CN117320008B - 5G message tax system and processing method thereof - Google Patents

5G message tax system and processing method thereof Download PDF

Info

Publication number
CN117320008B
CN117320008B CN202311602475.3A CN202311602475A CN117320008B CN 117320008 B CN117320008 B CN 117320008B CN 202311602475 A CN202311602475 A CN 202311602475A CN 117320008 B CN117320008 B CN 117320008B
Authority
CN
China
Prior art keywords
user
tax
message
information
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311602475.3A
Other languages
Chinese (zh)
Other versions
CN117320008A (en
Inventor
王彪
任燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi Palm Power Network Technology Co ltd
Original Assignee
Jiangxi Palm Power Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi Palm Power Network Technology Co ltd filed Critical Jiangxi Palm Power Network Technology Co ltd
Priority to CN202311602475.3A priority Critical patent/CN117320008B/en
Publication of CN117320008A publication Critical patent/CN117320008A/en
Application granted granted Critical
Publication of CN117320008B publication Critical patent/CN117320008B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/761Proximity, similarity or dissimilarity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Tourism & Hospitality (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Computing Systems (AREA)
  • Educational Administration (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Artificial Intelligence (AREA)
  • Development Economics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The tax system of 5G message and its processing method that the invention provides, tax business transacts and uses, through the security verification of the security management module, guarantee accuracy and legitimacy of user's identity, at the same time, when transacting the sensitive business, call the security management module again to carry on the security verification, adopt the matching method of Minutiae of fingerprint identification and facial image identification characteristic point match method, guarantee the security of the data and prevent the information from revealing, carry on the security management to the biological identification information that the tax system of 5G message gathers, and when the user terminal is cartoon, adopt part of characteristic value recognition, raise the response efficiency, adopt the dynamic configuration algorithm, update the function list corresponding to different user's identities.

Description

5G message tax system and processing method thereof
Technical Field
The invention relates to the field of tax system safety management, in particular to a 5G message tax system and a processing method thereof.
Background
While maintaining the advantages of "faster transmission speed, greater limited data transmission capability, greater connectivity, lower latency, greater message capacity, better security, and lower cost and power consumption components", the 5G message has the drawback that the drawbacks of "loss of information, information churning during authentication of the identity security of the information user, information confidentiality still remain" are difficult to overcome, and a good balance of processing is critical, such as: in order to keep the information secret, 10 complex encryption means are added, the response time is delayed, and the defect of information blocking is obvious.
Particularly, old users, old mobile phones and low-version smart phones can have longer response time, information is blocked, the users need to authenticate identity for many times because of the blocking, the user experience is poor, and good balance of processing needs to be found at the moment instead of only emphasizing importance of a certain aspect.
In the tax business handling of 5G, the login and use of personal information of a plurality of common employees of an enterprise can be supported, when hundreds of employees of the enterprise use a 5G mobile phone APP to log in and modify personal monthly tax-free information and interact with information check between financial departments of the enterprise, the interaction cannot be satisfied by a 4G communication architecture and the 4G mobile phone APP in the past, and when the conditions that hundreds of employees of the enterprise use the 5G mobile phone APP are satisfied, smooth operation steps are designed, data processing means for processing numerous and complicated information are selected, so that the blocking is greatly reduced, and the information loss of the cache is critical.
Disclosure of Invention
The invention aims to provide a 5G message tax system and a processing method thereof.
The invention aims to solve the problems that: when the personal user and the enterprise user tax business transact and use, the accuracy and the legality of the user identity are ensured through the safety verification of the safety management module, meanwhile, when the sensitive business transact and use, the safety management module is called again to carry out the safety verification, the safety of data is ensured, the information leakage is prevented, the safety problem is solved, the collected biological identification information is safely managed, the response speed of the user side is improved when the user side is blocked, and the user experience is improved.
A 5G message tax system, comprising:
5G message terminal module: generating a visual 5G message page for a user to view at a mobile phone terminal, wherein the 5G message terminal module displays different function lists controlled by the tax service management module to the user, namely tax services authorized to be used by the tax service management module, and can only be displayed to the user and used by the user;
5G message receiving module: when a user sends a tax service handling instruction, receiving a service handling instruction or data sent by the user through a 5G message terminal module, and simultaneously sending an http request to an API interface of a tax department;
when the tax department returns the business information, receiving the business information fed back by the tax department, and simultaneously forwarding the data result processed by the data processing module to the mobile phone terminal of the user;
and a data processing module: according to the data requirement of the 5G message terminal module, data packaging is carried out on the data fed back by the tax department, and the data processing module needs to acquire specific parameter packaging requirements from the tax service management module;
when a user applies for handling tax service, the received request information is converted into standard API interface parameters according to the API interface requirements of tax departments, and the data processing module is required to acquire specific parameter encapsulation requirements from the tax service management module;
tax service management module: controlling whether different tax service functions can be displayed and used outwards, and controlling whether the tax service functions are public functions or not;
simultaneously storing parameter packaging requirements corresponding to different tax services, wherein the packaging requirements comprise two parts, namely, the parameter requirements of the 5G message terminal module and the parameter requirements of an API interface of a tax department;
simultaneously controlling the 5G message templates returned to the user by different tax services and dynamic data required by the corresponding templates, namely, sending request acquisition data to an operator or sending request acquisition data to a tax department;
meanwhile, controlling the specific content of the 5G message template, namely the number, the arrangement and the combination mode of pictures, videos, audios, texts and connection information contained in the specific 5G message template;
and a safety management module: the method comprises the steps of collecting and storing biological information and basic information of a user, carrying out security verification on the biological information and the basic information when the user logs in each time, returning verification results to other modules, and allowing the user to further operate if the verification results pass.
A processing method of a 5G message tax system is based on the processing of the 5G message tax system, and adopts the following technical scheme:
the user also needs to call the security management module to carry out security verification again when handling sensitive business, wherein the security verification adopts a biological feature recognition algorithm and comprises the following steps:
(1) A user registration stage:
a: the user provides biological information required for biological feature recognition, namely fingerprints and facial images;
b: the system preprocesses the acquired biological information through denoising and normalization:
c: storing the preprocessed biological information as a biological characteristic template of the user;
(2) And (3) an identification stage:
a: the user scans using a biometric device such as a fingerprint sensor, a camera;
b: the equipment collects biological information and preprocesses the collected biological information through denoising and normalization;
c: comparing the preprocessed biological information with a biological characteristic template of a registered user;
d: the similarity score between the biological information is calculated by the system, the similarity of the matching quantity and the positions of Minutiae between two fingerprints is calculated by adopting a Minutiae matching method in fingerprint identification, the similarity score is calculated, key feature points in the facial image are detected and matched by adopting a feature point matching method in facial image identification, such as eyes, noses and mouths, and the similarity score of the feature points is calculated;
e: judging whether the similarity score exceeds a preset threshold value, if so, verifying to pass, and allowing the user to perform sensitive business operation;
and (3) implementing a strict access control mechanism for biological information of the acquired fingerprint and facial image, only authorizing a specific person to access the fingerprint and facial information, adopting multi-factor authentication to ensure the security of the biological information, and realizing by combining first factor authentication and second factor authentication, wherein the first factor authentication is used for authenticating the first identity authentication factor provided by the accessing person, the second factor authentication is used for authenticating the first identity authentication factor provided by the accessing person, and after the second factor authentication is used for authenticating the accessing person, the system requires the accessing person to provide the second factor authentication information which is short message authentication code, hardware security key, fingerprint or facial recognition, and only after the two factors pass authentication, the accessing person can access the stored biological information of the fingerprint and facial image.
Further, in the method for handling tax service by using 5G message, when encountering a user terminal, the security management module adopts a part of characteristic values to carry out comparison verification when carrying out verification, and the steps are as follows:
p1: the system calculates a jamming index to analyze whether a jamming problem exists or not;
network delay monitoring: measuring network delay by sending a test request to a user terminal and calculating the time difference between arrival and response of the request, detecting the loss rate of a network packet and recording the loss rate as a packet loss index and the utilization rate of network bandwidth as a bandwidth index;
network time delay measures network delay by sending test requests to a user terminal and calculating time difference of request arrival and response, and records network test request sending timeRecording network test request receiving time +.>The network time delay index is +.>
Katon index =* Delay index + of>* Bandwidth index + for>* Packet loss index, set up katonAn index threshold value exceeding the threshold value, determining that the user terminal is stuck, wherein +.>、/>And->Satisfy->
Setting the threshold value to randomly send a test request to the user terminal under normal conditions, and analyzing the delay index, the bandwidth index and the packet loss index under the normal conditions obtained by the test、/>And +.>Set to 0.5, 0.3 and 0.2 respectively;
p2: partial information verification, wherein under the condition that the user end is detected to be stuck, the security management module adopts partial characteristic values to carry out comparison verification, mantissa authentication is adopted for the mobile phone number, four-bit authentication is adopted after identity card information is adopted, and partial characteristic values can be adopted for text information to carry out verification;
for fingerprint identification, the system requires a user to randomly select fingerprint lines at a plurality of specific positions in the verification process to serve as verification factors;
for facial recognition, the system provides a blurred mask or reference image, requiring the user to verify by selecting the correct region or keypoint;
when the system detects that the user terminal is stuck during user login, the security management module performs comparison verification by adopting part of characteristic values, so that the response speed of the user terminal, the resource utilization rate and the tax service handling efficiency can be improved.
Further, after the user successfully logs in the system, the 5G message terminal module dynamically switches the function list which can be used by the user so as to accord with the function authority of different identities of the user, and the method comprises the following steps:
q1: defining a function list, namely defining a corresponding function list according to different identities of tax-paying individuals and enterprise users, wherein each function is represented by an identifier, for example, 1 represents function 1, and 2 represents function 2;
q2: the user identity is switched, and when the user switches identity, the 5G message terminal module sends the identity information of the user to the background server;
q3: the background server responds to the function list of the corresponding identity in the database and the configuration file according to the received user identity information;
q4: the method comprises the steps that a function list is updated, a background server returns a function list corresponding to a user identity to a 5G message terminal module, and after the terminal module receives the function list, the local function display is updated;
q5: and (3) user operation, wherein the user can select the functions to be executed in the 5G message terminal module, and only the functions in the function list can be selected and executed.
The invention has the beneficial effects that: when tax business is handled, the system of the invention ensures the accuracy and legality of the user identity through the safety verification of the safety management module, and meanwhile, when sensitive business is handled, the safety verification is called again to ensure the safety of data and prevent information leakage, thus, personal users and enterprise users can use the system to handle tax business more safely, the safety problem is effectively solved, the biological identification information collected by the 5G message tax system is safely managed, the leakage is effectively prevented, the safety verification is carried out by adopting part of characteristic value identification when the user side is blocked, and the function list corresponding to different user identities is updated by adopting a dynamic configuration algorithm.
Drawings
FIG. 1 is a flow chart of the present invention;
FIG. 2 is a schematic diagram of fingerprint identification using Minutiae matching;
FIG. 3 is a schematic diagram of a function list updated in real time according to the identity of a user using a dynamic configuration algorithm.
Detailed Description
The present invention will be further described more fully hereinafter, but the scope of the invention is not limited thereto.
A 5G message tax system, comprising:
5G message terminal module: generating a visual 5G message page for a user to view at a mobile phone terminal, wherein the 5G message terminal module displays different function lists controlled by the tax service management module to the user, namely tax services authorized to be used by the tax service management module, and can only be displayed to the user and used by the user;
5G message receiving module: when a user sends a tax service handling instruction, receiving a service handling instruction or data sent by the user through a 5G message terminal module, and simultaneously sending an http request to an API interface of a tax department;
when the tax department returns the business information, receiving the business information fed back by the tax department, and simultaneously forwarding the data result processed by the data processing module to the mobile phone terminal of the user;
and a data processing module: according to the data requirement of the 5G message terminal module, data packaging is carried out on the data fed back by the tax department, and the data processing module needs to acquire specific parameter packaging requirements from the tax service management module;
when a user applies for handling tax service, the received request information is converted into standard API interface parameters according to the API interface requirements of tax departments, and the data processing module is required to acquire specific parameter encapsulation requirements from the tax service management module;
tax service management module: controlling whether different tax service functions can be displayed and used outwards, and controlling whether the tax service functions are public functions or not;
simultaneously storing parameter packaging requirements corresponding to different tax services, wherein the packaging requirements comprise two parts, namely, the parameter requirements of the 5G message terminal module and the parameter requirements of an API interface of a tax department;
simultaneously controlling the 5G message templates returned to the user by different tax services and dynamic data required by the corresponding templates, namely, sending request acquisition data to an operation or sending request acquisition data to a tax department;
meanwhile, controlling the specific content of the 5G message template, namely the number, the arrangement and the combination mode of pictures, videos, audios, texts and connection information contained in the specific 5G message template;
and a safety management module: the method comprises the steps of collecting and storing biological information and basic information of a user, carrying out security verification on the biological information and the basic information when the user logs in each time, returning verification results to other modules, and allowing the user to further operate if the verification results pass.
A processing method of a 5G message tax system is based on the processing of the 5G message tax system, and adopts the following technical scheme:
the user invokes the security management module to carry out security verification when handling sensitive business, wherein the security verification adopts a biological feature recognition algorithm and comprises the following steps:
(1) A user registration stage:
a: the user provides biological information required for biological feature recognition, namely fingerprints and facial images;
b: the system preprocesses the acquired biological information through denoising and normalization:
c: storing the preprocessed biological information as a biological characteristic template of the user;
(2) And (3) an identification stage:
a: the user scans using a biometric device such as a fingerprint sensor, a camera;
b: the equipment collects biological information and preprocesses the collected biological information through denoising and normalization;
c: comparing the preprocessed biological information with a biological characteristic template of a registered user;
d: the similarity score between the biological information is calculated by the system, the similarity of the matching quantity and the positions of Minutiae between two fingerprints is calculated by adopting a Minutiae matching method in fingerprint identification, the similarity score is calculated, key feature points in the facial image are detected and matched by adopting a feature point matching method in facial image identification, such as eyes, noses and mouths, and the similarity score of the feature points is calculated;
e: judging whether the similarity score exceeds a preset threshold value, if so, verifying to pass, and allowing the user to perform sensitive business operation;
and (3) implementing a strict access control mechanism for biological information of the acquired fingerprint and facial image, only authorizing a specific person to access the fingerprint and facial information, adopting multi-factor authentication to ensure the security of the biological information, and realizing by combining first factor authentication and second factor authentication, wherein the first factor authentication is used for authenticating the first identity authentication factor provided by the accessing person, the second factor authentication is used for authenticating the first identity authentication factor provided by the accessing person, and after the second factor authentication is used for authenticating the accessing person, the system requires the accessing person to provide the second factor authentication information which is short message authentication code, hardware security key, fingerprint or facial recognition, and only after the two factors pass authentication, the accessing person can access the stored biological information of the fingerprint and facial image.
As shown in fig. 2, fingerprint identification is performed by using a Minutiae matching method, a similarity score is finally obtained, and if the similarity score exceeds a threshold value, verification is passed, so that a user is allowed to perform sensitive business operation;
the facial image recognition is carried out by adopting a feature point matching method, the single-sided eyebrow has 6 key points, the left boundary to the right boundary are uniformly sampled, the total number of the eye is 12, the eyes are divided into 7 key points, the left boundary and the right boundary are respectively, the upper eyelid and the lower eyelid are uniformly sampled, the total number of the eye is 14, the lips are divided into 26 key points, the number of the lips is 2 except for the corners of the mouth, the lips are divided into the upper lip and the lower lip, the outer boundary of the upper lip and the lower lip is respectively uniformly sampled into 6 points, the inner boundary of the upper lip and the lower lip are respectively uniformly sampled into 4 points, the marking of the nose is increased by 6 key points of a nose bridge part, the nose tip part is uniformly sampled by 4, the total number of the key points is 10, and the facial contour is uniformly sampled by 20 key points.
Further, in the method for handling tax service by using 5G message, when encountering a user terminal, the security management module adopts a part of characteristic values to carry out comparison verification when carrying out verification, and the steps are as follows:
p1: the system calculates a jamming index to analyze whether a jamming problem exists or not;
network delay monitoring: measuring network delay by sending a test request to a user terminal and calculating the time difference between arrival and response of the request, and using a network delay analysis tool to realize the detection of the loss rate of network packets recorded as a packet loss index and the utilization rate of network bandwidth recorded as a bandwidth index;
network time delay measures network delay by sending test requests to a user terminal and calculating time difference of request arrival and response, and records network test request sending timeRecording network test request receiving time +.>The network time delay index is +.>
Katon index =* Delay index + of>* Bandwidth index + for>* Packet loss index, setting a katon index threshold, exceeding the threshold, and judging that the user terminal is katon, wherein +_>Take a value of 0.5,/>The value is 0.3%>The value is 0.2;
the delay index unit is millisecond ms, the bandwidth index unit is bit per second bps, the packet loss index has no unit, the unit of the katon index is a combination unit, and the unit is obtained by index weighting of different units, and the significance is that the influence of delay, bandwidth and packet loss on the network performance is comprehensively considered, and the method is used for evaluating whether the degree of the katon condition occurs in the network or not;
p2: partial information verification, wherein under the condition that the user end is detected to be stuck, the security management module adopts partial characteristic values to carry out comparison verification, mantissa authentication is adopted for the mobile phone number, four-bit authentication is adopted after identity card information is adopted, and partial characteristic values can be adopted for text information to carry out verification;
for fingerprint identification, the system requires a user to randomly select fingerprint lines at a plurality of specific positions in the verification process to serve as verification factors;
for facial recognition, the system provides a blurred mask or reference image that requires the user to verify by selecting the correct region or keypoint.
Further, after the user successfully logs in the system, the 5G message terminal module dynamically switches the function list which can be used by the user so as to accord with the function authority of different identities of the user, and the method comprises the following steps:
by adopting a dynamic configuration algorithm, dynamically configuring on a background server, updating a function list in real time according to the identity of a user, and when the user switches the identity, sending a request to the background server by a 5G message terminal module, acquiring the function list of the corresponding identity and updating a local function display;
q1: defining a function list, namely defining a corresponding function list according to different identities of tax-paying individuals and enterprise users, wherein each function is represented by an identifier, for example, 1 represents function 1, and 2 represents function 2;
q2: the user identity is switched, and when the user switches identity, the 5G message terminal module sends the identity information of the user to the background server;
q3: the background server responds to the function list of the corresponding identity in the database and the configuration file according to the received user identity information;
q4: the method comprises the steps that a function list is updated, a background server returns a function list corresponding to a user identity to a 5G message terminal module, and after the terminal module receives the function list, the local function display is updated;
q5: and (3) user operation, wherein the user can select the functions to be executed in the 5G message terminal module, and only the functions in the function list can be selected and executed.
As shown in fig. 3, the function list before user identity switching is 1,2, 3, and the function list after user identity switching is 1, 3, 4.
The embodiments of the present invention are disclosed as preferred embodiments, but not limited thereto, and those skilled in the art will readily appreciate from the foregoing description that various extensions and modifications can be made without departing from the spirit of the present invention.
The processing method of the 5G message tax system provided by the invention ensures the accuracy and legality of the user identity through the safety verification of the safety management module when the tax service is handled, and simultaneously, when the sensitive service is handled, the safety management module is called again to carry out the safety verification, and the fingerprint identification Minutiae matching method and the facial image identification feature point matching method are adopted to ensure the safety of data and prevent information leakage, so that the system can be used by individual users and enterprise users to handle the tax service more safely, the safety problem is effectively solved, and when the user terminal is at a calm, the response efficiency is improved by adopting part of feature value identification, and the function list corresponding to different user identities is updated by adopting a dynamic configuration algorithm.

Claims (5)

1. A 5G message tax system, comprising:
5G message terminal module: generating a visual 5G message page for a user to view at a mobile phone terminal, wherein the 5G message terminal module displays different function lists controlled by the tax service management module to the user, namely tax services authorized to be used by the tax service management module, and can only be displayed to the user and used by the user;
5G message receiving module: when a user sends a tax service handling instruction, receiving a service handling instruction or data sent by the user through a 5G message terminal module, and simultaneously sending an http request to an API interface of a tax department;
when the tax department returns the business information, receiving the business information fed back by the tax department, and simultaneously forwarding the data result processed by the data processing module to the mobile phone terminal of the user;
and a data processing module: according to the data requirement of the 5G message terminal module, data packaging is carried out on the data fed back by the tax department, and the data processing module needs to acquire specific parameter packaging requirements from the tax service management module;
when a user applies for handling tax service, the received request information is converted into standard API interface parameters according to the API interface requirements of tax departments, and the data processing module is required to acquire specific parameter encapsulation requirements from the tax service management module;
tax service management module: controlling whether different tax service functions are displayed and used outwards, and controlling whether the tax service functions are public functions or not;
simultaneously storing parameter packaging requirements corresponding to different tax services, wherein the packaging requirements comprise two parts, namely, the parameter requirements of the 5G message terminal module and the parameter requirements of an API interface of a tax department;
simultaneously controlling the 5G message templates returned to the user by different tax services and dynamic data required by the corresponding templates, namely, sending request acquisition data to an operation or sending request acquisition data to a tax department;
meanwhile, controlling the specific content of the 5G message template, wherein the specific content of the 5G message template comprises the number and the arrangement and combination modes of pictures, videos, audios, texts and connection information;
and a safety management module: collecting and storing the biological information and the basic information of the user, carrying out security verification on the biological information and the basic information when the user logs in each time, returning a verification result to other modules, and allowing the user to further operate if the verification is passed;
under the condition that the user logs in and is stuck, safety verification is carried out, and the safety management module adopts part of characteristic values of verification information provided by the user to carry out comparison verification.
2. A method for processing a 5G message tax system according to claim 1, comprising:
s1: collecting basic information and biological information of a user, wherein the biological information comprises fingerprints and facial image biological information provided when the user uses the system for the first time, the basic information comprises names, electronic mailboxes, mobile phone numbers, addresses, certificate types, certificate numbers and valid start and stop dates of certificates which are registered when the user uses the system for the first time, and uniform social credit codes, tax payer names, main tax authorities, production management addresses, legal representatives names, financial responsible person names, legal representatives mobile phone numbers and financial responsible person mobile phone number information are also required to be collected for enterprise users;
s2: the system processes the collected biological information through denoising and normalization, stores the biological information as a biological characteristic template of the user, and adopts an access control mechanism for the stored biological characteristic template;
s3: when a user logs in and transacts sensitive business each time, the system compares the fingerprint, facial image biological information and stored biological feature templates provided by the user;
s4: the system calculates a jam index, analyzes whether a jam problem exists, and the jam index is =* Delay index + of>* Bandwidth index + for>* Packet loss index, setting a katon index threshold, exceeding the threshold, and judging that the user terminal is katon, wherein +_>、/>And->Satisfy->
Wherein the delay index is,/>Time of receipt for network test request,/->Sending time for a network test request, wherein the packet loss index is the loss rate of network packets, and the bandwidth index is the network bandwidth utilization rate;
under the condition that the system detects that a user terminal is stuck when the user logs in, the security management module prompts the user to carry out security verification, the security management module adopts part of characteristic values of information verified by the user to carry out comparison verification, mantissa authentication is adopted for mobile phone numbers, post four-bit authentication is adopted for identity card information, part of characteristic values are adopted for text information to carry out verification, the system requires the user to randomly select fingerprint lines at a plurality of specific positions in the verification process to serve as verification factors for fingerprint identification, and the system provides a blurred mask image for facial identification and requires the user to carry out verification by selecting a correct area;
s5: after the user successfully logs in the system, a 5G message terminal module in the system displays different function lists for the user, and the 5G message terminal module adopts a dynamic configuration algorithm to update the function lists corresponding to different user identities.
3. The method for processing the 5G message tax system of claim 2, wherein the access control mechanism in S2 is implemented by a combination of a first factor authentication and a second factor authentication by using multi-factor authentication, and comprises:
s21: the first factor verification is to verify the first identity verification factor provided by the visitor, and the visitor is required to provide an identity verification factor which is a user name, a password and a PIN code;
s22: the second verification factor is that after the visitor passes the verification of the first factor, the system requires the visitor to provide the second factor verification information which is one of a short message verification code, a hardware security key, a fingerprint and facial recognition;
s23: only after both factors are verified can the accessing person access the stored biometric information of the fingerprint and facial image.
4. The method for processing the 5G message tax system of claim 2, wherein the system in S3 compares the fingerprint, the facial image biometric information and the stored biometric template provided by the user, comprising:
s31: the system collects fingerprint and facial image biological information provided by a user when logging in;
s32: the system carries out denoising and normalization processing on the collected biological information and compares the biological information with a biological characteristic template of a user;
s33: the fingerprint biological information adopts a Minutiae matching method, and the facial image identification adopts a feature point matching method;
s34: and calculating a similarity score, judging whether the similarity score exceeds a preset threshold value, and if the similarity score exceeds the threshold value, verifying to pass, and allowing the user to log in and perform sensitive business operation.
5. The method for processing the 5G message tax system of claim 2, wherein the step of updating the function list corresponding to different user identities by the 5G message terminal module in S5 using a dynamic configuration algorithm comprises:
by adopting a dynamic configuration algorithm, dynamically configuring on a background server, updating a function list in real time according to the identity of a user, and when the user switches the identity, sending a request to the background server by a 5G message terminal module, acquiring the function list of the corresponding identity and updating a local function display;
s51: defining a function list, namely defining a corresponding function list according to different identities of tax-paying individuals and enterprise users, wherein each function is represented by an identifier;
s52: the user identity is switched, and when the user switches identity, the 5G message terminal module sends the identity information of the user to the background server;
s53: the background server responds to the function list of the corresponding identity in the database and the configuration file according to the received user identity information;
s54: the method comprises the steps that a function list is updated, a background server returns a function list corresponding to a user identity to a 5G message terminal module, and after the terminal module receives the function list, the local function display is updated;
s55: and (3) user operation, wherein the user can select the functions to be executed in the 5G message terminal module, and only the functions in the function list can be selected and executed.
CN202311602475.3A 2023-11-28 2023-11-28 5G message tax system and processing method thereof Active CN117320008B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311602475.3A CN117320008B (en) 2023-11-28 2023-11-28 5G message tax system and processing method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311602475.3A CN117320008B (en) 2023-11-28 2023-11-28 5G message tax system and processing method thereof

Publications (2)

Publication Number Publication Date
CN117320008A CN117320008A (en) 2023-12-29
CN117320008B true CN117320008B (en) 2024-02-20

Family

ID=89250220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311602475.3A Active CN117320008B (en) 2023-11-28 2023-11-28 5G message tax system and processing method thereof

Country Status (1)

Country Link
CN (1) CN117320008B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1460953A (en) * 2003-07-03 2003-12-10 四川昊园高科技发展(集团)有限公司 Cash registation-tax administration integrated application system
JP2015230528A (en) * 2014-06-04 2015-12-21 株式会社日立製作所 Tax management method, system, and program
CN110187806A (en) * 2019-05-22 2019-08-30 Oppo广东移动通信有限公司 Fingerprint template input method and relevant apparatus
WO2020030537A1 (en) * 2018-08-08 2020-02-13 Nokia Technologies Oy Method and apparatus for security management in 5g networks
CN112929591A (en) * 2021-01-28 2021-06-08 联通(辽宁)产业互联网有限公司 5G tax video customer service platform and operation method thereof
CN114493815A (en) * 2021-12-27 2022-05-13 航天信息股份有限公司 Method and system for self-service tax payment declaration based on identity recognition
CN116011963A (en) * 2022-12-28 2023-04-25 航天信息软件技术有限公司 Digital tax handling method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11461854B2 (en) * 2017-11-03 2022-10-04 Mastercard International Incorporated Systems and methods for using multi-factor authentication for tax filings
KR20210026594A (en) * 2019-08-30 2021-03-10 엘지전자 주식회사 The method and apparatus for monitoring driving condition of vehicle

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1460953A (en) * 2003-07-03 2003-12-10 四川昊园高科技发展(集团)有限公司 Cash registation-tax administration integrated application system
JP2015230528A (en) * 2014-06-04 2015-12-21 株式会社日立製作所 Tax management method, system, and program
WO2020030537A1 (en) * 2018-08-08 2020-02-13 Nokia Technologies Oy Method and apparatus for security management in 5g networks
CN110187806A (en) * 2019-05-22 2019-08-30 Oppo广东移动通信有限公司 Fingerprint template input method and relevant apparatus
CN112929591A (en) * 2021-01-28 2021-06-08 联通(辽宁)产业互联网有限公司 5G tax video customer service platform and operation method thereof
CN114493815A (en) * 2021-12-27 2022-05-13 航天信息股份有限公司 Method and system for self-service tax payment declaration based on identity recognition
CN116011963A (en) * 2022-12-28 2023-04-25 航天信息软件技术有限公司 Digital tax handling method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于混杂模式的音视频质量分析的设计与实现;张天兵;电子设计工程;全文 *

Also Published As

Publication number Publication date
CN117320008A (en) 2023-12-29

Similar Documents

Publication Publication Date Title
US10326761B2 (en) Web-based user authentication techniques and applications
US6655585B2 (en) System and method of biometric smart card user authentication
US9531710B2 (en) Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication
EP3905081A1 (en) Method and device for authenticating identity information, and server
JP6653268B2 (en) System and method for communicating strong authentication events on different channels
US10027641B2 (en) Method and apparatus of account login
US11023709B2 (en) System, method and apparatus for multi-modal biometric authentication and liveness detection
US20140289116A1 (en) System and method for performing authentication for a local transaction
WO2019104887A1 (en) Remote interview method, electronic device, and computer readable storage medium
US20160241552A1 (en) System and method for biometric authentication with device attestation
EP2065798A1 (en) Method for performing secure online transactions with a mobile station and a mobile station
US10733281B2 (en) Methods and systems for ensuring that an individual is authorized to conduct an activity
WO2022170759A1 (en) Information processing method and apparatus, and electronic device, server and medium
Schuckers Presentations and attacks, and spoofs, oh my
CN115758398B (en) Access control data processing method and device, access control system and storage medium
US20240028698A1 (en) System and method for perfecting and accelerating biometric identification via evolutionary biometrics via continual registration
US20200327310A1 (en) Method and apparatus for facial verification
Podio Personal authentication through biometric technologies
KR102180719B1 (en) Non-faced account opening system and non-faced account opening method using the same
CN117320008B (en) 5G message tax system and processing method thereof
CN110738499A (en) User identity authentication method and device, computer equipment and storage medium
KR20020018496A (en) Method and Device for Controlling The Usage of Communication Device using Image Based Face Verification Technology
Chang et al. Application of Face Recognition in E-commerce Security Authentication in the Era of Big Data
Lala et al. Towards A secured financial transaction: A multi-factor authentication model
TWI779823B (en) Authentication method and authentication device with fast anti-counterfeiting function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant