Background technology
In recent years, the trend of globalization is increasingly apparent, and the contacts and flowing of personnel are more and more closely, incident to fear cruelly
More and more etc. malicious sabotage event, in order to strengthen the understanding to personnel, real name is made for the inevitable requirement of large number of rows industry, identity
Card card reader is more and more extensive in the application of China market, with the demand that market is huge, the supply capacity of card reader of ID card
Also constantly lifted.
As China changes, No.2 residence card work is formal to be started, and noticeable new identity card is occurred in quickly
In resident's hand.No.2 residence card has many change and different from the first generation resident identification card.No.2 residence card
It is, by the single page card-type credentials of multi-layered polyester Material cladding, using non-contact IC card fabrication techniques, possess regarding reading and machine
Read two kinds of functions.85.6 millimeters of certificate size design length, it is wide 54 millimeters, it is thick 1.0 millimeters.There is issuing authority and effectively in certificate front
2 registries of time limit, are printed on national emblem pattern, certificate title, enjoyable Great Wall pattern and chromatic pattern;Certificate reverse side have name,
Sex, nationality, date of birth, place where someone is permanent residents address, citizenship number and my 7 registries of photograph, are printed on
Chromatic pattern.The generally granting of China second-generation identity card, to card reader of ID card industry no small business opportunity is brought.
Second generation identity card is the smart card for meeting the TypeB agreements of ISO/IEC 14443, according to《Residential identity demonstration》
Regulation, wherein store the identity information of nine projects of resident, including:Name, sex, nationality, date of birth, permanent residence
Location address, in person citizenship number, photograph, the term of validity of certificate and issuing authority.With can only carry out regard read first
Generation ID is compared, and second generation identity card in addition to retaining and regarding reading function, can also carry out noncontact because employing RFID technique
Machine read automatically, improve recognition efficiency.Additionally, public security department can also pass through resident body of the card reader to card memory storage
Part information is modified, and so can directly rewrite card inside information without fabrication again in resident information change, such as live
During address change.Another considerable advantage of second generation identity card is that antifalsification is good, the communication between identity card and read write line
It is that, through encryption, the technology and fund threshold for cracking is all at a relatively high, can to a large extent prevent the puppet to certificate
Make and distort.
Flourishing for China second-generation identity card demand, to business such as China second-generation identity card Card Readers huge business opportunity is provided, and is passed
The on-line equipment of system is required for connecting a SAM security module due to each machine terminal, and with high costs, transformation difficulty is big
The drawbacks of it is increasingly apparent, information, this problem for developing into solution of network technology provide good solution, by right
Situations such as use, demand of card-reading terminal, has carried out multiple Tracking investigation, and has carried out comprehensively dividing to designing risk assessment etc.
Analysis.Investigation finds that current on-line China second-generation identity card recognizes that product structure complexity, single function, transformation are difficult, it is difficult to pacify
Entirely, easily solve the above problems.
Meanwhile, Information Technology Development makes rapid progress, and it is that scientific worker is diligent it to be fully applied in the life of people
In the hope of target.By means of the new results of Information Technology Development, lack for the various functions of existing China second-generation identity card card reader
Fall into, redesigned, be proposed the functions such as decoding, encryption and decryption, communication, charging, radio communication and be integrated, safer, side
Just, intelligentized Multifunction intelligence China second-generation identity card card-reading system, changing traditional on-line product must be equipped with per machine
The restriction of SAM security modules, imparts the new effect of China second-generation identity card card reader, new intension.
MCU controllers have the advantages that design structure is simple, powerful, in being usually applied to intelligentized design, and
And control accuracy and measuring accuracy can utilize the requirement for reaching industrial practicality, conveniently, calculating is simple, be easy to real-time control, because
This is widely used in the development of TT&C system.China second-generation identity card decoder module comparative maturity, miniaturization
Hardware also has been carried out, very easy to use, in being widely used in various accurate solution code systems.SMS (Short Message Service) SMS (short
Messaging service) as a kind of master data business of GSM network, more and more attention are obtained, based on note
The remote radio communication technology of breath plays an important role in terms of remote monitoring, because it transmission information and can take in time
With cheap, in multiple industries, especially remote monitoring aspect is also widely used.By the combination of above technology, if
China second-generation identity card coding/decoding system of the meter based on informationization technology, meets the primary demand of different characteristic user, is every profession and trade reality
The implementation of name system provides technical support, is that the trip and daily life of people offers convenience.
