CN109543399B - Method for preventing second-generation ID card reader OCX control from being tampered - Google Patents

Method for preventing second-generation ID card reader OCX control from being tampered Download PDF

Info

Publication number
CN109543399B
CN109543399B CN201811339533.7A CN201811339533A CN109543399B CN 109543399 B CN109543399 B CN 109543399B CN 201811339533 A CN201811339533 A CN 201811339533A CN 109543399 B CN109543399 B CN 109543399B
Authority
CN
China
Prior art keywords
ocx
control
card reader
identity
identity card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811339533.7A
Other languages
Chinese (zh)
Other versions
CN109543399A (en
Inventor
罗静珺
李峰
刘湘
刘芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Corp Ltd Chongqing Branch
Original Assignee
China United Network Communications Corp Ltd Chongqing Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Corp Ltd Chongqing Branch filed Critical China United Network Communications Corp Ltd Chongqing Branch
Priority to CN201811339533.7A priority Critical patent/CN109543399B/en
Publication of CN109543399A publication Critical patent/CN109543399A/en
Application granted granted Critical
Publication of CN109543399B publication Critical patent/CN109543399B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Abstract

The invention discloses a method for preventing an OCX control of a second-generation ID card reader from being tampered, which is characterized in that the OCX control of the ID card reader is transformed with a server calling interface, the effectiveness of the OCX control is encrypted and authenticated, a system provides a server side check mechanism, the ID card reader provides a client side check interface, data is encrypted, and the authenticity and the effectiveness of the control and the data of the ID card are verified in an interactive mode; the invention has the beneficial effects that: the invention can ensure the compatibility of all identity card readers, improve the authenticity of data read by the identity card readers and improve the safety of a business support system under the condition of not influencing the uniform specification of identity card reading issued by the ministry of public security by less investment.

Description

Method for preventing OCX control of second-generation ID card reader from being tampered
Technical Field
The invention belongs to the technical field of internet data security and tamper prevention of an OCX control of a second-generation ID card reader, and particularly relates to a method for preventing the OCX control of the second-generation ID card reader from being tampered.
Background
In the process of checking and developing the real-name system special work, the telecom operator finds out part of suspected false identity card information and enters a service system of the telecom operator for service acceptance through auditing. For such information, the false identity information is confirmed through special checking and verification. The false information is finally determined to be caused by that an identity card reading simulator OCX control is illegally installed at a small part of business terminals and is read by bypassing a real identity card reader at a Web end by auditing and searching in a business system and combining field secret visit and investigation.
The reason why the information of the second generation identity card is tampered in the system is as follows: individual illegal persons develop fake plug-ins according to the plug-in specification issued by the ministry of public security, the plug-ins meet all interfaces in the specification, and however, the identity card information is not read from an identity card reader, is input manually, and even is generated automatically.
Disclosure of Invention
The invention aims to provide a method for preventing an OCX control of a second-generation ID card reader from being tampered, so as to solve the problem that part of suspected false ID card information provided in the background technology enters a service system of a telecommunication operator for service acceptance. For such information, the false identity information is confirmed by a special check. The method comprises the steps of auditing and searching in a business system, combining with on-site dark visit and investigation, and finally determining that the false information is caused by that an identification card reading simulator OCX control is illegally installed at a small part of business terminals and the reading is carried out by bypassing a real identification card reader at a Web end.
In order to achieve the purpose, the invention provides the following technical scheme: a method for preventing the second generation ID card reader OCX control from being tampered comprises an ID card reader, a business support system foreground page and a business support system background service, wherein:
the identity card reader comprises four blocks, namely identity card reading, secretKey corresponding to APPID generation, identity information packaging, SHA1 encryption by using the secretKey and identity information combination to generate an encryption string cloudSignature _ cli;
the business support system foreground page comprises a foreground identity card clicking identity card reading button, calling an OCX control cloudReadCar method, acquiring foreground identity information, comparing cloudSignature of an identity card reader and a server side in js, and judging whether five blocks pass verification or not;
the business support system background comprises three blocks, namely a background service generation APPID, a callback BSS service storage secertKey, an SHA1 encryption module, a server side storage identity information module and an encryption string cloudSignature _ str module, wherein the three blocks are used for SHA1 encryption and are combined with the identity information module to carry out SHA1 encryption;
the OCX control of the identity card reader is transformed with a server calling interface, the effectiveness of the OCX control is encrypted and authenticated, a system provides a server side verification mechanism, the identity card reader provides a client side verification interface, data is encrypted, and the authenticity and the effectiveness of the control and the identity card data are verified interactively by two parties.
The method comprises the following steps:
the method comprises the following steps: transformation of OCX controls: the method comprises the steps of OCX reliability, an encryption algorithm, OCX and background network communication, addition of an identity card checking and reading interface, control attribute modification and provision of a background service interface for a front section calling standard; wherein:
OCX reliability: OCX guarantees that dependent dlls are not replaced;
and (3) encryption algorithm: combining some fields in the identity card with secreteKey, and generating a signature by using SHA1 algorithm;
OCX and background network communication: an interface is provided for background services and https is supported, so that the safety of data is guaranteed;
adding a verification reading ID card interface, a cloudReadCard, a function verification necessary dynamic library file, reading ID card information, generating a signature, and calling back BSS service to return a secertKey;
modifying the control attribute, and adding a read signature generated by a clodSignature method, wherein other attributes are the same as the original specification;
step two: and (3) matching and modifying a service support system: updating a card reader driving program; the ReadCard () in the original standard control is abandoned completely, and the cloudReadCard function of the new control can be used for completely replacing the ReadCard () in the original standard control; providing an http interface for acquiring the appId for the plug-in to call, and returning to the appId; providing a baseUrl address for the control, and receiving a secreteKey generated by the control; providing an APPID request; providing a function with the same encryption mode as the plug-in, and encrypting the parameters Sex + Born + CardNo + Effect Date + secret Key read by the card reader by SHA 1;
step three: and integrating the whole business process, comparing the encryption results of the card reader and the business support system, and judging whether the verification is passed.
As a preferred technical solution of the present invention, in the step one, OCX ensures that dependent dll is not replaced, and is solved by checking the file through MD 5.
Compared with the prior art, the invention has the beneficial effects that: the invention can ensure the compatibility of all identity card readers, improve the authenticity of data read by the identity card readers and improve the safety of a business support system under the condition of not influencing the uniform specification of identity card reading issued by the ministry of public security by less investment.
Drawings
FIG. 1 is a flowchart of the encryption modification of an ID card reader of the present invention;
Detailed Description
A method for preventing the second generation ID card reader OCX control from being tampered comprises an ID card reader, a business support system foreground page and a business support system background service, wherein:
the identity card reader comprises four blocks, namely identity card reading, generating secretKey corresponding to the APPID, packing identity information, and using the secretKey and the identity information to be combined for SHA1 encryption to generate an encryption string cloudSignature _ cli;
the business support system foreground page comprises a foreground clicking identity card identification reading button, calling an OCX control cloudReadCar method, acquiring foreground identity information, comparing cloudSignature of an identity card reader and a server side in js, and judging whether five blocks pass verification or not;
the business support system background comprises three blocks, namely a background service generation APPID, a callback BSS service storage secertKey, an SHA1 encryption block, a server side storage identity information block and an encryption string clioSignature _ str block, wherein the APPID is generated by the background service, the secertKey is stored by the callback BSS service, and the shA1 encryption block is generated by combining the secertKey and the identity information block;
the OCX control of the identity card reader is transformed with a server calling interface, the effectiveness of the OCX control is encrypted and authenticated, a system provides a server side verification mechanism, the identity card reader provides a client side verification interface, data is encrypted, and the authenticity and the effectiveness of the control and the identity card data are verified interactively by two parties.
The method comprises the following steps:
the method comprises the following steps: transformation of OCX controls: the method comprises the steps of OCX reliability, an encryption algorithm, OCX and background network communication, addition of an identity card checking and reading interface, control attribute modification and provision of a background service interface for a front section calling standard; wherein:
OCX reliability: OCX ensures that the dependent dll is not replaced and can be solved by checking the file by MD 5;
and (3) encryption algorithm: combining some fields in the identity card with the secreteKey, and generating a signature by using an SHA1 algorithm;
OCX and background network communication: an interface is provided for background services and https is supported, so that the safety of data is guaranteed;
adding a checking and reading ID card interface, namely a cloudReadCard (QString param), a function checking necessary dynamic library file, reading ID card information and generating a signature, and calling back BSS service to transmit a secertKey;
modifying the control attribute, and adding a read signature generated by a clodSignature method, wherein other attributes are the same as the original specification;
step two: and (3) matching and modifying a service support system: updating a card reader driving program; the ReadCard () in the original standard control is abandoned completely, and the cloudReadCard function of the new control can be used for completely replacing the ReadCard () in the original standard control; providing an http interface for acquiring the appId for the plug-in to call, and returning to the appId; providing a baseUrl address to the control for receiving a secretKey generated by the control; provide an APPID request, such as: GET http:// 127.0.0.1; providing a function with the same encryption mode as the plug-in, and encrypting SHA1 for the parameters Sex + Born + CardNO + Effect dDate + secret Key read by the card reader;
step three: and integrating the whole business process, comparing the encryption results of the card reader and the business support system, judging whether the verification is passed, if so, considering that the reading of the identity card information is successful, and if not, giving a corresponding prompt.
FIG. 1 shows a flowchart of the encryption modification of an ID card reader: the method comprises the steps that an identity card authentication reading button is clicked on a foreground interface of a business support system, a background service in the background service of the business support system generates an APPID, the APPID is returned, an OCX control cloudReadCar method is called, an APPID card is transmitted to read an identity card, or an identity information request is transmitted to a foreground identity information acquisition block, the identity card reading block then enters a secretKey corresponding to the APPID, the identity information package is performed from the secretKey corresponding to the APPID, the other segment enters a callback BSS service to store a secretKey for SHA1 encryption, the foreground identity information acquisition block also enters identity information package, after the identity information package is performed, the secretKey and the identity information are combined to perform SHA1 encryption to generate an encryption string cloudSignature _ cli, or the identity information is stored in a server, the secretKey and the identity information are combined to perform SHA1 encryption to generate an encryption string CloudSignature information, whether the identity information passes through plaintext display is judged, and whether the plaintext is wrong identity information to be displayed or not.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (3)

1. A method for preventing the second generation ID card reader OCX control from being tampered is characterized by comprising an ID card reader, a business support system foreground page and a business support system background service, wherein:
the identity card reader comprises four blocks, namely identity card reading, generating secretKey corresponding to the APPID, packing identity information, and using the secretKey and the identity information to be combined for SHA1 encryption to generate an encryption string cloudSignature _ cli;
the business support system foreground page comprises a foreground identity card clicking identity card reading button, calling an OCX control cloudReadCar method, acquiring foreground identity information, comparing cloudSignature of an identity card reader and a server side in js, and judging whether five blocks pass verification or not;
the business support system background comprises three blocks, namely a background service generation APPID, a callback BSS service storage secertKey, an SHA1 encryption block, a server side storage identity information block and an encryption string clioSignature _ str block, wherein the APPID is generated by the background service, the secertKey is stored by the callback BSS service, and the shA1 encryption block is generated by combining the secertKey and the identity information block;
the OCX control of the identity card reader is transformed with a server calling interface, the effectiveness of the OCX control is encrypted and authenticated, the system provides a server side verification mechanism, the identity card reader provides a client side verification interface, data is encrypted, and the authenticity and the effectiveness of the control and the identity card data are verified interactively by two parties.
2. The method for preventing the OCX control of the second-generation ID card reader from being tampered with as claimed in claim 1, comprising the following steps:
the method comprises the following steps: transformation of OCX controls: the method comprises the steps of OCX reliability, an encryption algorithm, OCX and background network communication, addition of an identity card checking and reading interface, control attribute modification and provision of a background service interface for a front section calling standard; wherein:
OCX reliability: OCX guarantees that dependent dlls are not replaced;
and (3) encryption algorithm: combining some fields in the identity card with the secreteKey, and generating a signature by using an SHA1 algorithm;
OCX and background network communication: an interface is provided for background services and https is supported, so that the safety of data is guaranteed;
adding a verification reading ID card interface, a cloudReadCard, a function verification necessary dynamic library file, reading ID card information, generating a signature, and calling back BSS service to return a secertKey;
modifying the control attribute, adding a read signature generated by a clodSignature method, wherein other attributes are the same as the original specification;
step two: and (3) matching and modifying a service support system: updating a card reader driving program; the ReadCard () in the original standard control is abandoned completely, and the cloudReadCard function of the new control can be used for completely replacing the ReadCard () in the original standard control; providing an http interface for acquiring an APPID, calling a plug-in unit, and returning to the APPID; providing a baseUrl address for the control, and receiving a secreteKey generated by the control; providing an APPID request; providing a function with the same encryption mode as the plug-in, and encrypting the parameters Sex + Born + CardNo + Effect Date + secret Key read by the card reader by SHA 1;
step three: and integrating the whole business process, comparing the encryption results of the card reader and the business support system, and judging whether the verification is passed.
3. The method for preventing the second generation ID card reader OCX control from being tampered according to claim 2, wherein: in the first step, OCX ensures that the dependent dll is not replaced, and the problem is solved by checking the file through MD 5.
CN201811339533.7A 2018-11-12 2018-11-12 Method for preventing second-generation ID card reader OCX control from being tampered Active CN109543399B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811339533.7A CN109543399B (en) 2018-11-12 2018-11-12 Method for preventing second-generation ID card reader OCX control from being tampered

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811339533.7A CN109543399B (en) 2018-11-12 2018-11-12 Method for preventing second-generation ID card reader OCX control from being tampered

Publications (2)

Publication Number Publication Date
CN109543399A CN109543399A (en) 2019-03-29
CN109543399B true CN109543399B (en) 2022-12-23

Family

ID=65846798

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811339533.7A Active CN109543399B (en) 2018-11-12 2018-11-12 Method for preventing second-generation ID card reader OCX control from being tampered

Country Status (1)

Country Link
CN (1) CN109543399B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175305B (en) * 2019-05-05 2022-03-11 中国银行股份有限公司 Data processing method, data processing device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117405A (en) * 2011-03-02 2011-07-06 苏州圣桥华玺信息安全技术有限公司 Identity card reader
CN104361489A (en) * 2014-11-03 2015-02-18 上海众人科技有限公司 Sensitive information identification system and sensitive information identification method
CN104573592A (en) * 2015-01-07 2015-04-29 歌尔声学股份有限公司 Integrating method and device for PEOPLESOFT HRMS platform and identity card reader
CN105187219A (en) * 2015-09-30 2015-12-23 山东信通电子股份有限公司 Method for preventing tampering of identity information in real name authentication
CN105915549A (en) * 2016-06-20 2016-08-31 公安部第三研究所 Secure communication system and method for online read of physical identity card
CN106027250A (en) * 2015-11-10 2016-10-12 天地融科技股份有限公司 Identity card information safety transmission method and system
CN107172008A (en) * 2017-04-01 2017-09-15 北京芯盾时代科技有限公司 A kind of system and method for carrying out multisystem certification and synchronization in a mobile device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8176563B2 (en) * 2000-11-13 2012-05-08 DigitalDoors, Inc. Data security system and method with editor
CN101002217A (en) * 2004-05-18 2007-07-18 西尔弗布鲁克研究有限公司 Pharmaceutical product tracking
US8468244B2 (en) * 2007-01-05 2013-06-18 Digital Doors, Inc. Digital information infrastructure and method for security designated data and with granular data stores

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117405A (en) * 2011-03-02 2011-07-06 苏州圣桥华玺信息安全技术有限公司 Identity card reader
CN104361489A (en) * 2014-11-03 2015-02-18 上海众人科技有限公司 Sensitive information identification system and sensitive information identification method
CN104573592A (en) * 2015-01-07 2015-04-29 歌尔声学股份有限公司 Integrating method and device for PEOPLESOFT HRMS platform and identity card reader
CN105187219A (en) * 2015-09-30 2015-12-23 山东信通电子股份有限公司 Method for preventing tampering of identity information in real name authentication
CN106027250A (en) * 2015-11-10 2016-10-12 天地融科技股份有限公司 Identity card information safety transmission method and system
CN105915549A (en) * 2016-06-20 2016-08-31 公安部第三研究所 Secure communication system and method for online read of physical identity card
CN107172008A (en) * 2017-04-01 2017-09-15 北京芯盾时代科技有限公司 A kind of system and method for carrying out multisystem certification and synchronization in a mobile device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
History-based trust negotiation model;Yizhu Zhao;《Journal of Shanghai University(English Edition)》;20090415(第02期);244-250 *
身份证识别系统行业解决方案;何兰;《警察技术》;20070507(第03期);135-141 *

Also Published As

Publication number Publication date
CN109543399A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
CN103295046B (en) The method and apparatus generated and use safe Quick Response Code
CN112333198B (en) Secure cross-domain login method, system and server
AU2012345478B2 (en) A method of generation and transmission of secure tokens based on tokens generated by TRNG and split into shares and the system thereof
CN107124281B (en) Data security method and related system
US20070028111A1 (en) Methods and apparatus for authentication of content delivery and playback applications
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN109039652B (en) Digital certificate generation and application method
CN107633402B (en) Method and system for aggregation authentication
CN111343179B (en) Real-time consensus method and device for authenticity of data on link
CN113472521A (en) Block chain-based real-name digital identity management method, signature device and verification device
CN111753278A (en) Comprehensive management system and method for electronic copyright authentication certificate
CN108900472B (en) Information transmission method and device
CN104657860A (en) Mobile banking security authentication method
KR20130021126A (en) Image-based user authentication method, and computer readable recording medium storing program for the same
CN109543399B (en) Method for preventing second-generation ID card reader OCX control from being tampered
CN110677261A (en) Credible two-dimensional code generation method and device, electronic equipment and storage medium
CN111553450B (en) Two-dimensional code generation and verification method and device
CN112202794A (en) Transaction data protection method and device, electronic equipment and medium
GB2449240A (en) Conducting secure online transactions using CAPTCHA
CN115150193A (en) Method and system for encrypting sensitive information in data transmission and readable storage medium
CN110740112B (en) Authentication method, apparatus and computer readable storage medium
CN117097562B (en) Safe centralized signature method and system
CN114499902B (en) Safety camera system based on digital watermarking technology and application method thereof
CN115037744B (en) Method and device for circulation of blockchain certificates, storage medium and management platform
CN114978681B (en) Service application authorization method and device based on block chain and processor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant