CN107172213A - A kind of quick accreditation information verification method and device based on device identification - Google Patents

A kind of quick accreditation information verification method and device based on device identification Download PDF

Info

Publication number
CN107172213A
CN107172213A CN201710579155.9A CN201710579155A CN107172213A CN 107172213 A CN107172213 A CN 107172213A CN 201710579155 A CN201710579155 A CN 201710579155A CN 107172213 A CN107172213 A CN 107172213A
Authority
CN
China
Prior art keywords
information
rule
identification code
input information
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710579155.9A
Other languages
Chinese (zh)
Other versions
CN107172213B (en
Inventor
林韶军
黄河
张海峰
陈征宇
林生基
严友金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Evecom Information Technology Development Co Ltd
Original Assignee
Evecom Information Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Evecom Information Technology Development Co Ltd filed Critical Evecom Information Technology Development Co Ltd
Priority to CN201710579155.9A priority Critical patent/CN107172213B/en
Publication of CN107172213A publication Critical patent/CN107172213A/en
Application granted granted Critical
Publication of CN107172213B publication Critical patent/CN107172213B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • Technology Law (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to communication technical field, more particularly to a kind of quick accreditation information verification method and device based on device identification.A kind of quick accreditation information verification method based on device identification, including step:Different hardware module to business all-in-one sets corresponding identification code, and in service end preset identifications code;Application input information is obtained by business all-in-one, and adds the identification code of corresponding hardware module wherein;And send to service end;Application input information after encryption is decrypted service end, obtains the identification code of application input information and correspondence hardware module;The legitimacy of the two is verified, if legal, the prompting that return is succeeded in registration to business all-in-one.Acquisition for application input information need not obtain information registration form by manually arriving sales counter, then be filled in, but be obtained by business all-in-one integral type, and application input information is encrypted, and whole registration process becomes more efficient, more convenient.

Description

A kind of quick accreditation information verification method and device based on device identification
Technical field
The present invention relates to communication technical field, more particularly to a kind of quick accreditation information verification method based on device identification And device.
Background technology
With the support energetically of the progress and economic fast development of science and technology, and national policy, more and more People starts selection and become self-employed, and increasing self-employed entrepreneur needs to apply for business license.In the prior art, individual is industrial and commercial Family application business license must arrive the industrial and commercial sales counter of correspondence and obtain information registration form, and manual fill message steps on information after having filled in Note table submits to Receptionist, and Receptionist carries out signal auditing, after auditing successfully, can succeeded in registration.It is whole to register Cheng Zhong, it is extremely inconvenient if accredited personnel is numerous, in addition it is also necessary to wait in line, if registration form information fills out mistake, need to mend again again and fill out one Registration form, not only takes, and inefficiency.
And the industrial and commercial sales counter of correspondence has the fixed work hours, it is impossible to provide all the period of time, continual business service to client, make Into the inconvenience of business license application.
The content of the invention
For this reason, it may be necessary to a kind of quick accreditation information verification method based on device identification and device be provided, to solve battalion The problem of industry license application process complex operation and inefficiency.
To achieve the above object, a kind of quick accreditation information verification method based on device identification is inventor provided, is had Body realizes that technical scheme is as follows:
A kind of quick accreditation information verification method based on device identification, comprises the following steps:To business all-in-one not With hardware module, corresponding identification code is set, and in the preset identification code of service end, the identification code unique mark is corresponding Hardware module;Application input information is obtained by business all-in-one, and it is corresponding to obtain the application input information transfer channel The identification code of hardware module, and the identification code that corresponding hardware module is added in information is inputted in the application, the application is defeated Entering information includes:Personal information and enterprise name;Legitimacy to the personal information and the enterprise name is verified, if The personal information and the enterprise name are legal, then according to mark of the predetermined encryption rule to the corresponding hardware module of addition The application input information of code is encrypted;Send the application after encryption and input information to service end;Service end receives the encryption Application input information afterwards, and the application input information after the encryption is decrypted according to default decryption rule, obtain Shen It please input the identification code of information and correspondence hardware module;Conjunction to the application input information and the identification code of correspondence hardware module Method is verified, if the identification code of the application input information and correspondence hardware module is legal, what return was succeeded in registration carries Show to business all-in-one.
Further, it is " then regular to adding the identification code of corresponding hardware module according to predetermined encryption in the step Application input information is encrypted " before, in addition to step:The application input information is torn open according to the default rule that splits Point, and add interference information in each node of fractionation;The step " and according to it is default decryption rule to the encryption after Application input information is decrypted " after, in addition to step:According to the default rule that splits to the addition correspondence hardware after the decryption The application input information of the identification code of module carries out computing with words.
Further, also include before the step " being split according to the default rule that splits to the application input information " Step:The fractionation rule list of information transfer encryption and decryption is set up, the fractionation rule list includes:Split rule, encryption and decryption rule and Interference information;And the preset fractionation rule list of difference is in the business all-in-one and the service end.
Further, " application according to predetermined encryption rule to adding the identification code of correspondence hardware module is defeated for the step Enter information to be encrypted " before, in addition to step:Encryption and decryption rule, and the preset encryption rule on the business all-in-one are set up, The preset decryption rule in the service end.
Further, the hardware module of the business all-in-one includes:Company information acquisition module, identity card identification mould Block, Identification of Images module, signature plate module and voice module.
To achieve the above object, inventor provide a kind of quick accreditation information based on device identification and veritify device, tool Body realizes that technical scheme is as follows:
A kind of quick accreditation information based on device identification veritifies device, including:Identification code generating module, business all-in-one And service end;The identification code generating module is used for:Different hardware module to business all-in-one sets corresponding identification code, and In the preset identification code of the service end, the corresponding hardware module of the identification code unique mark;The business all-in-one is used In:Obtain application input information, and obtain the identification code of the corresponding hardware module of the application input information transfer channel, and The identification code of corresponding hardware module is added in the application input information, the application input information includes:Personal information and Enterprise name;Legitimacy to the personal information and the enterprise name is verified, if the personal information and the enterprise Industry title is legal, then the application input information for adding the identification code of corresponding hardware module is carried out according to predetermined encryption rule Encryption;Send the application after encryption and input information to the service end;The service end is additionally operable to:Receive the Shen after the encryption Information please be input, and the application input information after the encryption is decrypted according to default decryption rule, application input is obtained The identification code of information and correspondence hardware module;Legitimacy to the application input information and the identification code of correspondence hardware module is entered Row is verified, if the identification code of the application input information and correspondence hardware module is legal, the prompting that return is succeeded in registration to business Thing all-in-one.
Further, the business all-in-one is additionally operable to:The application input information is carried out according to the default rule that splits Split, and interference information is added in each node of fractionation;The service end is additionally operable to:According to the default rule that splits to the solution The application input information of the identification code of addition correspondence hardware module after close carries out computing with words.
Further, in addition to:Rule list sets up module, and the rule list, which sets up module, to be used for:Information transfer is set up to add The fractionation rule list of decryption, the fractionation rule list includes:Split rule, encryption and decryption rule and interference information;And it is preset respectively The fractionation rule list is in the business all-in-one and the service end.
Further, in addition to:Encryption and decryption rule sets up module, and the encryption and decryption rule, which sets up module, to be used for:Set up and add Decryption rule, and the preset encryption rule on the business all-in-one, the preset decryption rule in the service end.
Further, the business all-in-one includes:Company information acquisition module, identity card identification module, Identification of Images Module, signature plate module and voice module.
The beneficial effects of the invention are as follows:Application input information is obtained by business all-in-one, and obtains the application input Information pass through the corresponding different hardware module of transmission channel identification code, and it is described application input information in add it is corresponding The identification code of different hardware module, then it is encrypted, send the application after encryption and input information to service end, service The application input information is decrypted at end, further according to the identification code prestored to the corresponding hardware module that is obtained after decryption The legitimacy of identification code verified, and the legitimacy for inputting information to application is verified.In whole process, for application Information registration form need not be obtained by manually arriving sales counter by inputting the acquisition of information, then be filled in, but pass through business all-in-one Integral type is obtained, simple and convenient, and the identification code for corresponding to hardware module is added in corresponding informance, and is encrypted, So that not only efficiency is improved whole registration process, become more efficient, more convenient;It ensure that the peace of whole registration process user profile Quan Xing, by the checking of the identification code to hardware module, more ensure that accessed application input information from legal business Thing all-in-one, rather than the information for pretending to send by miscellaneous equipment, further ensure that the security of information physical aspect;And Before the application input information is encrypted, the school of legitimacy is carried out to the personal information and the enterprise name in advance Test, the application for substantially not meeting registration condition can be excluded in advance, for application personnel, its time can be saved, service end is come Say, it is to avoid the retrieval resource of some obvious incongruent resource occupation service ends, drag slow recall precision;And business all-in-one whole day Formula open service, without manually supervision and management thereat, it is ensured that client can carry out individual in oneself available free any time Body industrial and commercial units business license is registered, and not only improves efficiency, and greatly promote Consumer's Experience.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the quick accreditation information verification method based on device identification described in embodiment;
Fig. 2 is the flow split described in embodiment according to default fractionation rule to the application input information Figure;
Fig. 3 is the module map that a kind of quick accreditation information based on device identification described in embodiment veritifies device;
Fig. 4 is to include the module map for the accreditation information veritification device that rule list sets up module described in embodiment;
Fig. 5 is to include the module for the accreditation information veritification device that encryption and decryption rule sets up module described in embodiment Figure.
Description of reference numerals:
300th, quick accreditation information veritifies device,
301st, identification code generating module,
302nd, business all-in-one,
303rd, service end,
304th, rule list sets up module,
305th, encryption and decryption rule sets up module.
Embodiment
To describe the technology contents of technical scheme in detail, feature, the objects and the effects being constructed, below in conjunction with specific reality Apply example and coordinate accompanying drawing to be explained in detail.
Referring to Fig. 1, in the present embodiment, a kind of quick accreditation information verification method based on device identification can be applied On business all-in-one, the business all-in-one is to input information with acquisition application input information, with the transmission application To service end authority and the equipment for receiving service end return information authority.In the present embodiment, the service end is private network, and Not all client all possesses access rights to it, and specific client just possesses access rights, the service end number to it According to preserving the corresponding identification code of each hardware module on business all-in-one in storehouse.Concrete implementation technical scheme is as follows:
Step S101:Different hardware module to business all-in-one sets corresponding identification code, and in the preset institute of service end State identification code, the corresponding hardware module of the identification code unique mark.It can realize in the following way:By transforming business one The different hardware module of machine, stores correspondence identification code, the corresponding hardware of the identification code unique mark in different hardware module Module, is stored after corresponding identification code, and the preset identification code is in service end, so as to the subsequently received application input letter of service end During breath, it can determine whether the application input information whether from legal business all-in-one.In the present embodiment, the business one The hardware module of body machine may include:Company information acquisition module, identity card identification module, Identification of Images module, signature plate module, Voice module and print module etc..Preset after the identification code, perform step S102:Obtained and applied by business all-in-one Information is inputted, and obtains the identification code of the corresponding hardware module of the application input information transfer channel, and it is defeated in the application Enter the identification code that corresponding hardware module is added in information, the application input information includes:Personal information and enterprise name.Can Realize in the following way:Application personnel input corresponding application input information on the screen of business all-in-one, and described The identification code of corresponding hardware module is added in application input information, such as:Information X is obtained, information X successively have passed through three hardware Module, then add the identification code of three hardware modules of its process in information X, if information X is only by a hardware module, The identification code of the hardware module only then need to be added in information X.By obtain added in information X its be transferred through it is all The identification code of related hardware module, it is ensured that information X comes from legal business all-in-one, it is to avoid illegal operation.In this reality Apply in mode, the application input information includes:Enterprise name and personal information, such as:Enterprise name:XXX Science and Technology Ltd.s, The personal information can include:Certificate photo information etc..Wherein described application input information may also include:Business Scope of Enterprise, Registered address etc..
Obtain after good application input information, perform step S103:Whether the personal information and the enterprise name close MethodIt can realize in the following way:Get after enterprise name, it is right as looked forward to seeing website directly by the existing resource of outer net The title of enterprise carries out duplicate checking, prejudges enterprise name and whether there is.If (if existing), correspondence prompting letter is returned Breath.It can realize in the following way:Application personnel are reminded by pop-up box, the enterprise name has been registered, or the enterprise name It is illegal, allow it to think other enterprise names again as early as possible.Equally, the certificate photo in personal information can be believed beforehand through outer net Whether breath legal to be looked into advance, such as whether in the presence of this ID card No., and the information such as ID card No. and personnel's name whether Unanimously.Investigated beforehand through whether outer net is legal to enterprise name and personal information, first enterprise name and in the absence of machine Close sex chromosome mosaicism, therefore it is not related to customer information leakage, secondly preliminary duplicate checking, significantly can block some registered enterprise names Cut outside, for customer perspective, quickly reminded him to need to change enterprise name, rather than wait all material to be audited to private network One time, this prompting is just done, the time is saved, and for resource view, reduce some substantially underproof company information occupancy Private network query resource, improves service end resource query speed, improved efficiency.Same whether there is in advance to personal information is carried out Investigation, can also avoid the waiting of unnecessary time and the consumption of unnecessary resource.
If the personal information and the enterprise name are legal, step S104 is performed:It is right according to predetermined encryption rule The application input information for adding the identification code of corresponding hardware module is encrypted.It can realize in the following way:Pre-establish Encryption and decryption rule, such as:The corresponding public key of encryption and decryption rule and key are pre-set, the encryption and decryption rule adds to be asymmetric It is close, the public key is preset on the business all-in-one, the private key is preset in the service end, is preset corresponding After public and private key, the application input information for adding the identification code of corresponding hardware module is encrypted using the public key.At it In his embodiment, it can also be believed by setting other encryption rules and the application for adding the identification code of corresponding hardware module being inputted Breath is encrypted.After having encrypted, step S105 is performed:Send the application after encryption and input information to service end.Then step is performed Rapid S106:Service end receives the application input information after the encryption, and according to default decryption rule to the Shen after the encryption It please input information to be decrypted, obtain the identification code of application input information and correspondence hardware module.It can realize in the following way: The application input information after the encryption is decrypted using the private key being preset at thereon for service end, you can obtain application input The identification code of information and correspondence hardware module.By the way that application input information is encrypted, it is ensured that the peace of message transmitting procedure Quan Xing.
After service end has been decrypted, step S107 is performed:The application inputs information and the identification code of correspondence hardware module It is no legalIt can realize in the following way:Inquired about to service client database, because service client database has been pre-saved The identification code of each hardware module of legal business all-in-one, therefore whether the identification code of correspondence hardware module legal can be looked into Ask, to application input, whether information is legal inquires about in database in addition, and such as certificate photo information whether there is, on certificate photo Information, handwritten signature content it is whether corresponding with facial image, registered address whether there is, and whether Business Scope of Enterprise legal etc. Deng.If all application input information are legal, the application input information is preserved to servicing client database, and perform step S108:The prompting succeeded in registration is returned to business all-in-one.Can be in the following way:By on business all-in-one with the page Form ejection pertinent registration is successfully pointed out, and is shown on business all-in-one and corresponding to be awarded code, unified credit code, applicant Member sees after related prompting that self-service can carry on the business license printing on business all-in-one.To ensure it is that I operates, In present embodiment, carry out printing before to carry out it is secondary log in, need to input user identity card information and facial image identification, It is me to ensure printing, it is ensured that the security of business license.
Application input information is obtained by business all-in-one, and obtains the transmission channel pair that the application input information is passed through The identification code for the different hardware module answered, and the mark that corresponding different hardware module is added in information is inputted in the application Code, then it is encrypted, send the application after encryption and input information to service end, service end is to the application input letter Breath is decrypted, and the legitimacy of the identification code of the corresponding hardware module obtained after decryption is entered further according to the identification code prestored Row verification, and the legitimacy for inputting information to application are verified., need not for the acquisition that application inputs information in whole process Information registration form is obtained by manually arriving sales counter, then is filled in, but is obtained by business all-in-one integral type, simple side Just, the identification code of correspondence hardware module and in corresponding informance is added, and is encrypted so that whole registration process is not Only efficiency is improved, and becomes more efficient, more convenient;The security of whole registration process user profile is ensure that, by hardware mould The checking of the identification code of block, more ensure that accessed application input information from legal business all-in-one, rather than logical The information that miscellaneous equipment camouflage is sent is crossed, security of the information on physical layer is further ensure that;And to the application Before input information is encrypted, the verification of legitimacy is carried out to the personal information and the enterprise name in advance, can be arranged in advance Except the application for substantially not meeting registration condition, for application personnel, its time can be saved, for service end, it is to avoid some The retrieval resource of obvious incongruent resource occupation service end, drags slow recall precision;And business all-in-one whole day formula open service, Without manually supervision and management thereat, it is ensured that client can carry out self-employed entrepreneur's business in oneself available free any time License is registered, and not only improves efficiency, and greatly promote Consumer's Experience.
Referring to Fig. 2, in another embodiment, in order to further strengthen the security for transmitting information, can use as follows Technical scheme is realized:
Wherein step S201 to step S203 is identical to step S103 with step S101, step S209 to step S210 and step Rapid S107 is identical to step S108, and repeat specification is not done herein.Other steps are as follows:
Step S204:The application input information is split according to the default rule that splits, and in each section of fractionation Point adds interference information.It can realize in the following way:Before this step, the fractionation rule list of information transfer encryption and decryption is set up, The fractionation rule list includes:Split rule, encryption and decryption rule and interference information;And the preset fractionation rule list of difference is in institute State business all-in-one and the service end.Then the application input information for adding correspondence identification code is torn open by the rule that splits Point, and add interference information in each node of fractionation.In the present embodiment, the interference information can be word, picture, Can be other arbitrary forms.In the present embodiment, to increase confidentiality, the fractionation rule can have multiple, can arbitrarily select One of rule that splits is selected to split the application input information.In some other embodiments, examined for simplicity Consider, the fractionation rule only can also fix one.Add after interference information, performed step S205:According to predetermined encryption The application input information for adding the identification code of corresponding hardware module is encrypted rule.It can realize in the following way:Root According to the encryption rule split in rule list got in advance, it is encrypted to adding the application input information after interference information. Only corresponding decryption rule can just be decrypted to it.In the present embodiment, using asymmetric cryptosystem (by the way of i.e. public and private key, It is provided with the business all-in-one in public key, the service end and is provided with corresponding private key, only just can be right by this private key It is decrypted).And selected fractionation rule is encrypted the encryption method in the fractionation rule list got in advance, obtains To encryption header file.After encryption is good, step S206 is performed:Send the application after encryption and input information to service end.Can be using such as Under type:The application input information after encryption and the encryption header file are sent simultaneously to service end.Because splitting rule to appoint Meaning is chosen, therefore service end is not aware which fractionation rule is in advance, therefore splits rule encryption generation encryption by selected Header file is transmitted, that is, be ensure that the safety for splitting rule, be also ensure that just it can be decrypted for only corresponding service end and obtain Get fractionation rule.
Then step S207 is performed:Service end receives the application input information after the encryption, and is advised according to default decryption Then the application input information after the encryption is decrypted, the identification code of application input information and correspondence hardware module is obtained. It can realize in the following way:Service end inputs information and encryption using the private key being preset at thereon to the application after the encryption Header file is decrypted, you can obtains the identification code of application input information and correspondence hardware module and splits rule.By to Shen It please input information to be encrypted, it is ensured that the security of message transmitting procedure.After decryption is good, step S208 is performed:According to default Split rule and computing with words is carried out to the application input information of the identification code of the addition correspondence hardware module after the decryption.It can lead to Cross following manner realization:Control is set in advance in the interference information split in rule list of service end, first removes application input letter Interference information in breath, the fractionation rule obtained further according to decryption carries out computing with words to application input information, is most started Add the application input information of the identification code of correspondence hardware module.Subsequent then execution step S209 and step S210.To described Before application input information encryption, it is split, and adds interference information, the decryption difficulty of information is further increased, carries The high security of application input information.
In the present embodiment, the hardware module of the business all-in-one includes:Company information acquisition module, identity card are known Other module, Identification of Images module, signature plate module, voice module and print module etc..Therefore business all-in-one is passed through Get the ID card information of application personnel, figure information, company information, handwriting information, voice messaging etc., Yi Jishen Corresponding business license please be can print after the success of personnel requisition's business license, realize integrated operation, personnel are without people for application Work to sales counter fill message, as long as and in the place for having business all-in-one, you can applied for the registration of at any time, become higher Effect, it is faster.
Referring to Fig. 3, in another embodiment, a kind of quick accreditation information based on device identification veritifies device To implement technical scheme as follows:
A kind of quick accreditation information based on device identification veritifies device 300, including:Identification code generating module 301, business All-in-one 302 and service end 303;The identification code generating module 301 is used for:To the different hardware module of business all-in-one 302 Corresponding identification code is set, and in the preset identification code of the service end 303, the corresponding hardware of the identification code unique mark Module;The business all-in-one 302 is used for:Application input information is obtained, and obtains the application input information transfer channel pair The identification code for the hardware module answered, and the identification code that corresponding hardware module is added in information, the Shen are inputted in the application Please input information includes:Personal information and enterprise name;Legitimacy to the personal information and the enterprise name carries out school Test, if the personal information and the enterprise name are legal, according to predetermined encryption rule to adding corresponding hardware module Identification code application input information be encrypted;Send the application after encryption and input information to the service end 303;The clothes Business end 303 is additionally operable to:The input information of the application after the encryption is received, and according to default decryption rule to the Shen after the encryption It please input information to be decrypted, obtain the identification code of application input information and correspondence hardware module;To the application input information Verified with the legitimacy of the identification code of correspondence hardware module, if the mark of the application input information and correspondence hardware module Code is legal, the prompting that return is succeeded in registration to business all-in-one 302.
Application input information is obtained by business all-in-one 302, and obtains the transmission for applying for that input information is passed through and is led to The identification code of the corresponding different hardware module in road, and the mark that corresponding different hardware module is added in information is inputted in the application Know code, then it is encrypted, send the application after encryption and input information to service end 303,303 pairs of Shens of service end It please input information to be decrypted, further according to the identification code prestored to the identification code of corresponding hardware module that obtains after decryption Legitimacy is verified, and the legitimacy for inputting information to application is verified.In whole process, information is inputted for application Information registration form need not be obtained by manually arriving sales counter by obtaining, then be filled in, but be obtained by the integral type of business all-in-one 302 Take, it is simple and convenient, and the identification code for corresponding to hardware module is added in corresponding informance, and be encrypted so that it is whole Not only efficiency is improved registration process, becomes more efficient, more convenient;The security of whole registration process user profile is ensure that, more It ensure that accessed application input information pretends hair from legal business all-in-one 302, rather than by miscellaneous equipment The information sent, further ensure that the security of information;And before the application input information is encrypted, in advance to described Personal information and the enterprise name carry out the verification of legitimacy, and the application for substantially not meeting registration condition can be excluded in advance, right For application personnel, its time can be saved, for service end 303, it is to avoid some obvious incongruent resource occupation service ends 303 retrieval resource, drags slow recall precision;And the whole day formula open service of business all-in-one 302, without manually supervision is managed thereat Reason, it is ensured that client can carry out self-employed entrepreneur's business license registration in oneself available free any time, not only improve effect Rate, and greatly promote Consumer's Experience.
In the present embodiment, the business all-in-one 302 includes:Company information acquisition module, identity card identification module, Identification of Images module, signature plate module and voice module.
In another embodiment, in order to further strengthen transmit information security, reality can be adopted the following technical scheme that It is existing:The business all-in-one 302 is additionally operable to:The application input information is split according to the default rule that splits, and torn open Each node divided adds interference information;The service end 303 is additionally operable to:According to the default rule that splits to adding after the decryption The application input information for entering the identification code of correspondence hardware module carries out computing with words.It is right before the application input information encryption It is split, and adds interference information, further increases the decryption difficulty of information, improves the safety of application input information Property.
Referring to Fig. 4, in another embodiment, in order to further strengthen the security for transmitting information, can use as follows Technical scheme is realized:A kind of quick accreditation information based on device identification veritifies device 300, in addition to rule list sets up mould Block 304, the rule list, which sets up module 304, to be used for:Set up the fractionation rule list of information transfer encryption and decryption, the fractionation rule list Including:Split rule, encryption and decryption rule and interference information;And the preset fractionation rule list of difference is in the business all-in-one 302 and the service end 303.
Referring to Fig. 5, in another embodiment, in order to ensure transmitting the security of information, following technology can be used Scheme is realized:A kind of quick accreditation information based on device identification veritifies device 300, in addition to:Encryption and decryption rule is set up Module 305, the encryption and decryption rule, which sets up module 305, to be used for:Encryption and decryption rule is set up, and on the business all-in-one 302 Preset encryption rule, the preset decryption rule in the service end 303.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or deposited between operating In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability is included, so that process, method, article or terminal device including a series of key elements not only include those Key element, but also other key elements including being not expressly set out, or also include being this process, method, article or end The intrinsic key element of end equipment.In the absence of more restrictions, limited by sentence " including ... " or " including ... " Key element, it is not excluded that also there is other key element in the process including the key element, method, article or terminal device.This Outside, herein, " being more than ", " being less than ", " exceeding " etc. are interpreted as not including this number;" more than ", " following ", " within " etc. understand It is to include this number.
It should be understood by those skilled in the art that, the various embodiments described above can be provided as method, device or computer program production Product.These embodiments can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.All or part of step in the method that the various embodiments described above are related to can be instructed by program correlation hardware come Complete, described program can be stored in the storage medium that computer equipment can be read, for performing the various embodiments described above side All or part of step described in method.The computer equipment, includes but is not limited to:Personal computer, server, general-purpose computations Machine, special-purpose computer, the network equipment, embedded device, programmable device, intelligent mobile terminal, intelligent home device, Wearable Smart machine, vehicle intelligent equipment etc.;Described storage medium, includes but is not limited to:RAM, ROM, magnetic disc, tape, CD, sudden strain of a muscle Deposit, USB flash disk, mobile hard disk, storage card, memory stick, webserver storage, network cloud storage etc..
The various embodiments described above are with reference to method, equipment (system) and the computer program product according to embodiment Flow chart and/or block diagram are described.It should be understood that can be by every in computer program instructions implementation process figure and/or block diagram One flow and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computers can be provided Programmed instruction is to the processor of computer equipment to produce a machine so that pass through the finger of the computing device of computer equipment Order, which is produced, to be used to realize what is specified in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames The device of function.
These computer program instructions may be alternatively stored in the computer that computer equipment can be guided to work in a specific way and set In standby readable memory so that the instruction being stored in the computer equipment readable memory, which is produced, includes the manufacture of command device Product, the command device is realized to be referred in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames Fixed function.
These computer program instructions can be also loaded into computer equipment so that performed on a computing device a series of Operating procedure is to produce computer implemented processing, so that the instruction performed on a computing device is provided for realizing in flow The step of function of being specified in one flow of figure or multiple flows and/or one square frame of block diagram or multiple square frames.
Although the various embodiments described above are described, those skilled in the art once know basic wound The property made concept, then can make other change and modification to these embodiments, so embodiments of the invention are the foregoing is only, Not thereby the scope of patent protection of the present invention, the equivalent structure that every utilization description of the invention and accompanying drawing content are made are limited Or equivalent flow conversion, or other related technical fields are directly or indirectly used in, similarly it is included in the patent of the present invention Within protection domain.

Claims (10)

1. a kind of quick accreditation information verification method based on device identification, it is characterised in that comprise the following steps:
Corresponding identification code is set to the different hardware module of business all-in-one, and in the preset identification code of service end, it is described The corresponding hardware module of identification code unique mark;
Application input information is obtained by business all-in-one, and obtains the corresponding hardware mould of the application input information transfer channel The identification code of block, and the identification code that corresponding hardware module is added in information is inputted in the application, the application inputs information Including:Personal information and enterprise name;
Legitimacy to the personal information and the enterprise name is verified, if the personal information and the enterprise name It is legal, then the application input information for adding the identification code of corresponding hardware module is encrypted according to predetermined encryption rule;
Send the application after encryption and input information to service end;
Service end receives the application input information after the encryption, and defeated to the application after the encryption according to default decryption rule Enter information to be decrypted, obtain the identification code of application input information and correspondence hardware module;
Legitimacy to the application input information and the identification code of correspondence hardware module is verified, if the application input letter Breath and the identification code of correspondence hardware module are legal, the prompting that return is succeeded in registration to business all-in-one.
2. a kind of quick accreditation information verification method based on device identification according to claim 1, it is characterised in that
" then the application input information for adding the identification code of corresponding hardware module is entered according to predetermined encryption rule in the step Before row encryption ", in addition to step:The application input information is split according to the default rule that splits, and in each of fractionation Individual node adds interference information;
After the step " and the application input information after the encryption is decrypted according to default decryption rule ", in addition to Step:The application input information of the identification code of the addition correspondence hardware module after the decryption is carried out according to the default rule that splits Computing with words.
3. a kind of quick accreditation information verification method based on device identification according to claim 2, it is characterised in that institute Also include step before stating step " being split according to the default rule that splits to the application input information ":
The fractionation rule list of information transfer encryption and decryption is set up, the fractionation rule list includes:Split rule, encryption and decryption regular and dry Disturb information;
And the preset fractionation rule list of difference is in the business all-in-one and the service end.
4. a kind of quick accreditation information verification method based on device identification according to claim 1, it is characterised in that institute State before step " the application input information for adding the identification code of correspondence hardware module is encrypted according to predetermined encryption rule ", also Including step:
Encryption and decryption rule, and the preset encryption rule on the business all-in-one are set up, the preset decryption rule in the service end Then.
5. a kind of quick accreditation information verification method based on device identification according to claim 1, it is characterised in that
The hardware module of the business all-in-one includes:Company information acquisition module, identity card identification module, Identification of Images mould Block, signature plate module and voice module.
6. a kind of quick accreditation information based on device identification veritifies device, it is characterised in that including:Identification code generating module, Business all-in-one and service end;
The identification code generating module is used for:Different hardware module to business all-in-one sets corresponding identification code, and in institute State the preset identification code of service end, the corresponding hardware module of the identification code unique mark;
The business all-in-one is used for:Application input information is obtained, and it is corresponding to obtain the application input information transfer channel The identification code of hardware module, and the identification code that corresponding hardware module is added in information is inputted in the application, the application is defeated Entering information includes:Personal information and enterprise name;Legitimacy to the personal information and the enterprise name is verified, if The personal information and the enterprise name are legal, then according to mark of the predetermined encryption rule to the corresponding hardware module of addition The application input information of code is encrypted;Send the application after encryption and input information to the service end;
The service end is additionally operable to:The input information of the application after the encryption is received, and is added according to default decryption rule to described Application input information after close is decrypted, and obtains the identification code of application input information and correspondence hardware module;To the application The legitimacy of the identification code of input information and correspondence hardware module is verified, if the application input information and correspondence hardware mould The identification code of block is legal, the prompting that return is succeeded in registration to business all-in-one.
7. a kind of quick accreditation information based on device identification according to claim 6 veritifies device, it is characterised in that
The business all-in-one is additionally operable to:The application input information is split according to the default rule that splits, and split Each node add interference information;
The service end is additionally operable to:According to the default rule that splits to the identification code for adding correspondence hardware module after the decryption Application input information carries out computing with words.
8. a kind of quick accreditation information based on device identification according to claim 7 veritifies device, it is characterised in that
Also include:Rule list sets up module, and the rule list, which sets up module, to be used for:Set up the fractionation rule of information transfer encryption and decryption Table, the fractionation rule list includes:Split rule, encryption and decryption rule and interference information;And the preset fractionation rule list of difference In the business all-in-one and the service end.
9. a kind of quick accreditation information based on device identification according to claim 6 veritifies device, it is characterised in that
Also include:Encryption and decryption rule sets up module, and the encryption and decryption rule, which sets up module, to be used for:Set up encryption and decryption regular, and Preset encryption rule on the business all-in-one, the preset decryption rule in the service end.
10. a kind of quick accreditation information based on device identification according to claim 6 veritifies device, it is characterised in that
The business all-in-one includes:Company information acquisition module, identity card identification module, Identification of Images module, signature template die Block and voice module.
CN201710579155.9A 2017-07-17 2017-07-17 A kind of quick accreditation information verification method and device based on device identification Active CN107172213B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710579155.9A CN107172213B (en) 2017-07-17 2017-07-17 A kind of quick accreditation information verification method and device based on device identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710579155.9A CN107172213B (en) 2017-07-17 2017-07-17 A kind of quick accreditation information verification method and device based on device identification

Publications (2)

Publication Number Publication Date
CN107172213A true CN107172213A (en) 2017-09-15
CN107172213B CN107172213B (en) 2019-08-13

Family

ID=59816954

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710579155.9A Active CN107172213B (en) 2017-07-17 2017-07-17 A kind of quick accreditation information verification method and device based on device identification

Country Status (1)

Country Link
CN (1) CN107172213B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101527630A (en) * 2008-12-31 2009-09-09 北京飞天诚信科技有限公司 Method, server and system for manufacturing certificate remotely
US20140013106A1 (en) * 2012-07-03 2014-01-09 International Business Machines Corporation Issuing, presenting and challenging mobile device identification documents
CN104933580A (en) * 2015-06-11 2015-09-23 沈文俊 Card-making device, server and card-making method of artwork anti-fake smart card
CN105590188A (en) * 2015-12-29 2016-05-18 南威软件股份有限公司 Online self-service certificate handling system and certificate check system
CN106447293A (en) * 2016-09-28 2017-02-22 佛山科学技术学院 Method and system for implementing double-notification intelligent pushing of commercial registration

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101527630A (en) * 2008-12-31 2009-09-09 北京飞天诚信科技有限公司 Method, server and system for manufacturing certificate remotely
US20140013106A1 (en) * 2012-07-03 2014-01-09 International Business Machines Corporation Issuing, presenting and challenging mobile device identification documents
CN104933580A (en) * 2015-06-11 2015-09-23 沈文俊 Card-making device, server and card-making method of artwork anti-fake smart card
CN105590188A (en) * 2015-12-29 2016-05-18 南威软件股份有限公司 Online self-service certificate handling system and certificate check system
CN106447293A (en) * 2016-09-28 2017-02-22 佛山科学技术学院 Method and system for implementing double-notification intelligent pushing of commercial registration

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
康建: "山西省身份证制证辅助管理系统的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Also Published As

Publication number Publication date
CN107172213B (en) 2019-08-13

Similar Documents

Publication Publication Date Title
Grover et al. Diffusion of blockchain technology: Insights from academic literature and social media analytics
DE112016006077B4 (en) SYSTEMS AND METHODS FOR PROVIDING A BLOCK CHAIN-BASED MULTIFACTOR IDENTITY CHECK OF PERSONS
US20200092298A1 (en) Avoiding user session misclassification using configuration and activity fingerprints
US20180115426A1 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
CN109359480B (en) A kind of the privacy of user guard method and system of Digital Library-Oriented
CN110990486A (en) Block link evidence issuing and storing method and device based on network data interaction
CN111553443B (en) Training method and device for referee document processing model and electronic equipment
US20210365584A1 (en) Portable reputation brokering using linked blockchains and shared events
CN108681676A (en) Data managing method and device, system, electronic equipment, program and storage medium
TW201608400A (en) Business card information searching method and cloud server
CN108512660B (en) Virtual card verification method
CN105227380B (en) The method, apparatus and system of user data processing
CN112328486A (en) Interface automation test method and device, computer equipment and storage medium
CN111858611B (en) Data access method, device, computer equipment and storage medium
Sindhura et al. An effective secure storage of data in cloud using ISSE encryption technique
CN107742141B (en) Intelligent identity information acquisition method and system based on RFID technology
CN113723903A (en) RPA (Security platform Association) and AI (Internet Access Association) combined pass ticket transaction method and device, electronic equipment and storage medium
CN110737918B (en) External data sharing management platform
CN108460606A (en) A kind of method for anti-counterfeit based on two-dimensional code scanning and revene lookup
CN116956326A (en) Authority data processing method and device, computer equipment and storage medium
Priya et al. A survey on privacy preserving voting scheme based on blockchain technology
Renuga et al. Efficient privacy-preserving data sanitization over cloud using optimal GSA algorithm
CN106575341B (en) Compound document access
CN107172213B (en) A kind of quick accreditation information verification method and device based on device identification
CN106651371A (en) Electronic ticket producing method and system and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder

Address after: 350000 13th floor, building 5, f District, software park, 89 software Avenue, Gulou District, Fuzhou City, Fujian Province

Patentee after: EVECOM INFORMATION TECHNOLOGY DEVELOPMENT Co.,Ltd.

Address before: Room b305, building 1, Strait Economic and Trade Plaza, No.2, Luoxing East Road, free trade zone, Fuzhou City, Fujian Province, 350000

Patentee before: EVECOM INFORMATION TECHNOLOGY DEVELOPMENT Co.,Ltd.

CP02 Change in the address of a patent holder