期刊文献+

二代证与校园卡融合的通用模型设计 被引量:4

Design of universal model for integration of the second-generation resident ID and campus card
在线阅读 下载PDF
导出
摘要 针对第二代居民身份证具有的身份安全认证和信息唯一性的技术特点,以及校园卡具有的园区身份认证、电子钱包消费等服务功能,提出以二代证作为实体证书、校园卡作为应用属性的通用认证模式.采用目录式文件管理多功能区域技术,设计公共扇区,构建基础数据平台同步系统,将二代证与校园卡进行有效融合,实现了证卡的跨行业应用. Aiming at the technology characteristics of the second-generation resident ID about the secure identity authentication and information uniqueness, as well as the service functions such as garden area identity authentication and electronic wallet consumption, a general authentication model was proposed, in which the second-generation resident ID was used as entity certificate, and the campus card was worked as application attributes. Multiple function area technology of directory file management was adopted. The general model was designed to establish public sector, basic data platform synchronization system, and integrate the second-generation resident ID and the campus card effectively. It realized the cross-industry application of the cards.
出处 《郑州轻工业学院学报(自然科学版)》 CAS 2008年第6期91-95,共5页 Journal of Zhengzhou University of Light Industry:Natural Science
基金 福建省教育厅科技项目(JB08263) 福建省漳州市科技计划项目(Z2008004) 漳州职业技术学院科研计划资助项目(ZZY0813)
关键词 第二代居民身份证 校园卡 认证模型 second-generation resident ID campus card authentication model
  • 相关文献

参考文献5

二级参考文献37

  • 1黄莉萍.试论“校园一卡通”的运营模式与网络安全实现[J].教育信息化,2005(4):34-35. 被引量:4
  • 2宋广为.Mifare 1非接触式IC射频卡的一卡通系统实现[J].现代电子技术,2005,28(11):27-29. 被引量:6
  • 3马秀丽.MIFARE 1非接触式IC卡的技术特点及应用浅析[J].金卡工程,2005,9(2):46-50. 被引量:9
  • 4Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 5Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 6Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 7Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 8Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 9Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 10Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84

共引文献224

同被引文献24

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部