GB2584645A - Card identification system with scramble coding ability - Google Patents

Card identification system with scramble coding ability Download PDF

Info

Publication number
GB2584645A
GB2584645A GB1908050.6A GB201908050A GB2584645A GB 2584645 A GB2584645 A GB 2584645A GB 201908050 A GB201908050 A GB 201908050A GB 2584645 A GB2584645 A GB 2584645A
Authority
GB
United Kingdom
Prior art keywords
scrambling
code
data set
identification data
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1908050.6A
Other versions
GB201908050D0 (en
Inventor
Kwong Fung Shing
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB1908050.6A priority Critical patent/GB2584645A/en
Publication of GB201908050D0 publication Critical patent/GB201908050D0/en
Publication of GB2584645A publication Critical patent/GB2584645A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

On a mobile device 30 a user identification data set 80 comprising a Card ID 21, Device code 22, a mobile local time 31 and a validation period 23 is encrypted using a master key 42. The encrypted data is scrambled 41 with a time varying scrambling variable 411 to create a 2D code 45 (e.g. a QR, Quick Response or matrix code) and send to an independent decoder 101. At the decoder, the message is decoded, using the scrambling variable 41 and master key 42. The mobile current time (of encoding) is retrieved and verified against the local time of decoding to check if it is within the verification period (e.g. fig.4). The scrambling coding program may be downloaded to the mobile phone as a mobile ‘APP’, from a cloud server. The present invention may be used for identification of a person such as an employee card, visitor card, attendance card etc and enable time restricted access, for example only effective for a limited time such as 10 seconds, or only giving user access between 9am-5pm.

Description

CARD IDENTIFICATION SYSTEM WITH SCRAMBLE CODING ABILITY
FIELD OF THE INVENTION
The present invention is related to identification of an identity of a person by using electronic devices, and in particular to a card identification system with scramble coding ability.
BACKGROUND OF THE INVENTION
2D codes (such as QR code) serve to store specific information.
The QR codes are attached to some objects for identification. Currently, 2D codes are widely used in identification of specific persons, such as using a mobile phone APP to generate a specific 2D code which represents a message about an identify of a user. If the 2D code is scanned by an electronic device, the user may be identified.
In identification of a person, the conventional 2D code has a specific form for a specific person for identification of a person. If this 2D code is copied undesired by another person. Then this person can pass through the identification of this code so that the identification system considers that the another person copied the 2D code 45 is that one which are lawfully authorized. This is not beneficial for control of persons and it is a threatening to the safety of the system.
Therefore, the object of the present invention is to provide a novel card identification system with scramble coding ability so as to resolve the 25 problems of the prior art.
SUMMARY OF THE INVENTION
Accordingly, for improving the above-mentioned defects in the prior art, the object of the present invention is to provide a card identification 30 system with scramble coding ability, wherein the present invention provides scrambling 2D codes which are varied with time, that is, it is not unique. If one 2D code 45 is copied, the copied 2D code is only effective in a very short time, such as 10 seconds. Therefore, it can assure the safety of the identification of a person. The 2D code 45 based on the present invention can be used in various status, such as an employee card, a visitor card, an attendance card, etc. The present invention also provides the function of mobile phone identification. The function of decoding can be equipped in a mobile phone so as to prevent that no network is connected.
To achieve the above object, the present invention provides a card identification system with scramble coding ability, comprising: a primary terminal for providing data to a mobile phone, the data being about a person to be identified; the primary terminal being owned by an entity; a cloud device connected to the primary terminal for receiving instructions from the primary terminal for transferring at least one identification data set; each identification data set including a card ID, a device code, and a validation period; a mobile phone wirelessly connected to the cloud device; the mobile phone downloading a scrambling coding APP from the cloud device; the scrambling coding APP serving to receive the at least one identification data set transferred from the cloud device and adding a mobile current time from the mobile phone; wherein the scrambling coding APP is built with a scrambling coder and stored at least one master key; each master key being corresponding to a respective identification data set; different identification data set having its own master key; and wherein the scrambling coder is stored with a scrambling variable; the scrambling coding APP encrypts the card ID, the device code, the validation period of the identification data set and the mobile current time based on the master key of the identification data set so as to get an encryption data; then the encryption data is encoded by the scrambling coder by using the scrambling variable to become a 2 dimensional code; due to the action of the scrambling variable, the 2D code is time-varied; that is, the 2D code is only retained for a predetermined time period; after the period, the scrambling coder will generate another 2D code.
The card identification system with scramble coding ability may further comprise a coder receiving end for receiving the 2D code from the scrambling coding APP; and a scrambling decoding operator connected to the coder receiving end; the scrambling decoding operator including the scrambling variable or other variables related to the scrambling variable and the at least one master key; wherein for a specific identification data set, the master key of the scrambling decoding operator is identical to the master key of the specific identification data set in the scrambling coding APP; the scrambling decoding operator receives the 2D code from the coder receiving end and decodes the 2D code as a decoded 2D code and then decrypts the decoded 2D code by using the master key so as to get the card ID, the device code, the validation period and the mobile current time corresponding to the identification data set; then the scrambling decoding operator determines whether the current time is in an effective time interval between the mobile current time and the mobile current time plus the validation period; if the current time of decoding is not between the effective time interval, the scrambling decoding operator considers that the time that the coder receiving end scans the mobile phone is over the effective time interval; that is to say, the 2D code is ineffective and then no succeeding operation is performed; if the current time of decoding falls into the effective time interval, then the device code is identified; and if the device code is effective, the card ID is transferred to the cloud device or the primary terminal to inform related members of the entity or to be recorded.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a block diagram about the element arrangement in one embodiment of the present invention.
Fig. 2 is a block diagram about the element arrangement in another 30 embodiment of the present invention.
Fig. 3 is a block diagram about the element arrangement in a further embodiment of the present invention.
Fig. 4 shows that the current time in decoding is within the period of effective time according to the present invention.
Fig. 5 shows that the current time in decoding is not within the period of effective time according to the present invention.
Fig. 6 shows a first application about the 2D code of the present invention.
Fig. 7 shows a second application about the 2D code of the present 10 invention.
Fig. 8 shows a third application about the 2D code of the present invention.
Fig. 9 shows a fourth application about the 2D code of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
In order that those skilled in the art can further understand the present invention, a description will be provided in the following in detail. However, these descriptions and the appended drawings are only used to cause those skilled in the art to understand the objects, features, and characteristics of the present invention, but not to be used to confine the scope and spirit of the present invention defined in the appended claims.
With reference to Figs. 1 to 9, the system of the present invention is illustrated. The system of the present invention is suitable for various kinds of communication systems, such as 2G, 30, 40, 50, WiFi, blue tooth, NEC, etc. The present invention includes the following elements.
A primary terminal 10 serves to provide data about a person to be identified. The primary terminal 10 is owned by an entity, such as a business entity, a corporation, a school, etc. A cloud device 20 is connected to the primary terminal 20. The cloud device 20 serves to receive instructions from the primary terminal 10 for transferring at least one identification data set 80. Each identification data set 80 includes a card ID 21, a device code 22, and a validation period 23.
A mobile phone 30 is wirelessly connected to the cloud device 20. The mobile phone 30 could download a scrambling coding APP 40 from the cloud device 20. The scrambling coding APP 40 serves to receive the at least one identification data set 80 (including the card ID 21, the device code 22 and the validation period 23) transferred from the cloud device 20 and adds a mobile current time 31 from the mobile phone 30.
The scrambling coding APP 40 is built with a scrambling coder 41 and at least one master key 42. Each master key 42 is corresponding to a respective identification data set 80. Each different identification data set 80 has its own master key 42.
The scrambling coder 41 is stored with a scrambling variable 411. The scrambling coding APP 40 encrypts the card ID 21, the device code 22, the validation period 23 of the identification data set 80 and the mobile current time 31 based on the master key 42 of the identification data set 80 so as to get an encryption data. Then encryption data is encoded by the scrambling coder 41 and by using the scrambling variable 411 to become a 2 dimensional code (2D code) 45, such as a QR code. Due to the action of the scrambling variable 411, the 2D code 45 is time-varied. That is, the 2D code 45 is only retained for a predetermined time period. After the period, the scrambling coder 41 will generate another 2D code 45. The predetermined time period is the validation period 23. For example, if the card ID 21 of the identification data set 80 is 01458, the device code 22 is ABC, the validation period 23 is 10 seconds, and the mobile current time 31 of the mobile phone 30 is 120315 (3 minutes and 15 seconds at 12 O'clock). The master key 42 is A01C78; and the scrambling variable 411 is the 120315 (sequential combination of number of hours, minutes and seconds).
The scrambling coding APP 40 encrypts the 01458, ABC, 10 second, and 120315 by using the master key 42 (A0 1C78). The scrambling coder 41 codes the encrypted data. The coding operation is performed every 10 seconds. The coding is effected by the scrambling variable 411.
A coder receiving end 50 serves to receive the 2D code 45 from the scrambling coding APP 40. The coder receiving end 50 may be installed in an independent non-clouded electronic device 100, such as an independent decoder 101 (see Fig. I), another mobile phone 102 (referring to Fig. 2), or other computers of various types, A scrambling decoding operator 60 is connected to the coder receiving end 50. The scrambling decoding operator 60 includes the scrambling variable 411 or other variables related to the scrambling variable 411 and at least one master key 42. For a specific identification data set 80, the master key 42 of the scrambling decoding operator 60 is identical to the master key 42 of the specific identification data set 80 in the scrambling coding APP 40.
The scrambling decoding operator 60 receives the 2D code 45 from the coder receiving end 50 and decodes the 2D code 45 as a decoded 2D code 45 and then decrypts the decoded 2D code 45 by using the master key 42 so as to get the card ID 21, the device code 22, the validation period 23 and the mobile current time 31 corresponding to the identification data set 80.
Then the scrambling decoding operator 60 determines whether the current time is in the effective time interval between the mobile current time 31 and the mobile current time 31 plus the validation period 23. For example, if the validation period 23 is 10 seconds, and the mobile current time 31 is 3 minutes and 15 second of 12 o'clock, that is 120315. Then the scrambling decoding operator 60 determines whether the current time is between 3 minutes and 15 second of 12 o'clock (12:3:15) and 3 minutes and 25 second of 12 o'clock (12:3:25) With reference to Fig. 5, if the current time of decoding is not between the effective time interval, the scrambling decoding operator 60 considers 30 that the time that the coder receiving end 50 scans the mobile phone 30 is over the effective time interval. That is to say, the 2D code 45 is ineffective and then no succeeding operation is performed.
With reference to Fig. 4, if the current time of decoding falls into the effective time interval, then the device code 22 is identified. If the device code 22 is effective, the card ID 21 is transferred to the cloud device 20 or the primary terminal 10 to inform related members of the entity or to be recorded.
In above description, the time of the mobile phone 30 must be synchronous with the time of the coder receiving end 50. This can be 10 achieved easily. It is preferred that the mobile phone 30 and the coder receiving end 50 are connected to a same network system.
The scrambling variable 411 or other variables related to the scrambling variable 411 are variables which are interrelated between the scrambling coder 41 and the scrambling decoding operator 60. That is, the scrambling decoding operator 60 knows the scrambling variable 411 by which the scrambling coder 41 generates the 2D code 45. The scrambling variable 411 may be hour, minutes and seconds or other variables related to time, or variables of other forms.
With reference to Fig. 3, the scrambling decoding operator 60 of the present invention may be installed in the cloud device 20 so that it is separated from the coder receiving end 50. The 2D code 45 is transferred to the cloud device 20 through the coder receiving end 50. Next, the scrambling decoding operator 60 decodes the 2D code 45.
Or the scrambling decoding operator 60 is installed in a non-clouded electronic device 100 and is combined with the coder receiving end 50. The non-clouded electronic device 100 is for example, an independent decoder, another mobile phone, or computers of various forms. Under the condition that the scrambling decoding operator 60 is combined with the coder receiving end 50, the non-clouded electronic device 100 may identify the 2D code 45 directly. The objective of this installation is that when no network is used, the non-clouded electronic device 100 can decode and identify directly. Under this condition, the non-clouded electronic device 100 may be connected to the mobile phone 30 through a Bluetooth device. For example, the non-clouded electronic device 100 is another mobile phone (referring to Fig. 2), such as a mobile phone owned by a member of the entity having the primary terminal 10. The member may identify whether the person having the mobile phone 30 is a permissible person by the entity.
The cloud device 20 further includes a checker 25. Before identify, the mobile phone 30 transfers an activation code 32 to the checker 25 of the 10 cloud device 20, the checker 25 will check whether the activation code is an acceptable code by the cloud device 20.
Using a scrambling 2D code as a way for identifying a person according to the present invention may be used in the following applications With reference to Fig. 6, a first application of the present invention is used to identify an employee identification card. It includes the following processes.
The mobile phone 30 downloads the scrambling coding APP 40. The mobile phone 30 is an employee handset 301.
The primary terminal 10 sends a set of identification data set 80 20 (including the card ID 21, device code 22 and validation period 23) to the employee handset 301.
The scrambling coding APP 40 adds a mobile current time 31 of the employee handset 301 to the identification data set 80. Then with respect to the master key 42, the scrambling coding APP 40 encrypts the card ID 21, the device code 22 and the validation period 23 of the identification data set 80 and the mobile current time 31 of the employee handset 301 as an encrypted data. Then the encrypted data is coded into a time varied 2D code 45 by the scrambling coder 41 and using the scrambling variable 411. When the employee needs to be identified, the coder receiving end 50 scans the 2D code 45 generated by the scrambling coding APP 40. After the coder receiving end 50 reads the 2D code 45, the scrambling decoding operator 60 decrypts and decodes the 2D code 45 by using the master key 42 and the scrambling variable 411 or other variables related to the scrambling variable 411 into the original card ID 21, device code 22, validation period 23 of the identification data set 80 and the mobile current time 31. Then the scrambling decoding operator 60 determines whether the current time is a time between the "mobile current time 31" and the "mobile current time 31 + mobile current time 31". If yes, the device code 22 is identified to determine whether the device code 22 is a code acceptable by the entity. If yes, the card ID 21 is transferred to the cloud device 20 and the primary terminal 10 so as to make the members of the entity know or recode that the person owning the identification data set 80 is a permissible person.
The present invention further includes an identification time period set machine 70 which is located in the primary terminal 10 or the cloud device 20 for providing a time period which allows the scrambling coding APP 40 to generate the 2D code 45. If the time period is out of the identification time period, the scrambling coding APP 40 does not generate 2D code 45. That is to say, after the identification time period or the identification time, the person owning the mobile phone 30 is not permitted to enter into the entity.
In the following, two examples are provided for description of the identification time period set machine 70.
Fig. 7 shows another application of the present invention. A visitor 30 owns a mobile phone 302. The identification time period set machine 70 sets a time period of 2 hours or an due time of 5 o'clock. Therefore, the scrambling coding APP 40 in the mobile phone 302 generates 2D code 45 only at a time period of 2 hours, or before 5 o'clock. If over the time setting, the visitor is not permitted to enter into the entity.
Fig. 8 shows a third application of the present invention. It is shown 30 that the present invention is used to an attendance card for a meeting. In this example, the identification time period set machine 70 can set a time period of 3 days. Therefore, the scrambling coding APP 40 in the mobile phone 302 generates 2D code 45 only at a time period of 3 days. If over the time setting, the scrambling coding APP 40 does not generate the 2D code 45 based on the identification data set 80 and the attendance is not permitted to enter into the entity.
Fig. 9 shows an example that the present invention is used in a case of multiple identification data sets 80. In this application, elements with numerals identical to the above applications mean that they have the same 10 functions. Therefore, the details of these elements are not further described herein. In the following, an example of two identification data sets 80 is
used as an example for description.
The identification data sets 80 includes a first identification data set 80' and a second identification data set 80". The first identification data set 80' has a respective master key 42' and the second identification data set 80" has a respective master key 42". The first master key 42' is not identical to the second master key 42". After scrambling coding, a first 2D code 45' and a second 2D code 45" are generated. In the scrambling decoding operator 60, it uses the first master key 42' and the master key 42 to decrypt and decode the first 2D code 45' and uses the second master key 42" and the master key 42 to decrypt and decode the second 2D code 45" so as to get the first identification data set 80' and the second identification data set 80-. Then the scrambling decoding operator 60 determines whether the current time is in the effective times, respectively as the above mentioned way and then the scrambling decoding operator 60 determines whether the device codes of the first identification data set 80' and the second identification data set 80" are effective, respectively. The process is identical to the first embodiment, while each identification data set 80 has its master key 42.
When there are a plurality of identification data sets 80, there may be a 30 plurality of coder receiving ends 50. Each coder receiving end 50 has a respective identification data set 80. For example, an entity has a plurality of departments, and each department has its own coder receiving end 50. Each coder receiving end 50 can identify one of the 2D codes 45 so as to determine whether the person having the 2D codes 45 can enter into the department.
Advantages of the present invention are that the present invention provides scrambling 2D codes which are varied with time, that is, it is not unique. If one 2D code 45 is copied, the copied 2D code is only effective in a very short time, such as 10 seconds. Therefore, it can assure the safety of the identification of a person. The 2D code 45 based on the present invention can be used in various status, such as an employee card, a visitor card, an attendance card, etc. The present invention also provides the function of mobile phone identification. The function of decoding can be equipped in a mobile phone so as to prevent that no network is connected.
The present invention is thus described, it will be obvious that the same may be varied in many ways. Such variations are not to be regarded as a departure from the spirit and scope of the present invention, and all such modifications as would be obvious to one skilled in the art are intended to be included within the scope of the following claims.

Claims (17)

  1. WHAT IS CLAIMED IS: 1. A card identification system with scramble coding ability, comprising: a primary terminal for providing data to a mobile phone, the data being about a person to be identified; the primary terminal being owned by an entity; a cloud device connected to the primary terminal for receiving instructions from the primary terminal for transferring at least one identification data set; each identification data set including a card ID, a 10 device code, and a validation period; a mobile phone wirelessly connected to the cloud device; the mobile phone downloading a scrambling coding APP from the cloud device; the scrambling coding APP serving to receive the at least one identification data set transferred from the cloud device and adding a mobile current time from the mobile phone; wherein the scrambling coding APP is built with a scrambling coder and stored at least one master key; each master key being corresponding to a respective identification data set; different identification data set having its own master key; and wherein the scrambling coder is stored with a scrambling variable; the scrambling coding APP encrypts the card ID, the device code, the validation period of the identification data set and the mobile current time based on the master key of the identification data set so as to get an encryption data; then the encryption data is encoded by the scrambling coder by using the scrambling variable to become a 2 dimensional code; due to the action of the scrambling variable, the 2D code is time-varied; that is, the 2D code is only retained for a predetermined time period; after the period, the scrambling coder will generate another 2D code.
  2. 2. The card identification system with scramble coding ability as 30 claimed in claim 1, further comprising a coder receiving end for receiving the 2D code from the scrambling coding APP; and a scrambling decoding operator connected to the coder receiving end; the scrambling decoding operator including the scrambling variable or other variables related to the scrambling variable and the at least one master key; wherein for a specific identification data set, the master key of the scrambling decoding operator is identical to the master key of the specific identification data set in the scrambling coding APP; the scrambling decoding operator receives the 2D code from the coder receiving end and decodes the 2D code as a decoded 2D code and then decrypts the decoded 2D code by using the master key so as to get the card ID, the device code, the validation period and the mobile current time corresponding to the identification data set; then the scrambling decoding operator determines whether the current 15 time is in an effective time interval between the mobile current time and the mobile current time plus the validation period; if the current time of decoding is not between the effective time interval, the scrambling decoding operator considers that the time that the coder receiving end scans the mobile phone is over the effective time interval; that is to say, the 2D code is ineffective and then no succeeding operation is performed; if the current time of decoding falls into the effective time interval, then the device code is identified; and if the device code is effective, the card ID is transferred to the cloud device or the primary terminal to inform related members of the entity or to be recorded.
  3. 3. The card identification system with scramble coding ability as claimed in claim 2, wherein the time of the mobile phone is synchronous with the time of the coder receiving end.
  4. 4. The card identification system with scramble coding ability as claimed in claim 2, wherein the scrambling variable or other variables 30 related to the scrambling variable are variables which are interrelated between the scrambling coder and the scrambling decoding operator; that is, the scrambling decoding operator knows the scrambling variable by which the scrambling coder generates the 2D code.
  5. 5. The card identification system with scramble coding ability as claimed in claim 2, wherein the scrambling variable is hour, minutes and seconds.
  6. 6. The card identification system with scramble coding ability as claimed in claim 2, wherein the scrambling variable is related to time.
  7. 7. The card identification system with scramble coding ability as 10 claimed in claim 2, wherein the predetermined time period is the validation period.
  8. 8. The card identification system with scramble coding ability as claimed in claim 2, further comprising an identification time period set machine which is located in the primary terminal or the cloud device for providing a time period or a time which allows the scrambling coding APP to generate the 2D code; if the time period is out of the identification time period or the time, the scrambling coding APP does not generate 2D code.
  9. 9. The card identification system with scramble coding ability as claimed in claim 2, wherein the scrambling decoding operator is installed in 20 a non-clouded electronic device.
  10. 10. The card identification system with scramble coding ability as claimed in claim 8, wherein the non-clouded electronic device is an independent decoder or another mobile phone, so that the non-clouded electronic device can identify the 2D code directly.
  11. 11. The card identification system with scramble coding ability as claimed in claim 8, wherein the scrambling decoding operator is installed in the cloud device so that it is separated from the coder receiving end; the 2D code is transferred to the cloud device through the coder receiving end; then the scrambling decoding operator decodes the 2D code.
  12. 12. The card identification system with scramble coding ability as claimed in claim 8, wherein the scrambling decoding operator is installed in a non-cloud device so s to be combined with the coder receiving end.
  13. 13. The card identification system with scramble coding ability as claimed in claim 1, wherein the system is applied to one of communication systems of 20, 30, 40, 50, WiFi, blue tooth and NFC.
  14. 14. The card identification system with scramble coding ability as claimed in claim 2, wherein the 2D code is QR code.
  15. 15. The card identification system with scramble coding ability as claimed in claim 2, wherein the cloud device includes a checker; before transferring the identification data set, the mobile phone transfers an activation code to the checker of the cloud device, the checker will check whether the activation code is an acceptable code by the system.
  16. 16. The card identification system with scramble coding ability as claimed in claim 2, wherein the at least one identification data sets are a plurality of identification data sets; each identification data set has its own related master key; and the scrambling coding APP encrypts and encode each identification data set by using the master key which is related to the identification data set and the scrambling variable; and the scrambling decoding operator decoding and decrypting the 2D code by using the scrambling variable or other variable related to the scrambling variable and the master key related to the identification data set.
  17. 17. The card identification system with scramble coding ability as claimed in claim 15, wherein when there are a plurality of identification data sets, there are a plurality of coder receiving ends; and each coder receiving end has a respective identification data set.
GB1908050.6A 2019-06-06 2019-06-06 Card identification system with scramble coding ability Withdrawn GB2584645A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1908050.6A GB2584645A (en) 2019-06-06 2019-06-06 Card identification system with scramble coding ability

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1908050.6A GB2584645A (en) 2019-06-06 2019-06-06 Card identification system with scramble coding ability

Publications (2)

Publication Number Publication Date
GB201908050D0 GB201908050D0 (en) 2019-07-24
GB2584645A true GB2584645A (en) 2020-12-16

Family

ID=67386164

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1908050.6A Withdrawn GB2584645A (en) 2019-06-06 2019-06-06 Card identification system with scramble coding ability

Country Status (1)

Country Link
GB (1) GB2584645A (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015106333A1 (en) * 2014-01-16 2015-07-23 Perry + Currier Inc. Device, system and method of mobile identity verification

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015106333A1 (en) * 2014-01-16 2015-07-23 Perry + Currier Inc. Device, system and method of mobile identity verification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Alfred Menezes, Handbook of Applied Cryptography, (Fifth Printing 2001), CRC Press. Available from http://cacr.uwaterloo.ca/hac/ *

Also Published As

Publication number Publication date
GB201908050D0 (en) 2019-07-24

Similar Documents

Publication Publication Date Title
CN107453862B (en) Scheme for generating, storing and using private key
CN111861455B (en) Personal information query method and device based on mobile terminal bar code
CN108496382B (en) Secure information transmission system and method for personal identity authentication
US10154018B2 (en) Method and system for facilitating network joining
US5402490A (en) Process for improving public key authentication
CN111625781A (en) SDK authorization authentication method, device, equipment and storage medium
US20070017979A1 (en) Mobile ticketing via information hiding
EP0653695A2 (en) Software pay per use system
CN107404478B (en) eID coding query method, system and corresponding server thereof
CN108667784B (en) System and method for protecting internet identity card verification information
CN104717056A (en) Two-dimensional code encryption and decryption method and encryption and decryption device
CN112883361A (en) Function jump method and device of application program, computer equipment and storage medium
CN109145641B (en) Privacy information protection method and system
CN105139205A (en) Payment verification method, terminal and server
CN104899500B (en) A kind of elevator customer Rights Management System and method
CN115964728A (en) File encryption method and device based on consensus algorithm
CN106254304B (en) Method and system for facilitating secure communications
CN101057447B (en) Method and device for re-dispatching specifically coded access objects from a server to a mobile terminal device
US20210359857A1 (en) Card identification system with scramble coding ability
CN108234126B (en) System and method for remote account opening
GB2584645A (en) Card identification system with scramble coding ability
CN110532290B (en) Information verification device, method and storage medium based on block chain
CN114969768A (en) Data processing method and device and storage medium
US20160110552A1 (en) Method and Apparatus for Transmission of Visually Encoded Data
CN115941279A (en) Encryption and decryption method, system and equipment for user identification in data

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)