CN110401542A - Electronic identity voucher generation method, terminal and server - Google Patents

Electronic identity voucher generation method, terminal and server Download PDF

Info

Publication number
CN110401542A
CN110401542A CN201910716878.8A CN201910716878A CN110401542A CN 110401542 A CN110401542 A CN 110401542A CN 201910716878 A CN201910716878 A CN 201910716878A CN 110401542 A CN110401542 A CN 110401542A
Authority
CN
China
Prior art keywords
information
identity
card
electronic identity
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910716878.8A
Other languages
Chinese (zh)
Inventor
郭晓逢
刘刚
许金浓
郭晓加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910716878.8A priority Critical patent/CN110401542A/en
Publication of CN110401542A publication Critical patent/CN110401542A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

A kind of electronic identity voucher generation method provided by the invention, terminal and server, electronic identity voucher is obtained by all information factors in encryption message, each information factor is encrypted according to an identity information, and the cipher mode of at least two information factors is different, and then one side encryption rule is complicated, it is not easy to be stolen, on the other hand, using register user's typing authentication code and biological information as key, when needing to transfer electronic identity voucher, it needs to decrypt using authentication code and biological information, strengthen the safety of electronic identity voucher.

Description

Electronic identity voucher generation method, terminal and server
Technical field
The present invention relates to electronic certificate fields, more particularly to a kind of electronic identity voucher generation method, terminal and clothes Business device.
Background technique
It is continued to develop with trend is changed on service line, such as credit card obtains fraud wind severe outside visitor's field face on line Danger, also there is an urgent need to identity authentication means on the line of more safe and convenient, and it is crucial effectively to strengthen client identity and wish confirmation etc. The authenticity management of link, it is ensured that service security, efficient operation.Pass through the authentication means of more safe and convenient, Business Stream Journey design will more simplify, and the safety of business handling and convenience are promoted.By the authentication of more safe and convenient Means preferably meet the financial service demand of mobile interchange epoch client, further promote customer service experience.
Summary of the invention
At least one of to solve the above-mentioned problems, the application provides a kind of electronic identity voucher generation method, comprising:
The encryption message that terminal is sent is received, the encryption message includes multiple information factors, and each information factor passes through Encryption formation is carried out to the identity information of registration user, and the cipher mode of at least two information factors is different, it is described Identity information includes ID card information;
The encryption message is decrypted, each information factor is obtained;
Electronic identity voucher is generated according to all information factors, and using the authentication code and biological characteristic of registration user's typing Information stores the electronic identity as key encryption.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effective Phase, finger print information and identity card DN code, and/or,
The biological information to be formed by encoding to facial image progress base64.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
The ID card information is authenticated, determines whether the ID card information is correct;And/or
Further include:
Receive the authentication code of registration user's typing.
In certain embodiments, the identity information further includes reserved customer information.
In certain embodiments, a kind of electronic identity voucher generation method, comprising:
Multiple identity informations of registration user are obtained, the identity information includes ID card information;
The information factor that encryption forms corresponding number is carried out to each identity information using at least one cipher mode;
The information factor is packaged as encryption message and is sent to server, so that the server is to the encryption message It is decrypted to obtain each information factor, and then generates electronic identity voucher according to all information factors, wherein the electronics body Part voucher is encrypted using the authentication code and biological information of registration user's typing as key.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effective Phase, finger print information and identity card DN code;And/or the biological information is by carrying out base64 coding to facial image It is formed.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
The authentication code of typing registration user.
In certain embodiments, the identity information further includes reserved customer information.
The application also provides a kind of for generating the server of electronic identity voucher, comprising:
Message receiving module is encrypted, the encryption message that terminal is sent is received, the encryption message includes multiple information factors, Each information factor carries out encryption formation by an identity information to registration user, and at least two information factors plus Close mode is different, and the identity information includes ID card information;
Deciphering module is decrypted the encryption message, obtains each information factor;
Electronic identity voucher generation module generates electronic identity voucher according to all information factors, and using registration user The authentication code and biological information of typing store the electronic identity as key encryption.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effective Phase, finger print information and identity card DN code, and/or,
The biological information to be formed by encoding to facial image progress base64.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
Just whether ID card information authentication module authenticates the ID card information, determine the ID card information Really;And/or
Further include:
Authentication code receiving module receives the authentication code of registration user's typing.
In certain embodiments, the identity information further includes reserved customer information.
The application also provides a kind of for generating the terminal of electronic identity voucher, comprising:
Identity information acquisition module, obtains multiple identity informations of registration user, and the identity information includes identity card letter Breath;
Encrypting module carries out the information that encryption forms corresponding number to each identity information using at least one cipher mode The factor;
Message sending module is encrypted, the information factor is packaged as encryption message and is sent to server, so that the clothes Business device is decrypted to obtain each information factor to the encryption message, so according to all information factors generation electronic identity with Card, wherein the electronic identity voucher is encrypted using the authentication code and biological information of registration user's typing as key.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effective Phase, finger print information and identity card DN code;And/or the biological information is by carrying out base64 coding to facial image It is formed.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
Authentication code recording module, authentication code described in typing.
In certain embodiments, the identity information further includes reserved customer information.
The application also provides a kind of computer equipment, including memory, processor and storage on a memory and can located The step of computer program run on reason device, the processor realizes method as described above when executing described program.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer program The step of method as described above is realized when being executed by processor.
The invention has the following beneficial effects:
A kind of electronic identity voucher generation method, terminal and server provided by the invention pass through the institute in encryption message There is the information factor to obtain electronic identity voucher, each information factor is encrypted according to an identity information, and at least The cipher mode of two information factors is different, and then one side encryption rule is complicated, is not easy to be stolen, on the other hand, with registration The authentication code and biological information of user's typing are as key, when needing to transfer electronic identity voucher, need using certification Code and biological information decryption, strengthen the safety of electronic identity voucher.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 shows credible electronic identity authentication system structure diagram in the application.
Fig. 2 shows a kind of electronic identity voucher generation method flow diagrams that terminal in the application executes.
Fig. 3 shows a kind of electronic identity voucher generation method flow diagram that server executes in the application.
Fig. 4 shows terminal structure schematic diagram in the application.
Fig. 5 shows server architecture schematic diagram in the application.
Fig. 6 is shown in the application to the encryption schematic diagram of field format encryption.
Fig. 7 shows the structural schematic diagram for being suitable for the computer equipment for being used to realize the embodiment of the present application.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1 shows a kind of credible electronic identity authentication system comprising terminal 1 and server 5.
Terminal 1 and external information collecting device, such as fingerprint capturer, identity card recognizer 2, recognition of face device etc. are even It connects, available identity information, such as the address name, user's gender, certificate card number, the certificate that obtain from identity card are effective Phase, identity card DN code, the finger print information etc. acquired by fingerprint capturer.
Terminal is responsible for carrying out above-mentioned identity information encryption formation encryption message, and encryption message is then sent to service Device, so that server generates electronic identity voucher according to all information factors in encryption message.
It in the embodiment in figure 1, can also include for the storage server 4 of storage, for Ministry of Public Security's authentication The authentication server 3 of 8 requests verification of platform, carries out sign test server 7 of signature verification etc..
Further, ciphering process can not execute in server, can execute solution by the encryption equipment being separately provided Close, this will not be repeated here.
Since the above- mentioned information factor is uniquely, according to preset generating algorithm, to can be generated with uniqueness Electronic identity voucher.
Fig. 2 shows the electronic identity voucher generation methods that the application terminal is implemented, and specifically include:
S11: multiple identity informations of registration user are obtained, the identity information includes ID card information;
S12: the information factor that encryption forms corresponding number is carried out to each identity information using at least one cipher mode;
S13: the information factor is packaged as encryption message and is sent to server, so that the server is to the encryption Message is decrypted to obtain each information factor, and then generates electronic identity voucher according to all information factors, wherein the electricity Sub- identity documents are encrypted using the authentication code and biological information of registration user's typing as key.
It is appreciated that a kind of electronic identity voucher generation method provided by the invention implemented by terminal, is reported by encryption All information factors in text obtain electronic identity voucher, and each information factor is encrypted according to an identity information, And the cipher mode of at least two information factors is different, and then one side encryption rule is complicated, is not easy to be stolen, another party Face is needed when needing to transfer electronic identity voucher using the authentication code and biological information of registering user's typing as key It is decrypted using authentication code and biological information, strengthens the safety of electronic identity voucher.
It describes in detail below to electronic identity voucher generation method.
It is appreciated that DN code is the unique identification of identity card, if a citizen possesses multiple identity cards, every identity card DN code is also all different.
Terminal is encrypted using a variety of cipher modes, specifically, first by all identity informations according to format classification into Row classification, is then normalized the identity information of classification, uses to the other identity information of every type after normalization A kind of cipher mode is encrypted.Specifically, being encrypted using information of the dynamic encryption to number format, using following encryptions The information of field format is encrypted.
As shown in fig. 6, be illustrated below one specifically the cipher mode to field format data by way of example, it will be appreciated that Following Encryption Algorithm cannot be considered as the limitation to the application Encryption Algorithm.
S71: original field data 1, original field data 2, original field data 3 to original field data N are to encrypt Information field, N represents one or more, and system can calculate the specific value of N automatically.
For a certain original field data N, one of customized set of algorithms M algorithm can be used, it is encrypted. Symmetry algorithm and asymmetric arithmetic can be used in set of algorithms M.Symmetry algorithm includes 3DES, SM4, AES etc., and the key of every kind of algorithm can According to configuration requirement by the second, point, when, day, week, the moon, year different cycles carry out dynamic update, asymmetric arithmetic includes SM2, RSA Deng.System is that each field N selects a kind of Encryption Algorithm, and generating algorithm sequence from set of algorithms M according to the specific value of N K1K2K3...Kn, Kn indicate a kind of Encryption Algorithm, and sequence of algorithms K1K2K3...Kn is encrypted using national secret algorithm SM4, close Key supports dynamic to update.The key of above-mentioned symmetry algorithm is always consistent in terminal and server.
S72: by previous step rule, system to original field data 1, original field data 2, original field data 3 to Original field data N is encrypted according to the algorithm that sequence of algorithms K1K2K3...Kn chooses, to sequence of algorithms K1K2K3...Kn It is encrypted.Ciphertext L is spliced into using list separator between data, and list separator is customized character visible or can in system See character string.
After each field data completes encryption, electronic identity voucher terminal sends to electronic identity voucher server and instructs, and makes Private key is generated in electronic identity voucher server with asymmetric SM2 national secret algorithm, and corresponding public key is returned into electronic identity Voucher terminal.The public and private key that asymmetric SM2 national secret algorithm generates to can press the second, point, when, day, week, the moon, year different cycles it is dynamic State updates.Ciphertext L is encrypted to ciphertext X using the public key that asymmetric SM2 national secret algorithm generates.
S73: carrying out base64 coding to ciphertext X, at the same after base64 coding the front F of bit string, middle part Y or after The out-of-order character of portion B supplement safety, safety random ordering character is consistent with the character visible range that base64 is encoded, safety random ordering character Quantity is 12 multiple, and the out-of-order character string system of the safety of front F, middle part Y or rear portion B can be defined and combine, and according to System ultimately produces base64 encoded information format message and is sent.
In some embodiments, the biological information to be formed by encoding to facial image progress base64.
In addition, in certain embodiments, the electronic identity voucher is two dimensional code mark.
Further, the above method further include: the authentication code of typing registration user.
Authentication code is the identifying code of user's typing, and the application is added by combining biological information with authentication code Close decryption, and then identifying code and biological information acquisition electronic certificate are needed while inputting, improve the safety of electronic certificate Property.
In certain embodiments, above-mentioned identity information further includes reserved customer information.
By taking banking system as an example, customer information includes existing customer's number, cell-phone number of client etc..
In addition, the above method further includes the steps that authentication: according to the DN code, being transferred from the server of public security department Corresponding authentication information is compared with the identity information of reading, if unanimously, authentication passes through.
Fig. 3 shows a kind of electronic identity voucher generation method by server implementation, comprising:
S21: the encryption message that terminal is sent is received, the encryption message includes multiple information factors, each information factor Encryption formation is carried out by an identity information to registration user, and the cipher mode of at least two information factors is different, The identity information includes ID card information;
S22: the encryption message is decrypted, each information factor is obtained;
S23: electronic identity voucher is generated according to all information factors, and using the authentication code and biology of registration user's typing Characteristic information stores the electronic identity as key encryption.
It is appreciated that a kind of electronic identity voucher generation method provided by the invention implemented by terminal, is reported by encryption All information factors in text obtain electronic identity voucher, and each information factor is encrypted according to an identity information, And the cipher mode of at least two information factors is different, and then one side encryption rule is complicated, is not easy to be stolen, another party Face is needed when needing to transfer electronic identity voucher using the authentication code and biological information of registering user's typing as key It is decrypted using authentication code and biological information, strengthens the safety of electronic identity voucher.
It is appreciated that be based on identical inventive concept, in some embodiments, the ID card information include: address name, User's gender, certificate card number, certificate validity period, finger print information and identity card DN code.
Based on identical inventive concept, in some embodiments, the biological information is by carrying out facial image Base64 encodes to be formed.
Based on identical inventive concept, in some embodiments, the electronic identity voucher is two dimensional code mark.
Based on identical inventive concept, in some embodiments, further includes:
The ID card information is authenticated, determines whether the ID card information is correct.
Authentication information is transferred from public security server by DN code in the embodiment to be authenticated.
Based on identical inventive concept, in some embodiments, further includes:
Receive the authentication code of registration user's typing.
Authentication code is the customized identifying code of user, can be existed in a manner of 6 bit digitals or 8 bit digitals etc..
In the embodiment of the present application, client can be new client or frequent customer, and frequent customer is stored with corresponding in systems Identity information, such as fingerprint, face feature and identity card etc..
Terminal and server is described in detail below.
Fig. 4 shows the virtual architecture schematic diagram of terminal, specifically includes: identity information acquisition module 11, obtains registration and uses Multiple identity informations at family, the identity information include ID card information;Encrypting module 12, using at least one cipher mode pair Each identity information carries out the information factor that encryption forms corresponding number;Message sending module 13 is encrypted, by the information factor Be packaged as encryption message and be sent to server so that the server to the encryption message be decrypted to obtain each information because Son, and then electronic identity voucher is generated according to all information factors, wherein the electronic identity voucher is using registration user's typing Authentication code and biological information as key encrypt.
In some embodiments, terminal and external information collecting device, for example, fingerprint capturer, identity card recognizer, The connection such as recognition of face device.
Based on identical inventive concept, in an embodiment, the ID card information includes: address name, user's gender, card Part card number, certificate validity period, finger print information and identity card DN code;And/or the biological information passes through to facial image Base64 is carried out to encode to be formed.
Based on identical inventive concept, in an embodiment, the electronic identity voucher is two dimensional code mark.
Based on identical inventive concept, in an embodiment, terminal further include:
Authentication code recording module, authentication code described in typing.
Based on identical inventive concept, in an embodiment, the identity information further includes reserved customer information.
Fig. 5 shows the concrete structure schematic diagram of server, as shown in figure 5, comprising: encrypt message receiving module 21, The encryption message that terminal is sent is received, the encryption message includes multiple information factors, and each information factor is by using registration One identity information at family carries out encryption formation, and the cipher mode of at least two information factors is different, the identity information Including ID card information;Deciphering module 22 is decrypted the encryption message, obtains each information factor;Electronic identity with Generation module 23 is demonstrate,proved, generates electronic identity voucher according to all information factors, and using the authentication code of registration user's typing and life Object characteristic information stores the electronic identity as key encryption.
It is appreciated that server provided by the present application, obtains electronic identity by all information factors in encryption message Voucher, each information factor are encrypted according to an identity information, and the cipher mode of at least two information factors Difference, and then one side encryption rule is complicated, is not easy to be stolen, on the other hand, to register the authentication code and biology of user's typing Characteristic information is as key, when needing to transfer electronic identity voucher, needs to decrypt using authentication code and biological information, add The strong safety of electronic identity voucher.
Based on identical inventive concept, the ID card information includes: address name, user's gender, certificate card number, certificate Validity period, finger print information and identity card DN code, and/or, the biological information is by carrying out base64 to facial image Coding is formed.
The electronic identity voucher is two dimensional code mark.
Based on identical inventive concept, further includes:
Just whether ID card information authentication module authenticates the ID card information, determine the ID card information Really;And/or, further includes:
Authentication code receiving module receives the authentication code of registration user's typing.
Based on identical inventive concept, the identity information further includes reserved customer information.
The generation scene and application scenarios of electronic certificate is illustrated below.
Step S501: when client's arrival bank outlets' sales counter handles registration electronic certificate business, terminal is initiated to read two generation bodies The instruction of part card information, client pass through the credible 2 brush China second-generation identity card of card-reading apparatus in cabinet face outside sales counter, and service terminal takes DN After the second-generation identification card informations such as code, customer name, identification card number and fingerprint, pass through encryption and generate message, then by data Server is sent to be handled.
Step S502: server receives the data of terminal request, is analyzed and processed to message, is carried out according to type of message Processing.If client is new client, the corresponding customer number of new client is generated, terminal sends the finger of typing electronic certificate authentication code It enables, client is passed through by code keyboard typing double probate code, system veritification, client's success typing authentication code.
Step S503 terminal calls portrait living body control, and system obtains qualified facial image and is used for recognition of face, and right It carries out base64 coding, while by facial image, Client handset number and the electronic certificate authentication code related data after coding into Row processing, and it is sent to server, server network handles data, then transmits data to private server 3, Special clothes Business device 3 transmits data to Ministry of Public Security's identity authentication platform 8 by network special line and is verified, and verifies successful result original road and returns Return to terminal.If client is registered to cross electronic certificate, 5 electronic certificate message processing module 53 of application server is remembered according to system Record prompts the actual conditions of client enrollment electronic certificate.If user, there are multiple identity cards, system judges that certificate validity period originates Whether date or date of expiry are less than the validity period in system in the customer information, such as less than, it is desirable that and client holds new certificate acquiring, Or it is handled again after the customer information of more new system.
Step S504: terminal receives unsuccessful verification as a result, registration electronic certificate success, application server 5 compile client Number, the information such as electronic certificate, customer name, passport NO., fingerprint and transaction code be sent to storage server 4 and saved, Wherein, be related to the sensitive datas such as electronic certificate, customer name, passport NO., fingerprint by encryption equipment encryption and decryption handle after again into Row saves.
The scene that client uses electronic certificate is illustrated below.
Step S701: client reaches bank outlets' sales counter, and the mobile device of installation Mobile banking app shows that client nets card two It ties up code (electronic certificate), the service terminal that channel accesses 1 site cabinet face 11 reads net card two dimensional code using scanning means, passes through people As living body control shooting facial image photo, and base64 coding is carried out, passes through code keyboard input authentication code, sets of relational data Dress is message, is sent to application server 5.
