co ltd
Original Assignee
Routon Electronic Co ltd
Wuhan Precision Business Machine Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Routon Electronic Co ltd, Wuhan Precision Business Machine Co ltd filed Critical Routon Electronic Co ltd
Priority to CN201810967699.7A priority Critical patent/CN109214221B/en
Publication of CN109214221A publication Critical patent/CN109214221A/en
Application granted granted Critical
Publication of CN109214221B publication Critical patent/CN109214221B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an identification card reader verification method, an upper computer and an identification card reader, wherein the provided method comprises the following steps: sending a hardware version number acquisition request to an identity card reader, and receiving and verifying the hardware version number sent by the identity card reader; if the hardware version number passes the verification, sending a unique identification code acquisition request of a security module to the identity card reader to acquire the unique identification code of the security module in the identity card reader; and encrypting the unique identification code of the security module, and sending the encrypted unique identification code to the identity card reader so that the identity card reader can verify an upper computer. The method provided by the invention can ensure the binding and interlocking of the software of the upper computer and the equipment of the ID card reader by verifying the hardware version number of the ID card reader and simultaneously verifying the encryption mode of the upper computer. The error of equipment management and control is prevented from appearing, and identity card information security is threatened.

Description

Authentication method of identity card reader, upper computer and identity card reader
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to an upper computer verification method of an identity card reader, an upper computer and the identity card reader.
Background
In the existing market, the interface types of the ID card reader are USB, ministerial marks, serial ports and the like. For a USB HID interface, a USB CCID interface or a serial interface, a manufacturer does not need to provide any device driver file, and the complete drive-free can be realized. This is a great advantage and, at the same time, brings with it a number of problems. Because the communication instruction of the ID card reader is a unified standard, different manufacturers and different devices use the same instruction and flow when reading the ID card information, the following problems are bound to occur: because the reader is free from driving, the upper computer software of a certain manufacturer can easily acquire the card information through the identity card readers of other manufacturers, so that the upper computer software of the manufacturer can not be matched with the identity card readers and used.
In the prior art, the upper computer that the identity card reader is connected with can't carry out effectual authentication, lead to the identity card reader to read the information security not enough, cause identity card information to reveal easily.
Disclosure of Invention
The embodiment of the invention provides an identification card reader verification method, an upper computer and an identification card reader, and aims to solve the problems that in the prior art, effective authentication cannot be performed on the upper computer connected with the identification card reader, so that the safety of information read by the identification card reader is insufficient, and the information of an identification card is easily leaked.
In a first aspect, an embodiment of the present invention provides an authentication method for an identity card reader, including:
sending a hardware version number acquisition request to an identity card reader, and receiving and verifying the hardware version number sent by the identity card reader;
if the hardware version number passes the verification, sending a unique identification code acquisition request of a security module to the identity card reader to acquire the unique identification code of the security module in the identity card reader;
and encrypting the unique identification code of the security module, and sending the encrypted unique identification code to the identity card reader so that the identity card reader can verify an upper computer.
Wherein, after the step of sending a request for obtaining the unique identification code of the security module to the identity card reader to obtain the unique identification code of the security module in the identity card reader, the method further comprises: and receiving the encrypted unique identification code sent by the identity card reader, and verifying the identity card reader according to the encrypted unique identification code.
The step of verifying the hardware version number sent by the identity card reader specifically comprises the following steps: and comparing the received hardware version number with the version number in the configuration file, and if the comparison result is consistent, indicating that the verification is passed.
In a second aspect, an embodiment of the present invention provides an authentication method for an id card reader, where the authentication method includes: receiving a hardware version number acquisition request, and sending a hardware version number to an upper computer so that the upper computer can verify the hardware version number; receiving a unique identification code acquisition request of the security module, and sending the unique identification code of the security module to the upper computer; and receiving the encrypted unique identification code sent by the upper computer, and verifying the upper computer according to the encrypted unique identification code.
The step of verifying the upper computer according to the encrypted unique identification code specifically comprises the following steps: encrypting the unique identification code of the security module to obtain encrypted data; and comparing the encrypted data with the encrypted unique identification code, and if the comparison result is consistent, judging that the verification is passed.
Wherein, the step of comparing the encrypted data with the encrypted unique identification code further comprises: and if the comparison result of the encrypted data and the encrypted unique identification code is inconsistent, judging that the verification is not passed.
In a third aspect, an embodiment of the present invention provides an upper computer, including a processor, a communication interface, a memory, and a bus, where the processor and the communication interface complete mutual communication through the bus, and the processor may call a logic instruction in the memory to execute the method for authenticating an id card reader as provided in the first aspect.
In a fourth aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for authenticating an identity card reader as provided in the first aspect above.
In a fifth aspect, an embodiment of the present invention provides an identification card reader, including a processor, a communication interface, a memory, and a bus, where the processor and the communication interface complete mutual communication through the bus, and the processor may call a logic instruction in the memory to execute the identification card reader authentication method provided in the second aspect.
In a sixth aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the authentication method for an identification card reader as provided in the second aspect.
According to the authentication method of the identity card reader provided by the embodiment of the invention, the hardware version number of the identity card reader is authenticated, and the encryption mode of the upper computer is simultaneously authenticated, so that the drive-free identity card reader equipment can only communicate with the upper computer software of a manufacturer, and the binding and interlocking of the upper computer software and the identity card reader equipment are ensured. And errors in equipment management and control are prevented, so that the unreasonable demand supply in commerce is caused.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic flow diagram of an upper computer in an authentication method of an identification card reader according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an identification card reader in an identification card reader verification method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an upper computer according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an identification card reader according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow diagram of an upper computer in an authentication method of an identification card reader according to an embodiment of the present invention, and as shown in fig. 1, the provided method includes:
s1, sending a hardware version number obtaining request to the ID card reader, and receiving and verifying the hardware version number sent by the ID card reader.
Specifically, when the identity card reader needs to be called to read the identity card information, the upper computer firstly sends a hardware version number acquisition request to the identity card reader, and requests the hardware version number of the upper computer to the identity card reader, so that the upper computer can verify the hardware version number of the identity card reader, and the upper computer and the identity card reader can be matched for use.
S2, if the hardware version number passes the verification, sending a unique identification code acquisition request of the security module to the ID card reader to obtain the unique identification code of the security module in the ID card reader.
Specifically, after the hardware version number of the identity card reader is verified, the upper computer sends a unique identification code acquisition request of the security module to the identity card reader, each identity card reader is provided with a standard security module, the ID number of the module is a unique identification code, and the upper computer receives the unique identification code of the security module of the reader sent by the identity card reader after requesting the unique identification code of the security module from the identity card reader.
And S3, encrypting the unique identification code of the security module, and sending the encrypted unique identification code to the identity card reader so that the identity card reader can verify the upper computer.
Specifically, after the unique identification code of the security module in the identity card reader is received, the upper computer encrypts the unique identification code, the encrypted unique identification code is obtained, the encrypted unique identification code is sent to the identity card reader, the identity card reader can verify the encrypted unique identification code, the upper computer and the reader belong to the same manufacturer, and the identity card reader and the upper computer can be matched for use.
By the method, the hardware version number of the identity card reader is verified, and the encryption mode of the upper computer is verified, so that the drive-free identity card reader equipment can only communicate with the upper computer software of a manufacturer, and the binding and interlocking of the upper computer software and the identity card reader equipment are guaranteed. And errors in equipment management and control are prevented, so that the unreasonable demand supply in commerce is caused.
On the basis of the above embodiment, after the step of receiving and verifying the hardware version number sent by the identification card reader, the method further includes: and if the hardware version number is not verified, terminating the verification.
The step of verifying the hardware version number sent by the identity card reader specifically comprises the following steps: and comparing the received hardware version number with the version number in the configuration file, and if the comparison result is consistent, indicating that the verification is passed.
Specifically, the step of verifying the hardware version number of the identity card reader specifically includes comparing the hardware version number of the identity card reader with the hardware version number in the configuration file, and if the comparison result is consistent, it indicates that the verification of the identity card reader is passed.
Furthermore, if the hardware version number of the identity card reader is not consistent with the hardware version number in the configuration file in the process of verifying the hardware version number, the verification of the identity card reader is not passed, and at this time, a subsequent instruction is not sent to the identity card reader, and the verification is terminated.
On the basis of the above embodiment, after the step of sending the unique identification code acquisition request of the secure module to the identification card reader to obtain the unique identification code of the secure module in the identification card reader, the method further includes:
and receiving the encrypted unique identification code sent by the identity card reader, and verifying the identity card reader according to the encrypted unique identification code.
Specifically, when sending the unique identification code request to the identity card reader, the request can also include the request of obtaining the encrypted unique identification code, the host computer receives the unique identification code of the security module and sends the encrypted unique identification code to the host computer, the host computer encrypts the unique identification code and obtains the encrypted unique identification code, and simultaneously compares the encrypted unique identification code with the unique identification code sent by the identity card reader for verification, thereby realizing the verification action of the host computer on the identity card reader, and when the verification is passed, the encrypted unique identification code is sent to the identity card reader so that the identity card reading area verifies the encrypted unique identification code of the host computer.
In summary, in the method provided by the invention, when the card is read for the identity card, the bidirectional verification of the upper computer and the identity card reader is firstly carried out, and only when the encryption authentication is passed, the information on the identity card is read and sent to the upper computer, so that the safety of the information in the process of reading the identity card information is improved.
Fig. 2 is a schematic flow chart of an identification card reader in the authentication method of the identification card reader according to an embodiment of the present invention. Referring to fig. 2, the provided method includes:
and S21, receiving the hardware version number obtaining request, and sending the hardware version number to the upper computer so that the upper computer can verify the hardware version number.
Specifically, the identity card reading area firstly obtains a hardware version number obtaining request sent by the upper computer, and sends the hardware version number of the identity card reading area to the upper computer so that the upper computer can verify the hardware version number.
And S22, receiving the unique identification code acquisition request of the security module, and sending the unique identification code of the security module to the upper computer.
Specifically, after the verification of the hardware version number passes, the upper computer can send a unique identification code acquisition request of the security module to the identity card reader after the verification of the hardware version number passes, each identity card reader can be provided with a standard security module, the ID number of the module is a unique identification code, and after the identity card reader receives the unique identification code acquisition request of the security module sent by the upper computer, the unique identification code of the security module can be sent to the upper computer.
And S33, receiving the encrypted unique identification code sent by the upper computer, and verifying the upper computer according to the encrypted unique identification code.
After receiving the unique identification code of the security module in the identity card reader, the upper computer encrypts the unique identification code to obtain the encrypted unique identification code, and sends the encrypted unique identification code to the identity card reader, and the identity card reader can verify the encrypted unique identification code sent by the upper computer to complete verification of the upper computer.
By the method, the hardware version number of the identity card reader is verified, and the encryption mode of the upper computer is verified, so that the drive-free identity card reader equipment can only communicate with the upper computer software of a manufacturer, and the binding and interlocking of the upper computer software and the identity card reader equipment are guaranteed. And errors in equipment management and control are prevented, so that the unreasonable demand supply in commerce is caused.
On the basis of the above embodiment, the step of verifying the upper computer according to the encrypted unique identification code specifically includes: encrypting the unique identification code of the security module to obtain encrypted data; and comparing the encrypted data with the encrypted unique identification code, and if the comparison result is consistent, judging that the verification is passed.
Wherein, the step of comparing the encrypted data with the encrypted unique identification code further comprises: and if the comparison result of the encrypted data and the encrypted unique identification code is inconsistent, judging that the verification is not passed.
Specifically, the process of verifying the encrypted unique identification code is that the identification card reader encrypts the unique identification of the encryption module of the identification card reader to obtain encrypted data, compares the encrypted data with the encrypted unique identification code sent by the upper computer, and when the comparison result is consistent, indicates that the verification is passed and the identification card reader can start to read the card.
Further, if the verification results are inconsistent, the encryption modes of the upper computer and the identity card reader are different, the upper computer may be inconsistent with the manufacturer of the identity card reader, the verification of the upper computer is not passed, and the card reading action is not performed in the identity card reading area.
In summary, in the method provided by the invention, when the card is read for the identity card, the bidirectional verification of the upper computer and the identity card reader is firstly carried out, and only when the encryption authentication is passed, the information on the identity card is read and sent to the upper computer, so that the safety of the information in the process of reading the identity card information is improved.
Fig. 3 is a schematic structural diagram of an upper computer according to an embodiment of the present invention, and as shown in fig. 3, the vulnerability detection apparatus of the deep learning system includes: a processor (processor)301, a communication Interface (communication Interface)302, a memory (memory)303 and a bus 304, wherein the processor 301, the communication Interface 302 and the memory 303 complete communication with each other through the bus 304. Processor 301 may call logic instructions in memory 303 to perform methods including, for example: sending a hardware version number acquisition request to an identity card reader, and receiving and verifying the hardware version number sent by the identity card reader; if the hardware version number passes the verification, sending a unique identification code acquisition request of a security module to the identity card reader to acquire the unique identification code of the security module in the identity card reader; and encrypting the unique identification code of the security module, and sending the encrypted unique identification code to the identity card reader so that the identity card reader can verify an upper computer.
An embodiment of the present invention discloses a computer program product, which includes a computer program stored on a non-transitory computer readable storage medium, where the computer program includes program instructions, and when the program instructions are executed by a computer, the computer can execute the method provided by the above method embodiments, for example, the method includes: sending a hardware version number acquisition request to an identity card reader, and receiving and verifying the hardware version number sent by the identity card reader; if the hardware version number passes the verification, sending a unique identification code acquisition request of a security module to the identity card reader to acquire the unique identification code of the security module in the identity card reader; and encrypting the unique identification code of the security module, and sending the encrypted unique identification code to the identity card reader so that the identity card reader can verify an upper computer.
The present embodiments provide a non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the methods provided by the above method embodiments, for example, including: sending a hardware version number acquisition request to an identity card reader, and receiving and verifying the hardware version number sent by the identity card reader; if the hardware version number passes the verification, sending a unique identification code acquisition request of a security module to the identity card reader to acquire the unique identification code of the security module in the identity card reader; and encrypting the unique identification code of the security module, and sending the encrypted unique identification code to the identity card reader so that the identity card reader can verify an upper computer.
Fig. 4 is a schematic structural diagram of an identity card reader according to an embodiment of the present invention, and as shown in fig. 4, the vulnerability detection apparatus of the deep learning system includes: a processor (processor)401, a communication Interface (communication Interface)402, a memory (memory)403 and a bus 404, wherein the processor 401, the communication Interface 402 and the memory 403 complete communication with each other through the bus 404. Processor 401 may call logic instructions in memory 403 to perform methods including, for example: receiving a hardware version number acquisition request, and sending a hardware version number to an upper computer so that the upper computer can verify the hardware version number; receiving a unique identification code acquisition request of the security module, and sending the unique identification code of the security module to the upper computer; and receiving the encrypted unique identification code sent by the upper computer, and verifying the upper computer according to the encrypted unique identification code.
An embodiment of the present invention discloses a computer program product, which includes a computer program stored on a non-transitory computer readable storage medium, where the computer program includes program instructions, and when the program instructions are executed by a computer, the computer can execute the method provided by the above method embodiments, for example, the method includes: receiving a hardware version number acquisition request, and sending a hardware version number to an upper computer so that the upper computer can verify the hardware version number; receiving a unique identification code acquisition request of the security module, and sending the unique identification code of the security module to the upper computer; and receiving the encrypted unique identification code sent by the upper computer, and verifying the upper computer according to the encrypted unique identification code.
The present embodiments provide a non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the methods provided by the above method embodiments, for example, including: sending a hardware version number acquisition request to an identity card reader, and receiving and verifying the hardware version number sent by the identity card reader; receiving a hardware version number acquisition request, and sending a hardware version number to an upper computer so that the upper computer can verify the hardware version number; receiving a unique identification code acquisition request of the security module, and sending the unique identification code of the security module to the upper computer; and receiving the encrypted unique identification code sent by the upper computer, and verifying the upper computer according to the encrypted unique identification code.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (7)

1. An authentication method of an identity card reader is characterized by comprising the following steps:
sending a hardware version number acquisition request to an identity card reader, and receiving and verifying the hardware version number sent by the identity card reader;
the hardware version number is the hardware version number of the reader;
if the hardware version number passes the verification, sending a unique identification code acquisition request of a security module to the identity card reader to acquire the unique identification code of the security module in the identity card reader;
the unique identification code acquisition request of the security module is sent to the identity card reader, and comprises a request for acquiring the encrypted unique identification code;
encrypting the unique identification code of the security module, and sending the encrypted unique identification code to the identity card reader so that the identity card reader can verify an upper computer; the identity card reader encrypts the unique identification code of the encryption module of the identity card reader to obtain encrypted data, and compares the encrypted data with the encrypted unique identification code sent by the upper computer;
wherein, after the step of sending a request for obtaining the unique identification code of the security module to the identity card reader to obtain the unique identification code of the security module in the identity card reader, the method further comprises:
receiving the encrypted unique identification code sent by the identification card reader, and comparing and verifying the identification card reader according to the encrypted unique identification code;
the verification is the verification of an encryption mode;
the step of verifying the hardware version number sent by the identity card reader specifically comprises the following steps:
and comparing the received hardware version number with the version number in the configuration file, and if the comparison result is consistent, indicating that the verification is passed.
2. An authentication method of an identity card reader is characterized by comprising the following steps:
receiving a hardware version number acquisition request, and sending a hardware version number to an upper computer so that the upper computer can verify the hardware version number;
the hardware version number is the hardware version number of the reader;
receiving a unique identification code acquisition request of the security module, and sending the unique identification code of the security module to the upper computer;
the receiving of the unique identification code acquisition request of the security module comprises receiving a request for acquiring the encrypted unique identification code;
receiving the encrypted unique identification code sent by the upper computer, and verifying the upper computer according to the encrypted unique identification code;
receiving the encrypted unique identification code sent by the identification card reader, and verifying the identification card reader according to the encrypted unique identification code;
the verification is the verification of an encryption mode;
the step of verifying the upper computer according to the encrypted unique identification code specifically comprises the following steps:
encrypting the unique identification code of the security module to obtain encrypted data;
and comparing the encrypted data with the encrypted unique identification code, and if the comparison result is consistent, judging that the verification is passed.
3. The method of claim 2, wherein the step of comparing the encrypted data with the encrypted unique identifier further comprises:
and if the comparison result of the encrypted data and the encrypted unique identification code is inconsistent, judging that the verification is not passed.
4. A host computer, comprising a processor, a communication interface, a memory and a bus, wherein the processor and the communication interface communicate with each other via the bus, and the processor can call logic instructions in the memory to execute the authentication method of the id card reader as claimed in claim 1.
5. A non-transitory computer readable storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the identification card reader verification method of claim 1.
6. An identification card reader, characterized by comprising a processor, a communication interface, a memory and a bus, wherein the processor, the communication interface and the memory are communicated with each other through the bus, and the processor can call logic instructions in the memory to execute the identification card reader authentication method as claimed in any one of claims 2 or 3.
7. A non-transitory computer readable storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the identification card reader verification method of any of claims 2 or 3.
CN201810967699.7A 2018-08-23 2018-08-23 Authentication method of identity card reader, upper computer and identity card reader Active CN109214221B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810967699.7A CN109214221B (en) 2018-08-23 2018-08-23 Authentication method of identity card reader, upper computer and identity card reader

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810967699.7A CN109214221B (en) 2018-08-23 2018-08-23 Authentication method of identity card reader, upper computer and identity card reader

Publications (2)

Publication Number Publication Date
CN109214221A CN109214221A (en) 2019-01-15
CN109214221B true CN109214221B (en) 2022-02-01

Family

ID=64989675

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810967699.7A Active CN109214221B (en) 2018-08-23 2018-08-23 Authentication method of identity card reader, upper computer and identity card reader

Country Status (1)

Country Link
CN (1) CN109214221B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110363041B (en) * 2019-07-02 2022-11-11 深圳华视电子读写设备有限公司 Identity card reader with stable signal transmission
CN111966969B (en) * 2020-07-17 2024-04-30 航天信息股份有限公司 Authentication chip control method, authentication method for upper computer application and system thereof
CN112183137B (en) * 2020-09-25 2021-12-07 天津理工大学 Dynamic configuration interface system of second-generation identity card reader
CN113726741B (en) * 2021-07-28 2024-01-19 浪潮电子信息产业股份有限公司 Acceleration card data downloading method and related device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101118589A (en) * 2006-07-31 2008-02-06 中国科学院自动化研究所 Read-write machine dedicated for false proof based on radio frequency recognizing technology and management method
CN101763303A (en) * 2008-12-25 2010-06-30 深圳富泰宏精密工业有限公司 Software version verification system and method thereof
CN101771535A (en) * 2008-12-30 2010-07-07 上海茂碧信息科技有限公司 Mutual authentication method between terminal and server
CN101833676A (en) * 2009-11-02 2010-09-15 上海阳扬电子科技有限公司 Method for controlling reading and writing of intelligent card with USBKEY module and reader thereof
CN102932338A (en) * 2012-10-24 2013-02-13 中国航天科工集团第二研究院七〇六所 System and method for safe network access of radio-frequency identification system
CN105099710A (en) * 2015-08-28 2015-11-25 中国航天科工集团第二研究院七〇六所 Cross-domain access control method for trusted radio frequency identification network
CN106100836A (en) * 2016-08-09 2016-11-09 中京天裕科技(北京)有限公司 A kind of industrial user's authentication and the method and system of encryption
CN206270971U (en) * 2016-12-02 2017-06-20 北京握奇智能科技有限公司 A kind of secure readers

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102332066B (en) * 2011-05-31 2014-09-24 贾松仁 Authentication management system and method of code jumping chip identification codes
CN103491094B (en) * 2013-09-26 2016-10-05 成都三零瑞通移动通信有限公司 A kind of rapid identity authentication method based on C/S model
CN105160242B (en) * 2015-08-07 2018-01-05 北京亿速码数据处理有限责任公司 Certificate loading method, certificate update method and the card reader of a kind of card reader
CN105243314B (en) * 2015-09-14 2018-01-02 成都金安卓创科技有限公司 A kind of security system and its application method based on USB key
CN105678115B (en) * 2015-12-31 2018-05-25 北京神州绿盟信息安全科技股份有限公司 A kind of software authentication method and relevant device and system
CN106095675B (en) * 2016-06-07 2018-12-14 无锡键桥电子科技有限公司 A kind of reusable verifying system of EDA and FPGA for passive label chip
CN105959189B (en) * 2016-06-08 2019-09-13 美的集团股份有限公司 Household appliance and its with the communication system and method for Cloud Server and terminal, terminal
US10411907B2 (en) * 2017-01-25 2019-09-10 Salesforce.Com, Inc. Secure remote user authentication leveraging public key cryptography and key splitting
CN107566407B (en) * 2017-10-20 2020-07-28 哈尔滨工程大学 Bidirectional authentication data secure transmission and storage method based on USBKey
CN107948156B (en) * 2017-11-24 2021-10-22 郑州云海信息技术有限公司 Identity-based closed key management method and system
CN108377186A (en) * 2018-03-19 2018-08-07 北京工业大学 A kind of ssl protocol based on TCM

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101118589A (en) * 2006-07-31 2008-02-06 中国科学院自动化研究所 Read-write machine dedicated for false proof based on radio frequency recognizing technology and management method
CN101763303A (en) * 2008-12-25 2010-06-30 深圳富泰宏精密工业有限公司 Software version verification system and method thereof
CN101771535A (en) * 2008-12-30 2010-07-07 上海茂碧信息科技有限公司 Mutual authentication method between terminal and server
CN101833676A (en) * 2009-11-02 2010-09-15 上海阳扬电子科技有限公司 Method for controlling reading and writing of intelligent card with USBKEY module and reader thereof
CN102932338A (en) * 2012-10-24 2013-02-13 中国航天科工集团第二研究院七〇六所 System and method for safe network access of radio-frequency identification system
CN105099710A (en) * 2015-08-28 2015-11-25 中国航天科工集团第二研究院七〇六所 Cross-domain access control method for trusted radio frequency identification network
CN106100836A (en) * 2016-08-09 2016-11-09 中京天裕科技(北京)有限公司 A kind of industrial user's authentication and the method and system of encryption
CN206270971U (en) * 2016-12-02 2017-06-20 北京握奇智能科技有限公司 A kind of secure readers

Also Published As

Publication number Publication date
CN109214221A (en) 2019-01-15

Similar Documents

Publication Publication Date Title
CN109214221B (en) Authentication method of identity card reader, upper computer and identity card reader
US9992678B2 (en) Network locking or card locking method and device for a mobile terminal, terminal, SIM card, storage media
CN106850209A (en) A kind of identity identifying method and device
US11539399B2 (en) System and method for smart card based hardware root of trust on mobile platforms using near field communications
CN106131021B (en) Request authentication method and system
CN104751105A (en) Fingerprint data verification method, fingerprint data verification device, related equipment and system
CN104469736A (en) Data processing method, server and terminal
CN109815669A (en) Authentication method and server based on recognition of face
CN109699015B (en) Machine-card binding relationship authentication method and device and communication system
CN112514323A (en) Electronic device for processing digital key and operation method thereof
CN107026730A (en) Data processing method, apparatus and system
CN112688942B (en) Electric energy meter firmware program upgrading method, device, medium and equipment based on ESAM
US20190019189A1 (en) Payment authentication
CN107395600B (en) Service data verification method, service platform and mobile terminal
TWI657350B (en) APP certification system and method
CN109699030B (en) Unmanned aerial vehicle authentication method, device, equipment and computer readable storage medium
US10536453B2 (en) Method and arrangement for authorizing an action on a self-service system
JP2022527758A (en) Secure emergency vehicle communication
CN108574657B (en) Server access method, device and system, computing equipment and server
CN108322907B (en) Card opening method and terminal
US11972419B2 (en) Method for authenticating payment data, corresponding devices and programs
CN102647415A (en) Audio-interface-based method and system for providing identity authentication
CN107846390B (en) Authentication method and device for application program
CN112637855B (en) Machine-card binding method based on block chain and server
CN106603237B (en) Safe payment method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant