CN106650349B - A kind of pair of identity card uses the safe method being monitored - Google Patents

A kind of pair of identity card uses the safe method being monitored Download PDF

Info

Publication number
CN106650349B
CN106650349B CN201610900037.9A CN201610900037A CN106650349B CN 106650349 B CN106650349 B CN 106650349B CN 201610900037 A CN201610900037 A CN 201610900037A CN 106650349 B CN106650349 B CN 106650349B
Authority
CN
China
Prior art keywords
information
checked
card
service system
identity card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610900037.9A
Other languages
Chinese (zh)
Other versions
CN106650349A (en
Inventor
张磊
孟欣欣
李首峰
陈放
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guozhengtong Technology Co ltd
Original Assignee
Guozhengtong Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guozhengtong Polytron Technologies Inc filed Critical Guozhengtong Polytron Technologies Inc
Priority to CN201610900037.9A priority Critical patent/CN106650349B/en
Publication of CN106650349A publication Critical patent/CN106650349A/en
Application granted granted Critical
Publication of CN106650349B publication Critical patent/CN106650349B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of pair of identity cards to use the safe method being monitored, comprising: S1, confirmation owner identification demonstrate,prove information;Whether S2, confirmation ID card information to be checked are real informations, and then confirm whether ID card information to be checked is the owner identification card information authorized;S3, given time point or user propose demand when, Xiang Shangwei terminal system feed back RT value as owner identification card monitored results.The present invention is realized to veritify other people identity information true and falses, be monitored the case where verifying to the identity information authenticated, in particular point in time or the message informing user for needing to be checked according to user.The present invention makes personal identification data realize safe and secret transmission by distinctive Encryption Algorithm, prevents data from intercepting and capturing brought security risk by hacker when transmitting.

Description

A kind of pair of identity card uses the safe method being monitored
Technical field
The present invention relates to a kind of pair of identity cards to use the safe method being monitored.
Background technique
Currently, with universal and dependence of the people to internet of Internet application, the safety problem of internet is also increasingly It highlights.Rogue program, all kinds of fishing and fraud continue to keep rapid growth, while hacker attack and large-scale personal information are let out Dew event takes place frequently, and increases substantially with various network attacks associated, is the leakage and property loss of a large amount of netizen's personal information It is continuously increased.Once leakage of personal information, will face refuse messages in a steady stream constantly, harassing call again and again, spam paving Canopy, assume another's name to apply for card overdraw debt, case accident very unexpectedly, illegal company come to swindle, pretend to be public security requirement account transfer, hole Illiteracy swindle take advantage of a weak point, the various problems such as account's debt disappears suddenly, personal reputation is ruined for no reason.Personal information is endangered after being revealed Evil is very big, and network company, telecom operators, real estate, infrastructure management company, medical institutions etc. are should most to cause especially to infuse The unit of meaning.
The method for thus safe handling of a kind of pair of identity card being needed to be monitored is right for veritifying the identity information true and false Whether identity information authenticated and authorization is stolen to be verified in real time, is utilized to identity information authenticated and authorization The case where the result notice user that is monitored, and will be checked so that user grasps making for oneself identity information in real time Use situation.
Summary of the invention
The present invention to solve above-mentioned technical problem used by technical solution be to provide a kind of pair of identity card using it is safe into The method of row monitoring, comprising: S1, confirmation owner identification demonstrate,prove information;Whether S2, confirmation ID card information to be checked are real informations, into And confirm whether ID card information to be checked is the owner identification card information authorized;S3, it proposes to need in given time point or in user When asking, Xiang Shangwei terminal system feeds back RT value as owner identification and demonstrate,proves monitored results.
Preferably, S1 is included: S1-1, is obtained owner identification card information using upper terminal system, identifies multiple primary attributes Data;Multiple primary attribute data of acquisition are uploaded to service system by S1-2, upper terminal system;S1-3, by cipher key match Afterwards, whether the multiple primary attribute data of the database authentication of service system whether there is and correspond to each other, if there is simultaneously It corresponds to each other, then returns to correct information to upper terminal system, and demonstrate,prove corresponding data set in the owner identification in the database and add Setting parameter AU=1, parameter RT=0, if there is no or exist and it is not corresponding to each other, then to upper terminal system return mistake Information;Wherein, AU=1 indicates that owner identification card information is the owner identification card information authorized, and RT=0 indicates other current terminals It is 0 that equipment, which is read using the number of the information of the identity card,;
Preferably, S2 includes: S2-1, using one of multiple the next terminal systems networked with service system acquisition body to be checked Part card information, identifies multiple attribute datas to be checked;S2-2, the next terminal system upload multiple attribute datas to be checked of acquisition To service system;S2-3, service system the multiple attribute data to be checked of database authentication whether there is and whether mutually It is corresponding, if there is and correspond to each other, the corresponding data set of the identity card to be checked whether there is parameter AU in the database for judgement =1, if so, identity card to be checked be main identity card, make identity card parameter RT=RT+1 in database, if there is no or Person exists and not corresponding to each other or presence and corresponds to each other but parameter AU=is not present in the corresponding data set of the identity card to be checked 1, then any operation is not executed;S2-4, S2-1 is returned.
Preferably, use and clothes described in owner identification card information, S2-1 are obtained using upper terminal system described in S1-1 It includes: using NFC mode reading identity card that one of multiple the next terminal systems of business systems connection, which obtain ID card information to be checked, Number, by automatic Character Font Recognition technology identify address name, by individual subscriber input educational background, graduated school, graduation time, drive Card information, phone number, E-mail address are sailed, or is inputted using NFC mode reading identity card all information, by individual subscriber Educational background, graduated school, graduation time, driver's license information, phone number, E-mail address.
Preferably, the multiple primary attribute data of S1, the multiple attribute data to be checked of S2 include identity card all information, It is educational background, graduated school, graduation time, driver's license information, phone number, multiple in E-mail address;Multiple attribute datas to be checked It is identical or identical as multiple primary attribute data portions.
Preferably, identify that address name includes: image input by automatic Character Font Recognition technology;Yunnan snub-nosed monkey, packet Include greyscale transformation, image noise reduction, angle correct;Character features extract, comprising: with the black/white points in character area than extracting, The numerical value vector for forming space, is compared;Or after text image graph thinning, the stroke endpoint of word, the number in crosspoint are obtained Amount and position are compared characterized by stroke section;Comparison identification: including being compared using the method for calculating mathematical distance; Words post-processing.
Preferably, the cipher key match in S1-3 includes: upper terminal system to service system request dynamic key, and service is System generates dynamic key and is sent to upper terminal system, and saves the dynamic key in service system;Upper terminal system obtains After obtaining dynamic key, it will need to be sent to the particular encryption algorithm encryption of the data dynamic key of service system, upper terminal The data encrypted are sent to service system by system;After service system receives the upper terminal system data encrypted, service System is encrypted with the data that the Encryption Algorithm in dynamic key saves service system, generates the service system number encrypted According to, it is compared with the upper terminal system data encrypted, it is equal then to authenticate correct, service system deletion dynamic key.
Method of the invention is true letter through the personal information after the logical certification of identity by user authentication personal information Breath can search whether my information has published in internet, pass through sets itself and mention after authorization examination is true It hands over and needs matched attribute data, carry out retrieval matching, matched once retrieving with attribute data, then pushed in real time to user. It realizes and the logical identity information authenticated is monitored the case where verifying, in particular point in time or according to user's need The message informing user that will be checked.The present invention realizes personal identification data safe and secret by distinctive Encryption Algorithm Transmission prevents data from intercepting and capturing brought security risk by hacker when transmitting.
Detailed description of the invention
Fig. 1 is that the present invention uses the safe method flow diagram being monitored to identity card.
Specific embodiment
The present invention is made with detailed description below in conjunction with drawings and examples:
The present invention provides a kind of pair of identity card and uses the safe method being monitored, comprising:
S1, confirmation owner identification demonstrate,prove information, comprising: S1-1, obtain owner identification card information using upper terminal system, identify Multiple primary attribute data;Multiple primary attribute data of acquisition are uploaded to service system by S1-2, upper terminal system;S1-3, warp After crossing cipher key match, whether the multiple primary attribute data of the database authentication of service system whether there is and correspond to each other, If there is and correspond to each other, then to upper terminal system return correct information, and in the database the owner identification demonstrate,prove correspond to Data set add parameter AU=1 (indicating that the identity card is authorized owner identification card to be matched), add parameter RT=0 (it is 0 that other current terminal devices of expression, which are read using the number of the information of the identity card), if there is no or in the presence of not It corresponds to each other, then returns to error message to upper terminal system;
S2, confirmation ID card information to be checked, comprising: S2-1, using the multiple the next terminal systems networked with service system One of obtain ID card information to be checked, identify multiple attribute datas to be checked;S2-2, the next terminal system by acquisition it is multiple to Inspection attribute data uploads to service system;S2-3, service system the multiple attribute data to be checked of database authentication whether deposit And whether correspond to each other, if there is and correspond to each other, the judgement corresponding data set of the identity card to be checked in the database Make identity card parameter RT=RT+1 in database if so, identity card to be checked is main identity card with the presence or absence of parameter AU=1, If there is no or exist and not corresponding to each other or presence and correspond to each other but the corresponding data set of the identity card to be checked There is no parameter AU=1, then do not execute any operation;S2-4, S2-1 is returned;The step cycle executes, and joins when with service system When multiple the next terminal systems of net obtain any ID card information, then the confirmation detection of S2 is carried out, to identify under multiple Whether position terminal system there is the case where authorizing ID card information leakage.Preferably, when confirming that identity card to be checked is main identity card, Make identity card parameter RT=RT+1 in database, while can also record bottom terminal system acquisition in the database should be to The time of ID card information, the geographical location of the bottom terminal system, terminal type and number are examined, the further core of user is convenient for It looks into.
S3, given time point or user propose demand when, Xiang Shangwei terminal system feed back RT value as owner identification card Monitored results, i.e. identity reveal number.The step belongs to interrupt step, can set set time point such as 1 day zero every month When feed back RT value, can also user propose demand when trigger the feedback RT value the step of.Preferably, the bottom can also be fed back Terminal system acquires the time of the ID card information to be checked, the geographical location of the bottom terminal system, terminal type and number, also Data statistics can be done by horizontal axis of the period to RT value, reveal the relationship of number with identity by observing time section, convenient for using Family is further verified.
Preferably, use and clothes described in owner identification card information, S2-1 are obtained using upper terminal system described in S1-1 It includes: using NFC mode reading identity card that one of multiple the next terminal systems of business systems connection, which obtain ID card information to be checked, Number, by automatic Character Font Recognition technology identify address name, by individual subscriber input educational background, graduated school, graduation time, drive Card information, phone number, E-mail address are sailed, or is inputted using NFC mode reading identity card all information, by individual subscriber Educational background, graduated school, graduation time, driver's license information, phone number, E-mail address.Above-mentioned individual subscriber input is used thereafter In matched information can include city of residence, house property information, information of vehicles, Bank Account Number, the Chinese zodiac, constellation according to user demand Deng other it is conceivable that personal attribute information.
Preferably, the multiple primary attribute data of S1, the multiple attribute data to be checked of S2 include identity card all information, It is educational background, graduated school, graduation time, driver's license information, phone number, multiple in E-mail address, it can also include user People input other it is conceivable that personal attribute information;Multiple attribute datas to be checked it is identical as multiple primary attribute data portions or Person is identical.Wherein, primary attribute data are usually the information of identity card, are also possible to ID card information and other information.With Family with sets itself and can submit and need matched attribute data type to be checked and number, carry out retrieval matching, once find certain The attribute data to be checked and required matched attribute data of one the next terminal system identity card obtained all exactly match, Then think identity information leakage.
Preferably, identify that address name includes: image input by automatic Character Font Recognition technology;Yunnan snub-nosed monkey, packet Include greyscale transformation, image noise reduction, angle correct;Character features extract, comprising: with the black/white points in character area than extracting, The numerical value vector for forming space, is compared;Or after text image graph thinning, the stroke endpoint of word, the number in crosspoint are obtained Amount and position are compared characterized by stroke section;Comparison identification: including being compared using the method for calculating mathematical distance; Words post-processing.
Preferably, in comparison identification, Chinese character is identified using profile tracing.
Preferably, the cipher key match in S1-3 includes: upper terminal system to service system request dynamic key, and service is System generates dynamic key and is sent to upper terminal system, and saves the dynamic key in service system;Upper terminal system obtains After obtaining dynamic key, it will need to be sent to the particular encryption algorithm encryption of the data dynamic key of service system, upper terminal The data encrypted are sent to service system by system;After service system receives the upper terminal system data encrypted, service System is encrypted with the data that the Encryption Algorithm in dynamic key saves service system, generates the service system number encrypted According to, it is compared with the upper terminal system data encrypted, it is equal then to authenticate correct, service system deletion dynamic key.
In the preferred embodiment, used automatic Character Font Recognition belongs to pattern-recognition, is divided into following steps: Image input, Yunnan snub-nosed monkey, character features extraction, matching identification, the word correction that will most admit one's mistake through manual synchronizing afterwards, will tie Fruit output, wherein
1. image inputs, including takes pictures and obtain identity card color image.
2. Yunnan snub-nosed monkey: greyscale transformation: since color image information contained amount is excessively huge, the block letter in image It before character carries out identifying processing, needs to carry out greyscale transform process to image, makes image only and include the foreground information of black and white The background information of color promotes the Efficiency and accuracy of identifying processing.Image noise reduction: due to the quality of images to be recognized be limited to it is defeated The printing quality for entering equipment, environment and document before printed character carries out identifying processing in image, needs basis to make an uproar The feature of sound carries out denoising to images to be recognized, promotes the accuracy of identifying processing.Angle correct: due to scanning and shooting Process is related to manual operation, and the images to be recognized for inputting computer more or less can all have some angular deviations, to image Before middle printed character carries out identifying processing, it is necessary to carry out image direction detection, and correct image direction.
3. character features extract: feature extraction is the core of automatic Character Font Recognition, is characterized in the chip of identification, can be divided into two Class: one is the feature of statistics, and such as the black/white points ratio in character area, when text is distinguished into several regions, this is one by one The joint of region black/white points ratio, at a numerical value vector in space.And another category feature is the feature of structure, such as text After image graph thinning, the stroke endpoint of word, the quantity in crosspoint and position are obtained, or characterized by stroke section, it is special to cooperate Comparison method is compared.
4. comparison database: after input text has calculated feature, either with statistics or the feature of structure, there is a comparison Database or property data base are compared, and the content of database includes all word collection texts to be identified, according to input The resulting feature group of the same Feature Extraction Method of text.
In comparison identification, according to different features, different mathematical distance functions is selected, in order to make the knot of identification Fruit is more stable, using the different complementarity of various feature comparison methods, keeps the result confidence identified high.
5. words post-process: due to automatic Character Font Recognition discrimination and be unable to reach absolutely, in order to reinforce comparing Correctness and confidence value, using after comparison identification text and its possible similar candidates sub-block in, according to the identification of front and back Text finds out most logical word, does the function of correcting, i.e. words post-processes, and it includes in automatic Character Font Recognition system.
In the preferred embodiment, comparison identification identifies Chinese character using profile tracing.For the one of a width bianry image The process of bar profile line, profile tracking is: searching in the picture according to sequence from top to bottom, from left to right, first found Then it is adjacent to find its according to certain " tracking criterion " from S point by starting point S of the pixel that a value is 1 as profile line Profile point, until finding all profile points.
Simply " tracking criterion " description are as follows: if current profile point is N, then target point M is found in the 8- neighborhood of N, If the 4- neighborhood point of M is not all target point, otherwise it is not profile point that M, which is profile point,;If M and S are overlapped, then profile with Track terminates, and otherwise continually looks for next point.This algorithm will click through the 4- neighborhood of all the points in each profile point 8- neighborhood Row differentiates that calculation amount is bigger, influences the speed of tracking, the present invention proposes a kind of innovatory algorithm thus.
1) it is searched in character picture according to sequence from top to bottom, from left to right, the pixel that first found value is 1 As the starting point of character profile line, remember that the pixel is P1;2) consideration one is with P1Centered on 3 × 3 templates.It will be each in template Pixel as shown in Figure 1 marking serial numbers be 0~7, checked in order since the pixel of serial number 0 each pixel whether be value be 1 Pixel is 1 the value initially encountered and the pixel of the profile point to have tracked is not set as P2.If being value entirely from 0 to 7 is 0 Pixel, then P1For isolated point, go to 4);3) by P2As template center's pixel, P is searched in the same way3, P4....Such as The result P of fruit searchn=P1, Pn+1=P2, then show P1, P2..., PnFormed a closed loop, stop this profile line with Track.Point range P1, P2..., PnSeek to look for profile line.
4) from P1Set out and searched in the picture according to sequence from top to bottom, from left to right, first found value be 1 and 2) starting point of the profile point as another profile line not on the profile line found, goes to, until can not find new exterior feature Until the starting point of molded line.
This innovatory algorithm not only simplifies the calculating for judging profile point, and can track all profiles of piece image Line.
If the profile characteristic sequence of character is X=x1,x2,…xn, standard character characteristic sequence is Y=y1, y2,…yn, then the related coefficient of two characteristic sequences are as follows:
Wherein, E () indicates desired value;
Related coefficient is a ratio, is not equal Unit-Measures, is not relevant percentage, without organization, generally 2 significant digits are taken to indicate.The sign of related coefficient only indicates relevant direction, the relevant degree of absolute value representation.Cause The measurement of units such as not to be, thus it cannot say that related coefficient 0.7 is 0.35 twice, can only say that related coefficient is 0.7 two column Variable degree of correlation is more closer and higher than the two column variable degrees of correlation that related coefficient is 0.35.It can not say related coefficient From 0.70 to 0.80 with related coefficient from 0.30 to 0.40 as increased degree it is big.Normally, related coefficient and degree of correlation Relationship it is as follows:
Thus, character detected with compared with character calculated result be highly correlated when, judgement identified The character.
In the preferred embodiment, cipher key match includes: terminating layer to authentication layers request dynamic key, and authentication layers generate dynamic State key is sent to client, and saves the dynamic key in authentication layers;After terminating layer obtains dynamic key, it will need to send To the particular encryption algorithm encryption of the data dynamic key of authentication layers, the data encrypted are sent to authentication layers by terminating layer; Authentication layers receive the terminal layer data encrypted, the data that the Encryption Algorithm in authentication layers dynamic key saves authentication layers into Row encryption, generates the certification layer data encrypted, is compared with the terminal layer data encrypted, equal, authenticates success, recognizes It demonstrate,proves layer and deletes dynamic key.
Encryption Algorithm therein is using following specific Encryption Algorithm.
The information of input is handled with 512 groupings, and each grouping is divided into 16 32 seats groupings again, have passed through After a series of processing, the output of algorithm is formed by four 32, will will generate one after this four 32 packet concatenations 128 hashed values.It is filled firstly the need of to information, the result for making its byte length rem to 512 is equal to 448.Therefore, The byte length (Bits Length) of information will be scaled up to N*512+448, i.e. N*64+56 byte (Bytes), and N is one Positive integer.The method of filling is as follows, one 1 and numerous 0 is filled behind information, until meeting condition above Shi Caiting Only with the filling of 0 pair of information.Then one is added behind this result again with the information before the filling of 64 binary representations Length.By the processing of this two step, present information byte length=N*512+448+64=(N+1) * 512, i.e. length is lucky It is 512 integer multiple.Reason for this is that meet the requirement in later process to message length.Claimed there are four 32 Make the numeric parameter of link variable, they are respectively as follows: A=0x01234567, B=0x89abcdef, C=0xfedcba98, D= 0x76543210.After setting this four link variables, the four-wheel loop computation into algorithm is begun to, the number of circulation is The number of 512 information blocks in information.
Four link variables above are copied in four additional variable: A to a, B to b, C to c, D to d.Major cycle has four It takes turns (MD4 only has three-wheel), every wheel circulation is all much like.The first round carries out 16 operations.Operation is to its in a, b, c and d every time In the nonlinear function operation of three works, then by acquired results plus the 4th variable (subgroup in text and One constant).By acquired results, ring moves an indefinite number to the right again, and plus one of a, b, c or d.Finally with the result Replace one of a, b, c or d.
Preferably, the information of input can be handled using 1024 groupings, and each grouping is divided into 32 32 again Subgroup, after have passed through a series of processing, the output of algorithm is formed by four 32, by this four 32 packet concatenations 128 hashed values will be generated afterwards.It is filled firstly the need of to information, the result for making its byte length rem to 512 Equal to 448.Therefore, the byte length of information will be scaled up to N*512+448, i.e. N*64+56 byte, and N is a positive integer. The method of filling is as follows, and one 1 and numerous 0 is filled behind information, just stops with 0 pair when meeting condition above The filling of information.Then one is added behind this result again with the message length before the filling of 64 binary representations.Through The processing of this two step is crossed, present information byte length=N*512+448+64=(N+1) * 512, i.e. length is precisely 512 Integer multiple.Reason for this is that meet the requirement in later process to message length.There are four 32 to be referred to as link The numeric parameter of variable, they are respectively as follows: A=0x01234567, B=0x89abcdef, C=0xfedcba98, D= 0x76543210.This four link variables are set, the four-wheel loop computation of algorithm is initially entered, the number of circulation is in information The number of 512 information blocks.
Four link variables above are copied in four additional variable: A to a, B to b, C to c, D to d.Major cycle has eight Wheel, every wheel circulation are all much like.The first round carries out 16 operations.Operation is primary non-to wherein three works in a, b, c and d every time Then acquired results are added the 4th variable (subgroup and a constant in text) by linear function operation.Again will Ring moves an indefinite number to acquired results to the right, and plus one of a, b, c or d.Finally replaced in a, b, c or d with the result One of.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by anyone skilled in the art, It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of the claim Subject to enclosing.

Claims (6)

1. a kind of pair of identity card uses the safe method being monitored, comprising:
S1, confirmation owner identification demonstrate,prove information;
Whether S2, confirmation ID card information to be checked are real informations, and then confirm whether ID card information to be checked has authorized Owner identification demonstrate,proves information;
S3, given time point or user propose demand when, Xiang Shangwei terminal system feed back RT value as owner identification card monitoring As a result, the RT indicates that other current terminal devices read the number of the information using the identity card, wherein S1 includes:
S1-1, owner identification card information is obtained using upper terminal system, identify multiple primary attribute data;
Multiple primary attribute data of acquisition are uploaded to service system by S1-2, upper terminal system;
S1-3, after cipher key match, the multiple primary attribute data of the database authentication of service system whether there is and be No reciprocal correspondence, if there is and correspond to each other, then correct information is returned to upper terminal system, and in the database in the master The corresponding data set of identity card adds parameter AU=1, parameter RT=0, if there is no or exist and it is not corresponding to each other, then to Upper terminal system returns to error message;Wherein, AU=1 indicates that owner identification card information is the owner identification card information authorized, It is 0 that RT=0, which indicates that other current terminal devices are read using the number of the information of the identity card,.
2. the method as described in claim 1, which is characterized in that S2 includes:
S2-1, ID card information to be checked is obtained using one of multiple the next terminal systems networked with service system, identified more A attribute data to be checked;
Multiple attribute datas to be checked of acquisition are uploaded to service system by S2-2, the next terminal system;
S2-3, service system the multiple attribute data to be checked of database authentication whether there is and whether correspond to each other, such as Fruit exists and corresponds to each other, and the corresponding data set of the identity card to be checked whether there is parameter AU=1 in the database for judgement, if Be, then identity card to be checked be main identity card, make identity card parameter RT=RT+1 in database, if there is no or exist And not corresponding to each other or presence and correspond to each other but parameter AU=1 is not present in the corresponding data set of the identity card to be checked, then not Execute any operation;
S2-4, S2-1 is returned.
3. method according to claim 2, which is characterized in that use upper terminal system described in S1-1 obtains owner identification card ID card information packet to be checked is obtained using one of multiple the next terminal systems with service system networking described in information, S2-1 It includes: identifying address name using NFC mode reading identity card number, by automatic Character Font Recognition technology, inputted by individual subscriber Educational background, graduated school, graduation time, driver's license information, phone number, E-mail address, or use NFC mode reading identity card All information inputs educational background, graduated school, graduation time, driver's license information, phone number, E-mail address by individual subscriber.
4. method as claimed in claim 3, which is characterized in that the multiple owner identification card information of S1, S2 are the multiple to be checked ID card information includes: identity card all information, educational background, graduated school, graduation time, driver's license information, phone number, electronics It is multiple in mailbox;Multiple ID card informations to be checked and multiple owner identifications card message part are identical or identical.
5. the method as described in claim 1, which is characterized in that identify that address name includes: by automatic Character Font Recognition technology Image input;
Yunnan snub-nosed monkey comprising greyscale transformation, image noise reduction, angle correct;
Character features extract, comprising: with the black/white points in character area than extracting, form the numerical value vector in space, compared It is right;Or after text image graph thinning, the stroke endpoint of word, the quantity in crosspoint and position are obtained, characterized by stroke section, into Row compares;
Comparison identification: including being compared using the method for calculating mathematical distance;
Words post-processing.
6. the method as described in claim 1, which is characterized in that the cipher key match in S1-3 includes:
Upper terminal system generates dynamic key and is sent to upper terminal system to service system request dynamic key, service system System, and the dynamic key is saved in service system;
After upper terminal system obtains dynamic key, it will need to be sent to the particular encryption of the data dynamic key of service system The data encrypted are sent to service system by algorithm for encryption, upper terminal system;
After service system receives the upper terminal system data encrypted, the Encryption Algorithm in service system dynamic key is to clothes The data that business system saves are encrypted, and the service system data encrypted are generated, with the upper terminal system data encrypted It is compared, equal then certification is correct, and service system deletes dynamic key.
CN201610900037.9A 2016-10-14 2016-10-14 A kind of pair of identity card uses the safe method being monitored Active CN106650349B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610900037.9A CN106650349B (en) 2016-10-14 2016-10-14 A kind of pair of identity card uses the safe method being monitored

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610900037.9A CN106650349B (en) 2016-10-14 2016-10-14 A kind of pair of identity card uses the safe method being monitored

Publications (2)

Publication Number Publication Date
CN106650349A CN106650349A (en) 2017-05-10
CN106650349B true CN106650349B (en) 2019-06-07

Family

ID=58856917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610900037.9A Active CN106650349B (en) 2016-10-14 2016-10-14 A kind of pair of identity card uses the safe method being monitored

Country Status (1)

Country Link
CN (1) CN106650349B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063463A (en) * 2018-06-26 2018-12-21 上海常仁信息科技有限公司 A kind of robot ID card verification method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136909A (en) * 2006-10-09 2008-03-05 北京国政通网络科技有限公司 Method and system for checking user real identification using communication network
CN103778374A (en) * 2014-02-19 2014-05-07 邹候文 Trusted terminal, double-channel card, anti-cloning chip, chip fingerprint and channel attack resistance method
CN105743883A (en) * 2016-01-21 2016-07-06 兴唐通信科技有限公司 Network application identity attribute acquisition method and network application identity attribute acquisition device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136909A (en) * 2006-10-09 2008-03-05 北京国政通网络科技有限公司 Method and system for checking user real identification using communication network
CN103778374A (en) * 2014-02-19 2014-05-07 邹候文 Trusted terminal, double-channel card, anti-cloning chip, chip fingerprint and channel attack resistance method
CN105743883A (en) * 2016-01-21 2016-07-06 兴唐通信科技有限公司 Network application identity attribute acquisition method and network application identity attribute acquisition device

Also Published As

Publication number Publication date
CN106650349A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
CN112738015B (en) Multi-step attack detection method based on interpretable convolutional neural network CNN and graph detection
CN103856472B (en) A kind of method and device of Account Logon
CN105631272B (en) A kind of identity identifying method of multiple security
Abd Razak et al. Data anonymization using pseudonym system to preserve data privacy
US20140270411A1 (en) Verification of User Photo IDs
CN104823203A (en) Biometric template security and key generation
CN102223233A (en) Biological code authentication system and biological code authentication method
Polakis et al. Faces in the distorting mirror: Revisiting photo-based social authentication
EP4150510A1 (en) System, method and computer program product for mitigating customer onboarding risk
Kwon et al. CCTV-based multi-factor authentication system
CN117115881A (en) Face recognition system based on machine learning
CN113342892A (en) Cloud security data processing method based on block chain node cluster and block chain system
CN106650349B (en) A kind of pair of identity card uses the safe method being monitored
CN112329004A (en) Method and device for face recognition and face password
CN116614251A (en) Data security monitoring system
CN109714253A (en) Terminal data hidden method and system
CN113612748A (en) Authority management method and system based on block chain
CN107742140B (en) Intelligent identity information identification method based on RFID technology
Chang et al. [Retracted] Application of Face Recognition in E‐commerce Security Authentication in the Era of Big Data
CN106156591A (en) A kind of smart phone user Transparent Authentication method under cloud environment
CN106529616A (en) Identity card verifying method
Aguilar Santiago et al. Chaotic Cryptosystem for Selective Encryption of Faces in Photographs
CN117494092B (en) Scenic spot ticket non-inductive verification method, system and medium based on living organism identification
CN106534074A (en) Data completion method through image matching
Haynes Using image steganography to establish covert communication channels

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 100029 Third Floor of Yansha Shengshi Building, 23 North Third Ring Road, Xicheng District, Beijing

Patentee after: GUOZHENGTONG TECHNOLOGY Co.,Ltd.

Address before: 100195 Haidian District, Beijing, 18 apricot Road, No. 1 West Tower, four floor.

Patentee before: GUOZHENGTONG TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address