CN103186936A - Management method for network voting and network voting system - Google Patents

Management method for network voting and network voting system Download PDF

Info

Publication number
CN103186936A
CN103186936A CN 201110446694 CN201110446694A CN103186936A CN 103186936 A CN103186936 A CN 103186936A CN 201110446694 CN201110446694 CN 201110446694 CN 201110446694 A CN201110446694 A CN 201110446694A CN 103186936 A CN103186936 A CN 103186936A
Authority
CN
China
Prior art keywords
ballot
identification
voting
network
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201110446694
Other languages
Chinese (zh)
Inventor
陶勇刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Pateo Electronic Equipment Manufacturing Co Ltd
Original Assignee
Shanghai Pateo Electronic Equipment Manufacturing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Pateo Electronic Equipment Manufacturing Co Ltd filed Critical Shanghai Pateo Electronic Equipment Manufacturing Co Ltd
Priority to CN 201110446694 priority Critical patent/CN103186936A/en
Publication of CN103186936A publication Critical patent/CN103186936A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a management method for network voting and a network voting system. The method comprises the following steps that: a voting initiator initiates a network voting event; identity recognition data comprising physical characteristic data of voting requesters are collected based on the network voting event and voting requests of the voting requesters; the identity recognition data are encrypted by using a public key and then sent to an identity recognition party; the identity recognition party decrypts the identity recognition data by using a private key and then carries out identity recognition, wherein the private key and the public key form a key pair; the identity recognition party encrypts identity recognition results by using the private key and sends the identity recognition results to a voting service provider; the voting service provider decrypts the identity recognition results by using the public key, extracts identity information in the identity recognition results and provides voting information corresponding to the identity information to the voting requesters; and the voting requesters carry out network voting based on the voting information. With the method and the system provided by the invention, fairness and validity of network voting are improved.

Description

The management method of network voting and network voting system
Technical field
The present invention relates to the identity recognizing technology in the network interaction service, particularly the management method of the network voting of application identity recognition technology and network voting system.
Background technology
Nowadays, the network interaction service is owing to the development of Internet technology obtains widespread use.Real-time data message, ways of services supplied efficiently make the network interaction service more can attract user's concern with respect to traditional ways of services supplied.Be accompanied by the application surface of network interaction service more and more widely, it has also changed the implementation of some common social actions gradually.
Ballot as a kind of mode of collecting masses' purpose, always is extensive use of by people.And by means of the network voting that the widespread use that network interaction is served occurs, also provide a kind of brand-new operator scheme for this common social action of voting.
Network voting is the social network service centered by voting, and the statistics of the poll of network voting and demonstration need not manually participate in fully by software control, can guarantee the fairness of voting to a certain extent.For example, when needs carried out an investigation, the investigator can create a ballot system in the network platform, and be divided into two kinds substantially: a kind of is the multiple-choice question form, went out a problem and voted by single choosing or multiselect then; Also a kind of is the question-and-answer problem form, provides a problem exactly, others to answer then and adds up from the result who answers.
The demand that is accompanied by network voting is cumulative, some have also occurred at present the ballot service platform of network voting service is provided, these ballot service platforms can provide the technical service of network voting whole process usually, from creating ballot system to voting rule is set, and can bear the service of the data preparations such as statistics as a result after the ballot.
Usually, for fairness and the validity that guarantees to vote, these ballot service platforms have taked multiple verification technique to come ballot claimant's identity is verified.For example, by being set, voting rule restriction nonregistered user participates in ballot; Perhaps, by detecting the IP address, limit the repeatedly ballot in same ballot system of same IP address; Or by reading cookies, the arrangement poll is refused its additional ballot to the user who finishes ballot.
Yet that above identity validation technology still is difficult to satisfy comprehensively is that the user increases day by day, for the fairness of network voting and the demand of validity.For example, registered user's login name and password are easy to because user's carelessness causes information leakage, thereby other people just can counterfeit registered user vote.And IP address and cookies also can be forged by other people.Thereby, make the user reduce greatly for network voting result's confidence level.
Therefore, fairness and the validity that how further to improve network voting remains the industry problem demanding prompt solution.
Summary of the invention
The invention provides a kind of management method and network voting system of network voting, to improve fairness and the validity of network voting.
For addressing the above problem, the invention provides a kind of management method of network voting, comprising:
The ballot initiator initiates the network voting event;
Based on described network voting event and ballot claimant's ballot request, gather ballot claimant's identification data, described identification data comprise characteristics of human body's data;
Described identification data are sent to identification side after with publicly-owned secret key encryption;
Identification side carries out identification after with private cipher key the identification data being deciphered; It is right that described private cipher key and described publicly-owned key constitute key;
Identification side is sent to ballot service side after with private key encryption with the identification result;
Ballot service side extracts the identity information among the described identification result with the described identification result of publicly-owned secret key decryption, and provides the vote information corresponding with described identity information to the ballot claimant;
The claimant is based on described vote information in ballot, carries out network voting.
Correspondingly, the present invention also provides a kind of network voting system, comprising: ballot apparatus for initiating, voting terminal, identity recognition device and ballot service platform, wherein,
Described ballot apparatus for initiating based on ballot initiator's request, is set up and to network delivery network ballot event;
Described voting terminal based on the ballot request of described network voting event, is gathered ballot claimant's identification data based on the network voting event of obtaining from network and ballot claimant, and described identification data comprise characteristics of human body's data; And described identification data are sent to identity recognition device after with publicly-owned secret key encryption; Based on vote information, carry out the network voting data and handle;
Described identity recognition device obtains the identification data with publicly-owned secret key encryption, after with private cipher key the identification data being deciphered, carries out identification; It is right that described private cipher key and described publicly-owned key constitute key; And, the identification result is sent to described ballot service platform after with private key encryption;
Described ballot service platform, the identification result so that publicly-owned secret key decryption identity recognition device produces extracts the identity information among the described identification result, and provides the vote information corresponding with described identity information to voting terminal.
Compared with prior art, such scheme has the following advantages: said method and system all adopt the identification data that comprise characteristics of human body's data to carry out identification, because the uniqueness of characteristics of human body's data, be that each individual characteristics of human body's data all exists difference, accuracy based on this identification of carrying out is higher, and then can examine accurately the personnel's that participate in ballot identity, thereby stopped other people on behalf of ballot or pretended to be the situation of ballot, strengthened the confidence level of voting results.
And because whole voting process can't be by other people on behalf of finishing, voting results also will be bound one by one with the ballot claimant, and the ballot claimant also can't deny voting results, has also strengthened fairness and the validity of voting process.
In addition, each link in the network voting is carried out the coded communication based on publicly-owned key, private cipher key, in the advantage aspect the confidentiality, improves the confidentiality of communication by publicly-owned key and private cipher key, to strengthen the confidentiality of network voting.
Description of drawings
Fig. 1 is a kind of embodiment schematic flow sheet of the management method of network voting of the present invention;
Fig. 2 is the process synoptic diagram of a kind of embodiment of the management method of network voting of the present invention;
Fig. 3 is a kind of embodiment structural representation of network voting system of the present invention;
Fig. 4 is the structural representation of ballot apparatus for initiating among a kind of embodiment of network voting system of the present invention;
Fig. 5 is the structural representation of voting terminal among a kind of embodiment of network voting system of the present invention;
Fig. 6 is the structural representation of identity recognition device among a kind of embodiment of network voting system of the present invention;
Fig. 7 is the structural representation of ballot service platform among a kind of embodiment of network voting system of the present invention.
Embodiment
Just as stated in the Background Art, present identity validation technology still is difficult to satisfy fairness and the validity of network voting comprehensively.Comparison data when in view of this, the management method of network voting provided by the invention has used the identification data conduct that comprises characteristics of human body's data to carry out identification.Because the individual uniqueness of characteristics of human body's data, it can't be stolen and counterfeit, thereby can accurately carry out identification.And, the management method of network voting provided by the invention is also carried out coded communication based on publicly-owned key, private cipher key to each link in the network voting, to in the advantage aspect the confidentiality, improve the confidentiality of communication by publicly-owned key and private cipher key, to strengthen the confidentiality of network voting.
With reference to shown in Figure 1, a kind of embodiment of the management method of network voting of the present invention comprises:
Step s1, the ballot initiator initiates the network voting event;
Step s2 based on described network voting event and ballot claimant's ballot request, gathers ballot claimant's identification data, and described identification data comprise characteristics of human body's data;
Step s3 is sent to identification side with described identification data after with publicly-owned secret key encryption;
Step s4, identification side carry out identification after with private cipher key the identification data being deciphered; It is right that described private cipher key and described publicly-owned key constitute key;
Step s5, identification side is sent to ballot service side after with private key encryption with the identification result;
Step s6, ballot service side extracts the identity information among the described identification result with the described identification result of publicly-owned secret key decryption, and provides the vote information corresponding with described identity information to the ballot claimant;
Step s7, the claimant is based on described vote information in ballot, carries out network voting.
Further specify below in conjunction with the process of instantiation to the management method of above-mentioned network voting.For convenience of description, one side that will initiate network voting in network voting is called the ballot initiator, provide a side of network voting service to be called ballot service side in network voting, the side that the reception vote information is voted based on described network voting is called the ballot claimant.
In conjunction with illustrated in figures 1 and 2, ballot the initiator can vote demand and initiate the network voting event based on self networks.For example, the ballot initiator wants to use always by the mode of ballot the investigation of mobile phone brand, and then it can be to the network voting event (usually by ballot service platform) of network issue based on this investigation, to initiate network voting.
When the common people were interested in above-mentioned network voting, it just can be used as the ballot claimant and participates in the described network voting.And before voting, need carry out identification earlier to the ballot claimant.Particularly, need to gather earlier ballot claimant's identification data, described identification data comprise characteristics of human body's data.Certainly, described identification data can also comprise licencing key.This sentences the identification data and is characteristics of human body's data instance.Described characteristics of human body's data can comprise a kind of or combination in fingerprint, pupil, shape of face, the sound.But the present invention does not limit this, and other characteristics of human body's data that can obtain by acquisition mode are all applicable to the present invention.Be example with the fingerprint, just need to gather by fingerprint acquisition device the fingerprint of service consumption side this moment.The fingerprint that collects will be used for follow-up identification as the identification data.
As previously mentioned, in order to guarantee the communication security in the network voting, need the communication data in the communication process is encrypted.Therefore, behind the captured identity recognition data, can initiate the identification request to identification side.Identification side can provide publicly-owned key after obtaining described identification request.Thus, just can be encrypted the identification data of gathering by described publicly-owned key.Certainly, encryption to the identification data is not limited in this mode, also can in having the electronic equipment of encryption function, deposit publicly-owned key in advance in, then behind the captured identity recognition data, just receive described identification data to be encrypted operation by described electronic equipment.
After the encryption of finishing the identification data, just the identification data after encrypting can be sent to identification side, carry out identification to transfer to identification side.At this moment, identification side can be decrypted the identification data with private cipher key.Based on publicly-owned key and the right encrypting and decrypting characteristic of private cipher key, can only be deciphered by private cipher key by the data of publicly-owned secret key encryption, and also can only be by publicly-owned secret key decryption by the data of private key encryption.Therefore, the content of the identification data after the encryption only may be obtained by the deciphering back, identification side that has private cipher key.Even the identification data after encrypting are obtained by its other party in communication process, its other party also can't obtain content wherein.Thereby the data security in the communication process has obtained assurance.
And described publicly-owned key and private cipher key meet Security Real Time Protocol (SRTP, Secure Real-time Transport Protocol).Security Real Time Protocol is at RTP (RTP; Real-time Transport Protocol) a defined agreement on the basis, being intended to provides encryption, message authentication, integrality to guarantee and the playback protection for the data of the RTP in clean culture and the multicast application program.It is developed by David Oran (Cisco) and Rolf Blom (Ericsson), and is issued as RFC 3711 in March, 2004 by IETF the earliest.
Because RTP and can being used to is controlled the RTCP Real-time Transport Control Protocol (RTCP of the session of RTP, RTP Control Protocol) contact is closely arranged, Security Real Time Protocol equally also has a companion protocol, it is called as real-time security transmission control protocol (SRTCP, Secure RTCP).Real-time security transmission control protocol provides similarly and security-related characteristic for RTCP Real-time Transport Control Protocol, those that provide for RTP just as Security Real Time Protocol.
When using RTP or RTCP Real-time Transport Control Protocol, it is optional using Security Real Time Protocol or real-time security transmission control protocol.Even but used Security Real Time Protocol or real-time security transmission control protocol, and all they characteristic (as data stream encryption and message authentication) that provides also all is optional, these characteristics can be used independently or be forbidden.Unique exception is when using real-time security transmission control protocol, must use its message authentication characteristic.
About traffic encryption-in order to provide the maintaining secrecy of data stream (for example above-mentioned identification data), need carry out encryption and decryption to data stream.About this point, Security Real Time Protocol (in conjunction with real-time security transmission control protocol) is a kind of cryptographic algorithm only, and namely AES has formulated the use standard.This cryptographic algorithm has two kinds of encryption modes, and they can convert original AES piece ciphertext to the stream ciphertext, comprise segmentation integer counter pattern and f8 pattern.
Wherein, segmentation integer counter pattern is a kind of typical counter mode, and its allows the random access to any piece, and these characteristics are transmitted at unreliable network that may packet loss for the data stream of RTP and are very important.Generally speaking, nearly all function can both be used as counter and use, as long as the number of times that it repeats in once circulating just can not too much.But what be used for the RTP data encryption only is a common integer count-up counter.The AES that operates under this pattern is the cryptographic algorithm of its acquiescence, and what it used is the encryption key of acquiescence 128 bit lengths and the session salt key of acquiescence 112 bit lengths.
And the f8 pattern is a mutation of output feedback mode, and it has increased positioning function and has changed function of initializing, and the AES under the default value sum counter pattern of its encryption key and salt key is the same.The AES that operates under this pattern is used to UMTS 3G mobile network.
Except the AES cryptographic algorithm, Security Real Time Protocol also allows thoroughly forbidding encryption, and what used this moment is so-called " zero cryptographic algorithm ".It can be considered to second kind of cryptographic algorithm that Security Real Time Protocol is supported, or perhaps its third encryption mode of supporting.In fact, zero cryptographic algorithm is not carried out any encryption, that is to say that cryptographic algorithm is imagined as key stream only the stream that comprises " 0 ", and intactly inlet flow is copied to output stream.This pattern is that the system of all and Security Real Time Protocol compatibility all must realize, because it can be used in and not need Security Real Time Protocol to provide confidentiality to guarantee and only require that it provides the occasion of other characteristic (as authentication and message integrity).
Although Security Real Time Protocol can be included new cryptographic algorithm like a cork in technically, the Security Real Time Protocol standard is pointed out that the new cryptographic algorithm except above-mentioned cryptographic algorithm differs and is gone in the specific implementation of being added to some Security Real Time Protocol surely simply.Add a kind of new cryptographic algorithm and guarantee it with the Security Real Time Protocol standard mutually compatible unique effective means be standard-track RFC who clearly defines the new association of this algorithm of issue.
About message authentication, integrality and playback protection---more than the cryptographic algorithm itself enumerated can not protect the integrality of message, the assailant still can data falsification---can reset the data of transmitting at least over.Therefore, the Security Real Time Protocol standard method that the protected data integrality also is provided simultaneously and prevented from resetting.
In order to carry out message authentication and to protect the integrality of message, Security Real Time Protocol has used HMAC-SHA1 algorithm (definition in RFC 2104).What this algorithm used is the HMAC-SHA1 authenticate key of acquiescence 160 bit lengths.But it can not resist Replay Attack.Playback guard method suggestion take over party safeguards the index of the message that had before received, and is compared in they and each message that newly receives, and receives only the new information that those past were not played.This method extremely depends on the use (to stop the Cheating Technology at message index) of integrity protection.
After decipher the identification data with private cipher key identification side, the benchmark recognition data of the search of identification side and described identification Data Matching; And, according to described benchmark recognition data corresponding identity information, obtain the identification result.Wherein, described benchmark recognition data comprises characteristics of human body's data equally.Particularly, described identification Fang Zhongke pre-deposits each characteristics of human body's data with user of ballot qualification, and with these characteristics of human body's data of user with ballot qualification as the benchmark recognition data, described benchmark recognition data correspondence described identity information with user of ballot qualification.When searching for the benchmark recognition data of acquisition and described identification Data Matching, just can think that the ballot claimant has the ballot qualification.And when search fails to obtain benchmark recognition data with described identification Data Matching, just can think that the claimant that votes does not have the ballot qualification.In addition, the described characteristics of human body's data that pre-deposit can be by gathering to obtain to the user with ballot qualification in advance, but the present invention is not limited thereto.
After identification side finished identification and obtains the identification result, it can be sent to ballot service side's (service platform of for example voting) after with private key encryption with described identification result.Based on above-mentioned to publicly-owned key and the right secrecy Analysis of private cipher key, to send the security that also can guarantee communication process behind the described checking result of private key encryption.
Vote service side behind the checking result after the acquisition encryption, obtain the identity information that comprises among the identification result with publicly-owned secret key decryption.Described publicly-owned key can pre-deposit in the electronic equipment with decipher function of ballot service side, perhaps, before or after identification side is sent to ballot service side after with private key encryption with the identification result, publicly-owned key is sent to the service side of voting.
Ballot service side can provide the vote information corresponding with described identity information to the ballot claimant according to the identity information that obtains.Still the surveying ballot with aforesaid mobile phone brand commonly used is example, at this moment, ballot service side will send the vote information of corresponding its identity information to the ballot claimant, and described vote information can comprise the ballot options that the claimant that votes can obtain, the ballot operation that the claimant that votes can carry out etc.Thus, the ballot claimant just can carry out network voting according to described vote information, in the investigation that participates in described mobile phone brand commonly used.
And if ballot service side from the identification result, know the ballot claimant and do not have when voting qualification, then can not provide any vote information to the claimant that votes.Then, the ballot claimant is not owing to obtain any vote information, and it also can't carry out network voting.Thereby, make that usurping other people operation that identity carries out network voting of voting can't finish, with the confidence level that guarantees voting results and fairness, the validity of voting process.
By the said process analysis as can be known, the ballot claimant only need assist to finish the collection of identification data, just can and then finish the flow process of whole network voting, and during guaranteed the security of communication data by the mode of coded communication.Therefore, whole network voting process is very convenient for the ballot claimant, and has security preferably.
Need to prove that the application of above-mentioned network voting is example to investigate, but application of the present invention is not limited thereto.The business decision of for example elect, shareholder's conference is related and other social actions that is fit to carry out in the mode of ballot are all applicable to the present invention.For example, for election, the ballot claimant namely is the election claimant, and the vote information that ballot service side provides just can comprise the ballot paper of corresponding election claimant identity information; And for the related business decision of shareholder's conference, the ballot claimant namely is the shareholder, and the vote information that ballot service side provides just can comprise the ballot weight information of corresponding shareholder's identity information (shareholder's share size) and the ballot options that the shareholder can vote.
In addition, consider that names such as playing investigation in recent years carries out the situation of illegal business activity and occur now and then, under the situation of common people's carelessness, probably some the important personal information (for example personally identifiable information, family's deposit information etc.) of self are revealed.Therefore, before the ballot initiator initiates the network voting event, also can verify for ballot initiator's qualification.
Particularly, identification side can regularly obtain ballot initiator's authorization information (usually before the ballot initiator initiates the network voting event), so that the ballot initiator is carried out qualification testing, only after qualification testing passes through, sends the credit notice to ballot service side.And ballot service side just can send network voting event authorization notification to the ballot initiator after obtaining the credit notice, and the ballot initiator only after obtaining described authorization notification, just has the right to initiate the network voting event.In specific implementation, described identification side notifies to be sent to ballot service side after the private key encryption with credit; Ballot service side is with the described credit notice of publicly-owned secret key decryption.
Serve as that ballot initiator's qualification is designated example with described ballot initiator's authorization information.Then, identification side can the ballot initiator's that obtain qualification sign is corresponding with the ballot initiator of credit the qualification sign compare, if the qualification of obtaining sign belongs to the qualification sign of the ballot initiator correspondence of one of them credit, qualification testing passes through; If the service identifiers that obtains does not belong to the qualification sign of the ballot initiator correspondence of wherein any one credit, qualification testing failure.
Thus, by the qualification testing of identification side to the ballot initiator, can further strengthen the security of network voting.
Correspondingly, the present invention also provides network voting system, to realize above-mentioned network voting process.Be elaborated below in conjunction with the concrete structure of instantiation to network voting system.
With reference to shown in Figure 3, a kind of embodiment of network voting system of the present invention can comprise: ballot apparatus for initiating 10, voting terminal 20, identity recognition device 30 and ballot service platform 40.
In one embodiment, with reference to shown in Figure 4, described ballot apparatus for initiating 10 can comprise:
Set up unit 101, based on ballot initiator's request, set up the network voting event;
Release unit 102 is issued to network setting up the network voting event of setting up unit 101.
In one embodiment, with reference to shown in Figure 5, described voting terminal 20 can comprise:
Tip element 201, based on the ballot request of described network voting event, prompting ballot claimant carries out the identification data acquisition, and starts collecting unit 202 based on the network voting event of obtaining from network and ballot claimant;
Collecting unit 202 after the startup, is gathered user's identification data, and described identification data comprise characteristics of human body's data;
Ciphering unit 203, with described identification data with publicly-owned secret key encryption;
Identification transmitting element 204 is sent to identity recognition device 30 with the described identification data after encrypting;
Ballot processing unit 205 based on the vote information that described ballot service platform 40 provides, carries out the network voting data and handles.
As previously mentioned, described characteristics of human body's data can comprise a kind of or combination in fingerprint, pupil, shape of face, the sound.Correspondingly, described collecting unit 202 is for realizing the device of corresponding human body characteristics data acquisition.For example, described characteristics of human body's data are fingerprint; Described collecting unit 202 is fingerprint acquisition device; Described characteristics of human body's data are the combination of pupil or shape of face or pupil, shape of face; Described collecting unit 202 is camera head; Described characteristics of human body's data are sound; Described collecting unit 202 is microphone.
In addition, as previously mentioned, described identification data can also comprise licencing key, and then described collecting unit 22 is external input device (for example in keyboard, liquid crystal touch screen, the mouse a kind of).
And described Tip element 201 can comprise a kind of or combination in display device, the loudspeaker, so that the prompting of service consumption side's image and/or voice mode to be provided.
In addition, described Tip element 201 and described collecting unit 202 can also integrate, to improve the integrated level of described voting terminal 20.
In one embodiment, with reference to shown in Figure 6, described identity recognition device 30 can comprise:
Pre-collecting unit 301 is gathered the benchmark recognition data in advance, and described benchmark recognition data comprises characteristics of human body's data;
Key generates described publicly-owned key and described private cipher key to generation unit 302 according to described benchmark recognition data;
Identification unit 303 obtains the identification data with publicly-owned secret key encryption, after with private cipher key the identification data being deciphered, carries out identification; The identification result is sent to described ballot service platform 40 after with private key encryption.
In one embodiment, with reference to shown in Figure 7, described ballot service platform 40 can comprise: resolution unit 401, vote information generation unit 403 and storage unit 402,
Described resolution unit 401 is extracted the identity information among the described identification result with the identification result that publicly-owned secret key decryption identity recognition device 30 produces, and described identity information is sent to vote information generation unit 403;
Association store vote information and corresponding identity information in the described storage unit 402;
Described vote information generation unit 403 is based on the identity information that obtains, and search obtains corresponding vote information from storage unit 402, and described vote information is sent to described voting terminal 20.
The network voting system that above-mentioned each device and voting terminal constitute realizes that the process of network voting can just repeat no more with reference to the management method explanation of aforementioned network ballot herein.
In other embodiments, described ballot apparatus for initiating 10 can also be integrated into ballot service platform 40, to realize higher integrated level.
In other embodiments, described voting terminal 20 can also comprise request unit, after the identification data of gathering the ballot claimant, initiates the identification request to identity recognition device 30; Described ciphering unit obtains the publicly-owned key that identity recognition device provides based on described identification request.
In other embodiments, described identity recognition device 30 can also comprise the qualification testing unit, obtains user's the authorization information of ballot apparatus for initiating 10 in advance, and the user of ballot apparatus for initiating 10 is carried out qualification testing; After qualification testing passes through, send the credit notice to ballot service platform 40; Ballot service platform 40 sends network voting event authorization notification to ballot apparatus for initiating 10 after obtaining the credit notice; Ballot apparatus for initiating 10 based on ballot initiator's request, is set up and to network delivery network ballot event after obtaining network voting event authorization notification.
More than disclose many aspects of the present invention and embodiment, it will be understood by those skilled in the art that other side of the present invention and embodiment.Disclosed many aspects and embodiment just are used for illustrating among the present invention, are not to be limitation of the invention, and real protection domain of the present invention and spirit should be as the criterion with claims.

Claims (16)

1. the management method of a network voting is characterized in that, comprising:
The ballot initiator initiates the network voting event;
Based on described network voting event and ballot claimant's ballot request, gather ballot claimant's identification data, described identification data comprise characteristics of human body's data;
Described identification data are sent to identification side after with publicly-owned secret key encryption;
Identification side carries out identification after with private cipher key the identification data being deciphered; It is right that described private cipher key and described publicly-owned key constitute key;
Identification side is sent to ballot service side after with private key encryption with the identification result;
Ballot service side extracts the identity information among the described identification result with the described identification result of publicly-owned secret key decryption, and provides the vote information corresponding with described identity information to the ballot claimant;
The claimant is based on described vote information in ballot, carries out network voting.
2. the management method of network voting according to claim 1 is characterized in that also comprise: identification side gathers the benchmark recognition data in advance, and described benchmark recognition data comprises characteristics of human body's data; The identification root generates described publicly-owned key and described private cipher key according to described benchmark recognition data;
Described identification comprises:
After described identification data are deciphered by identification side, the described benchmark recognition data of search and described identification Data Matching;
According to described benchmark recognition data corresponding identity information, obtain the identification result.
3. the management method of network voting as claimed in claim 1 or 2 is characterized in that, described characteristics of human body's data comprise a kind of or combination in fingerprint, pupil, shape of face, the sound.
4. the management method of network voting according to claim 1 is characterized in that described identification data also comprise licencing key.
5. the management method of network voting according to claim 1 is characterized in that, also comprises: identification side obtains ballot initiator's authorization information before the ballot initiator initiates the network voting event, the initiator carries out qualification testing to ballot; Identification side sends the credit notice to ballot service side after qualification testing passes through;
Ballot service side is after obtaining the credit notice, and the initiator sends network voting event authorization notification to ballot;
The ballot initiator initiates described network voting event after obtaining described authorization notification.
6. as the management method of network voting as described in the claim 5, it is characterized in that described authorization information is ballot initiator's qualification sign; Described qualification testing comprises:
Identification side judges whether described qualification sign belongs to the qualification sign of the ballot initiator correspondence of credit;
If described qualification sign belongs to the qualification sign of the ballot initiator correspondence of credit, qualification testing passes through;
If described qualification sign does not belong to the qualification sign of the ballot initiator correspondence of credit, qualification testing failure.
7. as the management method of network voting as described in the claim 5, it is characterized in that, described identification side with the credit notice to be sent to ballot service side after the private key encryption; Ballot service side is with the described credit notice of publicly-owned secret key decryption.
8. the management method of network voting according to claim 1 is characterized in that, also comprises: after the identification data of gathering the ballot claimant, initiate the identification request to identification side; Identification side provides based on described identification request and encrypts the required publicly-owned key of described identification data.
9. the management method of network voting according to claim 1 is characterized in that, also comprises: identification side will verify and be sent to after the result is with private key encryption before or after the ballot service side, publicly-owned key will be sent to the service side of voting.
10. a network voting system is characterized in that, comprises ballot apparatus for initiating, voting terminal, identity recognition device and ballot service platform, wherein,
Described ballot apparatus for initiating based on ballot initiator's request, is set up and to network delivery network ballot event;
Described voting terminal based on the ballot request of described network voting event, is gathered ballot claimant's identification data based on the network voting event of obtaining from network and ballot claimant, and described identification data comprise characteristics of human body's data; And described identification data are sent to identity recognition device after with publicly-owned secret key encryption; Based on vote information, carry out the network voting data and handle;
Described identity recognition device obtains the identification data with publicly-owned secret key encryption, after with private cipher key the identification data being deciphered, carries out identification; It is right that described private cipher key and described publicly-owned key constitute key; And, the identification result is sent to described ballot service platform after with private key encryption;
Described ballot service platform, the identification result so that publicly-owned secret key decryption identity recognition device produces extracts the identity information among the described identification result, and provides the vote information corresponding with described identity information to voting terminal.
11. network voting system as claimed in claim 10 is characterized in that, described voting terminal comprises:
Tip element, based on the ballot request of described network voting event, prompting ballot claimant carries out the identification data acquisition, and starts collecting unit based on the network voting event of obtaining from network and ballot claimant;
Collecting unit after the startup, is gathered user's identification data, and described identification data comprise characteristics of human body's data;
Ciphering unit, with described identification data with publicly-owned secret key encryption;
The identification transmitting element is sent to identity recognition device with the described identification data after encrypting;
The ballot processing unit based on the vote information that described ballot service platform provides, carries out the network voting data and handles.
12. network voting system as claimed in claim 11 is characterized in that, described voting terminal also comprises request unit, after the identification data of gathering the ballot claimant, initiates the identification request to identity recognition device; Described ciphering unit obtains the publicly-owned key that identity recognition device provides based on described identification request.
13. network voting system as claimed in claim 10 is characterized in that, described ballot apparatus for initiating comprises:
Set up the unit, based on ballot initiator's request, set up the network voting event;
Release unit is issued to network setting up the network voting event of setting up the unit.
14. network voting system as claimed in claim 10 is characterized in that, described identity recognition device comprises:
Pre-collecting unit is gathered the benchmark recognition data in advance, and described benchmark recognition data comprises characteristics of human body's data;
Key generates described publicly-owned key and described private cipher key to generation unit according to described benchmark recognition data;
The identification unit obtains the identification data with publicly-owned secret key encryption, after with private cipher key the identification data being deciphered, carries out identification; The identification result is sent to described ballot service platform after with private key encryption.
15. network voting system as claimed in claim 14 is characterized in that, described identity recognition device also comprises the qualification testing unit, obtains user's the authorization information of ballot apparatus for initiating in advance, and the user of ballot apparatus for initiating is carried out qualification testing; After qualification testing passes through, send the credit notice to the ballot service platform; The ballot service platform sends network voting event authorization notification to the ballot apparatus for initiating after obtaining the credit notice; The ballot apparatus for initiating based on ballot initiator's request, is set up and to network delivery network ballot event after obtaining network voting event authorization notification.
16. network voting system as claimed in claim 10 is characterized in that, described ballot service platform comprises: resolution unit, vote information generation unit and storage unit;
Described resolution unit is extracted the identity information among the described identification result with the identification result that publicly-owned secret key decryption identity recognition device produces, and described identity information is sent to the vote information generation unit;
Association store vote information and corresponding identity information in the described storage unit;
Described vote information generation unit is based on the identity information that obtains, and search obtains corresponding vote information from storage unit, and described vote information is sent to described voting terminal.
CN 201110446694 2011-12-27 2011-12-27 Management method for network voting and network voting system Pending CN103186936A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110446694 CN103186936A (en) 2011-12-27 2011-12-27 Management method for network voting and network voting system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110446694 CN103186936A (en) 2011-12-27 2011-12-27 Management method for network voting and network voting system

Publications (1)

Publication Number Publication Date
CN103186936A true CN103186936A (en) 2013-07-03

Family

ID=48678091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110446694 Pending CN103186936A (en) 2011-12-27 2011-12-27 Management method for network voting and network voting system

Country Status (1)

Country Link
CN (1) CN103186936A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104851179A (en) * 2015-05-18 2015-08-19 广西大学 Voting system based on WeChat public platform
CN105117964A (en) * 2015-09-28 2015-12-02 王小安 Shareholder network voting method
CN105225328A (en) * 2015-08-25 2016-01-06 浙江工业大学 Based on mobile terminal electronic voting method and the system of face characteristic identification
CN105490925A (en) * 2015-12-22 2016-04-13 北京奇虎科技有限公司 Verification method and apparatus of information validity
CN107833345A (en) * 2017-11-06 2018-03-23 东信和平科技股份有限公司 A kind of method and system of estate management electronic voting
CN109509289A (en) * 2018-12-11 2019-03-22 广州华多网络科技有限公司 The authority distributing method and device of network voting
CN110400410A (en) * 2019-07-31 2019-11-01 中钞***产业发展有限公司杭州区块链技术研究院 A kind of electronic voting system
CN110555933A (en) * 2019-07-31 2019-12-10 中钞***产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium
CN110675545A (en) * 2018-07-03 2020-01-10 万福资讯股份有限公司 Ticket counting method based on digital currency and block chain ticket counting system
CN110740133A (en) * 2019-10-15 2020-01-31 北京华宇九品科技有限公司 network voting and election method and system based on RTMP protocol

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104851179A (en) * 2015-05-18 2015-08-19 广西大学 Voting system based on WeChat public platform
CN105225328A (en) * 2015-08-25 2016-01-06 浙江工业大学 Based on mobile terminal electronic voting method and the system of face characteristic identification
CN105117964A (en) * 2015-09-28 2015-12-02 王小安 Shareholder network voting method
CN105490925A (en) * 2015-12-22 2016-04-13 北京奇虎科技有限公司 Verification method and apparatus of information validity
CN105490925B (en) * 2015-12-22 2019-07-23 北京奇虎科技有限公司 A kind of verification method and device of effectiveness of information
CN107833345A (en) * 2017-11-06 2018-03-23 东信和平科技股份有限公司 A kind of method and system of estate management electronic voting
CN110675545A (en) * 2018-07-03 2020-01-10 万福资讯股份有限公司 Ticket counting method based on digital currency and block chain ticket counting system
CN109509289A (en) * 2018-12-11 2019-03-22 广州华多网络科技有限公司 The authority distributing method and device of network voting
CN110400410A (en) * 2019-07-31 2019-11-01 中钞***产业发展有限公司杭州区块链技术研究院 A kind of electronic voting system
CN110555933A (en) * 2019-07-31 2019-12-10 中钞***产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium
CN110555933B (en) * 2019-07-31 2021-04-30 中钞***产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium
CN110740133A (en) * 2019-10-15 2020-01-31 北京华宇九品科技有限公司 network voting and election method and system based on RTMP protocol

Similar Documents

Publication Publication Date Title
CN103186936A (en) Management method for network voting and network voting system
CN108270571B (en) Internet of Things identity authorization system and its method based on block chain
CN107257334B (en) Identity authentication method for Hadoop cluster
JP4776245B2 (en) Opinion registration application for universal pervasive transaction framework
WO2018090183A1 (en) Identity authentication method, terminal device, authentication server and electronic device
CN101340436B (en) Method and apparatus implementing remote access control based on portable memory apparatus
WO2017201809A1 (en) Communication method and system for terminal
CN104735065B (en) A kind of data processing method, electronic equipment and server
CN103023911B (en) Trustable network equipment access trustable network authentication method
CN104767731A (en) Identity authentication protection method of Restful mobile transaction system
CN103201998A (en) Data processing for securing local resources in a mobile device
CN101547096B (en) Net-meeting system and management method thereof based on digital certificate
CN109379176B (en) Password leakage resistant authentication and key agreement method
WO2014141263A1 (en) Asymmetric otp authentication system
JPH07325785A (en) Network user identifying method, ciphering communication method, application client and server
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN109347626A (en) A kind of safety identification authentication method with antitracking characteristic
CN108667801A (en) A kind of Internet of Things access identity safety certifying method and system
CN103188212A (en) Security management method and service terminal of electronic wallet, and electronic wallet system
Kyrillidis et al. Distributed e-voting using the smart card web server
CN110035035A (en) A kind of secondary authentication method and system of single-sign-on
Vaziripour et al. Social Authentication for {End-to-End} Encryption
CN113194069B (en) Communication tracing method, communication tracing device and medium based on block chain
CN109522689A (en) Multiple-factor strong identity authentication method under mobile office environment
KR20110016186A (en) The method for preventing changing the authority of information data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C05 Deemed withdrawal (patent law before 1993)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130703