Utility model content
Problem to be solved in the utility model is to provide a kind of many China second-generation identity card network encoding and decoding based on bussing technique
System, the function with real-time decoding, real-time encryption and decryption process, real-time transmission, radio communication etc., so as to realize to two generation identity
The identification of card.
In order to solve above-mentioned technical problem, the technical solution of the utility model is:A kind of many two generations based on bussing technique
Identity card network coding/decoding system, including housing, housing is provided with display screen, and lower housing portion is provided with button, the housing upper
Normal operating conditions indicator lamp is provided with, display screen is provided with malfunction indicator lamp, embedded MCU control is provided with the housing
Device, memory, tcp/ip communication system, display driver circuit, CAN communication system, intelligent charging system, scheduler module and
At least one SAM security modules, intelligent charging system includes power-supply controller of electric, charging module and battery, power-supply controller of electric difference
It is connected with charging module, battery, charging module is connected with battery;The embedded MCU controller respectively with button, storage
Device, tcp/ip communication system, display driver circuit, power-supply controller of electric are connected, and display driver circuit passes through interface switching device
It is connected with display screen;The power-supply controller of electric is connected with SAM security modules, embedded MCU controller and unpack module phase
Connection, unpacks module and is connected with scheduler module, and scheduler module is connected respectively by CAN with SAM security modules, SAM
Security module is connected by USB or com interface with embedded MCU controller;The embedded MCU controller is by decoding
Module, packetization module are connected with CAN communication system, and CAN communication system is connected with database server, TCP/
IP communication systems are connected by host computer with NFC reader devices.
The quantity of the button is provided with two, and the distance between button is separated by 1cm;The button includes the of power switch
Second button of one button and system reset.
The quantity of the normal operating conditions indicator lamp is three, and normal operating conditions indicator lamp includes showing charging module
The LED whether LED of work, the LED for showing wireless communication system work and display power supply connect;The malfunction
The quantity of indicator lamp is three, and malfunction indicator lamp includes showing the LED of power supply, shows the LED of exception and show work
The LED of work;After power on battery is charged by charging module, shows that the LED of charging module work is bright, charged
After the completion of show charging module work LED go out.
Judge after electricity on the MCU controllers SAM security modules whether run successfully with tcp/ip communication system whether into
Work(starts;When SAM security modules run success and tcp/ip communication system starts successfully, show that the LED of work is bright, when
When SAM security modules operation failure or tcp/ip communication system start failure, show that abnormal LED is bright;When radio communication system
When system transmits decoded information, show that the LED of wireless communication system work is bright;After wireless communication system does not transmit decoding
Information when, show wireless communication system work LED go out;When a failure occurs by giving the correct time on wireless communication system, show
Show the LED flicker that wireless communication system works.
Cipher-text information is split as prefix, code length, data, four parts of verification by the unpacking module according to host-host protocol, is beaten
Bag module will be split as prefix, code length, data, the tetrameric cipher-text information of verification and be packed according to host-host protocol.
The scheduler module mounts 12 SAM security modules by CAN, and 12 SAM security modules are divided into 4 groups, adjust
Degree module delivers to corresponding SAM security modules by module is unpacked according to the cipher-text information after ICP/IP protocol unpacking;Every group of SAM peace
Full module writes respectively address 01,02,03,04, and per group includes 3 SAM security modules, and address 011,012,013 is compiled respectively;
021,022,023;031,032,033;041,042,043;Scheduler module respectively sends first to the 4th cipher-text information
To the SAM security modules that address is 011,021,031,041, the 5th to the 8th cipher-text information is sent respectively to address and is
012,022,032,042 SAM security modules, it is 013,023 that the 9th to the 12nd cipher-text information is sent respectively to address,
033,043 SAM security modules;If last time is transferred to the SAM security modules of a certain address, scheduler module records the position,
Next cipher-text information is transmitted from the beginning of record position, substantially suitable with the utilization ratio for ensureing each SAM security module.
The coding/decoding method of its identity information is:NFC reader devices captured identity demonstrate,proves information and is uploaded to host computer, embedded
MCU controllers judge whether tcp/ip communication system successfully starts up, if successfully starting up, the identity information in host computer passes through TCP/
IP communication systems pass to embedded MCU controller, and embedded MCU controller receives and judges whether identity information is complete, no
Successful then embedded MCU controller to tcp/ip communication system sends retransmission information, if identity information is complete, embedded MCU control
Device processed by identity information be sent to unpacking module unpacked, it would be desirable to data message be sent to scheduler module, scheduler module
Corresponding SAM security modules are selected to be decoded, SAM security modules are decoded to the data message after unpacking, when information solution
Embedded MCU controller, the decoded proof of identification of embedded MCU controller are sent to by USB or com interface after code success
Literary information transmission to encrypting module is encrypted, packetization module is packed, and the identity card cleartext information after packing is total by CAN
Line communication system is to database server, while showing that the LED of wireless communication system work is bright.
Traditional China second-generation identity card coding/decoding module is carried out networking by the utility model, by installing geo-informatization system additional, is assigned
The intension that it is abundanter is given, the demand of user can be to greatest extent met;Meanwhile, in the design using general-purpose chip,
Minimize cost, provide cheap for social groups, powerful product.The utility model simple structure, performance can
By, cheap, powerful, work that not only can be steady in a long-term, the process and communication of encryption and decryption can be carried out, but also
The working condition of itself can be transmitted so that technical staff need not be to scene it is known that equipment running status, have
Make accurately judgement, process in time beneficial to technical staff.
Specific embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, the technical scheme in the utility model embodiment is carried out
Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the utility model, rather than whole
Embodiment.Based on the embodiment in the utility model, those of ordinary skill in the art are not under the premise of creative work is paid
The every other embodiment for being obtained, belongs to the scope of the utility model protection.
A kind of many China second-generation identity card network coding/decoding systems based on bussing technique, as depicted in figs. 1 and 2, including housing
1, housing 1 is provided with display screen 2, and the bottom of housing 1 is provided with button 3.The quantity of button 3 is provided with two, the distance between button 3 phase
Every 1cm.Button 3 includes the first button of power switch and the second button of system reset, is respectively used to control whole system
Open the reset with system.The top of housing 1 is provided with normal operating conditions indicator lamp 5, and display screen 2 is provided with malfunction indicator lamp
4.The quantity of normal operating conditions indicator lamp 5 is three, and normal operating conditions indicator lamp 5 includes showing charging module work
The LED whether LED, the LED for showing wireless communication system work and display power supply connect;The malfunction indicator lamp
4 quantity is three, and malfunction indicator lamp 4 includes showing the LED of power supply, shows the LED of exception and show work
LED.After power on battery is charged by charging module, shows that the LED of charging module work is bright, charging complete
Show that the LED that charging module works is gone out afterwards.
Embedded MCU controller, memory, tcp/ip communication system, display driver circuit, CAN are provided with housing 1
Communication system, intelligent charging system, scheduler module and at least one SAM security modules, intelligent charging system includes power supply
Device, charging module and battery, power-supply controller of electric is connected respectively with charging module, battery, and charging module is connected with battery.It is embedding
Enter formula MCU controller to be connected with button 3, memory, tcp/ip communication system, display driver circuit, power-supply controller of electric respectively,
Display driver circuit is connected by interface switching device with display screen 2.Can directly using standby after whole device power down
Battery is powered, it is ensured that its normal work.The state of its specific works is shown by display screen 2, specific decoded result is shown.Electricity
Source controller is connected with SAM security modules, and embedded MCU controller is connected with module is unpacked, and unpacks module with scheduling mould
Block is connected, and scheduler module is connected respectively by CAN with SAM security modules, and SAM security modules pass through USB or COM
Interface is connected with embedded MCU controller.Each SAM security module includes decoding read/write head and interlock circuit composition, each
SAM security modules are connected in the scheduler module of embedded MCU controller by CAN.Embedded MCU controller is by solution
Code module, packetization module are connected with CAN communication system, and CAN communication system is connected with database server,
Tcp/ip communication system is connected by host computer with NFC reader devices.Tcp/ip communication system is then to utilize ICP/IP protocol
Chip, realizes that the encryption and decryption to information is transmitted.Embedded MCU controller receives the identity information of tcp/ip communication system transmission,
Unpack module to be unpacked corresponding information, data message is extracted, scheduler module will by bus using dispatching algorithm
The data transfer of identity information gives corresponding SAM security modules, SAM security modules by decoded object information by USB or
Person's com interface passes to embedded MCU controller, and decoded information is removed deliver to encrypting module again by embedded MCU controller
It is encrypted after being packed with packetization module and passes to CAN communication system, uploads to database server.
