CN109086618B - Encryption and verification method of identity card photo, related device and storage medium - Google Patents

Encryption and verification method of identity card photo, related device and storage medium Download PDF

Info

Publication number
CN109086618B
CN109086618B CN201810997129.2A CN201810997129A CN109086618B CN 109086618 B CN109086618 B CN 109086618B CN 201810997129 A CN201810997129 A CN 201810997129A CN 109086618 B CN109086618 B CN 109086618B
Authority
CN
China
Prior art keywords
identity card
user
card photo
dimensional code
photo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810997129.2A
Other languages
Chinese (zh)
Other versions
CN109086618A (en
Inventor
满红运
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BOE Technology Group Co Ltd
Original Assignee
BOE Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BOE Technology Group Co Ltd filed Critical BOE Technology Group Co Ltd
Priority to CN201810997129.2A priority Critical patent/CN109086618B/en
Publication of CN109086618A publication Critical patent/CN109086618A/en
Application granted granted Critical
Publication of CN109086618B publication Critical patent/CN109086618B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding

Abstract

The application discloses an encryption and verification method of an identity card photo, a related device and a storage medium. The encryption method is applied to a server side and comprises the following steps: receiving explanatory words of an identity card photo sent by a user; generating a two-dimensional code according to the explanatory text; the two-dimensional code is used for being synthesized on the identity card photo to verify whether the identity card photo is stolen. According to the technical scheme of the embodiment of the application, the identity card photo can be effectively prevented from being stolen.

Description

Encryption and verification method of identity card photo, related device and storage medium
Technical Field
The present disclosure relates generally to the field of computer technology, and more particularly, to the field of information security, and more particularly, to a method for encrypting and verifying an identification card photo, a related apparatus, and a storage medium.
Background
People often use identity card photos and identity card copies in daily life. Since the resident identification card is recorded with detailed and accurate information about the individual citizen, once the theft happens, unpredictable results can be caused, such as illegal personnel used for fraud, illegal intermediaries private personal asset buying, selling, renting and selling, etc. the identity of other people is falsely used for issuing credit card malicious overdraft for cash collection. Therefore, how to prevent the identity card photos from being stolen becomes a problem which needs to be solved urgently.
Disclosure of Invention
In view of the above-mentioned shortcomings or drawbacks of the prior art, it is desirable to provide a solution that can prevent the fraudulent use of identification card photos.
In a first aspect, an embodiment of the present application provides a method for encrypting an id card photo, where the method is applied to a server side, and includes:
receiving explanatory words of an identity card photo sent by a user;
generating a two-dimensional code according to the explanatory text; the two-dimensional code is used for being synthesized on the identity card photo to verify whether the identity card photo is stolen.
Optionally, the method further includes:
receiving identity information of the user;
the generating of the two-dimensional code according to the explanatory text comprises:
and generating the two-dimensional code according to the identity information of the user and the explanatory text.
Optionally, the generating the two-dimensional code according to the identity information of the user and the explanatory text includes:
generating a user identifier and a private key corresponding to the user identifier according to the identity information of the user;
signing original information containing the identity information of the user and the explanatory text by using the private key to obtain signature information;
and generating the two-dimensional code based on the signature information and the user identification.
Optionally, the generating the two-dimensional code based on the signature information and the user identifier includes:
splicing the signature information, the user identification, the original information and a predetermined verification interface into a uniform resource locator address;
and converting the uniform resource locator address into a two-dimensional code.
Optionally, the method further includes:
sending the two-dimensional code to the user so that the user can synthesize the two-dimensional code and the explanatory text on the identity card photo; or alternatively
Receiving the identity card photo;
and synthesizing the two-dimensional code and the explanatory text on the identity card photo and feeding back to the user.
In a second aspect, an embodiment of the present application further provides an encryption method for an id card photo, where the method is applied to a user equipment, and includes:
acquiring an identity card photo;
receiving descriptive words of the identity card photo input by a user;
sending the explanatory characters to a server side, and enabling the server side to generate a two-dimensional code for verifying whether the identity card photo is stolen according to the explanatory characters;
and acquiring an identity card photo synthesized with the two-dimensional code and the explanatory text.
Optionally, the method further includes:
and sending the identity information of the user to the server side, so that the server side generates the two-dimensional code according to the explanatory text and the identity information of the user.
Optionally, the obtaining of the identification card photo combined with the two-dimensional code and the explanatory text includes:
receiving the two-dimension code sent by the server;
synthesizing the two-dimensional code and the explanatory text on the identity card photo; or alternatively
Sending the identity card photo to the server side; and are combined
And receiving the ID card photo which is fed back by the server and combined with the explanatory text and the two-dimensional code.
In a third aspect, an embodiment of the present application further provides a method for verifying an identity card photo, which is implemented based on the above-mentioned encryption method for an identity card photo, where the method is applied to a server side and includes:
receiving a uniform resource locator address, wherein the uniform resource locator address is obtained by scanning a two-dimensional code on an identity card photo by a user;
analyzing the uniform resource locator address to obtain explanatory characters corresponding to the two-dimensional codes contained in the uniform resource locator address;
and sending the descriptive text corresponding to the two-dimensional code to a user so that the user can judge whether the identity card photo is stolen or not according to the descriptive text corresponding to the two-dimensional code and the descriptive text on the identity card photo.
Optionally, the method further includes:
analyzing the uniform resource locator address to obtain original information and signature information contained in the uniform resource locator address, wherein the original information contains user identification;
acquiring a public key corresponding to a user identifier from a pre-stored corresponding relationship between the user identifier and the public key;
carrying out Hash calculation on the original information by using the public key to obtain a Hash value of the original information;
and comparing the hash value with the signature information, and sending a notification message indicating the photo state of the identity card to the user according to the comparison result.
In a fourth aspect, an embodiment of the present application further provides an authentication method for an identity card photo, implemented based on the encryption method for an identity card photo as described above, where the method is applied to a user equipment, and includes:
scanning a two-dimensional code on an identity card photo, and receiving explanatory characters corresponding to the two-dimensional code;
and comparing the explanatory characters corresponding to the two-dimensional codes with the two-dimensional codes on the identity card photos to judge whether the identity card photos are stolen.
Optionally, the method further includes:
receiving a notification message for indicating the status of the identity card photo; wherein the identification card photo modality includes: normal and abnormal;
comparing the explanatory text corresponding to the two-dimensional code with the two-dimensional code on the identity card photo, and judging whether the identity card photo is stolen, the method comprises the following steps:
comparing the explanatory text corresponding to the two-dimensional code with the two-dimensional code on the identity card photo;
when the explanatory characters corresponding to the two-dimensional codes are different from the two-dimensional codes on the identity card photos, or the explanatory characters corresponding to the two-dimensional codes are the same as the two-dimensional codes on the identity card photos, and the notification message indicates that the state of the identity card photos is abnormal, the identity card photos are determined to be stolen;
and when the explanatory characters corresponding to the two-dimensional codes are the same as the two-dimensional codes on the identity card photos and the notification message indicates that the states of the identity card photos are normal, determining that the identity card photos are not stolen.
In a fifth aspect, an embodiment of the present application further provides an apparatus for encrypting an id card photo, where the apparatus is applied to a server side, and includes:
the descriptive text receiving unit is used for receiving descriptive text of the identity card photo sent by the user;
the two-dimensional code generating unit is used for generating a two-dimensional code according to the explanatory characters; the two-dimensional code is used for being synthesized on the identity card photo to verify whether the identity card photo is stolen.
In a sixth aspect, an embodiment of the present application further provides an apparatus for encrypting an id card photo, where the apparatus is applied to a user equipment, and the apparatus includes:
the identity card photo acquisition unit is used for acquiring an identity card photo;
the descriptive text receiving unit is used for receiving descriptive text of the identity card photo input by a user;
the sending unit is used for sending the explanatory characters to a server side, so that the server side generates a two-dimensional code for verifying whether the identity card photo is stolen or not according to the explanatory characters;
and the acquisition unit is used for acquiring the identity card photo combined with the two-dimensional code and the explanatory text.
In a seventh aspect, an embodiment of the present application further provides an apparatus for verifying an id card photo, where the apparatus is applied to a server side, and includes:
the receiving unit is used for receiving a uniform resource locator address, wherein the uniform resource locator address is obtained by scanning a two-dimensional code on an identity card photo by a user;
the analysis unit is used for analyzing the uniform resource locator address to obtain explanatory characters corresponding to the two-dimensional codes contained in the uniform resource locator address;
and the sending unit is used for sending the explanatory text corresponding to the two-dimensional code to a user so that the user can judge whether the identity card photo is stolen or not according to the explanatory text corresponding to the two-dimensional code and the explanatory text synthesized on the identity card photo.
In an eighth aspect, an embodiment of the present application further provides an apparatus for verifying an id card photo, where the apparatus is applied to a user equipment, and the apparatus includes:
the receiving unit is used for scanning the two-dimensional code on the identity card photo and receiving the explanatory text corresponding to the two-dimensional code;
and the judging unit is used for comparing the explanatory characters corresponding to the two-dimensional codes with the two-dimensional codes on the identity card photo and judging whether the identity card photo is stolen or not.
In a ninth aspect, an embodiment of the present application further provides an apparatus, including: at least one processor, at least one memory, and computer program instructions stored in the memory, which when executed by the processor, implement the method of encrypting an identification card photo as described above, and the method of verifying an identification card photo as described above.
In a tenth aspect, embodiments of the present application further provide a computer-readable storage medium, on which computer program instructions are stored, and when the computer program instructions are executed by a processor, the method for encrypting the identification card photo as described above and the method for verifying the identification card photo as described above are implemented.
According to the encryption and verification scheme of the identity card photo, the two-dimensional code used for verifying whether the identity card photo is stolen or not is generated through the explanatory text of the identity card photo input by a user, and the two-dimensional code and the explanatory text are synthesized on the identity card photo. The two-dimensional code on the identity card photo is scanned to obtain the corresponding descriptive characters, and then whether the identity card photo is stolen or not can be judged by judging whether the descriptive characters on the identity card photo are consistent with the descriptive characters corresponding to the two-dimensional code or not. In the technical scheme, even if the explanatory text on the identity card photo is tampered, the two-dimensional code cannot be forged, so that the identity card photo can be effectively prevented from being stolen.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates an exemplary system architecture in which embodiments of the present application may be applied;
fig. 2 illustrates an exemplary flowchart of an encryption method for an id card photo according to an embodiment of the present application;
fig. 3 illustrates an exemplary flowchart of an encryption method for an id card photo according to an embodiment of the present application;
FIG. 4 is a flowchart illustrating an exemplary method for verifying an ID card photo according to an embodiment of the present disclosure;
FIG. 5 is a flowchart illustrating an exemplary method for verifying an ID card photo according to an embodiment of the present disclosure;
fig. 6 illustrates an exemplary flowchart of an encryption method for an id card photo according to an embodiment of the present application;
FIG. 7 is a flowchart illustrating an exemplary method for verifying an ID card photo according to an embodiment of the present application;
fig. 8 shows an exemplary structure block diagram of an apparatus for encrypting an id card photo according to an embodiment of the present application;
fig. 9 shows an exemplary structural block diagram of an apparatus for encrypting an id card photo according to an embodiment of the present application;
fig. 10 is a block diagram illustrating an exemplary structure of an apparatus for verifying an identification card photo according to an embodiment of the present application;
fig. 11 shows an exemplary structural block diagram of an apparatus for verifying an identification card photo according to an embodiment of the present application;
FIG. 12 illustrates a schematic block diagram of a computer system suitable for use in implementing a server according to embodiments of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to FIG. 1, an exemplary system architecture 100 to which embodiments of the present application may be applied is shown.
As shown in fig. 1, system architecture 100 may include user devices 101, 102, network 103, and servers 104, 105, 106, and 107. The network 103 is the medium used to provide communication links between the user devices 101, 102 and the servers 104, 105, 106, 107. Network 103 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user 110 may use the user devices 101, 102 to interact with the servers 104, 105, 106, 107 over the network 103 to access various services, such as browsing web pages, downloading data, and the like. The user devices 101, 102 may have installed thereon various client applications, such as applications that can take photographs, including but not limited to picture processing applications and the like.
The user devices 101, 102 may be various electronic devices including, but not limited to, personal computers, smart phones, smart televisions, tablet computers, personal digital assistants, e-book readers, and so forth.
The servers 104, 105, 106, 107 may be servers that provide various services. The server may provide the service in response to a service request of the user. It will be appreciated that one server may provide one or more services, and that the same service may be provided by multiple servers.
It should be understood that the number of user devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of user devices, networks, and servers, as desired for an implementation.
As mentioned in the background, since the resident identification card is recorded with detailed and accurate information about the citizen, an unexpected result will be caused upon occurrence of the theft. Therefore, the embodiment of the application provides a scheme capable of preventing the identity card photos from being stolen. In the scheme, the two-dimensional code for verifying whether the identity card photo is stolen is generated through the explanatory text of the identity card photo input by the user, and the two-dimensional code and the explanatory text are synthesized on the identity card photo. The two-dimensional code on the identity card photo is scanned to obtain the corresponding descriptive characters, and then whether the identity card photo is stolen or not can be judged by judging whether the descriptive characters on the identity card photo are consistent with the descriptive characters corresponding to the two-dimensional code or not. In the technical scheme, even if the explanatory text on the identity card photo is tampered, the two-dimensional code cannot be counterfeited, so that the identity card photo can be effectively prevented from being stolen.
The method of the embodiment of the present application will be described below with reference to a flowchart.
Referring to fig. 2, an exemplary flowchart of an encryption method for an id card photo provided in an embodiment of the present application is shown. The method shown in fig. 2 may be performed at the server side in fig. 1.
As shown in fig. 2, the method comprises the following steps:
step 210, receiving the descriptive text of the identification card photo sent by the user.
In the embodiment of the application, the description words can be description words of the use and the use time of the identification card photo, such as 'a card gold card for applying for global communication of a certain bank, and an expiration date 2018/8/18'.
And step 220, generating a two-dimensional code according to the explanatory text, wherein the two-dimensional code is used for being synthesized on the identity card photo to verify whether the identity card photo is stolen.
In the embodiment of the application, besides the explanatory text, the identity information of the user can be received, and the two-dimensional code is generated together according to the explanatory text and the identity information of the user.
Specifically, firstly, according to the identity information of the user, a unique user identifier and a private key corresponding to the user identifier are generated;
the identity information of the user may be sent to the server when the user registers an account on the user equipment, and may include, but is not limited to, a user name, an identity card number, and the like.
Then, signing original information containing the identity information and the explanatory text of the user by using the private key to obtain signature information;
the original information may include a user name and a current date, besides the identity information and the explanatory text of the user, and the user name may be obtained from the identity information of the user.
And finally, generating the two-dimensional code based on the signature information and the unique user identification.
Specifically, the signature information, the user identifier, the original information, and the predetermined verification interface may be spliced into a Uniform Resource Locator (URL) address, and the URL address may be converted into a two-dimensional code.
Further, after the two-dimensional code is generated, the server side can send the two-dimensional code to the user, the user synthesizes the two-dimensional code and the explanatory text on the identity card photo, and the two-dimensional code and the explanatory text can also be synthesized on the identity card photo which is received in advance and then fed back to the user.
Referring to fig. 3, an exemplary flowchart of an encryption method for an id card photo provided in an embodiment of the present application is shown. The method shown in fig. 3 may be performed at the user equipment side in fig. 1.
As shown in fig. 3, the method comprises the following steps:
step 310, obtaining an identification card photo.
In the embodiment of the application, the user can shoot the identity card through the camera on the user equipment to obtain the identity card photo, and can also directly obtain the identity card photo through other user equipment.
Step 320, receiving the descriptive text of the identification card photo input by the user.
In the embodiment of the application, the descriptive text can be descriptive text of the use and the use time of the ID card photo, such as 'for applying for a bank global communication card, an expiration date 2018/8/18'.
And step 330, sending the descriptive text to the server side, so that the server side generates a two-dimensional code for verifying whether the identity card photo is stolen according to the descriptive text.
Besides sending the explanatory words to the server side, the user can also send the identity information of the user to the server side, so that the server side generates the two-dimensional code according to the explanatory words and the identity information. The identity information may be sent by the user at the time of account registration on the user device.
And step 340, acquiring an identity card photo synthesized with the two-dimensional code and the explanatory text.
Specifically, the id card photo synthesized with the two-dimensional code and the explanatory text may be actively synthesized and obtained by the user equipment, for example: receiving a two-dimensional code sent by a server side, and synthesizing the two-dimensional code and explanatory characters on an identity card photo; the user equipment side can also receive and acquire the two-dimensional code passively, for example, the identity card photo is sent to the server side, so that the server side can synthesize the generated two-dimensional code and the explanatory text on the identity card photo, and receive the identity card photo which is returned by the server side and synthesized with the two-dimensional code and the explanatory text.
The two-dimensional code and the explanatory text are synthesized to a fixed position on the identity card photo on the principle that main information on the identity card photo is not shielded no matter the synthesis operation is realized by the user equipment side or the server side.
Based on the encryption method of the identity card photo, the embodiment of the application also provides a verification method of the identity card photo. Referring to fig. 4, an exemplary flowchart of a method for verifying an identification card photo provided in an embodiment of the present application is shown. The method shown in fig. 4 may be performed at the server side in fig. 1.
And step 410, the server receives a URL address, wherein the URL address is obtained by scanning a two-dimensional code on an identity card photo by a user.
And step 420, analyzing the URL address to obtain the explanatory text corresponding to the two-dimensional code contained in the URL address.
Specifically, the original information contained in the URL address is analyzed from the URL address, and then the explanatory text corresponding to the two-dimensional code is obtained from the original information.
And 430, sending the descriptive text corresponding to the two-dimensional code to the user so that the user can judge whether the identity card photo is stolen according to the descriptive text corresponding to the two-dimensional code and the descriptive text on the identity card photo.
Further, the method may further include:
analyzing the URL address to acquire original information and signature information contained in the URL, wherein the original information contains a user identifier;
acquiring a public key corresponding to the user identifier from a pre-stored corresponding relationship between the user identifier and the public key;
carrying out Hash calculation on the original information by using the public key to obtain a Hash value;
comparing the hash value with the signature information, and sending a notification message indicating the state of the identity card photo to the user according to the comparison result; the status of the identification card photo can include normal and abnormal, when the hash value is consistent with the signature information, the status of the identification card photo is normal, and when the hash value is inconsistent with the signature information, the status of the identification card photo is abnormal.
Referring to fig. 5, an exemplary flowchart of a method for verifying an identification card photo provided in an embodiment of the present application is shown. The method shown in fig. 5 may be performed at the user equipment side in fig. 1.
Step 510, scanning the two-dimensional code on the identification card photo, and receiving the explanatory text corresponding to the two-dimensional code.
In the embodiment of the application, the user shares the identity card photo with the two-dimensional code and the explanatory text to the third-party office staff, the third-party office staff firstly checks the explanatory text on the identity card photo, and if the purpose defined in the explanatory text is different from the service to be handled by the identity card photo, or the current time exceeds the use time defined in the explanatory text, the identity card photo is directly determined to be falsely used, and the handling of related services for the identity card photo can be refused. If the application defined in the description text conforms to the service to be transacted currently and the current time does not exceed the use time defined in the description text, the two-dimensional code can be scanned by using a two-dimensional code scanning device, and then the description text corresponding to the two-dimensional code is obtained.
Specifically, a two-dimensional code scanning device is used for scanning a two-dimensional code on an identity card photo to obtain a URL (uniform resource locator) address corresponding to the two-dimensional code, and then the URL address is sent to obtain explanatory characters corresponding to the two-dimensional code.
In practical application, after the URL address corresponding to the two-dimensional code is obtained, a browser is used to open a webpage corresponding to the URL address, and the webpage displays the explanatory text corresponding to the two-dimensional code.
And step 520, comparing the explanatory text corresponding to the two-dimensional code with the explanatory text on the identity card photo, and judging whether the identity card photo is stolen.
Specifically, when the explanatory text corresponding to the two-dimensional code is inconsistent with the explanatory text on the identity card photo, the identity card photo is stolen; and when the explanatory characters corresponding to the two-dimensional code are consistent with the explanatory characters on the identity card photo, the identity card photo is not stolen.
Further, the method may further include:
receiving a notification message for indicating the status of the identity card photo; wherein, the status of the ID card photo comprises normal and abnormal.
Step 520 may specifically include:
when the explanatory characters corresponding to the two-dimensional code are different from the two-dimensional code on the identity card photo, or the explanatory characters corresponding to the two-dimensional code are the same as the two-dimensional code on the identity card photo, and the notification message indicates that the state of the identity card photo is abnormal, determining that the identity card photo is stolen;
and when the explanatory characters corresponding to the two-dimensional codes are the same as the two-dimensional codes on the identity card photos and the notification message indicates that the states of the identity card photos are normal, determining that the identity card photos are not stolen.
According to the encryption and verification scheme of the identity card photo, the two-dimensional code used for verifying whether the identity card photo is stolen or not is generated through the explanatory text of the identity card photo input by a user, and the two-dimensional code and the explanatory text are synthesized on the identity card photo. The two-dimensional code on the identity card photo is scanned to obtain the corresponding descriptive characters, and then whether the identity card photo is stolen or not can be judged by judging whether the descriptive characters on the identity card photo are consistent with the descriptive characters corresponding to the two-dimensional code or not.
In the technical scheme, even if the explanatory text on the identity card photo is tampered, the two-dimensional code cannot be counterfeited, so that the identity card photo can be effectively prevented from being stolen. Specifically, the two-dimensional code on each identification card photo is unique, and includes related information of the identification card, such as a user identifier generated according to the identity information of the user and signature information obtained by signing original information including the identity information of the user and explanatory text with a private key corresponding to the user identifier, which are unknown to others, so that the two-dimensional code cannot be forged.
The process of encrypting and verifying the identification card photo will be further described with reference to the flow chart.
Referring to fig. 6, an exemplary flowchart of an encryption method for an id card photo provided in an embodiment of the present application is shown.
As shown in fig. 6, the method comprises the following steps:
in step 610, the user registers an account with the server using the user device.
In step 620, the server generates a unique user identifier ID of the registered account, and a private key Kp and a public key Kb corresponding to the user identifier.
Generally, when a user registers an account on user equipment, identity information of the user, such as a user name M and an identification number B, is sent to a server, and after receiving the identity information, the server generates a unique user identifier ID, and a private key Kp and a public key Kb corresponding to the unique user identifier ID for the identity information.
Step 630, the user takes a picture of the identity card on the user equipment to obtain an identity card photo, and inputs the descriptive text of the identity card photo.
The description character input by the user is denoted by the letter "H", and in the embodiment of the present application, "H" = "is used for applying for a global communication gold card of a certain bank, and the expiration date 2018/8/18" is taken as an example.
In step 640, the ue sends the caption H to the server.
And step 650, the server side splices the user name M, the identification card number B, the current date D and the explanatory text H into original information w, namely w = M + B + D + H.
For example: w = Li Xiaoming, 100202001019999, 20180808, applies for a bank global communication card gold card, and the expiration date is 2018/8/18.
And step 660, the server signs the original information w by using the private key Kp of the user to obtain signature information s.
And step 670, the server side splices the original information w, the signature string s, the user identification ID and the verification interface U into a complete URL address, and generates a two-dimensional code from the URL address and returns the two-dimensional code to the user equipment.
Where URL = U + ID + w + s, i.e.
URL=http://www.abc.com/verifyID/100100202001019999/dow=”xxx”&s=”xxx”
And step 680, the user equipment synthesizes the received two-dimensional code and the explanatory text H into a fixed position of the identity card photo, and synthesizes an identity card photo with an anti-counterfeiting function without influencing main information on the identity card photo.
The user can share the identification card photo with the anti-counterfeiting function to third-party office staff.
Referring to fig. 7, an exemplary flowchart of a method for verifying an identification card photo provided in an embodiment of the present application is shown.
As shown in fig. 7, the method comprises the following steps:
in step 710, the third party clerk first checks the legend H on the identification card photo.
If the purpose limited in the caption H is different from the service to be transacted by the identity card picture or the current time exceeds the use time limited in the caption, the identity card picture is directly determined to be falsely used, and the related service can be refused to be transacted. If the usage defined in the caption conforms to the current business to be transacted and the current time does not exceed the usage time defined in the caption, the two-dimensional code scanning device can be used for scanning the usage.
And 720, directly scanning the two-dimensional code on the identity card photo by a third party clerk by using a two-dimensional code scanning tool to obtain a URL address corresponding to the two-dimensional code, and sending the URL address to the server side.
Such as:
URL=http://www.abc.com/verifyID/100100202001019999/dow=”xxx”&s=”xxx”
step 730, the server analyzes the URL address to obtain the original information w and the signature information s included in the URL address.
Step 740, parsing the explanatory text h and the user identification ID corresponding to the two-dimensional code from the original information w.
And step 750, searching the corresponding public key Kb by using the user identification ID, and performing hash calculation on the original information w to obtain a hash value S.
Step 760, comparing the hash value S with the signature information S to obtain a comparison result.
If the two pictures are the same, the state of the identity card picture is proved to be normal, and if the two pictures are not the same, the state of the identity card picture is proved to be abnormal.
And step 770, the server displays the analyzed h and the notification message generated based on the comparison result back to the page corresponding to the URL address.
The third party clerk would then see h and a notification message that characterizes the status of the identification card photo.
If H is the same as H and the notification message indicates that the status of the identity card photo is normal, determining that the identity card photo is not stolen;
and if H is the same as H, but the notification message indicates that the status of the identity card photo is abnormal, determining that the identity card photo is stolen. In this case, both the descriptive text on the identification card photo and the descriptive text carried in the URL location are tampered.
And if H is different from H and the notification message indicates that the status of the identity card photo is abnormal, determining that the identity card photo is stolen. In this case, the explanatory text on the identification card sheet is falsified.
It should be noted that while the operations of the method of the present invention are depicted in the drawings in a particular order, this does not require or imply that the operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Rather, the steps depicted in the flowcharts may change the order of execution. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
Based on the encryption method of the identity card photo, the embodiment of the application also provides an encryption device of the identity card photo, and the device is applied to a server side. Referring to fig. 8, the apparatus includes:
a caption receiving unit 810, configured to receive a caption of an id card photo sent by a user;
a two-dimensional code generating unit 820, configured to generate a two-dimensional code according to the explanatory text; the two-dimensional code is used for being synthesized on the identity card photo to verify whether the identity card photo is stolen.
Optionally, the encryption apparatus may further include:
and the identity information receiving unit is used for receiving the identity information of the user.
The two-dimensional code generating unit 820 is configured to generate the two-dimensional code according to the identity information of the user and the explanatory text.
Specifically, the two-dimensional code generating unit 820 is specifically configured to:
generating a user identifier and a private key corresponding to the user identifier according to the identity information of the user;
signing original information containing the identity information of the user and the explanatory text by using the private key to obtain signature information;
and generating the two-dimensional code based on the signature information and the user identification.
The two-dimensional code generating unit 820 is specifically configured to, when executing generation of the two-dimensional code based on the signature information and the user identifier:
splicing the signature information, the user identification, the original information and a predetermined verification interface into a uniform resource locator address;
and converting the uniform resource locator address into a two-dimensional code.
Optionally, the apparatus may further include:
the first sending unit is used for sending the two-dimensional code to the user so that the user can synthesize the two-dimensional code and the explanatory text on the identity card photo; or
The second sending unit is used for receiving the identity card photo; and synthesizing the two-dimensional code and the explanatory text on the identity card photo and feeding back to the user.
It should be understood that the subsystems or units recited in the apparatus correspond to various steps in the method described with reference to fig. 2. Thus, the operations and features described above for the method are equally applicable to the apparatus and the units comprised therein and will not be described in further detail here.
Based on the encryption method of the identity card photo, the embodiment of the application also provides an encryption device of the identity card photo, and the device is applied to a user equipment terminal. Referring to fig. 9, the apparatus includes:
an identification card photo obtaining unit 910, configured to obtain an identification card photo;
a description character receiving unit 920, configured to receive description characters of the identification card photo input by the user;
a sending unit 930, configured to send the explanatory text to a server side, so that the server side generates a two-dimensional code for verifying whether the identity card photo is stolen according to the explanatory text;
an obtaining unit 940 is configured to obtain an identification card photo in which the two-dimensional code and the explanatory text are combined.
Optionally, the encryption apparatus may further include:
and the identity information sending unit is used for sending the identity information of the user to the server side, so that the server side generates the two-dimensional code according to the explanatory text and the identity information of the user.
Optionally, the obtaining unit 940 is specifically configured to:
receiving the two-dimension code sent by the server; synthesizing the two-dimensional code and the explanatory text on the identity card photo; or
Sending the identity card photo to the server side; and receiving the identity card photo which is fed back by the server and combined with the description words and the two-dimensional code.
It should be understood that the subsystems or units recited in the apparatus correspond to the various steps in the method described with reference to fig. 3. Thus, the operations and features described above for the method are equally applicable to the apparatus and the units comprised therein and will not be described in further detail here.
Based on the authentication method of the identity card photo, the embodiment of the application also provides an authentication device of the identity card photo, and the device is applied to a server side. Referring to fig. 10, the apparatus includes:
a receiving unit 1010, configured to receive a uniform resource locator address, where the uniform resource locator address is obtained by scanning a two-dimensional code on an identity card photo by a user;
an analyzing unit 1020, configured to analyze the uniform resource locator address, obtain original information included in the uniform resource locator address, and determine a descriptive text included in the original information as a descriptive text corresponding to the two-dimensional code;
a sending unit 1030, configured to send the explanatory text corresponding to the two-dimensional code to a user, so that the user can determine whether the identification card photo is stolen according to the explanatory text corresponding to the two-dimensional code and the explanatory text synthesized on the identification card photo.
Optionally, the verification apparatus may further include:
a notification message sending unit configured to:
analyzing the uniform resource locator address to obtain original information, signature information and user identification contained in the uniform resource locator address;
acquiring a public key corresponding to a user identifier from a pre-stored corresponding relationship between the user identifier and the public key;
carrying out Hash calculation on the original information by using the public key to obtain a Hash value of the original information;
and comparing the hash value with the signature information, and sending a notification message indicating the photo state of the identity card to the user according to the comparison result.
It should be understood that the subsystems or units recited in the apparatus correspond to various steps in the method described with reference to fig. 4. Thus, the operations and features described above for the method are equally applicable to the apparatus and the units comprised therein and will not be described in further detail here.
Based on the authentication method of the identity card photo, the embodiment of the application also provides an authentication device of the identity card photo, and the device is applied to a user equipment terminal. Referring to fig. 11, the apparatus includes:
the receiving unit 1110 is configured to scan a two-dimensional code on an identity card photo and receive an explanatory text corresponding to the two-dimensional code;
the judging unit 1120 is configured to compare the explanatory text corresponding to the two-dimensional code with the two-dimensional code on the identification card photo, and judge whether the identification card photo is stolen.
Optionally, the verification apparatus may further include:
a notification message receiving unit configured to:
receiving a notification message for indicating the status of the identity card photo; wherein the identification card photo modality includes: normal and abnormal;
the determining unit 1120 is specifically configured to:
when the explanatory characters corresponding to the two-dimensional codes are different from the two-dimensional codes on the identity card photos, or the explanatory characters corresponding to the two-dimensional codes are the same as the two-dimensional codes on the identity card photos, and the notification message indicates that the state of the identity card photos is abnormal, the identity card photos are determined to be stolen;
and when the explanatory characters corresponding to the two-dimensional codes are the same as the two-dimensional codes on the identity card photos and the notification message indicates that the states of the identity card photos are normal, determining that the identity card photos are not stolen.
It should be understood that the subsystems or units recited in the apparatus correspond to the various steps in the method described with reference to fig. 5. Thus, the operations and features described above for the method are equally applicable to the apparatus and the units comprised therein and will not be described in further detail here.
Referring now to FIG. 12, shown is a block diagram of a computer system 1200 suitable for use in implementing a server according to embodiments of the present application.
As shown in fig. 12, the computer system 1200 includes a Central Processing Unit (CPU) 1201, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 1202 or a program loaded from a storage section 1208 into a Random Access Memory (RAM) 1203. In the RAM 1203, various programs and data necessary for the operation of the system 1200 are also stored. The CPU 1201, ROM 1202, and RAM 1203 are connected to each other by a bus 1204. An input/output (I/O) interface 1205 is also connected to bus 1204.
The following components are connected to the I/O interface 1205: an input section 1206 including a keyboard, a mouse, and the like; an output portion 1207 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 1208 including a hard disk and the like; and a communication section 1209 including a network interface card such as a LAN card, a modem, or the like. The communication section 1209 performs communication processing via a network such as the internet. A driver 1210 is also connected to the I/O interface 1205 as needed. A removable medium 1211, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is mounted on the drive 1210 as necessary, so that a computer program read out therefrom is mounted into the storage section 1208 as necessary.
In particular, the processes described above with reference to fig. 2-7 may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program containing program code for performing the methods of fig. 2-7. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 1209, and/or installed from the removable medium 1211.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor. The names of these units or modules do not in some cases constitute a limitation of the unit or module itself.
As another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus in the above-described embodiments; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the formula input methods described herein.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by a person skilled in the art that the scope of the invention as referred to in the present application is not limited to the embodiments with a specific combination of the above-mentioned features, but also covers other embodiments with any combination of the above-mentioned features or their equivalents without departing from the inventive concept. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (14)

1. An encryption method for identity card photos is applied to a server side, and comprises the following steps:
receiving explanatory words of an identity card photo sent by a user;
according to the explanatory text, generating a two-dimensional code, comprising:
generating a user identifier and a private key and a public key corresponding to the user identifier according to the identity information of the user;
signing the original information containing the identity information of the user and the explanatory text by using the private key to obtain signature information;
generating the two-dimensional code based on the signature information and the user identification;
the signature information is used for verifying whether the original information of the explanatory text on the identity card photo and the explanatory text carried by the two-dimensional code is tampered or not subsequently;
the two-dimensional code is used for being synthesized on the identity card photo to verify whether the identity card photo is stolen or not;
the public key is used for analyzing the signature information subsequently, and the original information comprises the explanatory text and the identity information of the user.
2. The encryption method according to claim 1, wherein the generating the two-dimensional code based on the signature information and the user identification comprises:
splicing the signature information, the user identification, the original information and a predetermined verification interface into a uniform resource locator address;
and converting the uniform resource locator address into a two-dimensional code.
3. The encryption method of claim 1, further comprising:
sending the two-dimensional code to the user so that the user can synthesize the two-dimensional code and the explanatory text on the identity card photo; or
Receiving the identity card photo;
and synthesizing the two-dimensional code and the explanatory text on the identity card photo and feeding back to the user.
4. An encryption method for id card photo based on the encryption method of claim 1, wherein the method is applied to the user equipment side, and comprises:
acquiring an identity card photo;
receiving the descriptive words of the identity card photo and the user identity information input by the user;
sending the explanatory characters and the user identity information to a server side, so that the server side generates a two-dimensional code for verifying whether the identity card photo is stolen or not according to the explanatory characters and the user identity information;
the two-dimension code comprises a user identification and signature information, the user identification and the signature information are used for comparing and verifying the state of the identity card photo at the server side, and the state of the identity card photo comprises normal state and abnormal state;
and acquiring an identity card photo synthesized with the two-dimensional code and the explanatory text.
5. The encryption method according to claim 4, wherein the obtaining of the identification card photo combined with the two-dimensional code and the explanatory text comprises:
receiving the two-dimension code sent by the server;
synthesizing the two-dimensional code and the explanatory text on the identity card photo; or
Sending the identity card photo to the server side; and are
And receiving the ID card photo which is fed back by the server and combined with the explanatory text and the two-dimensional code.
6. The method for verifying the identification card photo based on the encryption method of claim 2 is applied to a server side, and comprises the following steps:
receiving a uniform resource locator address, wherein the uniform resource locator address is obtained by scanning a two-dimensional code on an identity card photo by a user;
analyzing the uniform resource locator address to obtain explanatory characters corresponding to the two-dimensional codes contained in the uniform resource locator address;
sending the descriptive text corresponding to the two-dimensional code to a user so that the user can judge whether the identity card photo is stolen or not according to the descriptive text corresponding to the two-dimensional code and the descriptive text on the identity card photo;
the method further comprises the following steps:
analyzing the uniform resource locator address to obtain original information, signature information and user identification contained in the uniform resource locator address;
acquiring a public key corresponding to a user identifier from a pre-stored corresponding relationship between the user identifier and the public key;
performing hash calculation on the original information to obtain a hash value of the original information;
and comparing the hash value with the signature information, and sending a notification message indicating the photo state of the identity card to the user according to the comparison result.
7. A method for verifying identity card photos based on the encryption method of any one of claims 4 to 5, wherein the method is applied to a user equipment side and comprises the following steps:
scanning a two-dimensional code on an identity card photo, and receiving explanatory characters corresponding to the two-dimensional code;
comparing the explanatory characters corresponding to the two-dimensional codes with the two-dimensional codes on the identity card photos, and judging whether the identity card photos are stolen or not;
and receiving a notification message for indicating the status of the identity card photo.
8. The method of claim 7, wherein the identification card photo modality comprises: normal and abnormal;
the method further comprises the following steps:
comparing the explanatory text corresponding to the two-dimensional code with the two-dimensional code on the identity card photo, and judging whether the identity card photo is stolen, the method comprises the following steps:
comparing the explanatory text corresponding to the two-dimensional code with the two-dimensional code on the identity card photo;
when the explanatory characters corresponding to the two-dimensional codes are different from the two-dimensional codes on the identity card photos, or the explanatory characters corresponding to the two-dimensional codes are the same as the two-dimensional codes on the identity card photos, and the notification message indicates that the state of the identity card photos is abnormal, the identity card photos are determined to be stolen;
and when the explanatory characters corresponding to the two-dimensional codes are the same as the two-dimensional codes on the identity card photos and the notification message indicates that the states of the identity card photos are normal, determining that the identity card photos are not stolen.
9. An encryption device for ID photos, wherein the device is applied to a server side, and comprises:
the descriptive text receiving unit is used for receiving descriptive text of the identity card photo sent by the user;
the two-dimensional code generating unit is used for generating a two-dimensional code according to the explanatory text, and comprises:
generating a user identifier and a private key and a public key corresponding to the user identifier according to the identity information of the user; signing original information containing the identity information of the user and the explanatory text by using the private key to obtain signature information; generating the two-dimensional code based on the signature information and the user identification; the signature information is used for verifying whether the original information of the explanatory text on the identity card photo and the explanatory text carried by the two-dimensional code is tampered or not subsequently; the two-dimensional code is used for being synthesized on the identity card photo to verify whether the identity card photo is stolen or not; the public key is used for subsequently analyzing the signature information, and the original information comprises the explanatory text and the identity information of the user.
10. An apparatus for encrypting ID card photos, wherein the apparatus is applied to a user equipment, and comprises:
the identity card photo acquisition unit is used for acquiring an identity card photo;
the descriptive text receiving unit is used for receiving descriptive text of the identity card photo input by a user;
the sending unit is used for sending the explanatory characters to a server side, so that the server side generates a two-dimensional code for verifying whether the identity card photo is stolen or not according to the explanatory characters and the identity information of the user; the two-dimension code comprises a user identification and signature information, the user identification and the signature information are used for comparing and verifying the state of the identity card photo at the server side, and the state of the identity card photo comprises normal state and abnormal state;
and the acquisition unit is used for acquiring the identity card photo combined with the two-dimensional code and the explanatory text.
11. The device for verifying the identity card photo is applied to a server side and comprises the following components:
the receiving unit is used for receiving a uniform resource locator address, wherein the uniform resource locator address is obtained by scanning a two-dimensional code on an identity card photo by a user;
the analysis unit is used for analyzing the uniform resource locator address to obtain explanatory characters corresponding to the two-dimensional codes contained in the uniform resource locator address; the system comprises a uniform resource locator address, a signature information acquisition module, a signature analysis module and a user identification module, wherein the uniform resource locator address is used for analyzing the uniform resource locator address to acquire original information, signature information and a user identification contained in the uniform resource locator address; acquiring a public key corresponding to a user identifier from a pre-stored corresponding relationship between the user identifier and the public key; performing hash calculation on the original information to obtain a hash value of the original information; comparing the hash value with the signature information, and sending a notification message indicating the state of the identity card photo to the user according to the comparison result;
and the sending unit is used for sending the explanatory text corresponding to the two-dimensional code to a user so that the user can judge whether the identity card photo is stolen or not according to the explanatory text corresponding to the two-dimensional code and the explanatory text synthesized on the identity card photo.
12. An authentication apparatus for implementing the authentication method according to claim 7, wherein the apparatus is applied to a user equipment, and comprises:
the receiving unit is used for scanning the two-dimensional code on the identity card photo and receiving the explanatory text corresponding to the two-dimensional code;
and the judging unit is used for comparing the explanatory characters corresponding to the two-dimensional codes with the two-dimensional codes on the identity card photo, judging whether the identity card photo is stolen or not and receiving a notification message for indicating the state of the identity card photo.
13. An electronic device, comprising: at least one processor, at least one memory, and computer program instructions stored in the memory, wherein the computer program instructions, when executed by the processor, implement the encryption method of any one of claims 1-5 or the authentication method of any one of claims 6-8.
14. A computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the encryption method of any one of claims 1-5 or the authentication method of any one of claims 6-8.
CN201810997129.2A 2018-08-29 2018-08-29 Encryption and verification method of identity card photo, related device and storage medium Active CN109086618B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810997129.2A CN109086618B (en) 2018-08-29 2018-08-29 Encryption and verification method of identity card photo, related device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810997129.2A CN109086618B (en) 2018-08-29 2018-08-29 Encryption and verification method of identity card photo, related device and storage medium

Publications (2)

Publication Number Publication Date
CN109086618A CN109086618A (en) 2018-12-25
CN109086618B true CN109086618B (en) 2022-10-11

Family

ID=64795085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810997129.2A Active CN109086618B (en) 2018-08-29 2018-08-29 Encryption and verification method of identity card photo, related device and storage medium

Country Status (1)

Country Link
CN (1) CN109086618B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4454610B2 (en) * 2006-10-24 2010-04-21 シャープ株式会社 Image forming apparatus
CN102970140B (en) * 2012-11-15 2015-06-03 郑铭浚 Electronic authentication system for enterprise or personal authorization information
CN106569756A (en) * 2016-11-04 2017-04-19 北京小米移动软件有限公司 Method and device for copy false proofing

Also Published As

Publication number Publication date
CN109086618A (en) 2018-12-25

Similar Documents

Publication Publication Date Title
CN112333198B (en) Secure cross-domain login method, system and server
US9723050B2 (en) Tag authentication and location verification service
CN109598663B (en) Method and device for providing and acquiring safety identity information
US10235672B2 (en) Securely receiving from a remote user sensitive information and authorization to perform a transaction using the sensitive information
US20160323107A1 (en) Secure Optical Codes for Accessing Content
CN114417344A (en) Resource security integration platform
JP5413048B2 (en) Personal authentication system, personal authentication method
CN114500093A (en) Safe interaction method and system for message information
KR101940310B1 (en) Apparatus for verifying website and method thereof
CN112598810A (en) Exhibition entrance processing method and device
KR100748676B1 (en) How to verify ID card forgery by comparison
CN113553302A (en) Credit report acquisition method, system, equipment and storage medium
WO2020233223A1 (en) Payment method, apparatus and system, device, and storage medium
JP6899202B2 (en) E-commerce authentication system
CN109086618B (en) Encryption and verification method of identity card photo, related device and storage medium
KR20150044067A (en) System, User Device, Identification card Issue Device, Finger print Authentication Device and Method for issuing the idendification card using the finger print information
KR20200126313A (en) Method and System for authenticating documents using inquiry history notice
WO2018066426A1 (en) Fake web page determination device, fake web page determination system, fake web page determination method, and fake web page determination program
KR20140059975A (en) Internet certificates issuing system and method thereof
CA2891432C (en) Securely receiving from a remote user sensitive information and authorization to perform a transaction using the sensitive information
KR20040074358A (en) The detection method of a counterfeited identification card
Mohamed et al. Protecting wireless data transmission in mobile application systems using digital watermarking technique
US20240113879A1 (en) Generating ownership tags for decentralized verification
US20240113889A1 (en) Verifying ownership using decentralized verification
CN110189115B (en) Transaction channel access method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant