Movatterモバイル変換


[0]ホーム

URL:


CN118055410B - Certificate reading method, device and equipment for business desktop flat plate and storage medium - Google Patents

Certificate reading method, device and equipment for business desktop flat plate and storage medium
Download PDF

Info

Publication number
CN118055410B
CN118055410BCN202410443574.XACN202410443574ACN118055410BCN 118055410 BCN118055410 BCN 118055410BCN 202410443574 ACN202410443574 ACN 202410443574ACN 118055410 BCN118055410 BCN 118055410B
Authority
CN
China
Prior art keywords
information
network
business
verification
reading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410443574.XA
Other languages
Chinese (zh)
Other versions
CN118055410A (en
Inventor
高河福
唐晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Senrui Technology Co ltd
Original Assignee
Guangzhou Senrui Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Senrui Technology Co ltdfiledCriticalGuangzhou Senrui Technology Co ltd
Priority to CN202410443574.XApriorityCriticalpatent/CN118055410B/en
Publication of CN118055410ApublicationCriticalpatent/CN118055410A/en
Application grantedgrantedCritical
Publication of CN118055410BpublicationCriticalpatent/CN118055410B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The application relates to a certificate reading method, a device, equipment and a storage medium of a business desktop panel, wherein the method comprises the steps of responding business desktop panel outgoing information and acquiring current network information; judging the current network information based on a preset trusted network to obtain a network judgment result; corresponding certificate verification reading is carried out according to the network judgment result, and verification information is obtained; and judging whether the service is verified or not based on the verification information, and performing service handling according to a verification judgment result. The application has the effect of improving the safety of certificate reading when a worker carries a business desktop flat plate to go out to transact business.

Description

Certificate reading method, device and equipment for business desktop flat plate and storage medium
Technical Field
The invention relates to the technical field of certificate reading, in particular to a method, a device and equipment for reading a certificate of a business desktop flat plate and a storage medium.
Background
With the continuous development of technology, some traditional business processes can select to use tools such as mobile devices such as tablets or mobile phones according to requirements to adapt to business service requirements. However, the services which can be handled on the mobile phone at the present stage are very limited, and are often simple services, and for some relatively complex services, the services can be handled only after the number is taken in a hall and before the user goes to a desk computer; secondly, the size of the mobile phone screen is relatively small, and under the complex business process, the process and operation steps are very difficult to simplify, so that the business desktop panel with the functions of reading and writing cards and the like is gradually applied to various business scenes. Staff can use a business desktop flat plate to provide a gate-on service for high-quality clients, so that the service quality and the user experience are greatly improved.
However, when a worker holds a tablet for business, the security problem of certificate reading by the tablet of the business desk is increasingly prominent, and firstly, because current certificate reading is generally dependent on a card swiping or inserting operation, the security of certificate information is highly dependent on the protection of a physical card. If the identity card or other certificate card of the staff is lost or stolen, or if the staff is careless to manage the business desktop flat plate, the business desktop flat plate is taken by others, the disclosure of personal privacy information is directly caused, and the security of business operation is greatly threatened.
In summary, the safety of the staff in the related art is low when the staff carries the business desktop flat plate to go out to transact business. In order to improve the security of the document reading process, a more secure document reading method using a business desktop tablet is needed to enhance the security of the business desktop tablet in document reading.
Disclosure of Invention
In order to improve the security of certificate reading when a worker carries a business desktop flat plate out to transact business, the application provides a method, a device, equipment and a storage medium for reading the certificate of the business desktop flat plate.
In a first aspect, the above object of the present application is achieved by the following technical solutions:
A method for reading a document from a business desktop tablet, the method comprising:
responding to business flat board outgoing information to acquire current network information;
Judging the current network information based on a preset trusted network to obtain a network judgment result;
corresponding certificate verification reading is carried out according to the network judgment result, and verification information is obtained;
And judging whether the service is verified or not based on the verification information, and performing service handling according to a verification judgment result.
By adopting the technical scheme, the business tablet personal computer automatically identifies whether the current environment is in the specified business hall range, and when a worker carries the business tablet personal computer out to transact business, the business tablet personal computer identifies that the current environment is not in the specified business hall range, and a safety protection mechanism is started, so that the security of certificate reading when the business desktop tablet is transacted business outside the business hall is ensured; when the business tablet computer starts to read the user certificate, whether the current network is a trusted network is judged first, the trusted network is set by a staff of the business hall, for example, the trusted network is set as a business handling area outside the business hall, and business handling is carried out for the user through the network covered in the area, therefore, through identifying the network currently connected with the business tablet computer, safety verification is carried out on the aspect of network safety, the safety of data transmission of the network of the business tablet computer is ensured, in addition, after the network identification judgment is finished, certificate verification reading is carried out, namely, the user certificate is read, for example, whether the information on the read certificate is complete or not is verified, whether the information format is correct or not is verified, in addition, digital signature in the read information is verified or certificate verification is carried out, so that the certificate read by the business tablet computer is a safe and compliant certificate is ensured, and the safety of reading of the certificate is realized.
The present application may be further configured in a preferred example to: the responding business flat board outgoing information obtains current network information, which comprises the following steps:
Responding business flat board outgoing information, wherein the business flat board outgoing information comprises positioning information and network connection changing information;
And acquiring current network information according to the positioning information and the network connection change information.
By adopting the technical scheme, the business flat board outgoing information used for indicating that the current use environment of the business flat computer is not in the specified business hall range comprises positioning information and network connection change information, wherein the positioning information is the comparison information of the positioning position of the business flat computer and the specified business hall range, and the network connection change information is the information of the network connected with the identified business flat computer.
The present application may be further configured in a preferred example to: the step of judging the current network information based on the preset trusted network to obtain a network judgment result specifically comprises the following steps:
and judging whether the current network information corresponds to the trusted network or not based on the positioning information and the corresponding preset trusted network, and obtaining a network judgment result.
By adopting the technical scheme, the staff in the business hall conduct investigation on possible business handling scenes in advance, and judge the trusted network in each different business handling scene, in addition, if the staff goes to a new business handling scene, the staff can also judge whether the new business handling scene has the corresponding network in the trusted authority and is connected through the network database formed by a plurality of business halls, the new business handling scene does not have the corresponding network in the trusted authority, the network in the new business handling scene can also be tested through the network verification function, so that the trusted network is selected, and after business handling is completed, the trusted network of the new business handling scene is verified by a professional network engineer or a staff in the business hall, so that the trusted network amount of the business tablet computer is improved, the practicability of the business tablet computer is improved, the trusted network is provided in all business handling scenes, and the reading security certificate of the business tablet computer is improved.
The present application may be further configured in a preferred example to: and performing corresponding certificate verification reading according to the network judgment result to obtain verification information, wherein the method specifically comprises the following steps of:
Acquiring a corresponding network security level according to the network judgment result;
and carrying out corresponding certificate verification reading based on the network security level to obtain verification information.
By adopting the technical scheme, the network judgment result comprises analysis and judgment of the security of the network connected with the current business tablet computer, the higher the judged network security is, the higher the corresponding network security level is, the higher the security when the business tablet computer performs certificate reading is judged at the moment, so that the certificate corresponding to different network security levels is different in certificate verification reading, for example, when the network security level is lower, more steps of security verification actions are performed, including starting a data encryption engine to encrypt data, calling a SAM module (Security Access Module, a security access module) to perform certificate reading, user face identification, fingerprint identification and the like, and when the network security level is higher, the steps of corresponding security verification actions can be reduced, so that a certificate reading function with higher speed and efficiency is provided for a user, and the use experience of the user is improved.
The present application may be further configured in a preferred example to: the step of carrying out corresponding certificate verification reading based on the network security level to obtain verification information specifically comprises the following steps:
acquiring a corresponding card reading frequency threshold according to the network security level;
Judging the current screen state, and acquiring a corresponding user operation collection mode according to the current screen state;
corresponding certificate verification reading is carried out based on the user operation collection mode, and certificate reading information, verification information and card reading frequency are obtained, wherein the verification information comprises user operation information and environment brightness information;
when the card reading frequency is larger than a preset card reading frequency threshold value, acquiring camera identification information, wherein the verification information also comprises the camera identification information;
And when the network security level is smaller than a preset network security level threshold, acquiring the user biological characteristic identification information, wherein the verification information also comprises the user biological characteristic identification information.
By adopting the technical scheme, the card reading frequency refers to the frequency of certificate reading by a user using the business tablet personal computer in a unit time period, the corresponding card reading frequency threshold is the threshold of the frequency of certificate reading by the user using the business tablet personal computer in the unit time period, if the card reading frequency is larger than the preset card reading frequency threshold, the current use state of the business tablet personal computer is abnormal, therefore, a front camera or a rear camera on the business tablet personal computer is called to shoot images, the identity of the user and/or the identity of staff are identified, and the use safety of the business tablet personal computer is ensured; in addition, the current screen state refers to whether the screen is in a screen-off state, and user operation information acquired by the business tablet computer in the screen-off state is different from user operation information acquired by the business tablet computer in a screen-on state, for example, user touch wake-up gesture information, physical button operation information, fingerprint identification information, voice wake-up and near field sensor information and the like can be collected by the business tablet computer in the screen-off state, and user touch operation information, keyboard input information, application program use information, interaction notification operation information, gesture control information and the like can be collected by the business tablet computer in the screen-on state, and the mode of judging the identity of the user according to the different information is different.
The present application may be further configured in a preferred example to: judging whether the verification information is passed or not based on the verification information, and performing service handling according to a verification judgment result, wherein the method specifically comprises the following steps:
Inputting the user operation information, the environment brightness information, the camera identification information and/or the user biological characteristic identification information into a corresponding preset user learning model, and judging whether the user learning model is verified or not to obtain a model judgment result;
and carrying out business handling according to the model judgment result and the certificate reading information.
By adopting the technical scheme, the user learning model is used for learning verification information corresponding to different users, judging the operation habit of the users, verifying whether the current user identity is correct or not, when judging that the user identity is incorrect, displaying part of information and reminding a worker when judging that the user identity is in doubt, further verifying the identity of the current user, displaying the identity information of the user only when judging that the user identity corresponds correctly, and entering into the next business transaction, and based on the verification, realizing the effect of improving the security of certificate reading when the worker carries a business desktop flat plate out to transact business.
In a second aspect, the above object of the present application is achieved by the following technical solutions:
a business desktop tablet document reading device, the business desktop tablet document reading device comprising:
The network identification module is used for responding to the business flat board outgoing information and acquiring current network information;
The network judging module is used for judging the current network information based on a preset trusted network to obtain a network judging result;
The verification module is used for carrying out corresponding certificate verification reading according to the network judgment result to obtain verification information;
And the verification judging module is used for judging whether the verification information passes or not based on the verification information, and carrying out business transaction according to the verification judging result.
Optionally, the network identification module includes:
the response sub-module is used for responding to business flat board outgoing information, wherein the business flat board outgoing information comprises positioning information and network connection change information;
and the network identification sub-module is used for acquiring current network information according to the positioning information and the network connection change information.
In a third aspect, the above object of the present application is achieved by the following technical solutions:
a computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the document reading method of a business desktop tablet as described above when the computer program is executed.
In a fourth aspect, the above object of the present application is achieved by the following technical solutions:
A computer readable storage medium storing a computer program which when executed by a processor performs the steps of the document reading method of a business desktop tablet as described above.
In summary, the present application includes at least one of the following beneficial technical effects:
1. The business tablet personal computer automatically identifies whether the current environment is in a specified business hall range, and when a worker carries the business tablet personal computer out to transact business, the business tablet personal computer starts a safety protection mechanism when identifying that the current environment is not in the specified business hall range, so that the security of certificate reading when the business desktop tablet is in business outside the business hall is ensured; when the business tablet computer starts to read the user certificate, judging whether the current network is a trusted network or not, wherein the trusted network is automatically set by staff of the business hall, for example, the trusted network is automatically set as a business handling area outside the business hall, and the business is handled for the user through the network covered in the area, so that the safety verification is carried out on the aspect of network safety through the identification of the network currently connected with the business tablet computer, the safety of the network transmission data of the business tablet computer is ensured, in addition, after the network identification judgment is finished, certificate verification reading is carried out, namely, the user certificate is read, for example, whether the information on the read certificate is complete or not is verified to be correct, in addition, the digital signature in the read information is verified or certificate verification is carried out, so that the certificate read by the business tablet computer is a safe and compliant certificate is ensured, and the safety of the reading of the certificate is realized;
2. The business flat board outgoing information used for indicating that the current use environment of the business flat computer is not in the specified business hall range comprises positioning information and network connection changing information, wherein the positioning information refers to comparison information of the positioning position of the business flat computer and the specified business hall range, and the network connection changing information refers to information of a network connected with the identified business flat computer, so that when the positioning position of the business flat computer is not in the specified business hall range and the network connected with the business flat computer is not corresponding to the specified network, the use environment of the current business flat computer is judged to be not in the specified business hall range, and then the network connected with the current business flat computer is identified, so that specific state information of the network connected with the current business flat computer is acquired, and the accuracy of judging the use environment of the business flat computer is ensured;
3. if the staff goes to a new business handling scene, the network database formed by a plurality of business halls can also be used for judging whether the new business handling scene has a corresponding network in a trusted party and is connected, the new business handling scene does not have the network in the trusted party, the network in the new business handling scene can be tested through a network verification function, so that the trusted network is selected, and after the business handling is finished, a professional network engineer or staff in the business halls verifies the trusted network of the new business handling scene, so that the network database is updated, the trusted network quantity of the business tablet computer is improved, the practicability of the business tablet computer is improved, the trusted network is provided for all the business handling scenes, and the certificate reading safety of the business tablet computer is improved.
Drawings
FIG. 1 is a flowchart of a method for reading credentials of a business desktop tablet according to an embodiment of the present application;
FIG. 2 is a flowchart of an implementation of S10 of a method for reading credentials of a business desktop tablet in an embodiment of the application;
FIG. 3 is a flowchart of an implementation of S20 of a method for reading credentials of a business desktop tablet in an embodiment of the application;
FIG. 4 is a flowchart of an implementation of S30 of a certificate reading method for a business desktop tablet in an embodiment of the present application;
FIG. 5 is a flowchart of an implementation of S32 of a certificate reading method for a business desktop tablet in an embodiment of the present application;
FIG. 6 is a flowchart of an implementation of S40 of a certificate reading method for a business desktop tablet in an embodiment of the present application;
FIG. 7 is a schematic block diagram of a credential reading device with a desktop tablet in accordance with an embodiment of the present application;
FIG. 8 is an internal block diagram of a credential reading computer apparatus for a business desktop tablet in an embodiment of the application.
Detailed Description
The application is described in further detail below with reference to fig. 1-8.
In one embodiment, as shown in fig. 1, the application discloses a certificate reading method for a business desktop plate, which specifically comprises the following steps:
s10: and responding to the business flat board outgoing information, and acquiring current network information.
In this embodiment, the business tablet refers to a business tablet computer with a certificate identification reading function, the business tablet computer is applied in a telecom business hall, and the business tablet computer is internally provided with a certificate identification reading module, a front camera, a rear camera, a positioning module, a biological feature identification module and a brightness sensing module. The business flat board outgoing information is information indicating that the business flat computer is not in a specified business hall. The current network information refers to state information of a network connected with the current business tablet computer.
Specifically, the business tablet computer can automatically identify whether the current environment is within a specified business hall range, for example, by means of a positioning module in the business tablet computer, whether the position of the business tablet computer is within the specified business hall range is judged in real time, when a worker carries the business tablet computer out to transact business, the business tablet computer identifies that the current environment is not within the specified business hall range, information for indicating that the business tablet computer is not within the specified business hall range, namely business tablet board out information, a network connected with the current business tablet computer is identified in response to the business tablet board out information, state information, namely current network information, of the network connected with the current business tablet computer is acquired, and the current network information comprises a network IP address, gateway information, a network encryption protocol, a basic service set identifier, a service set identifier and the like. In this embodiment, the specified business hall range is a geographical range defined in advance, and may be defined by staff in the business hall according to the network coverage of the business hall, or defined according to the building area of the business hall.
S20: and judging the current network information based on a preset trusted network to obtain a network judgment result.
In this embodiment, the preset trusted network refers to a network to which a preset trusted business tablet computer is connected. The network judgment result is a comparison judgment result of the preset trusted network and the current network information.
Specifically, a trusted network database is preset in the business tablet computer, the trusted network database comprises networks connected with the trusted business tablet computers in different business handling scenes, namely trusted networks, if the networks connected with the current business tablet computer are the trusted networks, the security of network transmission data of the business tablet computer is higher, therefore, in the use process of the business tablet computer, the current network information is compared with the preset trusted networks in real time, whether the networks connected with the current business tablet computer are the trusted networks is judged, and a network judgment result is obtained.
In this embodiment, the trusted network database is set by the staff of the business hall, for example, as a network provided by a network router set by the business hall outside the business hall.
S30: and performing corresponding certificate verification reading according to the network judgment result to obtain verification information.
In this embodiment, the verification information refers to information for verifying the security of the usage scenario of the current business tablet computer.
Specifically, when the business tablet computer is used for certificate reading, the network judgment result obtained at the moment is extracted, and corresponding certificate verification reading is carried out according to the current network judgment result, namely, when the business tablet computer is used for certificate reading, the verification of the safety of the use scene of the business tablet computer is carried out simultaneously, and the certificate verification reading corresponding to different network judgment results is different, for example, if the network judgment result indicates that the network environment of the current business tablet computer is safe, namely, the network connected with the current business tablet computer is a trusted network, whether the identity of a user is correct or not is emphasized, the corresponding certificate verification reading comprises calling a camera on the business tablet computer to identify the identity of the user, and monitoring the state of the business tablet computer in real time, so that corresponding verification information is obtained; if the network judgment result indicates that the network environment of the current business tablet computer is unsafe, i.e. the network connected with the current business tablet computer is not a trusted network, verifying whether the user identity is correct and verifying the data security, for example, verifying the information and the format of the information on the certificate obtained by reading, verifying the verification result of the identity card number and the preset verification algorithm, and the like, and combining the information for verifying whether the user identity is correct to obtain the corresponding verification information.
S40: based on the verification information, whether the service is verified or not is judged, and the service is transacted according to the verification judgment result.
Specifically, the verification information is analyzed, whether the result of security verification of the use scene of the current business tablet computer passes the verification is judged, for example, if the network judgment result indicates that the network environment of the current business tablet computer is safe, i.e. the network connected with the current business tablet computer is a trusted network, the corresponding verification information comprises user identity information identified by a camera on the business tablet computer and state information of the monitoring business tablet computer, the corresponding verification result comprises information such as judging whether the user identity is correct, judging whether the camera and the biological feature identification device of the business tablet computer are damaged or not, when the verification result indicates that the user identity is correct and the states of the camera and the biological feature identification device of the business tablet computer are normal, the next business transaction based on certificate reading information can be carried out, when the verification result indicates that the user identity is incorrect, a worker can be reminded of further confirming the identity of the user, and when the verification result indicates that the states of the camera and the biological feature identification device of the business tablet computer are abnormal, the worker can be reminded of further confirming the identity of the user or directly stopping business transaction when the state of the camera and the biological feature identification device of the business tablet computer is abnormal, so that the security of the tablet computer is ensured; if the network judgment result indicates that the network environment of the current business tablet computer is unsafe, namely the network connected with the current business tablet computer is not a trusted network, the corresponding verification result comprises whether the information on the certificate obtained by reading is complete and whether the information format is correct, whether the verification identity card number accords with a preset verification algorithm or not, if the verification result indicates that the information on the certificate obtained by reading is incomplete, the information format is incorrect and the verification identity card number does not accord with the preset verification algorithm, the service handling flow can be stopped directly, and when the verification result indicates that the information on the certificate obtained by reading is complete, the information format is correct and the verification identity card number accords with the preset verification algorithm, the next service handling based on the certificate reading information is carried out.
In one embodiment, as shown in fig. 2, in step S10, current network information is acquired in response to business flat board outgoing information, which specifically includes:
S11: responsive to business tile egress information, the business tile egress information includes location information and network connection change information.
In this embodiment, the positioning information refers to information that the positioning position of the business tablet computer is not in the specified business hall range. The network connection change information is information that the identified network to which the business tablet computer is connected does not correspond to a prescribed network.
Specifically, whether the current use environment of the business tablet computer is in the specified business hall range or not is judged, namely, whether the positioning position of the business tablet computer is not in the specified business hall range or not is judged by combining a network identification mode through a positioning module in the business tablet computer, and when the network connected with the business tablet computer is not corresponding to the specified network, the current use environment of the business tablet computer is not in the specified business hall range is judged, so that the business tablet outgoing information comprises positioning information and network connection change information, namely, information that the positioning position of the business tablet computer is not in the specified business hall range, and information that the network connected with the identified business tablet computer is not corresponding to the specified network.
S12: and acquiring current network information according to the positioning information and the network connection change information.
Specifically, when the positioning information and the network connection change information are obtained at the same time, it is judged that the current use environment of the current business tablet computer is not in the specified business hall range, so that further real-time identification is performed on the network connected with the current business tablet computer, and current network information is obtained.
In one embodiment, as shown in fig. 3, in step S20, the current network information is determined based on a preset trusted network, and a network determination result is obtained, which specifically includes:
s21: based on the positioning information and the corresponding preset trusted network, judging whether the current network information corresponds to the trusted network or not, and obtaining a network judgment result.
In this embodiment, the range of the business is limited when the staff carries the business desktop flat board and goes out to transact business, that is, the range of the business desktop flat board cannot be exceeded when the staff carries the business desktop flat board and goes out, but the range of the business desktop flat board is divided into a plurality of different areas, a plurality of business halls are included in the limited range, each business tablet computer is special for a corresponding business hall, in addition, different areas outside the business halls correspond to different network databases, the preset information of the trusted network is stored in the corresponding network databases, and the staff of each business hall in the limited range can input the information to the network databases.
The staff of the business hall investigates possible business handling scenes in each area in advance, judges trusted networks in different business handling scenes and stores the trusted networks in a network database, and when the staff goes to a new business handling scene in the use process of the business tablet personal computer, the new business handling scene does not have the trusted networks, so that the network in the new business handling scene can be tested by the staff after the staff connects the networks by himself, through the network verification function of the business tablet personal computer, the trusted networks are selected, and after business handling is completed, the trusted networks of the new business handling scene are verified by the professional network engineer or the staff of the business hall, so that the network database is updated, and each trusted network of each area can be tested by the professional network engineer or the staff at regular time, so that the trusted networks which do not meet the safety requirements can be moved out of the corresponding network database.
Therefore, specifically, in the use process of the business tablet personal computer, the area where the position of the current business tablet personal computer belongs is judged in real time according to the positioning information, and whether the current network information is a preset trusted network of the corresponding area is judged through the network database corresponding to the current area, so that a network judgment result is obtained.
Further, in the use process of the business tablet personal computer, the area where the position of the current business tablet personal computer belongs is judged in real time according to the positioning information, and through a network database corresponding to the current area, the business tablet personal computer can be automatically connected with a preset trusted network or manually connected by a worker, and whether the business tablet personal computer is automatically connected or manually connected by the worker can judge whether the current network information is the preset trusted network of the corresponding area.
In one embodiment, as shown in fig. 4, in step S30, corresponding certificate verification reading is performed according to the network judgment result to obtain verification information, which specifically includes:
s31: and obtaining the corresponding network security level according to the network judgment result.
In this embodiment, the network database includes a trusted network in the corresponding area, and a network security level corresponding to each trusted network, where the network security level refers to a security level of a network connected to the business tablet computer, where the network security level may be set by a professional network engineer or a staff in a business hall, for example, if the trusted network is a network deployed in a business hall by a network router or the like, the corresponding network security level is higher, and for a trusted network deployed in a non-business hall, the network security level may be determined by information such as an encryption type, SSID hiding, whether to support two-factor authentication, whether to provide security performance of a visitor network and a network protocol, and the like of the trusted network.
Specifically, according to the network judgment result, judging whether the network connected with the current business tablet computer is a preset trusted network, if the network connected with the current business tablet computer is not the preset trusted network, the corresponding network security level is blank, and if the network connected with the current business tablet computer is the preset trusted network, the network security level of the trusted network connected with the business tablet computer is obtained.
S32: and carrying out corresponding certificate verification reading based on the network security level to obtain verification information.
Specifically, the preset certificate verification reading mode is provided for different network security levels, for example, the certificate verification reading mode for the lower network security level includes starting a higher-level data encryption engine to encrypt data or call a SAM module to perform certificate reading, and further includes user face recognition, fingerprint recognition and the like (in the service types of the business tablet computer, part of the service types are required to perform user face recognition and fingerprint recognition, part of the service types are not required to perform user face recognition and fingerprint recognition, and when the corresponding network security level is lower, the service types which are not required to perform user face recognition and fingerprint recognition are required to perform user face recognition and fingerprint recognition by staff, and the certificate verification reading mode for the higher network security level includes starting a normal data encryption engine to perform data encryption, performing user face recognition, fingerprint recognition and the like, so that the corresponding certificate verification reading is performed through the network security level, and verification information obtained through the certificate verification reading is obtained.
Further, if the corresponding network security level is blank, the staff is reminded to switch the network or replace the service handling place.
In one embodiment, as shown in fig. 5, in step S32, corresponding certificate verification reading is performed based on the network security level to obtain verification information, which specifically includes:
s321: and obtaining a corresponding card reading frequency threshold according to the network security level.
In this embodiment, the card reading frequency threshold refers to a threshold of frequency of certificate reading by the user using the business tablet computer in a unit time period.
Specifically, the network security level indicates the security of the network environment of the current business tablet computer, if the network security level is lower, the security of the network environment of the current business tablet computer is lower, and meanwhile, the security of the actual use scene of the current business tablet computer needs to be judged, so that according to the network security level, the threshold value of the frequency of certificate reading by the corresponding user using the business tablet computer in a unit time period, namely the card reading frequency threshold value, is obtained, and the frequency of certificate reading by the user using the business tablet computer in the unit time period is the card reading frequency. Because the frequency of using the business tablet computer to read the certificate in the unit time period has a normal range under the normal business handling scene, if the frequency of using the business tablet computer to read the certificate in the unit time period is too high, the user using the business tablet computer at the moment can be judged to have an abnormal purpose, for example, the privacy of other people is stolen through the business tablet computer, and therefore, the card reading frequency threshold is used as one of verification modes.
It should be noted that, the difference between the card reading frequency thresholds corresponding to different network security levels is not large, because the network security levels represent the security of the network environment of the business tablet computer, and the card reading frequency is used for judging the security of the actual usage scenario of the business tablet computer, so that the difference between the set card reading frequency thresholds is not large, for example, the card reading frequency thresholds of each network security level differ once or twice.
S322: judging the current screen state, and acquiring a corresponding user operation collection mode according to the current screen state.
In this embodiment, the current screen state refers to state information of whether the screen of the business tablet computer is off. The user operation collection mode refers to a mode that a business tablet computer collects operations of a user and a worker on the business tablet computer.
Specifically, in order to further verify the security of the actual use scenario of the current business tablet computer, whether the identities of the user and the staff are correct or not can be verified by collecting the operation of the user and the staff on the business tablet computer, because the security risk of the actual use scenario of the business tablet computer includes the risk that the staff is impersonated in addition to the risk that the user impersonates the credentials of other people and the risk that the user uses the business tablet computer improperly, therefore, whether the screen of the business tablet computer is in a screen-off state is judged, the current screen state is obtained, and the corresponding mode of collecting the operation of the user and the staff on the business tablet computer by the business tablet computer in the screen-off state or the screen-on state is obtained according to the current screen state, namely, the user operation collection mode.
S323: and carrying out corresponding certificate verification reading based on a user operation collection mode to obtain certificate reading information, verification information and card reading frequency, wherein the verification information comprises user operation information and environment brightness information.
In this embodiment, the certificate read information refers to information of the certificate read by the business tablet computer.
Specifically, corresponding certificate verification reading is performed based on a corresponding user operation collection mode, so that information of a business tablet computer for identifying and reading certificates, namely certificate reading information, verification information collected through the user operation collection mode, and card reading frequency obtained through real-time counting, namely frequency of using the business tablet computer to read certificates in a unit time period, are obtained, wherein the verification information comprises user operation information and environment brightness information. In this embodiment, the user operation information in the screen-off state includes wake-on-touch gesture information, physical button operation information, fingerprint identification information (i.e., a fingerprint when the worker unlocks the screen), voice wake-up information (i.e., a voice audio information of the worker), and the like, and the user operation information in the screen-on state includes touch operation information, keyboard input information, application use information (i.e., a specific operation and a duration of using the application by the user and/or the worker), interactive notification operation information (i.e., an operation of the user and/or the worker on the interactive notification information), gesture control information (i.e., a gesture of the user and/or the worker), and the like.
S324: when the card reading frequency is larger than a preset card reading frequency threshold value, acquiring camera identification information, wherein the verification information further comprises the camera identification information.
In this embodiment, the camera identification information refers to identification information of images shot by front and rear cameras of the business tablet computer.
Specifically, when the card reading frequency is larger than the preset card reading frequency threshold value in the preset unit time period, the front and rear cameras of the business tablet personal computer are called to shoot images, the images are identified, portrait information in the images is judged, and camera identification information is obtained.
S325: and when the network security level is smaller than a preset network security level threshold, acquiring the user biological characteristic identification information, wherein the verification information also comprises the user biological characteristic identification information.
In this embodiment, the biometric module refers to a fingerprint recognition module. The user biometric information refers to the identification information of the biometric module.
Specifically, if the network security level is smaller than a preset network security level threshold, after obtaining the certificate read information, namely after the business tablet computer completes identification of the certificate, reminding a worker to conduct fingerprint identification, enabling a user to conduct fingerprint identification, and obtaining fingerprint information of the user and the worker, namely user biological characteristic identification information.
In one embodiment, as shown in fig. 6, in step S40, based on the verification information, whether the verification is passed or not is judged, and the service transaction is performed according to the verification judgment result, which specifically includes:
s41: inputting user operation information, environment brightness information, camera identification information and/or user biological characteristic identification information into a corresponding preset user learning model, and obtaining a model judgment result based on whether user learning model judgment is verified.
In this embodiment, the model judgment result refers to a result that the user learns the model to judge whether the security of the actual usage scenario of the current business tablet computer meets the requirement.
Specifically, the user learning model refers to a machine learning model for learning operation habits of different users, and in this embodiment, the user learning model includes a machine learning model for learning operation habits of different users and staff, and the user learning model learns the environment brightness each time when a service is handled for a current user in a current area, corresponding to the environment brightness information, so as to obtain an environment brightness range for judging the safety of an actual use scenario of a current business tablet computer; corresponding to the wake-on-touch gesture information, a user learning model learns gestures when staff wakes up the business tablet computer, so that a plurality of wake-on-touch gesture types for judging the actual use scene safety of the current business tablet computer are obtained; corresponding to the physical button operation information, a user learning model learns the habit of a worker on the physical button operation so as to obtain a plurality of physical button operation modes for judging the actual use scene safety of the current business tablet computer; corresponding to the voice awakening information, a user learning model learns the voice prints and the language of staff, so as to obtain the voice information for judging the safety of the actual use scene of the current business tablet computer; corresponding to the touch operation information, a user learning model learns touch operation of a user and a worker on the business tablet computer, so that a touch operation mode for judging the safety of the actual use scene of the current business tablet computer is obtained; corresponding to the keyboard input information, the user learning model learns the typing habit of the user and staff when inputting the information, so as to obtain a typing habit mode for judging the safety of the actual use scene of the current business tablet computer; the user learning model learns habits of users and staff when using different application programs corresponding to application program using information, so that an application program using mode for judging the actual using scene safety of the current business tablet computer is obtained; corresponding to the interactive notification operation information, the user learning model learns the habit of the user and staff for operating the interactive notification information, so as to obtain an interactive notification operation mode for judging the safety of the actual use scene of the current business tablet computer; corresponding to the gesture control information, a user learning model learns the control gesture habit of a user and a staff on the business tablet computer, so as to obtain a gesture operation mode for judging the safety of the actual use scene of the current business tablet computer;
Therefore, based on the certificate read information and the preset identity of the current staff (the identity information of the staff input when the business tablet personal computer is used each time), the user operation information, the environment brightness information and/or the camera identification information and/or the user biological characteristic identification information corresponding to the current user and the current staff are respectively input into the corresponding preset user learning model, and based on the user learning model, whether the identities of the current user and the staff are correct or not is respectively judged, so that a model judgment result is obtained.
In this embodiment, the information judgment ratio value for judging whether the identities of the current user and the staff are correct can be set by itself, that is, the quantitative ratio value for judging whether the identities of the current user and the staff are correct when the user learning model analyzes various information, for example, the verification information includes 7 kinds of information types corresponding to the user, the information judgment ratio value is 50%, then the information of 7 kinds of users is analyzed by the user learning model respectively, and the identity of the current user is judged to be correct when the number of times of judging that the identity of the current user is correct reaches 4 times or more, that is, the identity of the current user is finally judged to be correct.
S42: and carrying out business handling according to the model judgment result and the certificate reading information.
Specifically, according to the model judgment result, if the model judgment result indicates that the identities of the user and the staff are correct, the next business handling is performed, and if the model judgment result indicates that the identities of the user and/or the staff are incorrect, the business handling flow is stopped.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present application.
In one embodiment, a document reading device for a business desktop tablet is provided, where the document reading device for a business desktop tablet corresponds to the document reading method for a business desktop tablet in the foregoing embodiment one by one. As shown in FIG. 7, the certificate reading device of the business desktop plate comprises a network identification module, a network judgment module, a verification module and a verification judgment module. The functional modules are described in detail as follows:
The network identification module is used for responding to the business flat board outgoing information and acquiring current network information;
the network judging module is used for judging the current network information based on a preset trusted network to obtain a network judging result;
the verification module is used for carrying out corresponding certificate verification reading according to the network judgment result to obtain verification information;
and the verification judging module is used for judging whether the service is verified or not based on the verification information, and performing service handling according to the verification judging result.
Optionally, the network identification module includes:
the response sub-module is used for responding to business flat board outgoing information, wherein the business flat board outgoing information comprises positioning information and network connection change information;
And the network identification sub-module is used for acquiring current network information according to the positioning information and the network connection change information.
Optionally, the network judging module includes:
And the network judging sub-module is used for judging whether the current network information corresponds to the trusted network or not based on the positioning information and the corresponding preset trusted network, and obtaining a network judging result.
Optionally, the verification module includes:
the security level acquisition sub-module is used for acquiring a corresponding network security level according to a network judgment result;
And the verification reading sub-module is used for carrying out corresponding certificate verification reading based on the network security level to obtain verification information.
Optionally, the verifying and reading submodule includes:
the card reading frequency threshold value acquisition unit is used for acquiring a corresponding card reading frequency threshold value according to the network security level;
The collecting mode obtaining unit is used for judging the current screen state and obtaining a corresponding user operation collecting mode according to the current screen state;
The verification reading unit is used for carrying out corresponding certificate verification reading based on a user operation collection mode to obtain certificate reading information, verification information and card reading frequency, wherein the verification information comprises user operation information and environment brightness information;
The first comparison unit is used for acquiring camera identification information when the card reading frequency is larger than a preset card reading frequency threshold value, and the verification information also comprises the camera identification information;
and the second comparison unit is used for acquiring the user biological characteristic identification information when the network security level is smaller than a preset network security level threshold value, and the verification information also comprises the user biological characteristic identification information.
Optionally, the verification judging module includes:
the model judging sub-module is used for inputting user operation information, environment brightness information, camera identification information and/or user biological characteristic identification information into a corresponding preset user learning model, and judging whether the user learning model is verified or not to obtain a model judging result;
and the business process sub-module is used for conducting business handling according to the model judgment result and the certificate reading information.
Specific limitations regarding the credential reading device of the business desktop tablet may be found in the above limitations of the credential reading method of the business desktop tablet, and will not be described in detail herein. The various modules in the credential reading device of the business desktop tablet described above can be implemented in whole or in part in software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing current network information, network judgment results, verification information and the like. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a method for reading credentials of a business desktop tablet.
In one embodiment, a computer device is provided comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of when executing the computer program:
responding to business flat board outgoing information to acquire current network information;
Judging current network information based on a preset trusted network to obtain a network judgment result;
corresponding certificate verification reading is carried out according to the network judgment result, and verification information is obtained;
Based on the verification information, whether the service is verified or not is judged, and the service is transacted according to the verification judgment result.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
responding to business flat board outgoing information to acquire current network information;
Judging current network information based on a preset trusted network to obtain a network judgment result;
corresponding certificate verification reading is carried out according to the network judgment result, and verification information is obtained;
Based on the verification information, whether the service is verified or not is judged, and the service is transacted according to the verification judgment result.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SYNCHLINK) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (8)

CN202410443574.XA2024-04-132024-04-13Certificate reading method, device and equipment for business desktop flat plate and storage mediumActiveCN118055410B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202410443574.XACN118055410B (en)2024-04-132024-04-13Certificate reading method, device and equipment for business desktop flat plate and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202410443574.XACN118055410B (en)2024-04-132024-04-13Certificate reading method, device and equipment for business desktop flat plate and storage medium

Publications (2)

Publication NumberPublication Date
CN118055410A CN118055410A (en)2024-05-17
CN118055410Btrue CN118055410B (en)2024-07-02

Family

ID=91045227

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202410443574.XAActiveCN118055410B (en)2024-04-132024-04-13Certificate reading method, device and equipment for business desktop flat plate and storage medium

Country Status (1)

CountryLink
CN (1)CN118055410B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111695990A (en)*2020-06-222020-09-22中国银行股份有限公司Processing method and device for door-to-door money collection service
CN116205715A (en)*2023-02-282023-06-02中国工商银行股份有限公司Portable business handling method and device

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8090351B2 (en)*2009-09-012012-01-03Elliot KleinGeographical location authentication method
US8381282B1 (en)*2011-09-302013-02-19Kaspersky Lab ZaoPortable security device and methods for maintenance of authentication information
KR101622610B1 (en)*2014-12-092016-05-23주식회사 에스원Smart Certification System of Home Wireless Network Camera by Using UWB Sensor and Methof thereof
CN106097221A (en)*2016-06-062016-11-09上海河广信息科技有限公司Certificate burglary-resisting system and certificate security system
CN112651841B (en)*2020-12-182024-04-19中国平安人寿保险股份有限公司Online business handling method, online business handling device, server and computer readable storage medium
CN112969183A (en)*2021-03-302021-06-15中信银行股份有限公司Method and system for managing security authority of external expansion equipment
CN114841799A (en)*2022-05-202022-08-02中国银行股份有限公司 Method and device for conducting business by using portable bank terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111695990A (en)*2020-06-222020-09-22中国银行股份有限公司Processing method and device for door-to-door money collection service
CN116205715A (en)*2023-02-282023-06-02中国工商银行股份有限公司Portable business handling method and device

Also Published As

Publication numberPublication date
CN118055410A (en)2024-05-17

Similar Documents

PublicationPublication DateTitle
JP7159509B1 (en) Systems and methods using multiple focal stacks for image-based spoofing detection
US20200065460A1 (en)Method and computer readable storage medium for remote interview signature
CN107481342A (en)Attendance checking system, method, server and terminal
EP3211825B1 (en)Trusted terminal verification method and apparatus
CA2922342C (en)Methods and systems for detecting head motion during an authentication transaction
US20180239978A1 (en)Imaging processing system and method and management apparatus
CN107729836A (en)Face recognition method and related product
EP3832506A1 (en)Secure storage of fingerprint related elements
CN108846912A (en)Work attendance method, terminal and server
CN110546641A (en)access control method and device, intelligent device and storage medium
CN110247898B (en)Identity verification method, identity verification device, identity verification medium and electronic equipment
CN112989299A (en)Interactive identity recognition method, system, device and medium
CN113077354B (en)Insurance application verification method and device for electronic equipment
CN104937602B (en)Privacy protection method and electronic equipment
CN113239339A (en)Certificate shooting method and device, computer equipment and storage medium
CN108596127A (en)A kind of fingerprint identification method, auth method and device and identity veritify machine
CN111881740A (en)Face recognition method, face recognition device, electronic equipment and medium
US8260060B2 (en)Comparison method, comparison system, computer, and program
CN106469269A (en)A kind of method of Password Management, device and terminal
CN118055410B (en)Certificate reading method, device and equipment for business desktop flat plate and storage medium
CN113032755B (en) Operator verification methods, devices, equipment and storage media for nuclear power equipment
CN117320008B (en)5G message tax system and processing method thereof
CN110546638A (en)Improvements in biometric authentication
CN116389005B (en)Electronic signing method and signing system based on distributed multi-storage nodes
CN108063665B (en)Communication method and terminal device

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp