Movatterモバイル変換


[0]ホーム

URL:


CN110401542A - Electronic identity voucher generation method, terminal and server - Google Patents

Electronic identity voucher generation method, terminal and server
Download PDF

Info

Publication number
CN110401542A
CN110401542ACN201910716878.8ACN201910716878ACN110401542ACN 110401542 ACN110401542 ACN 110401542ACN 201910716878 ACN201910716878 ACN 201910716878ACN 110401542 ACN110401542 ACN 110401542A
Authority
CN
China
Prior art keywords
information
identity
card
electronic identity
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910716878.8A
Other languages
Chinese (zh)
Inventor
郭晓逢
刘刚
许金浓
郭晓加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBCfiledCriticalIndustrial and Commercial Bank of China Ltd ICBC
Priority to CN201910716878.8ApriorityCriticalpatent/CN110401542A/en
Publication of CN110401542ApublicationCriticalpatent/CN110401542A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

A kind of electronic identity voucher generation method provided by the invention, terminal and server, electronic identity voucher is obtained by all information factors in encryption message, each information factor is encrypted according to an identity information, and the cipher mode of at least two information factors is different, and then one side encryption rule is complicated, it is not easy to be stolen, on the other hand, using register user's typing authentication code and biological information as key, when needing to transfer electronic identity voucher, it needs to decrypt using authentication code and biological information, strengthen the safety of electronic identity voucher.

Description

Electronic identity voucher generation method, terminal and server
Technical field
The present invention relates to electronic certificate fields, more particularly to a kind of electronic identity voucher generation method, terminal and clothesBusiness device.
Background technique
It is continued to develop with trend is changed on service line, such as credit card obtains fraud wind severe outside visitor's field face on lineDanger, also there is an urgent need to identity authentication means on the line of more safe and convenient, and it is crucial effectively to strengthen client identity and wish confirmation etc.The authenticity management of link, it is ensured that service security, efficient operation.Pass through the authentication means of more safe and convenient, Business StreamJourney design will more simplify, and the safety of business handling and convenience are promoted.By the authentication of more safe and convenientMeans preferably meet the financial service demand of mobile interchange epoch client, further promote customer service experience.
Summary of the invention
At least one of to solve the above-mentioned problems, the application provides a kind of electronic identity voucher generation method, comprising:
The encryption message that terminal is sent is received, the encryption message includes multiple information factors, and each information factor passes throughEncryption formation is carried out to the identity information of registration user, and the cipher mode of at least two information factors is different, it is describedIdentity information includes ID card information;
The encryption message is decrypted, each information factor is obtained;
Electronic identity voucher is generated according to all information factors, and using the authentication code and biological characteristic of registration user's typingInformation stores the electronic identity as key encryption.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effectivePhase, finger print information and identity card DN code, and/or,
The biological information to be formed by encoding to facial image progress base64.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
The ID card information is authenticated, determines whether the ID card information is correct;And/or
Further include:
Receive the authentication code of registration user's typing.
In certain embodiments, the identity information further includes reserved customer information.
In certain embodiments, a kind of electronic identity voucher generation method, comprising:
Multiple identity informations of registration user are obtained, the identity information includes ID card information;
The information factor that encryption forms corresponding number is carried out to each identity information using at least one cipher mode;
The information factor is packaged as encryption message and is sent to server, so that the server is to the encryption messageIt is decrypted to obtain each information factor, and then generates electronic identity voucher according to all information factors, wherein the electronics bodyPart voucher is encrypted using the authentication code and biological information of registration user's typing as key.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effectivePhase, finger print information and identity card DN code;And/or the biological information is by carrying out base64 coding to facial imageIt is formed.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
The authentication code of typing registration user.
In certain embodiments, the identity information further includes reserved customer information.
The application also provides a kind of for generating the server of electronic identity voucher, comprising:
Message receiving module is encrypted, the encryption message that terminal is sent is received, the encryption message includes multiple information factors,Each information factor carries out encryption formation by an identity information to registration user, and at least two information factors plusClose mode is different, and the identity information includes ID card information;
Deciphering module is decrypted the encryption message, obtains each information factor;
Electronic identity voucher generation module generates electronic identity voucher according to all information factors, and using registration userThe authentication code and biological information of typing store the electronic identity as key encryption.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effectivePhase, finger print information and identity card DN code, and/or,
The biological information to be formed by encoding to facial image progress base64.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
Just whether ID card information authentication module authenticates the ID card information, determine the ID card informationReally;And/or
Further include:
Authentication code receiving module receives the authentication code of registration user's typing.
In certain embodiments, the identity information further includes reserved customer information.
The application also provides a kind of for generating the terminal of electronic identity voucher, comprising:
Identity information acquisition module, obtains multiple identity informations of registration user, and the identity information includes identity card letterBreath;
Encrypting module carries out the information that encryption forms corresponding number to each identity information using at least one cipher modeThe factor;
Message sending module is encrypted, the information factor is packaged as encryption message and is sent to server, so that the clothesBusiness device is decrypted to obtain each information factor to the encryption message, so according to all information factors generation electronic identity withCard, wherein the electronic identity voucher is encrypted using the authentication code and biological information of registration user's typing as key.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effectivePhase, finger print information and identity card DN code;And/or the biological information is by carrying out base64 coding to facial imageIt is formed.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
Authentication code recording module, authentication code described in typing.
In certain embodiments, the identity information further includes reserved customer information.
The application also provides a kind of computer equipment, including memory, processor and storage on a memory and can locatedThe step of computer program run on reason device, the processor realizes method as described above when executing described program.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer programThe step of method as described above is realized when being executed by processor.
The invention has the following beneficial effects:
A kind of electronic identity voucher generation method, terminal and server provided by the invention pass through the institute in encryption messageThere is the information factor to obtain electronic identity voucher, each information factor is encrypted according to an identity information, and at leastThe cipher mode of two information factors is different, and then one side encryption rule is complicated, is not easy to be stolen, on the other hand, with registrationThe authentication code and biological information of user's typing are as key, when needing to transfer electronic identity voucher, need using certificationCode and biological information decryption, strengthen the safety of electronic identity voucher.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show belowThere is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only thisSome embodiments of invention for those of ordinary skill in the art without creative efforts, can be withIt obtains other drawings based on these drawings.
Fig. 1 shows credible electronic identity authentication system structure diagram in the application.
Fig. 2 shows a kind of electronic identity voucher generation method flow diagrams that terminal in the application executes.
Fig. 3 shows a kind of electronic identity voucher generation method flow diagram that server executes in the application.
Fig. 4 shows terminal structure schematic diagram in the application.
Fig. 5 shows server architecture schematic diagram in the application.
Fig. 6 is shown in the application to the encryption schematic diagram of field format encryption.
Fig. 7 shows the structural schematic diagram for being suitable for the computer equipment for being used to realize the embodiment of the present application.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, completeSite preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based onEmbodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every otherEmbodiment shall fall within the protection scope of the present invention.
Fig. 1 shows a kind of credible electronic identity authentication system comprising terminal 1 and server 5.
Terminal 1 and external information collecting device, such as fingerprint capturer, identity card recognizer 2, recognition of face device etc. are evenIt connects, available identity information, such as the address name, user's gender, certificate card number, the certificate that obtain from identity card are effectivePhase, identity card DN code, the finger print information etc. acquired by fingerprint capturer.
Terminal is responsible for carrying out above-mentioned identity information encryption formation encryption message, and encryption message is then sent to serviceDevice, so that server generates electronic identity voucher according to all information factors in encryption message.
It in the embodiment in figure 1, can also include for the storage server 4 of storage, for Ministry of Public Security's authenticationThe authentication server 3 of 8 requests verification of platform, carries out sign test server 7 of signature verification etc..
Further, ciphering process can not execute in server, can execute solution by the encryption equipment being separately providedClose, this will not be repeated here.
Since the above- mentioned information factor is uniquely, according to preset generating algorithm, to can be generated with uniquenessElectronic identity voucher.
Fig. 2 shows the electronic identity voucher generation methods that the application terminal is implemented, and specifically include:
S11: multiple identity informations of registration user are obtained, the identity information includes ID card information;
S12: the information factor that encryption forms corresponding number is carried out to each identity information using at least one cipher mode;
S13: the information factor is packaged as encryption message and is sent to server, so that the server is to the encryptionMessage is decrypted to obtain each information factor, and then generates electronic identity voucher according to all information factors, wherein the electricitySub- identity documents are encrypted using the authentication code and biological information of registration user's typing as key.
It is appreciated that a kind of electronic identity voucher generation method provided by the invention implemented by terminal, is reported by encryptionAll information factors in text obtain electronic identity voucher, and each information factor is encrypted according to an identity information,And the cipher mode of at least two information factors is different, and then one side encryption rule is complicated, is not easy to be stolen, another partyFace is needed when needing to transfer electronic identity voucher using the authentication code and biological information of registering user's typing as keyIt is decrypted using authentication code and biological information, strengthens the safety of electronic identity voucher.
It describes in detail below to electronic identity voucher generation method.
It is appreciated that DN code is the unique identification of identity card, if a citizen possesses multiple identity cards, every identity cardDN code is also all different.
Terminal is encrypted using a variety of cipher modes, specifically, first by all identity informations according to format classification intoRow classification, is then normalized the identity information of classification, uses to the other identity information of every type after normalizationA kind of cipher mode is encrypted.Specifically, being encrypted using information of the dynamic encryption to number format, using following encryptionsThe information of field format is encrypted.
As shown in fig. 6, be illustrated below one specifically the cipher mode to field format data by way of example, it will be appreciated thatFollowing Encryption Algorithm cannot be considered as the limitation to the application Encryption Algorithm.
S71: original field data 1, original field data 2, original field data 3 to original field data N are to encryptInformation field, N represents one or more, and system can calculate the specific value of N automatically.
For a certain original field data N, one of customized set of algorithms M algorithm can be used, it is encrypted.Symmetry algorithm and asymmetric arithmetic can be used in set of algorithms M.Symmetry algorithm includes 3DES, SM4, AES etc., and the key of every kind of algorithm canAccording to configuration requirement by the second, point, when, day, week, the moon, year different cycles carry out dynamic update, asymmetric arithmetic includes SM2, RSADeng.System is that each field N selects a kind of Encryption Algorithm, and generating algorithm sequence from set of algorithms M according to the specific value of NK1K2K3...Kn, Kn indicate a kind of Encryption Algorithm, and sequence of algorithms K1K2K3...Kn is encrypted using national secret algorithm SM4, closeKey supports dynamic to update.The key of above-mentioned symmetry algorithm is always consistent in terminal and server.
S72: by previous step rule, system to original field data 1, original field data 2, original field data 3 toOriginal field data N is encrypted according to the algorithm that sequence of algorithms K1K2K3...Kn chooses, to sequence of algorithms K1K2K3...KnIt is encrypted.Ciphertext L is spliced into using list separator between data, and list separator is customized character visible or can in systemSee character string.
After each field data completes encryption, electronic identity voucher terminal sends to electronic identity voucher server and instructs, and makesPrivate key is generated in electronic identity voucher server with asymmetric SM2 national secret algorithm, and corresponding public key is returned into electronic identityVoucher terminal.The public and private key that asymmetric SM2 national secret algorithm generates to can press the second, point, when, day, week, the moon, year different cycles it is dynamicState updates.Ciphertext L is encrypted to ciphertext X using the public key that asymmetric SM2 national secret algorithm generates.
S73: carrying out base64 coding to ciphertext X, at the same after base64 coding the front F of bit string, middle part Y or afterThe out-of-order character of portion B supplement safety, safety random ordering character is consistent with the character visible range that base64 is encoded, safety random ordering characterQuantity is 12 multiple, and the out-of-order character string system of the safety of front F, middle part Y or rear portion B can be defined and combine, and according toSystem ultimately produces base64 encoded information format message and is sent.
In some embodiments, the biological information to be formed by encoding to facial image progress base64.
In addition, in certain embodiments, the electronic identity voucher is two dimensional code mark.
Further, the above method further include: the authentication code of typing registration user.
Authentication code is the identifying code of user's typing, and the application is added by combining biological information with authentication codeClose decryption, and then identifying code and biological information acquisition electronic certificate are needed while inputting, improve the safety of electronic certificateProperty.
In certain embodiments, above-mentioned identity information further includes reserved customer information.
By taking banking system as an example, customer information includes existing customer's number, cell-phone number of client etc..
In addition, the above method further includes the steps that authentication: according to the DN code, being transferred from the server of public security departmentCorresponding authentication information is compared with the identity information of reading, if unanimously, authentication passes through.
Fig. 3 shows a kind of electronic identity voucher generation method by server implementation, comprising:
S21: the encryption message that terminal is sent is received, the encryption message includes multiple information factors, each information factorEncryption formation is carried out by an identity information to registration user, and the cipher mode of at least two information factors is different,The identity information includes ID card information;
S22: the encryption message is decrypted, each information factor is obtained;
S23: electronic identity voucher is generated according to all information factors, and using the authentication code and biology of registration user's typingCharacteristic information stores the electronic identity as key encryption.
It is appreciated that a kind of electronic identity voucher generation method provided by the invention implemented by terminal, is reported by encryptionAll information factors in text obtain electronic identity voucher, and each information factor is encrypted according to an identity information,And the cipher mode of at least two information factors is different, and then one side encryption rule is complicated, is not easy to be stolen, another partyFace is needed when needing to transfer electronic identity voucher using the authentication code and biological information of registering user's typing as keyIt is decrypted using authentication code and biological information, strengthens the safety of electronic identity voucher.
It is appreciated that be based on identical inventive concept, in some embodiments, the ID card information include: address name,User's gender, certificate card number, certificate validity period, finger print information and identity card DN code.
Based on identical inventive concept, in some embodiments, the biological information is by carrying out facial imageBase64 encodes to be formed.
Based on identical inventive concept, in some embodiments, the electronic identity voucher is two dimensional code mark.
Based on identical inventive concept, in some embodiments, further includes:
The ID card information is authenticated, determines whether the ID card information is correct.
Authentication information is transferred from public security server by DN code in the embodiment to be authenticated.
Based on identical inventive concept, in some embodiments, further includes:
Receive the authentication code of registration user's typing.
Authentication code is the customized identifying code of user, can be existed in a manner of 6 bit digitals or 8 bit digitals etc..
In the embodiment of the present application, client can be new client or frequent customer, and frequent customer is stored with corresponding in systemsIdentity information, such as fingerprint, face feature and identity card etc..
Terminal and server is described in detail below.
Fig. 4 shows the virtual architecture schematic diagram of terminal, specifically includes: identity information acquisition module 11, obtains registration and usesMultiple identity informations at family, the identity information include ID card information;Encrypting module 12, using at least one cipher mode pairEach identity information carries out the information factor that encryption forms corresponding number;Message sending module 13 is encrypted, by the information factorBe packaged as encryption message and be sent to server so that the server to the encryption message be decrypted to obtain each information becauseSon, and then electronic identity voucher is generated according to all information factors, wherein the electronic identity voucher is using registration user's typingAuthentication code and biological information as key encrypt.
In some embodiments, terminal and external information collecting device, for example, fingerprint capturer, identity card recognizer,The connection such as recognition of face device.
Based on identical inventive concept, in an embodiment, the ID card information includes: address name, user's gender, cardPart card number, certificate validity period, finger print information and identity card DN code;And/or the biological information passes through to facial imageBase64 is carried out to encode to be formed.
Based on identical inventive concept, in an embodiment, the electronic identity voucher is two dimensional code mark.
Based on identical inventive concept, in an embodiment, terminal further include:
Authentication code recording module, authentication code described in typing.
Based on identical inventive concept, in an embodiment, the identity information further includes reserved customer information.
Fig. 5 shows the concrete structure schematic diagram of server, as shown in figure 5, comprising: encrypt message receiving module 21,The encryption message that terminal is sent is received, the encryption message includes multiple information factors, and each information factor is by using registrationOne identity information at family carries out encryption formation, and the cipher mode of at least two information factors is different, the identity informationIncluding ID card information;Deciphering module 22 is decrypted the encryption message, obtains each information factor;Electronic identity withGeneration module 23 is demonstrate,proved, generates electronic identity voucher according to all information factors, and using the authentication code of registration user's typing and lifeObject characteristic information stores the electronic identity as key encryption.
It is appreciated that server provided by the present application, obtains electronic identity by all information factors in encryption messageVoucher, each information factor are encrypted according to an identity information, and the cipher mode of at least two information factorsDifference, and then one side encryption rule is complicated, is not easy to be stolen, on the other hand, to register the authentication code and biology of user's typingCharacteristic information is as key, when needing to transfer electronic identity voucher, needs to decrypt using authentication code and biological information, addThe strong safety of electronic identity voucher.
Based on identical inventive concept, the ID card information includes: address name, user's gender, certificate card number, certificateValidity period, finger print information and identity card DN code, and/or, the biological information is by carrying out base64 to facial imageCoding is formed.
The electronic identity voucher is two dimensional code mark.
Based on identical inventive concept, further includes:
Just whether ID card information authentication module authenticates the ID card information, determine the ID card informationReally;And/or, further includes:
Authentication code receiving module receives the authentication code of registration user's typing.
Based on identical inventive concept, the identity information further includes reserved customer information.
The generation scene and application scenarios of electronic certificate is illustrated below.
Step S501: when client's arrival bank outlets' sales counter handles registration electronic certificate business, terminal is initiated to read two generation bodiesThe instruction of part card information, client pass through the credible 2 brush China second-generation identity card of card-reading apparatus in cabinet face outside sales counter, and service terminal takes DNAfter the second-generation identification card informations such as code, customer name, identification card number and fingerprint, pass through encryption and generate message, then by dataServer is sent to be handled.
Step S502: server receives the data of terminal request, is analyzed and processed to message, is carried out according to type of messageProcessing.If client is new client, the corresponding customer number of new client is generated, terminal sends the finger of typing electronic certificate authentication codeIt enables, client is passed through by code keyboard typing double probate code, system veritification, client's success typing authentication code.
Step S503 terminal calls portrait living body control, and system obtains qualified facial image and is used for recognition of face, and rightIt carries out base64 coding, while by facial image, Client handset number and the electronic certificate authentication code related data after coding intoRow processing, and it is sent to server, server network handles data, then transmits data to private server 3, Special clothesBusiness device 3 transmits data to Ministry of Public Security's identity authentication platform 8 by network special line and is verified, and verifies successful result original road and returnsReturn to terminal.If client is registered to cross electronic certificate, 5 electronic certificate message processing module 53 of application server is remembered according to systemRecord prompts the actual conditions of client enrollment electronic certificate.If user, there are multiple identity cards, system judges that certificate validity period originatesWhether date or date of expiry are less than the validity period in system in the customer information, such as less than, it is desirable that and client holds new certificate acquiring,Or it is handled again after the customer information of more new system.
Step S504: terminal receives unsuccessful verification as a result, registration electronic certificate success, application server 5 compile clientNumber, the information such as electronic certificate, customer name, passport NO., fingerprint and transaction code be sent to storage server 4 and saved,Wherein, be related to the sensitive datas such as electronic certificate, customer name, passport NO., fingerprint by encryption equipment encryption and decryption handle after again intoRow saves.
The scene that client uses electronic certificate is illustrated below.
Step S701: client reaches bank outlets' sales counter, and the mobile device of installation Mobile banking app shows that client nets card twoIt ties up code (electronic certificate), the service terminal that channel accesses 1 site cabinet face 11 reads net card two dimensional code using scanning means, passes through peopleAs living body control shooting facial image photo, and base64 coding is carried out, passes through code keyboard input authentication code, sets of relational dataDress is message, is sent to application server 5.
Step S702: application server 5 splits message, sends the data to encryption equipment 5 and carries out data encrypting and decipheringProcessing splits type of message, customer name, identification card number, certificate validity period, the facial image of base64 coding, base64 volumeFinger print information, Client handset number, net card authentication code, the net of code demonstrate,prove the data of information and each field of transaction code, and request is authenticatedData be sent to sign test server 7 and sign, service-specific is sent by application server 5 by the data after signatureDevice, then Ministry of Public Security's identity authentication platform 8 is accessed by network special line and is verified.Application server 5 receives the verification knot returnedFruit transmits data to sign test server 7 and carries out sign test processing, after the encrypted machine of the data of return encrypts, is saved in storage clothesBusiness device 4, the customer information and Transaction Information of former message are also needed through encryption equipment encrypting storing.Application server 5 is by authentication resultReturn to site service terminal.
Step S703: terminal receive net identification card as a result, system is automatically performed the process of transfer transactions, winding-up.
It is appreciated that the application can simplify bank transaction process, access unified management by all kinds of means is realized, verification process canTo form complete business handling chain of evidence electronic record, powerful measure is provided for verification, retrospect, proof client's actual wishes.The problem of can effectively solve bank client identification safety authentication realizes client in the case where not carrying China second-generation identity card mediumIt also can be the bank safety transacting business the problem of.During banking is handled, reduction and the cumbersome interactive step of client are mentionedRise customer service experience, raising efficiency.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer equipment, specifically, computer is setIt is standby for example can for personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant,Media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipmentIn any equipment combination.
Computer equipment specifically includes memory, processor and storage on a memory simultaneously in a typical exampleThe computer program that can be run on a processor is realized when the processor executes described program and is held as described above by clientCapable method, alternatively, the processor realizes the method executed as described above by server when executing described program.
Below with reference to Fig. 7, it illustrates the structural schematic diagrams for the computer equipment for being suitable for being used to realize the embodiment of the present application.
As shown in fig. 7, computer equipment 600 includes central processing unit (CPU) 601, it can be read-only according to being stored inProgram in memory (ROM) 602 is loaded into random access storage device (RAM) from storage section 608) program in 603And execute various work appropriate and processing.In RAM603, also it is stored with system 600 and operates required various program sum numbersAccording to.CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected toBus 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathodeThe output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.;And including such as LAN card, the communications portion 609 of the network interface card of modem etc..Communications portion 609 via such as becauseThe network of spy's net executes communication process.Driver 610 is also connected to I/O interface 606 as needed.Detachable media 611, such asDisk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereonComputer program be mounted as needed such as storage section 608.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart descriptionSoftware program.For example, the embodiment of the present invention includes a kind of computer program product comprising be tangibly embodied in machine readableComputer program on medium, the computer program include the program code for method shown in execution flow chart.At thisIn the embodiment of sample, which can be downloaded and installed from network by communications portion 609, and/or from removableMedium 611 is unloaded to be mounted.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any methodOr technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), movesState random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasableProgrammable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devicesOr any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculatesMachine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing thisThe function of each unit can be realized in the same or multiple software and or hardware when application.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program productFigure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructionsThe combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programsInstruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produceA raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for realThe device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spyDetermine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram orThe function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that countingSeries of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer orThe instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram oneThe step of function of being specified in a box or multiple boxes.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludabilityIt include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrapInclude other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic wantElement.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described wantThere is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the applicationForm.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program codeThe shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as programModule.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, groupPart, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, byTask is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be withIn the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodimentDividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system realityFor applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the methodPart explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the artFor, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equalReplacement, improvement etc., should be included within the scope of the claims of this application.

Claims (22)

CN201910716878.8A2019-08-052019-08-05Electronic identity voucher generation method, terminal and serverPendingCN110401542A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910716878.8ACN110401542A (en)2019-08-052019-08-05Electronic identity voucher generation method, terminal and server

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910716878.8ACN110401542A (en)2019-08-052019-08-05Electronic identity voucher generation method, terminal and server

Publications (1)

Publication NumberPublication Date
CN110401542Atrue CN110401542A (en)2019-11-01

Family

ID=68327431

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910716878.8APendingCN110401542A (en)2019-08-052019-08-05Electronic identity voucher generation method, terminal and server

Country Status (1)

CountryLink
CN (1)CN110401542A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110955858A (en)*2019-11-122020-04-03广州大白互联网科技有限公司Information management method of network license platform
CN110995659A (en)*2019-11-122020-04-10广州大白互联网科技有限公司Method and system for generating network authentication data
CN111431873A (en)*2020-03-112020-07-17山东超越数控电子股份有限公司Method, system, device and medium for reporting information
CN112383399A (en)*2020-11-062021-02-19新大陆(福建)公共服务有限公司Key processing method, system, device and medium for self-adaptive matching identity platform
CN112597458A (en)*2020-12-222021-04-02北京八分量信息科技有限公司Method and device for identity authentication based on trusted authentication and related product
CN113691366A (en)*2020-05-162021-11-23成都天瑞芯安科技有限公司 Desensitized Secure Biometric Authentication System
CN114022335A (en)*2022-01-102022-02-08中航信移动科技有限公司 Electronic identity authentication method, device and electronic device based on dynamic timeliness
US20240184871A1 (en)*2022-12-052024-06-06Canon Kabushiki KaishaImage capturing apparatus that guarantees authenticity of image data, management system, control method, and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104601325A (en)*2013-10-312015-05-06华为技术有限公司Data encryption method, device, equipment and system and data decryption method, device, equipment and system
CN104881280A (en)*2015-05-132015-09-02南京邮电大学Multi-search supporting design method for encrypted database middleware
CN105429761A (en)*2015-12-292016-03-23宇龙计算机通信科技(深圳)有限公司 A method and device for generating a key
CN105656870A (en)*2015-06-292016-06-08宇龙计算机通信科技(深圳)有限公司Data transmission method, device and system
CN105847233A (en)*2016-03-102016-08-10浪潮集团有限公司Switch for subfield encryption transmission
CN106375083A (en)*2016-09-302017-02-01广东网金控股股份有限公司 A method and device for encryption and decryption based on Base64
US20180069696A1 (en)*2015-04-142018-03-08Samsung Sds Co., Ltd.Encrypted data management method and device
CN108540470A (en)*2018-04-042018-09-14中国工商银行股份有限公司Verification System and method based on digital certificate label
CN108595971A (en)*2018-04-252018-09-28杭州闪捷信息科技股份有限公司A kind of database adaptive refinement method
CN109005151A (en)*2018-06-132018-12-14四川斐讯信息技术有限公司A kind of encryption of information, decryption processing method and processing terminal
CN109450642A (en)*2018-11-052019-03-08郑州云海信息技术有限公司The treating method and apparatus of network ciphertext data

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104601325A (en)*2013-10-312015-05-06华为技术有限公司Data encryption method, device, equipment and system and data decryption method, device, equipment and system
US20180069696A1 (en)*2015-04-142018-03-08Samsung Sds Co., Ltd.Encrypted data management method and device
CN104881280A (en)*2015-05-132015-09-02南京邮电大学Multi-search supporting design method for encrypted database middleware
CN105656870A (en)*2015-06-292016-06-08宇龙计算机通信科技(深圳)有限公司Data transmission method, device and system
CN105429761A (en)*2015-12-292016-03-23宇龙计算机通信科技(深圳)有限公司 A method and device for generating a key
CN105847233A (en)*2016-03-102016-08-10浪潮集团有限公司Switch for subfield encryption transmission
CN106375083A (en)*2016-09-302017-02-01广东网金控股股份有限公司 A method and device for encryption and decryption based on Base64
CN108540470A (en)*2018-04-042018-09-14中国工商银行股份有限公司Verification System and method based on digital certificate label
CN108595971A (en)*2018-04-252018-09-28杭州闪捷信息科技股份有限公司A kind of database adaptive refinement method
CN109005151A (en)*2018-06-132018-12-14四川斐讯信息技术有限公司A kind of encryption of information, decryption processing method and processing terminal
CN109450642A (en)*2018-11-052019-03-08郑州云海信息技术有限公司The treating method and apparatus of network ciphertext data

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110955858A (en)*2019-11-122020-04-03广州大白互联网科技有限公司Information management method of network license platform
CN110995659A (en)*2019-11-122020-04-10广州大白互联网科技有限公司Method and system for generating network authentication data
CN110995659B (en)*2019-11-122022-02-22广州大白互联网科技有限公司Method and system for generating network authentication data
CN111431873A (en)*2020-03-112020-07-17山东超越数控电子股份有限公司Method, system, device and medium for reporting information
CN113691366A (en)*2020-05-162021-11-23成都天瑞芯安科技有限公司 Desensitized Secure Biometric Authentication System
CN112383399A (en)*2020-11-062021-02-19新大陆(福建)公共服务有限公司Key processing method, system, device and medium for self-adaptive matching identity platform
CN112383399B (en)*2020-11-062024-01-26新大陆(福建)公共服务有限公司Key processing method, system, equipment and medium of self-adaptive matching identity platform
CN112597458A (en)*2020-12-222021-04-02北京八分量信息科技有限公司Method and device for identity authentication based on trusted authentication and related product
CN112597458B (en)*2020-12-222023-12-01北京八分量信息科技有限公司Method, device and related product for identity authentication based on trusted authentication
CN114022335A (en)*2022-01-102022-02-08中航信移动科技有限公司 Electronic identity authentication method, device and electronic device based on dynamic timeliness
CN114022335B (en)*2022-01-102022-03-18中航信移动科技有限公司Electronic identity authentication method and device based on dynamic timeliness and electronic equipment
US20240184871A1 (en)*2022-12-052024-06-06Canon Kabushiki KaishaImage capturing apparatus that guarantees authenticity of image data, management system, control method, and storage medium

Similar Documents

PublicationPublication DateTitle
US20220407720A1 (en)Electronic identification verification methods and systems with storage of certification records to a side chain
CN110401542A (en)Electronic identity voucher generation method, terminal and server
EP4049403B1 (en)Optimized private biometric matching
CN113344570B (en) Method for transmitting and processing transaction messages and data processing device
CN105453483B (en)Method and apparatus for image-based key derivation
US10318932B2 (en)Payment card processing system with structure preserving encryption
WO2018145127A1 (en)Electronic identification verification methods and systems with storage of certification records to a side chain
US10395232B2 (en)Methods for enabling mobile payments
CN107566117A (en)A kind of block chain key management system and method
CN111222178B (en)Data signature method and device
CN106452775A (en)Method and apparatus for accomplishing electronic signing and signing server
Saranya et al.Efficient mobile security for E health care application in cloud for secure payment using key distribution
CN110290134A (en)A kind of identity identifying method, device, storage medium and processor
CN109903052A (en)A kind of block chain endorsement method and mobile device
CN115186301B (en)Information processing method, information processing device, computer equipment and computer readable storage medium
CN111814193A (en) An information sharing method, device and equipment
US20240135764A1 (en)Token based secure access to a locker system
CN108805574B (en)Transaction method and system based on privacy protection
CN113537982A (en)Safety verification method, device and equipment of financial equipment and storage medium
USRE49968E1 (en)Electronic identification verification methods and systems with storage of certification records to a side chain
CA3179201A1 (en)Systems and methods for use in segregating data blocks to distributed storage
CN115631045A (en)Electronic certificate transaction method, device, computer equipment and storage medium
US11562102B2 (en)Systems and methods for use in segregating data blocks to distributed storage
CN110400223A (en)Interactive log based on block chain encrypts, transfers, Anti-theft method, apparatus
CN110719264B (en)Information processing method and device, electronic equipment and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20191101

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp