CN107172213A - A kind of quick accreditation information verification method and device based on device identification - Google Patents
A kind of quick accreditation information verification method and device based on device identification Download PDFInfo
- Publication number
- CN107172213A CN107172213A CN201710579155.9A CN201710579155A CN107172213A CN 107172213 A CN107172213 A CN 107172213A CN 201710579155 A CN201710579155 A CN 201710579155A CN 107172213 A CN107172213 A CN 107172213A
- Authority
- CN
- China
- Prior art keywords
- information
- rule
- identification code
- input information
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000012795 verification Methods 0.000 title claims abstract description 18
- 238000005194 fractionation Methods 0.000 claims description 31
- 238000012546 transfer Methods 0.000 claims description 12
- 238000004891 communication Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000007639 printing Methods 0.000 description 3
- 230000001815 facial effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 206010068052 Mosaicism Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000003205 muscle Anatomy 0.000 description 1
- 238000011017 operating method Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 210000003765 sex chromosome Anatomy 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Marketing (AREA)
- General Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- Tourism & Hospitality (AREA)
- Human Resources & Organizations (AREA)
- Technology Law (AREA)
- Medical Informatics (AREA)
- Primary Health Care (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to communication technical field, more particularly to a kind of quick accreditation information verification method and device based on device identification.A kind of quick accreditation information verification method based on device identification, including step:Different hardware module to business all-in-one sets corresponding identification code, and in service end preset identifications code;Application input information is obtained by business all-in-one, and adds the identification code of corresponding hardware module wherein;And send to service end;Application input information after encryption is decrypted service end, obtains the identification code of application input information and correspondence hardware module;The legitimacy of the two is verified, if legal, the prompting that return is succeeded in registration to business all-in-one.Acquisition for application input information need not obtain information registration form by manually arriving sales counter, then be filled in, but be obtained by business all-in-one integral type, and application input information is encrypted, and whole registration process becomes more efficient, more convenient.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of quick accreditation information verification method based on device identification
And device.
Background technology
With the support energetically of the progress and economic fast development of science and technology, and national policy, more and more
People starts selection and become self-employed, and increasing self-employed entrepreneur needs to apply for business license.In the prior art, individual is industrial and commercial
Family application business license must arrive the industrial and commercial sales counter of correspondence and obtain information registration form, and manual fill message steps on information after having filled in
Note table submits to Receptionist, and Receptionist carries out signal auditing, after auditing successfully, can succeeded in registration.It is whole to register
Cheng Zhong, it is extremely inconvenient if accredited personnel is numerous, in addition it is also necessary to wait in line, if registration form information fills out mistake, need to mend again again and fill out one
Registration form, not only takes, and inefficiency.
And the industrial and commercial sales counter of correspondence has the fixed work hours, it is impossible to provide all the period of time, continual business service to client, make
Into the inconvenience of business license application.
The content of the invention
For this reason, it may be necessary to a kind of quick accreditation information verification method based on device identification and device be provided, to solve battalion
The problem of industry license application process complex operation and inefficiency.
To achieve the above object, a kind of quick accreditation information verification method based on device identification is inventor provided, is had
Body realizes that technical scheme is as follows:
A kind of quick accreditation information verification method based on device identification, comprises the following steps:To business all-in-one not
With hardware module, corresponding identification code is set, and in the preset identification code of service end, the identification code unique mark is corresponding
Hardware module;Application input information is obtained by business all-in-one, and it is corresponding to obtain the application input information transfer channel
The identification code of hardware module, and the identification code that corresponding hardware module is added in information is inputted in the application, the application is defeated
Entering information includes:Personal information and enterprise name;Legitimacy to the personal information and the enterprise name is verified, if
The personal information and the enterprise name are legal, then according to mark of the predetermined encryption rule to the corresponding hardware module of addition
The application input information of code is encrypted;Send the application after encryption and input information to service end;Service end receives the encryption
Application input information afterwards, and the application input information after the encryption is decrypted according to default decryption rule, obtain Shen
It please input the identification code of information and correspondence hardware module;Conjunction to the application input information and the identification code of correspondence hardware module
Method is verified, if the identification code of the application input information and correspondence hardware module is legal, what return was succeeded in registration carries
Show to business all-in-one.
Further, it is " then regular to adding the identification code of corresponding hardware module according to predetermined encryption in the step
Application input information is encrypted " before, in addition to step:The application input information is torn open according to the default rule that splits
Point, and add interference information in each node of fractionation;The step " and according to it is default decryption rule to the encryption after
Application input information is decrypted " after, in addition to step:According to the default rule that splits to the addition correspondence hardware after the decryption
The application input information of the identification code of module carries out computing with words.
Further, also include before the step " being split according to the default rule that splits to the application input information "
Step:The fractionation rule list of information transfer encryption and decryption is set up, the fractionation rule list includes:Split rule, encryption and decryption rule and
Interference information;And the preset fractionation rule list of difference is in the business all-in-one and the service end.
Further, " application according to predetermined encryption rule to adding the identification code of correspondence hardware module is defeated for the step
Enter information to be encrypted " before, in addition to step:Encryption and decryption rule, and the preset encryption rule on the business all-in-one are set up,
The preset decryption rule in the service end.
Further, the hardware module of the business all-in-one includes:Company information acquisition module, identity card identification mould
Block, Identification of Images module, signature plate module and voice module.
To achieve the above object, inventor provide a kind of quick accreditation information based on device identification and veritify device, tool
Body realizes that technical scheme is as follows:
A kind of quick accreditation information based on device identification veritifies device, including:Identification code generating module, business all-in-one
And service end;The identification code generating module is used for:Different hardware module to business all-in-one sets corresponding identification code, and
In the preset identification code of the service end, the corresponding hardware module of the identification code unique mark;The business all-in-one is used
In:Obtain application input information, and obtain the identification code of the corresponding hardware module of the application input information transfer channel, and
The identification code of corresponding hardware module is added in the application input information, the application input information includes:Personal information and
Enterprise name;Legitimacy to the personal information and the enterprise name is verified, if the personal information and the enterprise
Industry title is legal, then the application input information for adding the identification code of corresponding hardware module is carried out according to predetermined encryption rule
Encryption;Send the application after encryption and input information to the service end;The service end is additionally operable to:Receive the Shen after the encryption
Information please be input, and the application input information after the encryption is decrypted according to default decryption rule, application input is obtained
The identification code of information and correspondence hardware module;Legitimacy to the application input information and the identification code of correspondence hardware module is entered
Row is verified, if the identification code of the application input information and correspondence hardware module is legal, the prompting that return is succeeded in registration to business
Thing all-in-one.
Further, the business all-in-one is additionally operable to:The application input information is carried out according to the default rule that splits
Split, and interference information is added in each node of fractionation;The service end is additionally operable to:According to the default rule that splits to the solution
The application input information of the identification code of addition correspondence hardware module after close carries out computing with words.
Further, in addition to:Rule list sets up module, and the rule list, which sets up module, to be used for:Information transfer is set up to add
The fractionation rule list of decryption, the fractionation rule list includes:Split rule, encryption and decryption rule and interference information;And it is preset respectively
The fractionation rule list is in the business all-in-one and the service end.
Further, in addition to:Encryption and decryption rule sets up module, and the encryption and decryption rule, which sets up module, to be used for:Set up and add
Decryption rule, and the preset encryption rule on the business all-in-one, the preset decryption rule in the service end.
Further, the business all-in-one includes:Company information acquisition module, identity card identification module, Identification of Images
Module, signature plate module and voice module.
The beneficial effects of the invention are as follows:Application input information is obtained by business all-in-one, and obtains the application input
Information pass through the corresponding different hardware module of transmission channel identification code, and it is described application input information in add it is corresponding
The identification code of different hardware module, then it is encrypted, send the application after encryption and input information to service end, service
The application input information is decrypted at end, further according to the identification code prestored to the corresponding hardware module that is obtained after decryption
The legitimacy of identification code verified, and the legitimacy for inputting information to application is verified.In whole process, for application
Information registration form need not be obtained by manually arriving sales counter by inputting the acquisition of information, then be filled in, but pass through business all-in-one
Integral type is obtained, simple and convenient, and the identification code for corresponding to hardware module is added in corresponding informance, and is encrypted,
So that not only efficiency is improved whole registration process, become more efficient, more convenient;It ensure that the peace of whole registration process user profile
Quan Xing, by the checking of the identification code to hardware module, more ensure that accessed application input information from legal business
Thing all-in-one, rather than the information for pretending to send by miscellaneous equipment, further ensure that the security of information physical aspect;And
Before the application input information is encrypted, the school of legitimacy is carried out to the personal information and the enterprise name in advance
Test, the application for substantially not meeting registration condition can be excluded in advance, for application personnel, its time can be saved, service end is come
Say, it is to avoid the retrieval resource of some obvious incongruent resource occupation service ends, drag slow recall precision;And business all-in-one whole day
Formula open service, without manually supervision and management thereat, it is ensured that client can carry out individual in oneself available free any time
Body industrial and commercial units business license is registered, and not only improves efficiency, and greatly promote Consumer's Experience.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the quick accreditation information verification method based on device identification described in embodiment;
Fig. 2 is the flow split described in embodiment according to default fractionation rule to the application input information
Figure;
Fig. 3 is the module map that a kind of quick accreditation information based on device identification described in embodiment veritifies device;
Fig. 4 is to include the module map for the accreditation information veritification device that rule list sets up module described in embodiment;
Fig. 5 is to include the module for the accreditation information veritification device that encryption and decryption rule sets up module described in embodiment
Figure.
Description of reference numerals:
300th, quick accreditation information veritifies device,
301st, identification code generating module,
302nd, business all-in-one,
303rd, service end,
304th, rule list sets up module,
305th, encryption and decryption rule sets up module.
Embodiment
To describe the technology contents of technical scheme in detail, feature, the objects and the effects being constructed, below in conjunction with specific reality
Apply example and coordinate accompanying drawing to be explained in detail.
Referring to Fig. 1, in the present embodiment, a kind of quick accreditation information verification method based on device identification can be applied
On business all-in-one, the business all-in-one is to input information with acquisition application input information, with the transmission application
To service end authority and the equipment for receiving service end return information authority.In the present embodiment, the service end is private network, and
Not all client all possesses access rights to it, and specific client just possesses access rights, the service end number to it
According to preserving the corresponding identification code of each hardware module on business all-in-one in storehouse.Concrete implementation technical scheme is as follows:
Step S101:Different hardware module to business all-in-one sets corresponding identification code, and in the preset institute of service end
State identification code, the corresponding hardware module of the identification code unique mark.It can realize in the following way:By transforming business one
The different hardware module of machine, stores correspondence identification code, the corresponding hardware of the identification code unique mark in different hardware module
Module, is stored after corresponding identification code, and the preset identification code is in service end, so as to the subsequently received application input letter of service end
During breath, it can determine whether the application input information whether from legal business all-in-one.In the present embodiment, the business one
The hardware module of body machine may include:Company information acquisition module, identity card identification module, Identification of Images module, signature plate module,
Voice module and print module etc..Preset after the identification code, perform step S102:Obtained and applied by business all-in-one
Information is inputted, and obtains the identification code of the corresponding hardware module of the application input information transfer channel, and it is defeated in the application
Enter the identification code that corresponding hardware module is added in information, the application input information includes:Personal information and enterprise name.Can
Realize in the following way:Application personnel input corresponding application input information on the screen of business all-in-one, and described
The identification code of corresponding hardware module is added in application input information, such as:Information X is obtained, information X successively have passed through three hardware
Module, then add the identification code of three hardware modules of its process in information X, if information X is only by a hardware module,
The identification code of the hardware module only then need to be added in information X.By obtain added in information X its be transferred through it is all
The identification code of related hardware module, it is ensured that information X comes from legal business all-in-one, it is to avoid illegal operation.In this reality
Apply in mode, the application input information includes:Enterprise name and personal information, such as:Enterprise name:XXX Science and Technology Ltd.s,
The personal information can include:Certificate photo information etc..Wherein described application input information may also include:Business Scope of Enterprise,
Registered address etc..
Obtain after good application input information, perform step S103:Whether the personal information and the enterprise name close
MethodIt can realize in the following way:Get after enterprise name, it is right as looked forward to seeing website directly by the existing resource of outer net
The title of enterprise carries out duplicate checking, prejudges enterprise name and whether there is.If (if existing), correspondence prompting letter is returned
Breath.It can realize in the following way:Application personnel are reminded by pop-up box, the enterprise name has been registered, or the enterprise name
It is illegal, allow it to think other enterprise names again as early as possible.Equally, the certificate photo in personal information can be believed beforehand through outer net
Whether breath legal to be looked into advance, such as whether in the presence of this ID card No., and the information such as ID card No. and personnel's name whether
Unanimously.Investigated beforehand through whether outer net is legal to enterprise name and personal information, first enterprise name and in the absence of machine
Close sex chromosome mosaicism, therefore it is not related to customer information leakage, secondly preliminary duplicate checking, significantly can block some registered enterprise names
Cut outside, for customer perspective, quickly reminded him to need to change enterprise name, rather than wait all material to be audited to private network
One time, this prompting is just done, the time is saved, and for resource view, reduce some substantially underproof company information occupancy
Private network query resource, improves service end resource query speed, improved efficiency.Same whether there is in advance to personal information is carried out
Investigation, can also avoid the waiting of unnecessary time and the consumption of unnecessary resource.
If the personal information and the enterprise name are legal, step S104 is performed:It is right according to predetermined encryption rule
The application input information for adding the identification code of corresponding hardware module is encrypted.It can realize in the following way:Pre-establish
Encryption and decryption rule, such as:The corresponding public key of encryption and decryption rule and key are pre-set, the encryption and decryption rule adds to be asymmetric
It is close, the public key is preset on the business all-in-one, the private key is preset in the service end, is preset corresponding
After public and private key, the application input information for adding the identification code of corresponding hardware module is encrypted using the public key.At it
In his embodiment, it can also be believed by setting other encryption rules and the application for adding the identification code of corresponding hardware module being inputted
Breath is encrypted.After having encrypted, step S105 is performed:Send the application after encryption and input information to service end.Then step is performed
Rapid S106:Service end receives the application input information after the encryption, and according to default decryption rule to the Shen after the encryption
It please input information to be decrypted, obtain the identification code of application input information and correspondence hardware module.It can realize in the following way:
The application input information after the encryption is decrypted using the private key being preset at thereon for service end, you can obtain application input
The identification code of information and correspondence hardware module.By the way that application input information is encrypted, it is ensured that the peace of message transmitting procedure
Quan Xing.
After service end has been decrypted, step S107 is performed:The application inputs information and the identification code of correspondence hardware module
It is no legalIt can realize in the following way:Inquired about to service client database, because service client database has been pre-saved
The identification code of each hardware module of legal business all-in-one, therefore whether the identification code of correspondence hardware module legal can be looked into
Ask, to application input, whether information is legal inquires about in database in addition, and such as certificate photo information whether there is, on certificate photo
Information, handwritten signature content it is whether corresponding with facial image, registered address whether there is, and whether Business Scope of Enterprise legal etc.
Deng.If all application input information are legal, the application input information is preserved to servicing client database, and perform step
S108:The prompting succeeded in registration is returned to business all-in-one.Can be in the following way:By on business all-in-one with the page
Form ejection pertinent registration is successfully pointed out, and is shown on business all-in-one and corresponding to be awarded code, unified credit code, applicant
Member sees after related prompting that self-service can carry on the business license printing on business all-in-one.To ensure it is that I operates,
In present embodiment, carry out printing before to carry out it is secondary log in, need to input user identity card information and facial image identification,
It is me to ensure printing, it is ensured that the security of business license.
Application input information is obtained by business all-in-one, and obtains the transmission channel pair that the application input information is passed through
The identification code for the different hardware module answered, and the mark that corresponding different hardware module is added in information is inputted in the application
Code, then it is encrypted, send the application after encryption and input information to service end, service end is to the application input letter
Breath is decrypted, and the legitimacy of the identification code of the corresponding hardware module obtained after decryption is entered further according to the identification code prestored
Row verification, and the legitimacy for inputting information to application are verified., need not for the acquisition that application inputs information in whole process
Information registration form is obtained by manually arriving sales counter, then is filled in, but is obtained by business all-in-one integral type, simple side
Just, the identification code of correspondence hardware module and in corresponding informance is added, and is encrypted so that whole registration process is not
Only efficiency is improved, and becomes more efficient, more convenient;The security of whole registration process user profile is ensure that, by hardware mould
The checking of the identification code of block, more ensure that accessed application input information from legal business all-in-one, rather than logical
The information that miscellaneous equipment camouflage is sent is crossed, security of the information on physical layer is further ensure that;And to the application
Before input information is encrypted, the verification of legitimacy is carried out to the personal information and the enterprise name in advance, can be arranged in advance
Except the application for substantially not meeting registration condition, for application personnel, its time can be saved, for service end, it is to avoid some
The retrieval resource of obvious incongruent resource occupation service end, drags slow recall precision;And business all-in-one whole day formula open service,
Without manually supervision and management thereat, it is ensured that client can carry out self-employed entrepreneur's business in oneself available free any time
License is registered, and not only improves efficiency, and greatly promote Consumer's Experience.
Referring to Fig. 2, in another embodiment, in order to further strengthen the security for transmitting information, can use as follows
Technical scheme is realized:
Wherein step S201 to step S203 is identical to step S103 with step S101, step S209 to step S210 and step
Rapid S107 is identical to step S108, and repeat specification is not done herein.Other steps are as follows:
Step S204:The application input information is split according to the default rule that splits, and in each section of fractionation
Point adds interference information.It can realize in the following way:Before this step, the fractionation rule list of information transfer encryption and decryption is set up,
The fractionation rule list includes:Split rule, encryption and decryption rule and interference information;And the preset fractionation rule list of difference is in institute
State business all-in-one and the service end.Then the application input information for adding correspondence identification code is torn open by the rule that splits
Point, and add interference information in each node of fractionation.In the present embodiment, the interference information can be word, picture,
Can be other arbitrary forms.In the present embodiment, to increase confidentiality, the fractionation rule can have multiple, can arbitrarily select
One of rule that splits is selected to split the application input information.In some other embodiments, examined for simplicity
Consider, the fractionation rule only can also fix one.Add after interference information, performed step S205:According to predetermined encryption
The application input information for adding the identification code of corresponding hardware module is encrypted rule.It can realize in the following way:Root
According to the encryption rule split in rule list got in advance, it is encrypted to adding the application input information after interference information.
Only corresponding decryption rule can just be decrypted to it.In the present embodiment, using asymmetric cryptosystem (by the way of i.e. public and private key,
It is provided with the business all-in-one in public key, the service end and is provided with corresponding private key, only just can be right by this private key
It is decrypted).And selected fractionation rule is encrypted the encryption method in the fractionation rule list got in advance, obtains
To encryption header file.After encryption is good, step S206 is performed:Send the application after encryption and input information to service end.Can be using such as
Under type:The application input information after encryption and the encryption header file are sent simultaneously to service end.Because splitting rule to appoint
Meaning is chosen, therefore service end is not aware which fractionation rule is in advance, therefore splits rule encryption generation encryption by selected
Header file is transmitted, that is, be ensure that the safety for splitting rule, be also ensure that just it can be decrypted for only corresponding service end and obtain
Get fractionation rule.
Then step S207 is performed:Service end receives the application input information after the encryption, and is advised according to default decryption
Then the application input information after the encryption is decrypted, the identification code of application input information and correspondence hardware module is obtained.
It can realize in the following way:Service end inputs information and encryption using the private key being preset at thereon to the application after the encryption
Header file is decrypted, you can obtains the identification code of application input information and correspondence hardware module and splits rule.By to Shen
It please input information to be encrypted, it is ensured that the security of message transmitting procedure.After decryption is good, step S208 is performed:According to default
Split rule and computing with words is carried out to the application input information of the identification code of the addition correspondence hardware module after the decryption.It can lead to
Cross following manner realization:Control is set in advance in the interference information split in rule list of service end, first removes application input letter
Interference information in breath, the fractionation rule obtained further according to decryption carries out computing with words to application input information, is most started
Add the application input information of the identification code of correspondence hardware module.Subsequent then execution step S209 and step S210.To described
Before application input information encryption, it is split, and adds interference information, the decryption difficulty of information is further increased, carries
The high security of application input information.
In the present embodiment, the hardware module of the business all-in-one includes:Company information acquisition module, identity card are known
Other module, Identification of Images module, signature plate module, voice module and print module etc..Therefore business all-in-one is passed through
Get the ID card information of application personnel, figure information, company information, handwriting information, voice messaging etc., Yi Jishen
Corresponding business license please be can print after the success of personnel requisition's business license, realize integrated operation, personnel are without people for application
Work to sales counter fill message, as long as and in the place for having business all-in-one, you can applied for the registration of at any time, become higher
Effect, it is faster.
Referring to Fig. 3, in another embodiment, a kind of quick accreditation information based on device identification veritifies device
To implement technical scheme as follows:
A kind of quick accreditation information based on device identification veritifies device 300, including:Identification code generating module 301, business
All-in-one 302 and service end 303;The identification code generating module 301 is used for:To the different hardware module of business all-in-one 302
Corresponding identification code is set, and in the preset identification code of the service end 303, the corresponding hardware of the identification code unique mark
Module;The business all-in-one 302 is used for:Application input information is obtained, and obtains the application input information transfer channel pair
The identification code for the hardware module answered, and the identification code that corresponding hardware module is added in information, the Shen are inputted in the application
Please input information includes:Personal information and enterprise name;Legitimacy to the personal information and the enterprise name carries out school
Test, if the personal information and the enterprise name are legal, according to predetermined encryption rule to adding corresponding hardware module
Identification code application input information be encrypted;Send the application after encryption and input information to the service end 303;The clothes
Business end 303 is additionally operable to:The input information of the application after the encryption is received, and according to default decryption rule to the Shen after the encryption
It please input information to be decrypted, obtain the identification code of application input information and correspondence hardware module;To the application input information
Verified with the legitimacy of the identification code of correspondence hardware module, if the mark of the application input information and correspondence hardware module
Code is legal, the prompting that return is succeeded in registration to business all-in-one 302.
Application input information is obtained by business all-in-one 302, and obtains the transmission for applying for that input information is passed through and is led to
The identification code of the corresponding different hardware module in road, and the mark that corresponding different hardware module is added in information is inputted in the application
Know code, then it is encrypted, send the application after encryption and input information to service end 303,303 pairs of Shens of service end
It please input information to be decrypted, further according to the identification code prestored to the identification code of corresponding hardware module that obtains after decryption
Legitimacy is verified, and the legitimacy for inputting information to application is verified.In whole process, information is inputted for application
Information registration form need not be obtained by manually arriving sales counter by obtaining, then be filled in, but be obtained by the integral type of business all-in-one 302
Take, it is simple and convenient, and the identification code for corresponding to hardware module is added in corresponding informance, and be encrypted so that it is whole
Not only efficiency is improved registration process, becomes more efficient, more convenient;The security of whole registration process user profile is ensure that, more
It ensure that accessed application input information pretends hair from legal business all-in-one 302, rather than by miscellaneous equipment
The information sent, further ensure that the security of information;And before the application input information is encrypted, in advance to described
Personal information and the enterprise name carry out the verification of legitimacy, and the application for substantially not meeting registration condition can be excluded in advance, right
For application personnel, its time can be saved, for service end 303, it is to avoid some obvious incongruent resource occupation service ends
303 retrieval resource, drags slow recall precision;And the whole day formula open service of business all-in-one 302, without manually supervision is managed thereat
Reason, it is ensured that client can carry out self-employed entrepreneur's business license registration in oneself available free any time, not only improve effect
Rate, and greatly promote Consumer's Experience.
In the present embodiment, the business all-in-one 302 includes:Company information acquisition module, identity card identification module,
Identification of Images module, signature plate module and voice module.
In another embodiment, in order to further strengthen transmit information security, reality can be adopted the following technical scheme that
It is existing:The business all-in-one 302 is additionally operable to:The application input information is split according to the default rule that splits, and torn open
Each node divided adds interference information;The service end 303 is additionally operable to:According to the default rule that splits to adding after the decryption
The application input information for entering the identification code of correspondence hardware module carries out computing with words.It is right before the application input information encryption
It is split, and adds interference information, further increases the decryption difficulty of information, improves the safety of application input information
Property.
Referring to Fig. 4, in another embodiment, in order to further strengthen the security for transmitting information, can use as follows
Technical scheme is realized:A kind of quick accreditation information based on device identification veritifies device 300, in addition to rule list sets up mould
Block 304, the rule list, which sets up module 304, to be used for:Set up the fractionation rule list of information transfer encryption and decryption, the fractionation rule list
Including:Split rule, encryption and decryption rule and interference information;And the preset fractionation rule list of difference is in the business all-in-one
302 and the service end 303.
Referring to Fig. 5, in another embodiment, in order to ensure transmitting the security of information, following technology can be used
Scheme is realized:A kind of quick accreditation information based on device identification veritifies device 300, in addition to:Encryption and decryption rule is set up
Module 305, the encryption and decryption rule, which sets up module 305, to be used for:Encryption and decryption rule is set up, and on the business all-in-one 302
Preset encryption rule, the preset decryption rule in the service end 303.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality
Body or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or deposited between operating
In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to
Nonexcludability is included, so that process, method, article or terminal device including a series of key elements not only include those
Key element, but also other key elements including being not expressly set out, or also include being this process, method, article or end
The intrinsic key element of end equipment.In the absence of more restrictions, limited by sentence " including ... " or " including ... "
Key element, it is not excluded that also there is other key element in the process including the key element, method, article or terminal device.This
Outside, herein, " being more than ", " being less than ", " exceeding " etc. are interpreted as not including this number;" more than ", " following ", " within " etc. understand
It is to include this number.
It should be understood by those skilled in the art that, the various embodiments described above can be provided as method, device or computer program production
Product.These embodiments can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.All or part of step in the method that the various embodiments described above are related to can be instructed by program correlation hardware come
Complete, described program can be stored in the storage medium that computer equipment can be read, for performing the various embodiments described above side
All or part of step described in method.The computer equipment, includes but is not limited to:Personal computer, server, general-purpose computations
Machine, special-purpose computer, the network equipment, embedded device, programmable device, intelligent mobile terminal, intelligent home device, Wearable
Smart machine, vehicle intelligent equipment etc.;Described storage medium, includes but is not limited to:RAM, ROM, magnetic disc, tape, CD, sudden strain of a muscle
Deposit, USB flash disk, mobile hard disk, storage card, memory stick, webserver storage, network cloud storage etc..
The various embodiments described above are with reference to method, equipment (system) and the computer program product according to embodiment
Flow chart and/or block diagram are described.It should be understood that can be by every in computer program instructions implementation process figure and/or block diagram
One flow and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computers can be provided
Programmed instruction is to the processor of computer equipment to produce a machine so that pass through the finger of the computing device of computer equipment
Order, which is produced, to be used to realize what is specified in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames
The device of function.
These computer program instructions may be alternatively stored in the computer that computer equipment can be guided to work in a specific way and set
In standby readable memory so that the instruction being stored in the computer equipment readable memory, which is produced, includes the manufacture of command device
Product, the command device is realized to be referred in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames
Fixed function.
These computer program instructions can be also loaded into computer equipment so that performed on a computing device a series of
Operating procedure is to produce computer implemented processing, so that the instruction performed on a computing device is provided for realizing in flow
The step of function of being specified in one flow of figure or multiple flows and/or one square frame of block diagram or multiple square frames.
Although the various embodiments described above are described, those skilled in the art once know basic wound
The property made concept, then can make other change and modification to these embodiments, so embodiments of the invention are the foregoing is only,
Not thereby the scope of patent protection of the present invention, the equivalent structure that every utilization description of the invention and accompanying drawing content are made are limited
Or equivalent flow conversion, or other related technical fields are directly or indirectly used in, similarly it is included in the patent of the present invention
Within protection domain.
Claims (10)
1. a kind of quick accreditation information verification method based on device identification, it is characterised in that comprise the following steps:
Corresponding identification code is set to the different hardware module of business all-in-one, and in the preset identification code of service end, it is described
The corresponding hardware module of identification code unique mark;
Application input information is obtained by business all-in-one, and obtains the corresponding hardware mould of the application input information transfer channel
The identification code of block, and the identification code that corresponding hardware module is added in information is inputted in the application, the application inputs information
Including:Personal information and enterprise name;
Legitimacy to the personal information and the enterprise name is verified, if the personal information and the enterprise name
It is legal, then the application input information for adding the identification code of corresponding hardware module is encrypted according to predetermined encryption rule;
Send the application after encryption and input information to service end;
Service end receives the application input information after the encryption, and defeated to the application after the encryption according to default decryption rule
Enter information to be decrypted, obtain the identification code of application input information and correspondence hardware module;
Legitimacy to the application input information and the identification code of correspondence hardware module is verified, if the application input letter
Breath and the identification code of correspondence hardware module are legal, the prompting that return is succeeded in registration to business all-in-one.
2. a kind of quick accreditation information verification method based on device identification according to claim 1, it is characterised in that
" then the application input information for adding the identification code of corresponding hardware module is entered according to predetermined encryption rule in the step
Before row encryption ", in addition to step:The application input information is split according to the default rule that splits, and in each of fractionation
Individual node adds interference information;
After the step " and the application input information after the encryption is decrypted according to default decryption rule ", in addition to
Step:The application input information of the identification code of the addition correspondence hardware module after the decryption is carried out according to the default rule that splits
Computing with words.
3. a kind of quick accreditation information verification method based on device identification according to claim 2, it is characterised in that institute
Also include step before stating step " being split according to the default rule that splits to the application input information ":
The fractionation rule list of information transfer encryption and decryption is set up, the fractionation rule list includes:Split rule, encryption and decryption regular and dry
Disturb information;
And the preset fractionation rule list of difference is in the business all-in-one and the service end.
4. a kind of quick accreditation information verification method based on device identification according to claim 1, it is characterised in that institute
State before step " the application input information for adding the identification code of correspondence hardware module is encrypted according to predetermined encryption rule ", also
Including step:
Encryption and decryption rule, and the preset encryption rule on the business all-in-one are set up, the preset decryption rule in the service end
Then.
5. a kind of quick accreditation information verification method based on device identification according to claim 1, it is characterised in that
The hardware module of the business all-in-one includes:Company information acquisition module, identity card identification module, Identification of Images mould
Block, signature plate module and voice module.
6. a kind of quick accreditation information based on device identification veritifies device, it is characterised in that including:Identification code generating module,
Business all-in-one and service end;
The identification code generating module is used for:Different hardware module to business all-in-one sets corresponding identification code, and in institute
State the preset identification code of service end, the corresponding hardware module of the identification code unique mark;
The business all-in-one is used for:Application input information is obtained, and it is corresponding to obtain the application input information transfer channel
The identification code of hardware module, and the identification code that corresponding hardware module is added in information is inputted in the application, the application is defeated
Entering information includes:Personal information and enterprise name;Legitimacy to the personal information and the enterprise name is verified, if
The personal information and the enterprise name are legal, then according to mark of the predetermined encryption rule to the corresponding hardware module of addition
The application input information of code is encrypted;Send the application after encryption and input information to the service end;
The service end is additionally operable to:The input information of the application after the encryption is received, and is added according to default decryption rule to described
Application input information after close is decrypted, and obtains the identification code of application input information and correspondence hardware module;To the application
The legitimacy of the identification code of input information and correspondence hardware module is verified, if the application input information and correspondence hardware mould
The identification code of block is legal, the prompting that return is succeeded in registration to business all-in-one.
7. a kind of quick accreditation information based on device identification according to claim 6 veritifies device, it is characterised in that
The business all-in-one is additionally operable to:The application input information is split according to the default rule that splits, and split
Each node add interference information;
The service end is additionally operable to:According to the default rule that splits to the identification code for adding correspondence hardware module after the decryption
Application input information carries out computing with words.
8. a kind of quick accreditation information based on device identification according to claim 7 veritifies device, it is characterised in that
Also include:Rule list sets up module, and the rule list, which sets up module, to be used for:Set up the fractionation rule of information transfer encryption and decryption
Table, the fractionation rule list includes:Split rule, encryption and decryption rule and interference information;And the preset fractionation rule list of difference
In the business all-in-one and the service end.
9. a kind of quick accreditation information based on device identification according to claim 6 veritifies device, it is characterised in that
Also include:Encryption and decryption rule sets up module, and the encryption and decryption rule, which sets up module, to be used for:Set up encryption and decryption regular, and
Preset encryption rule on the business all-in-one, the preset decryption rule in the service end.
10. a kind of quick accreditation information based on device identification according to claim 6 veritifies device, it is characterised in that
The business all-in-one includes:Company information acquisition module, identity card identification module, Identification of Images module, signature template die
Block and voice module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710579155.9A CN107172213B (en) | 2017-07-17 | 2017-07-17 | A kind of quick accreditation information verification method and device based on device identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710579155.9A CN107172213B (en) | 2017-07-17 | 2017-07-17 | A kind of quick accreditation information verification method and device based on device identification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107172213A true CN107172213A (en) | 2017-09-15 |
CN107172213B CN107172213B (en) | 2019-08-13 |
Family
ID=59816954
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710579155.9A Active CN107172213B (en) | 2017-07-17 | 2017-07-17 | A kind of quick accreditation information verification method and device based on device identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107172213B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101527630A (en) * | 2008-12-31 | 2009-09-09 | 北京飞天诚信科技有限公司 | Method, server and system for manufacturing certificate remotely |
US20140013106A1 (en) * | 2012-07-03 | 2014-01-09 | International Business Machines Corporation | Issuing, presenting and challenging mobile device identification documents |
CN104933580A (en) * | 2015-06-11 | 2015-09-23 | 沈文俊 | Card-making device, server and card-making method of artwork anti-fake smart card |
CN105590188A (en) * | 2015-12-29 | 2016-05-18 | 南威软件股份有限公司 | Online self-service certificate handling system and certificate check system |
CN106447293A (en) * | 2016-09-28 | 2017-02-22 | 佛山科学技术学院 | Method and system for implementing double-notification intelligent pushing of commercial registration |
-
2017
- 2017-07-17 CN CN201710579155.9A patent/CN107172213B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101527630A (en) * | 2008-12-31 | 2009-09-09 | 北京飞天诚信科技有限公司 | Method, server and system for manufacturing certificate remotely |
US20140013106A1 (en) * | 2012-07-03 | 2014-01-09 | International Business Machines Corporation | Issuing, presenting and challenging mobile device identification documents |
CN104933580A (en) * | 2015-06-11 | 2015-09-23 | 沈文俊 | Card-making device, server and card-making method of artwork anti-fake smart card |
CN105590188A (en) * | 2015-12-29 | 2016-05-18 | 南威软件股份有限公司 | Online self-service certificate handling system and certificate check system |
CN106447293A (en) * | 2016-09-28 | 2017-02-22 | 佛山科学技术学院 | Method and system for implementing double-notification intelligent pushing of commercial registration |
Non-Patent Citations (1)
Title |
---|
康建: "山西省身份证制证辅助管理系统的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Also Published As
Publication number | Publication date |
---|---|
CN107172213B (en) | 2019-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Grover et al. | Diffusion of blockchain technology: Insights from academic literature and social media analytics | |
DE112016006077B4 (en) | SYSTEMS AND METHODS FOR PROVIDING A BLOCK CHAIN-BASED MULTIFACTOR IDENTITY CHECK OF PERSONS | |
US20200092298A1 (en) | Avoiding user session misclassification using configuration and activity fingerprints | |
US20180115426A1 (en) | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features | |
CN109359480B (en) | A kind of the privacy of user guard method and system of Digital Library-Oriented | |
CN110990486A (en) | Block link evidence issuing and storing method and device based on network data interaction | |
CN111553443B (en) | Training method and device for referee document processing model and electronic equipment | |
US20210365584A1 (en) | Portable reputation brokering using linked blockchains and shared events | |
CN108681676A (en) | Data managing method and device, system, electronic equipment, program and storage medium | |
TW201608400A (en) | Business card information searching method and cloud server | |
CN108512660B (en) | Virtual card verification method | |
CN105227380B (en) | The method, apparatus and system of user data processing | |
CN112328486A (en) | Interface automation test method and device, computer equipment and storage medium | |
CN111858611B (en) | Data access method, device, computer equipment and storage medium | |
Sindhura et al. | An effective secure storage of data in cloud using ISSE encryption technique | |
CN107742141B (en) | Intelligent identity information acquisition method and system based on RFID technology | |
CN113723903A (en) | RPA (Security platform Association) and AI (Internet Access Association) combined pass ticket transaction method and device, electronic equipment and storage medium | |
CN110737918B (en) | External data sharing management platform | |
CN108460606A (en) | A kind of method for anti-counterfeit based on two-dimensional code scanning and revene lookup | |
CN116956326A (en) | Authority data processing method and device, computer equipment and storage medium | |
Priya et al. | A survey on privacy preserving voting scheme based on blockchain technology | |
Renuga et al. | Efficient privacy-preserving data sanitization over cloud using optimal GSA algorithm | |
CN106575341B (en) | Compound document access | |
CN107172213B (en) | A kind of quick accreditation information verification method and device based on device identification | |
CN106651371A (en) | Electronic ticket producing method and system and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP02 | Change in the address of a patent holder |
Address after: 350000 13th floor, building 5, f District, software park, 89 software Avenue, Gulou District, Fuzhou City, Fujian Province Patentee after: EVECOM INFORMATION TECHNOLOGY DEVELOPMENT Co.,Ltd. Address before: Room b305, building 1, Strait Economic and Trade Plaza, No.2, Luoxing East Road, free trade zone, Fuzhou City, Fujian Province, 350000 Patentee before: EVECOM INFORMATION TECHNOLOGY DEVELOPMENT Co.,Ltd. |
|
CP02 | Change in the address of a patent holder |