CN106650349B - A kind of pair of identity card uses the safe method being monitored - Google Patents
A kind of pair of identity card uses the safe method being monitored Download PDFInfo
- Publication number
- CN106650349B CN106650349B CN201610900037.9A CN201610900037A CN106650349B CN 106650349 B CN106650349 B CN 106650349B CN 201610900037 A CN201610900037 A CN 201610900037A CN 106650349 B CN106650349 B CN 106650349B
- Authority
- CN
- China
- Prior art keywords
- information
- checked
- card
- service system
- identity card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of pair of identity cards to use the safe method being monitored, comprising: S1, confirmation owner identification demonstrate,prove information;Whether S2, confirmation ID card information to be checked are real informations, and then confirm whether ID card information to be checked is the owner identification card information authorized;S3, given time point or user propose demand when, Xiang Shangwei terminal system feed back RT value as owner identification card monitored results.The present invention is realized to veritify other people identity information true and falses, be monitored the case where verifying to the identity information authenticated, in particular point in time or the message informing user for needing to be checked according to user.The present invention makes personal identification data realize safe and secret transmission by distinctive Encryption Algorithm, prevents data from intercepting and capturing brought security risk by hacker when transmitting.
Description
Technical field
The present invention relates to a kind of pair of identity cards to use the safe method being monitored.
Background technique
Currently, with universal and dependence of the people to internet of Internet application, the safety problem of internet is also increasingly
It highlights.Rogue program, all kinds of fishing and fraud continue to keep rapid growth, while hacker attack and large-scale personal information are let out
Dew event takes place frequently, and increases substantially with various network attacks associated, is the leakage and property loss of a large amount of netizen's personal information
It is continuously increased.Once leakage of personal information, will face refuse messages in a steady stream constantly, harassing call again and again, spam paving
Canopy, assume another's name to apply for card overdraw debt, case accident very unexpectedly, illegal company come to swindle, pretend to be public security requirement account transfer, hole
Illiteracy swindle take advantage of a weak point, the various problems such as account's debt disappears suddenly, personal reputation is ruined for no reason.Personal information is endangered after being revealed
Evil is very big, and network company, telecom operators, real estate, infrastructure management company, medical institutions etc. are should most to cause especially to infuse
The unit of meaning.
The method for thus safe handling of a kind of pair of identity card being needed to be monitored is right for veritifying the identity information true and false
Whether identity information authenticated and authorization is stolen to be verified in real time, is utilized to identity information authenticated and authorization
The case where the result notice user that is monitored, and will be checked so that user grasps making for oneself identity information in real time
Use situation.
Summary of the invention
The present invention to solve above-mentioned technical problem used by technical solution be to provide a kind of pair of identity card using it is safe into
The method of row monitoring, comprising: S1, confirmation owner identification demonstrate,prove information;Whether S2, confirmation ID card information to be checked are real informations, into
And confirm whether ID card information to be checked is the owner identification card information authorized;S3, it proposes to need in given time point or in user
When asking, Xiang Shangwei terminal system feeds back RT value as owner identification and demonstrate,proves monitored results.
Preferably, S1 is included: S1-1, is obtained owner identification card information using upper terminal system, identifies multiple primary attributes
Data;Multiple primary attribute data of acquisition are uploaded to service system by S1-2, upper terminal system;S1-3, by cipher key match
Afterwards, whether the multiple primary attribute data of the database authentication of service system whether there is and correspond to each other, if there is simultaneously
It corresponds to each other, then returns to correct information to upper terminal system, and demonstrate,prove corresponding data set in the owner identification in the database and add
Setting parameter AU=1, parameter RT=0, if there is no or exist and it is not corresponding to each other, then to upper terminal system return mistake
Information;Wherein, AU=1 indicates that owner identification card information is the owner identification card information authorized, and RT=0 indicates other current terminals
It is 0 that equipment, which is read using the number of the information of the identity card,;
Preferably, S2 includes: S2-1, using one of multiple the next terminal systems networked with service system acquisition body to be checked
Part card information, identifies multiple attribute datas to be checked;S2-2, the next terminal system upload multiple attribute datas to be checked of acquisition
To service system;S2-3, service system the multiple attribute data to be checked of database authentication whether there is and whether mutually
It is corresponding, if there is and correspond to each other, the corresponding data set of the identity card to be checked whether there is parameter AU in the database for judgement
=1, if so, identity card to be checked be main identity card, make identity card parameter RT=RT+1 in database, if there is no or
Person exists and not corresponding to each other or presence and corresponds to each other but parameter AU=is not present in the corresponding data set of the identity card to be checked
1, then any operation is not executed;S2-4, S2-1 is returned.
Preferably, use and clothes described in owner identification card information, S2-1 are obtained using upper terminal system described in S1-1
It includes: using NFC mode reading identity card that one of multiple the next terminal systems of business systems connection, which obtain ID card information to be checked,
Number, by automatic Character Font Recognition technology identify address name, by individual subscriber input educational background, graduated school, graduation time, drive
Card information, phone number, E-mail address are sailed, or is inputted using NFC mode reading identity card all information, by individual subscriber
Educational background, graduated school, graduation time, driver's license information, phone number, E-mail address.
Preferably, the multiple primary attribute data of S1, the multiple attribute data to be checked of S2 include identity card all information,
It is educational background, graduated school, graduation time, driver's license information, phone number, multiple in E-mail address;Multiple attribute datas to be checked
It is identical or identical as multiple primary attribute data portions.
Preferably, identify that address name includes: image input by automatic Character Font Recognition technology;Yunnan snub-nosed monkey, packet
Include greyscale transformation, image noise reduction, angle correct;Character features extract, comprising: with the black/white points in character area than extracting,
The numerical value vector for forming space, is compared;Or after text image graph thinning, the stroke endpoint of word, the number in crosspoint are obtained
Amount and position are compared characterized by stroke section;Comparison identification: including being compared using the method for calculating mathematical distance;
Words post-processing.
Preferably, the cipher key match in S1-3 includes: upper terminal system to service system request dynamic key, and service is
System generates dynamic key and is sent to upper terminal system, and saves the dynamic key in service system;Upper terminal system obtains
After obtaining dynamic key, it will need to be sent to the particular encryption algorithm encryption of the data dynamic key of service system, upper terminal
The data encrypted are sent to service system by system;After service system receives the upper terminal system data encrypted, service
System is encrypted with the data that the Encryption Algorithm in dynamic key saves service system, generates the service system number encrypted
According to, it is compared with the upper terminal system data encrypted, it is equal then to authenticate correct, service system deletion dynamic key.
Method of the invention is true letter through the personal information after the logical certification of identity by user authentication personal information
Breath can search whether my information has published in internet, pass through sets itself and mention after authorization examination is true
It hands over and needs matched attribute data, carry out retrieval matching, matched once retrieving with attribute data, then pushed in real time to user.
It realizes and the logical identity information authenticated is monitored the case where verifying, in particular point in time or according to user's need
The message informing user that will be checked.The present invention realizes personal identification data safe and secret by distinctive Encryption Algorithm
Transmission prevents data from intercepting and capturing brought security risk by hacker when transmitting.
Detailed description of the invention
Fig. 1 is that the present invention uses the safe method flow diagram being monitored to identity card.
Specific embodiment
The present invention is made with detailed description below in conjunction with drawings and examples:
The present invention provides a kind of pair of identity card and uses the safe method being monitored, comprising:
S1, confirmation owner identification demonstrate,prove information, comprising: S1-1, obtain owner identification card information using upper terminal system, identify
Multiple primary attribute data;Multiple primary attribute data of acquisition are uploaded to service system by S1-2, upper terminal system;S1-3, warp
After crossing cipher key match, whether the multiple primary attribute data of the database authentication of service system whether there is and correspond to each other,
If there is and correspond to each other, then to upper terminal system return correct information, and in the database the owner identification demonstrate,prove correspond to
Data set add parameter AU=1 (indicating that the identity card is authorized owner identification card to be matched), add parameter RT=0
(it is 0 that other current terminal devices of expression, which are read using the number of the information of the identity card), if there is no or in the presence of not
It corresponds to each other, then returns to error message to upper terminal system;
S2, confirmation ID card information to be checked, comprising: S2-1, using the multiple the next terminal systems networked with service system
One of obtain ID card information to be checked, identify multiple attribute datas to be checked;S2-2, the next terminal system by acquisition it is multiple to
Inspection attribute data uploads to service system;S2-3, service system the multiple attribute data to be checked of database authentication whether deposit
And whether correspond to each other, if there is and correspond to each other, the judgement corresponding data set of the identity card to be checked in the database
Make identity card parameter RT=RT+1 in database if so, identity card to be checked is main identity card with the presence or absence of parameter AU=1,
If there is no or exist and not corresponding to each other or presence and correspond to each other but the corresponding data set of the identity card to be checked
There is no parameter AU=1, then do not execute any operation;S2-4, S2-1 is returned;The step cycle executes, and joins when with service system
When multiple the next terminal systems of net obtain any ID card information, then the confirmation detection of S2 is carried out, to identify under multiple
Whether position terminal system there is the case where authorizing ID card information leakage.Preferably, when confirming that identity card to be checked is main identity card,
Make identity card parameter RT=RT+1 in database, while can also record bottom terminal system acquisition in the database should be to
The time of ID card information, the geographical location of the bottom terminal system, terminal type and number are examined, the further core of user is convenient for
It looks into.
S3, given time point or user propose demand when, Xiang Shangwei terminal system feed back RT value as owner identification card
Monitored results, i.e. identity reveal number.The step belongs to interrupt step, can set set time point such as 1 day zero every month
When feed back RT value, can also user propose demand when trigger the feedback RT value the step of.Preferably, the bottom can also be fed back
Terminal system acquires the time of the ID card information to be checked, the geographical location of the bottom terminal system, terminal type and number, also
Data statistics can be done by horizontal axis of the period to RT value, reveal the relationship of number with identity by observing time section, convenient for using
Family is further verified.
Preferably, use and clothes described in owner identification card information, S2-1 are obtained using upper terminal system described in S1-1
It includes: using NFC mode reading identity card that one of multiple the next terminal systems of business systems connection, which obtain ID card information to be checked,
Number, by automatic Character Font Recognition technology identify address name, by individual subscriber input educational background, graduated school, graduation time, drive
Card information, phone number, E-mail address are sailed, or is inputted using NFC mode reading identity card all information, by individual subscriber
Educational background, graduated school, graduation time, driver's license information, phone number, E-mail address.Above-mentioned individual subscriber input is used thereafter
In matched information can include city of residence, house property information, information of vehicles, Bank Account Number, the Chinese zodiac, constellation according to user demand
Deng other it is conceivable that personal attribute information.
Preferably, the multiple primary attribute data of S1, the multiple attribute data to be checked of S2 include identity card all information,
It is educational background, graduated school, graduation time, driver's license information, phone number, multiple in E-mail address, it can also include user
People input other it is conceivable that personal attribute information;Multiple attribute datas to be checked it is identical as multiple primary attribute data portions or
Person is identical.Wherein, primary attribute data are usually the information of identity card, are also possible to ID card information and other information.With
Family with sets itself and can submit and need matched attribute data type to be checked and number, carry out retrieval matching, once find certain
The attribute data to be checked and required matched attribute data of one the next terminal system identity card obtained all exactly match,
Then think identity information leakage.
Preferably, identify that address name includes: image input by automatic Character Font Recognition technology;Yunnan snub-nosed monkey, packet
Include greyscale transformation, image noise reduction, angle correct;Character features extract, comprising: with the black/white points in character area than extracting,
The numerical value vector for forming space, is compared;Or after text image graph thinning, the stroke endpoint of word, the number in crosspoint are obtained
Amount and position are compared characterized by stroke section;Comparison identification: including being compared using the method for calculating mathematical distance;
Words post-processing.
Preferably, in comparison identification, Chinese character is identified using profile tracing.
Preferably, the cipher key match in S1-3 includes: upper terminal system to service system request dynamic key, and service is
System generates dynamic key and is sent to upper terminal system, and saves the dynamic key in service system;Upper terminal system obtains
After obtaining dynamic key, it will need to be sent to the particular encryption algorithm encryption of the data dynamic key of service system, upper terminal
The data encrypted are sent to service system by system;After service system receives the upper terminal system data encrypted, service
System is encrypted with the data that the Encryption Algorithm in dynamic key saves service system, generates the service system number encrypted
According to, it is compared with the upper terminal system data encrypted, it is equal then to authenticate correct, service system deletion dynamic key.
In the preferred embodiment, used automatic Character Font Recognition belongs to pattern-recognition, is divided into following steps:
Image input, Yunnan snub-nosed monkey, character features extraction, matching identification, the word correction that will most admit one's mistake through manual synchronizing afterwards, will tie
Fruit output, wherein
1. image inputs, including takes pictures and obtain identity card color image.
2. Yunnan snub-nosed monkey: greyscale transformation: since color image information contained amount is excessively huge, the block letter in image
It before character carries out identifying processing, needs to carry out greyscale transform process to image, makes image only and include the foreground information of black and white
The background information of color promotes the Efficiency and accuracy of identifying processing.Image noise reduction: due to the quality of images to be recognized be limited to it is defeated
The printing quality for entering equipment, environment and document before printed character carries out identifying processing in image, needs basis to make an uproar
The feature of sound carries out denoising to images to be recognized, promotes the accuracy of identifying processing.Angle correct: due to scanning and shooting
Process is related to manual operation, and the images to be recognized for inputting computer more or less can all have some angular deviations, to image
Before middle printed character carries out identifying processing, it is necessary to carry out image direction detection, and correct image direction.
3. character features extract: feature extraction is the core of automatic Character Font Recognition, is characterized in the chip of identification, can be divided into two
Class: one is the feature of statistics, and such as the black/white points ratio in character area, when text is distinguished into several regions, this is one by one
The joint of region black/white points ratio, at a numerical value vector in space.And another category feature is the feature of structure, such as text
After image graph thinning, the stroke endpoint of word, the quantity in crosspoint and position are obtained, or characterized by stroke section, it is special to cooperate
Comparison method is compared.
4. comparison database: after input text has calculated feature, either with statistics or the feature of structure, there is a comparison
Database or property data base are compared, and the content of database includes all word collection texts to be identified, according to input
The resulting feature group of the same Feature Extraction Method of text.
In comparison identification, according to different features, different mathematical distance functions is selected, in order to make the knot of identification
Fruit is more stable, using the different complementarity of various feature comparison methods, keeps the result confidence identified high.
5. words post-process: due to automatic Character Font Recognition discrimination and be unable to reach absolutely, in order to reinforce comparing
Correctness and confidence value, using after comparison identification text and its possible similar candidates sub-block in, according to the identification of front and back
Text finds out most logical word, does the function of correcting, i.e. words post-processes, and it includes in automatic Character Font Recognition system.
In the preferred embodiment, comparison identification identifies Chinese character using profile tracing.For the one of a width bianry image
The process of bar profile line, profile tracking is: searching in the picture according to sequence from top to bottom, from left to right, first found
Then it is adjacent to find its according to certain " tracking criterion " from S point by starting point S of the pixel that a value is 1 as profile line
Profile point, until finding all profile points.
Simply " tracking criterion " description are as follows: if current profile point is N, then target point M is found in the 8- neighborhood of N,
If the 4- neighborhood point of M is not all target point, otherwise it is not profile point that M, which is profile point,;If M and S are overlapped, then profile with
Track terminates, and otherwise continually looks for next point.This algorithm will click through the 4- neighborhood of all the points in each profile point 8- neighborhood
Row differentiates that calculation amount is bigger, influences the speed of tracking, the present invention proposes a kind of innovatory algorithm thus.
1) it is searched in character picture according to sequence from top to bottom, from left to right, the pixel that first found value is 1
As the starting point of character profile line, remember that the pixel is P1;2) consideration one is with P1Centered on 3 × 3 templates.It will be each in template
Pixel as shown in Figure 1 marking serial numbers be 0~7, checked in order since the pixel of serial number 0 each pixel whether be value be 1
Pixel is 1 the value initially encountered and the pixel of the profile point to have tracked is not set as P2.If being value entirely from 0 to 7 is 0
Pixel, then P1For isolated point, go to 4);3) by P2As template center's pixel, P is searched in the same way3, P4....Such as
The result P of fruit searchn=P1, Pn+1=P2, then show P1, P2..., PnFormed a closed loop, stop this profile line with
Track.Point range P1, P2..., PnSeek to look for profile line.
4) from P1Set out and searched in the picture according to sequence from top to bottom, from left to right, first found value be 1 and
2) starting point of the profile point as another profile line not on the profile line found, goes to, until can not find new exterior feature
Until the starting point of molded line.
This innovatory algorithm not only simplifies the calculating for judging profile point, and can track all profiles of piece image
Line.
If the profile characteristic sequence of character is X=x1,x2,…xn, standard character characteristic sequence is Y=y1,
y2,…yn, then the related coefficient of two characteristic sequences are as follows:
Wherein, E () indicates desired value;
Related coefficient is a ratio, is not equal Unit-Measures, is not relevant percentage, without organization, generally
2 significant digits are taken to indicate.The sign of related coefficient only indicates relevant direction, the relevant degree of absolute value representation.Cause
The measurement of units such as not to be, thus it cannot say that related coefficient 0.7 is 0.35 twice, can only say that related coefficient is 0.7 two column
Variable degree of correlation is more closer and higher than the two column variable degrees of correlation that related coefficient is 0.35.It can not say related coefficient
From 0.70 to 0.80 with related coefficient from 0.30 to 0.40 as increased degree it is big.Normally, related coefficient and degree of correlation
Relationship it is as follows:
Thus, character detected with compared with character calculated result be highly correlated when, judgement identified
The character.
In the preferred embodiment, cipher key match includes: terminating layer to authentication layers request dynamic key, and authentication layers generate dynamic
State key is sent to client, and saves the dynamic key in authentication layers;After terminating layer obtains dynamic key, it will need to send
To the particular encryption algorithm encryption of the data dynamic key of authentication layers, the data encrypted are sent to authentication layers by terminating layer;
Authentication layers receive the terminal layer data encrypted, the data that the Encryption Algorithm in authentication layers dynamic key saves authentication layers into
Row encryption, generates the certification layer data encrypted, is compared with the terminal layer data encrypted, equal, authenticates success, recognizes
It demonstrate,proves layer and deletes dynamic key.
Encryption Algorithm therein is using following specific Encryption Algorithm.
The information of input is handled with 512 groupings, and each grouping is divided into 16 32 seats groupings again, have passed through
After a series of processing, the output of algorithm is formed by four 32, will will generate one after this four 32 packet concatenations
128 hashed values.It is filled firstly the need of to information, the result for making its byte length rem to 512 is equal to 448.Therefore,
The byte length (Bits Length) of information will be scaled up to N*512+448, i.e. N*64+56 byte (Bytes), and N is one
Positive integer.The method of filling is as follows, one 1 and numerous 0 is filled behind information, until meeting condition above Shi Caiting
Only with the filling of 0 pair of information.Then one is added behind this result again with the information before the filling of 64 binary representations
Length.By the processing of this two step, present information byte length=N*512+448+64=(N+1) * 512, i.e. length is lucky
It is 512 integer multiple.Reason for this is that meet the requirement in later process to message length.Claimed there are four 32
Make the numeric parameter of link variable, they are respectively as follows: A=0x01234567, B=0x89abcdef, C=0xfedcba98, D=
0x76543210.After setting this four link variables, the four-wheel loop computation into algorithm is begun to, the number of circulation is
The number of 512 information blocks in information.
Four link variables above are copied in four additional variable: A to a, B to b, C to c, D to d.Major cycle has four
It takes turns (MD4 only has three-wheel), every wheel circulation is all much like.The first round carries out 16 operations.Operation is to its in a, b, c and d every time
In the nonlinear function operation of three works, then by acquired results plus the 4th variable (subgroup in text and
One constant).By acquired results, ring moves an indefinite number to the right again, and plus one of a, b, c or d.Finally with the result
Replace one of a, b, c or d.
Preferably, the information of input can be handled using 1024 groupings, and each grouping is divided into 32 32 again
Subgroup, after have passed through a series of processing, the output of algorithm is formed by four 32, by this four 32 packet concatenations
128 hashed values will be generated afterwards.It is filled firstly the need of to information, the result for making its byte length rem to 512
Equal to 448.Therefore, the byte length of information will be scaled up to N*512+448, i.e. N*64+56 byte, and N is a positive integer.
The method of filling is as follows, and one 1 and numerous 0 is filled behind information, just stops with 0 pair when meeting condition above
The filling of information.Then one is added behind this result again with the message length before the filling of 64 binary representations.Through
The processing of this two step is crossed, present information byte length=N*512+448+64=(N+1) * 512, i.e. length is precisely 512
Integer multiple.Reason for this is that meet the requirement in later process to message length.There are four 32 to be referred to as link
The numeric parameter of variable, they are respectively as follows: A=0x01234567, B=0x89abcdef, C=0xfedcba98, D=
0x76543210.This four link variables are set, the four-wheel loop computation of algorithm is initially entered, the number of circulation is in information
The number of 512 information blocks.
Four link variables above are copied in four additional variable: A to a, B to b, C to c, D to d.Major cycle has eight
Wheel, every wheel circulation are all much like.The first round carries out 16 operations.Operation is primary non-to wherein three works in a, b, c and d every time
Then acquired results are added the 4th variable (subgroup and a constant in text) by linear function operation.Again will
Ring moves an indefinite number to acquired results to the right, and plus one of a, b, c or d.Finally replaced in a, b, c or d with the result
One of.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by anyone skilled in the art,
It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of the claim
Subject to enclosing.
Claims (6)
1. a kind of pair of identity card uses the safe method being monitored, comprising:
S1, confirmation owner identification demonstrate,prove information;
Whether S2, confirmation ID card information to be checked are real informations, and then confirm whether ID card information to be checked has authorized
Owner identification demonstrate,proves information;
S3, given time point or user propose demand when, Xiang Shangwei terminal system feed back RT value as owner identification card monitoring
As a result, the RT indicates that other current terminal devices read the number of the information using the identity card, wherein S1 includes:
S1-1, owner identification card information is obtained using upper terminal system, identify multiple primary attribute data;
Multiple primary attribute data of acquisition are uploaded to service system by S1-2, upper terminal system;
S1-3, after cipher key match, the multiple primary attribute data of the database authentication of service system whether there is and be
No reciprocal correspondence, if there is and correspond to each other, then correct information is returned to upper terminal system, and in the database in the master
The corresponding data set of identity card adds parameter AU=1, parameter RT=0, if there is no or exist and it is not corresponding to each other, then to
Upper terminal system returns to error message;Wherein, AU=1 indicates that owner identification card information is the owner identification card information authorized,
It is 0 that RT=0, which indicates that other current terminal devices are read using the number of the information of the identity card,.
2. the method as described in claim 1, which is characterized in that S2 includes:
S2-1, ID card information to be checked is obtained using one of multiple the next terminal systems networked with service system, identified more
A attribute data to be checked;
Multiple attribute datas to be checked of acquisition are uploaded to service system by S2-2, the next terminal system;
S2-3, service system the multiple attribute data to be checked of database authentication whether there is and whether correspond to each other, such as
Fruit exists and corresponds to each other, and the corresponding data set of the identity card to be checked whether there is parameter AU=1 in the database for judgement, if
Be, then identity card to be checked be main identity card, make identity card parameter RT=RT+1 in database, if there is no or exist
And not corresponding to each other or presence and correspond to each other but parameter AU=1 is not present in the corresponding data set of the identity card to be checked, then not
Execute any operation;
S2-4, S2-1 is returned.
3. method according to claim 2, which is characterized in that use upper terminal system described in S1-1 obtains owner identification card
ID card information packet to be checked is obtained using one of multiple the next terminal systems with service system networking described in information, S2-1
It includes: identifying address name using NFC mode reading identity card number, by automatic Character Font Recognition technology, inputted by individual subscriber
Educational background, graduated school, graduation time, driver's license information, phone number, E-mail address, or use NFC mode reading identity card
All information inputs educational background, graduated school, graduation time, driver's license information, phone number, E-mail address by individual subscriber.
4. method as claimed in claim 3, which is characterized in that the multiple owner identification card information of S1, S2 are the multiple to be checked
ID card information includes: identity card all information, educational background, graduated school, graduation time, driver's license information, phone number, electronics
It is multiple in mailbox;Multiple ID card informations to be checked and multiple owner identifications card message part are identical or identical.
5. the method as described in claim 1, which is characterized in that identify that address name includes: by automatic Character Font Recognition technology
Image input;
Yunnan snub-nosed monkey comprising greyscale transformation, image noise reduction, angle correct;
Character features extract, comprising: with the black/white points in character area than extracting, form the numerical value vector in space, compared
It is right;Or after text image graph thinning, the stroke endpoint of word, the quantity in crosspoint and position are obtained, characterized by stroke section, into
Row compares;
Comparison identification: including being compared using the method for calculating mathematical distance;
Words post-processing.
6. the method as described in claim 1, which is characterized in that the cipher key match in S1-3 includes:
Upper terminal system generates dynamic key and is sent to upper terminal system to service system request dynamic key, service system
System, and the dynamic key is saved in service system;
After upper terminal system obtains dynamic key, it will need to be sent to the particular encryption of the data dynamic key of service system
The data encrypted are sent to service system by algorithm for encryption, upper terminal system;
After service system receives the upper terminal system data encrypted, the Encryption Algorithm in service system dynamic key is to clothes
The data that business system saves are encrypted, and the service system data encrypted are generated, with the upper terminal system data encrypted
It is compared, equal then certification is correct, and service system deletes dynamic key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610900037.9A CN106650349B (en) | 2016-10-14 | 2016-10-14 | A kind of pair of identity card uses the safe method being monitored |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610900037.9A CN106650349B (en) | 2016-10-14 | 2016-10-14 | A kind of pair of identity card uses the safe method being monitored |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106650349A CN106650349A (en) | 2017-05-10 |
CN106650349B true CN106650349B (en) | 2019-06-07 |
Family
ID=58856917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610900037.9A Active CN106650349B (en) | 2016-10-14 | 2016-10-14 | A kind of pair of identity card uses the safe method being monitored |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106650349B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109063463A (en) * | 2018-06-26 | 2018-12-21 | 上海常仁信息科技有限公司 | A kind of robot ID card verification method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101136909A (en) * | 2006-10-09 | 2008-03-05 | 北京国政通网络科技有限公司 | Method and system for checking user real identification using communication network |
CN103778374A (en) * | 2014-02-19 | 2014-05-07 | 邹候文 | Trusted terminal, double-channel card, anti-cloning chip, chip fingerprint and channel attack resistance method |
CN105743883A (en) * | 2016-01-21 | 2016-07-06 | 兴唐通信科技有限公司 | Network application identity attribute acquisition method and network application identity attribute acquisition device |
-
2016
- 2016-10-14 CN CN201610900037.9A patent/CN106650349B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101136909A (en) * | 2006-10-09 | 2008-03-05 | 北京国政通网络科技有限公司 | Method and system for checking user real identification using communication network |
CN103778374A (en) * | 2014-02-19 | 2014-05-07 | 邹候文 | Trusted terminal, double-channel card, anti-cloning chip, chip fingerprint and channel attack resistance method |
CN105743883A (en) * | 2016-01-21 | 2016-07-06 | 兴唐通信科技有限公司 | Network application identity attribute acquisition method and network application identity attribute acquisition device |
Also Published As
Publication number | Publication date |
---|---|
CN106650349A (en) | 2017-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112738015B (en) | Multi-step attack detection method based on interpretable convolutional neural network CNN and graph detection | |
CN103856472B (en) | A kind of method and device of Account Logon | |
CN105631272B (en) | A kind of identity identifying method of multiple security | |
Abd Razak et al. | Data anonymization using pseudonym system to preserve data privacy | |
US20140270411A1 (en) | Verification of User Photo IDs | |
CN104823203A (en) | Biometric template security and key generation | |
CN102223233A (en) | Biological code authentication system and biological code authentication method | |
Polakis et al. | Faces in the distorting mirror: Revisiting photo-based social authentication | |
EP4150510A1 (en) | System, method and computer program product for mitigating customer onboarding risk | |
Kwon et al. | CCTV-based multi-factor authentication system | |
CN117115881A (en) | Face recognition system based on machine learning | |
CN113342892A (en) | Cloud security data processing method based on block chain node cluster and block chain system | |
CN106650349B (en) | A kind of pair of identity card uses the safe method being monitored | |
CN112329004A (en) | Method and device for face recognition and face password | |
CN116614251A (en) | Data security monitoring system | |
CN109714253A (en) | Terminal data hidden method and system | |
CN113612748A (en) | Authority management method and system based on block chain | |
CN107742140B (en) | Intelligent identity information identification method based on RFID technology | |
Chang et al. | [Retracted] Application of Face Recognition in E‐commerce Security Authentication in the Era of Big Data | |
CN106156591A (en) | A kind of smart phone user Transparent Authentication method under cloud environment | |
CN106529616A (en) | Identity card verifying method | |
Aguilar Santiago et al. | Chaotic Cryptosystem for Selective Encryption of Faces in Photographs | |
CN117494092B (en) | Scenic spot ticket non-inductive verification method, system and medium based on living organism identification | |
CN106534074A (en) | Data completion method through image matching | |
Haynes | Using image steganography to establish covert communication channels |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 100029 Third Floor of Yansha Shengshi Building, 23 North Third Ring Road, Xicheng District, Beijing Patentee after: GUOZHENGTONG TECHNOLOGY Co.,Ltd. Address before: 100195 Haidian District, Beijing, 18 apricot Road, No. 1 West Tower, four floor. Patentee before: GUOZHENGTONG TECHNOLOGY Co.,Ltd. |
|
CP03 | Change of name, title or address |