Judge whether SAM security modules are run after electricity on MCU controllers successfully whether successfully to open with tcp/ip communication system
It is dynamic;When SAM security modules run success and tcp/ip communication system starts successfully, show that the LED of work is bright, when SAM peaces
When full module operation failure or tcp/ip communication system start failure, show that abnormal LED is bright;When wireless communication system transmission
During decoded information, show that the LED of wireless communication system work is bright;When wireless communication system does not transmit decoded information
When, the LED for showing wireless communication system work is gone out;When a failure occurs by giving the correct time on wireless communication system, show wireless
The LED flicker of communication system work.
Unpack module and cipher-text information is split as into prefix, code length, data, four parts of verification, mould of packing according to host-host protocol
Block will be split as prefix, code length, data, the tetrameric cipher-text information of verification and be packed according to host-host protocol.
Scheduler module calculates the method for the quantity of scheduling SAM security modules:The state balance equation of dispatching algorithm system
For:
Wherein, λ0、λn-1、λnRepresent the 0th, (n-1)th, the data flow arrival rate to be decoded for n-th, μ1、μn、μn+1Represent
The decoding service rate of first, n-th and (n+1)th, p0The idle probability of expression system, p1The decoding number for representing system service is 1
Probability, pn-1Represent probability of the decoding number for n-1, pn、pn+1Probability of the decoding number for n, n+1 is represented respectively;
If N (t) be time interval [0, t) in the quantity of the two generations identity to be decoded of scheduling that needs, pn(t1,t2) table
Show in interval (t1,t2) there is the probability of n request arrival to be decoded, then have:
pn(t1,t2)=p { N (t2)-N(t1)=n } (t2> t1,n≥0);
If above formula meets aftereffect, any one decoding request is unrelated with the time, two decodings please within any short time
Asking will not be while reaches, then the probability of request n to be decoded is for Poisson distribution knowable to the state balance equation of system:
Wherein, λ represents the information flow of the needs decoding that the unit interval averagely reaches, pkRepresent that k-th service is reached general
Rate;
When the request to be decoded for arriving meets Poisson distribution, can decode that time interval p (T≤t) of arrival meets and refer to
Number distribution:
Time probability p that scheduling needs, and number L that can be recalled are calculated using above formulasFor:
Wherein,ρ represents that the service time that each decoder module unit interval can decode that, μ represent each decoding
Module average decoding time.
Scheduler module mounts 12 SAM security modules by CAN, and 12 SAM security modules are divided into 4 groups, dispatch mould
Block delivers to corresponding SAM security modules by module is unpacked according to the cipher-text information after ICP/IP protocol unpacking;The safe mould of every group of SAM
Block writes respectively address 01,02,03,04, and per group includes 3 SAM security modules, and address 011,012,013 is compiled respectively;021,
022,023;031,032,033;041,042,043;First to the 4th cipher-text information is sent respectively to ground by scheduler module
Location is 011,021,031,041 SAM security modules, and it is 012 that the 5th to the 8th cipher-text information is sent respectively to address,
022,032,042 SAM security modules, it is 013,023,033 that the 9th to the 12nd cipher-text information is sent respectively to address,
043 SAM security modules;If last time is transferred to the SAM security modules of a certain address, scheduler module records the position, next time
Cipher-text information is transmitted from the beginning of record position, substantially suitable with the utilization ratio for ensureing each SAM security module.
Encrypting module is encrypted using random phase AES to decoded identity information, and method is:Conversion
Kernel function is:
Wherein, x (t) represents function, the F to be encryptedpThe transformation kernel of [x (t)] encryption, the conversion that u encryption kernel functions are located
Domain, t represents time, KpThe kernel function of (t, u) transformation kernel, XpTransformation results after (u) encryption, and
Wherein, Aα, δ, j, α, n represent encryption operator respectively;Encryption method is:
Wherein,Represent the result after quadratic transformation, Fα、FβExpression is utilized respectively result of the kernel function at α, β and enters
Row encryption, C represents the function after linear transformation, x0Independent variable, xβRepresent that f represents hope letter through converting kernel function for the β
Number, M1Represent linear transformation function, M2Represent quadratic transformation function.
Identity information after encryption is packed by packetization module, and by CAN communication system database is sent to
Server.Embedded MCU controller receives the decoded information of the SAM security modules transmission of scheduler module scheduling, encrypting module
Be encrypted using AES, then by packetization module pack, by CAN communication system upload to data server or
Person's client, is easy to that company technique personnel patrol and examine each running situation and client checks.Embedded MCU receives the safe moulds of SAM
After the decoded information success of block, display screen shows and receives successful information, is uploaded successfully by CAN communication system, shows nothing
The LED of line communication system work is bright, and display information is uploaded successfully.
Embedded MCU control is received the identity information of tcp/ip communication system and is solved using random phase decipherment algorithm
Close, its method is:
Wherein, XpU () needs the result after the original function of decryption, x (t) decryption, K-p(t, u) represents conversion kernel function;
Wherein, xαFor α when independent variable, f* (x) represents the result after secondary decryption, F-α、F-βRepresent through decryption angle
The conversion kernel function of respectively-α ,-β.
The course of work is as shown in figure 3, the fixed control of embedded MCU controller opening, power-supply controller of electric opens charging module, aobvious
Show that the LED that charging module works is bright;Embedded MCU controller searches whether tcp/ip communication system has sent information, if
Do not continue to search, if having searched second-generation identification card information, embedded MCU controller encapsulates cipher-text information coding, passes
Delivering to unpacking module ICP/IP protocol carries out coding unpacking, the information transmission after unpacking to scheduler module, and scheduler module is according to tune
Degree algorithms selection last time using the next address of decoding SAM security modules, SAM security modules are by second-generation identification card information solution
Embedded MCU controller is conveyed directly to by USB interface or com interface after code, embedded MCU controller is by decoded two
Generation ID information transmission to encrypting module is encrypted, packetization module is packed, and the second-generation identification card information after packing leads to
Cross CAN communication system and be sent to data server.The timing of embedded MCU controller is transported itself by wireless communication system
Row information passes to corporate server, is easy to company technique personnel to patrol and examine each running situation.
After the utility model is using the start of the first button, after the completion of embedded MCU controller self-inspection, by power-supply controller of electric
Whether detection battery is normal, and battery is charged after connection, and the workflow of charging is as shown in Figure 3.Power-supply controller of electric is entered
Interrupt entrance, close and interrupt, judge whether battery is full of, not full of charging module is started, to show and show charging mould on main frame
The LED of block work is bright, if battery is full of, power-supply controller of electric disconnects charging module, while open interrupting, shows charging module
The LED of work does not work, and relevant work pattern is entered after charging complete.
The coding/decoding method of the utility model identity information is:NFC reader devices captured identity is demonstrate,proved information and is uploaded to upper
Machine, embedded MCU controller judges whether tcp/ip communication system successfully starts up, the identity letter if successfully starting up, in host computer
Breath passes to embedded MCU controller by tcp/ip communication system, and embedded MCU controller receives and judges that identity information is
No complete, unsuccessful then embedded MCU controller to tcp/ip communication system sends retransmission information, embedding if identity information is complete
Enter formula MCU controller by identity information be sent to unpacking module unpacked, it would be desirable to data message be sent to scheduler module,
Scheduler module selects corresponding SAM security modules to be decoded, and SAM security modules are decoded to the data message after unpacking,
Embedded MCU controller is sent to by USB or com interface after information successfully decoded, embedded MCU controller is decoded
Identity card plaintext information transmission to encrypting module is encrypted, packetization module is packed, the identity card cleartext information after packing
By CAN communication system to database server, while showing that the LED of wireless communication system work is bright.
The utility model utilizes the development result of newest information technology, and closely ties with the daily life of the people masses
Close, belong to information technology and the married electronic equipment high-end product of people's lives, the bonding machine on the basis of electronic technology
Tool structure innovation, is that traditional online type product is incomparable the characteristics of with intelligent, functional diversities, and when front is emerging
The electronic product not ended comes down in a continuous line, and is also a recent period of time electronic technology development direction.The utility model can be by charging
Battery is powered, and power is low;Circuit level is high, and technology maturation, making sheet operation is few, easily production;Compact conformation is firm, and outward appearance sets
Meter is reasonable, with very high input-output ratio;It is the product of informationization technology development, is also the needs of social development, effectively solution
The drawbacks of traditional online type of having determined, be that the encoding and decoding of China second-generation identity card supply good solution, and its social benefit is huge;Together
When, China human mortality is numerous, and the necessity that system of real name is required also provides wide space for the marketing of product.
The above, only the utility model preferably specific embodiment, but protection domain of the present utility model is not
This is confined to, any those familiar with the art can readily occur in the technical scope that the utility model is disclosed
Change or replacement, all should cover within protection domain of the present utility model.