Step S702: application server 5 splits message, sends the data to encryption equipment 5 and carries out data encrypting and deciphering Processing splits type of message, customer name, identification card number, certificate validity period, the facial image of base64 coding, base64 volume Finger print information, Client handset number, net card authentication code, the net of code demonstrate,prove the data of information and each field of transaction code, and request is authenticated Data be sent to sign test server 7 and sign, service-specific is sent by application server 5 by the data after signature Device, then Ministry of Public Security's identity authentication platform 8 is accessed by network special line and is verified.Application server 5 receives the verification knot returned Fruit transmits data to sign test server 7 and carries out sign test processing, after the encrypted machine of the data of return encrypts, is saved in storage clothes Business device 4, the customer information and Transaction Information of former message are also needed through encryption equipment encrypting storing.Application server 5 is by authentication result Return to site service terminal.
Step S703: terminal receive net identification card as a result, system is automatically performed the process of transfer transactions, winding-up.
It is appreciated that the application can simplify bank transaction process, access unified management by all kinds of means is realized, verification process can To form complete business handling chain of evidence electronic record, powerful measure is provided for verification, retrospect, proof client's actual wishes. The problem of can effectively solve bank client identification safety authentication realizes client in the case where not carrying China second-generation identity card medium It also can be the bank safety transacting business the problem of.During banking is handled, reduction and the cumbersome interactive step of client are mentioned Rise customer service experience, raising efficiency.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer equipment, specifically, computer is set It is standby for example can for personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, Media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment In any equipment combination.
Computer equipment specifically includes memory, processor and storage on a memory simultaneously in a typical example The computer program that can be run on a processor is realized when the processor executes described program and is held as described above by client Capable method, alternatively, the processor realizes the method executed as described above by server when executing described program.
Below with reference to Fig. 7, it illustrates the structural schematic diagrams for the computer equipment for being suitable for being used to realize the embodiment of the present application.
As shown in fig. 7, computer equipment 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in Program in memory (ROM) 602 is loaded into random access storage device (RAM) from storage section 608) program in 603 And execute various work appropriate and processing.In RAM603, also it is stored with system 600 and operates required various program sum numbers According to.CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to Bus 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.; And including such as LAN card, the communications portion 609 of the network interface card of modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 606 as needed.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon Computer program be mounted as needed such as storage section 608.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart description Software program.For example, the embodiment of the present invention includes a kind of computer program product comprising be tangibly embodied in machine readable Computer program on medium, the computer program include the program code for method shown in execution flow chart.At this In the embodiment of sample, which can be downloaded and installed from network by communications portion 609, and/or from removable Medium 611 is unloaded to be mounted.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (22)

1. a kind of electronic identity voucher generation method characterized by comprising
The encryption message that terminal is sent is received, the encryption message includes multiple information factors, and each information factor passes through to note The identity information of volume user carries out encryption formation, and the cipher mode of at least two information factors is different, the identity Information includes ID card information;
The encryption message is decrypted, each information factor is obtained;
Electronic identity voucher is generated according to all information factors, and using the authentication code and biological information of registration user's typing The electronic identity is stored as key encryption.
2. electronic identity voucher generation method according to claim 1, which is characterized in that the ID card information includes: Address name, user's gender, certificate card number, certificate validity period, finger print information and identity card DN code, and/or,
The biological information to be formed by encoding to facial image progress base64.
3. electronic identity voucher generation method according to claim 1, which is characterized in that the electronic identity voucher is two Tie up code mark.
4. electronic identity voucher generation method according to claim 1, which is characterized in that further include:
The ID card information is authenticated, determines whether the ID card information is correct;And/or
Further include:
Receive the authentication code of registration user's typing.
5. electronic identity voucher generation method according to claim 1, which is characterized in that the identity information further includes pre- Stay customer information.
6. a kind of electronic identity voucher generation method characterized by comprising
Multiple identity informations of registration user are obtained, the identity information includes ID card information;
The information factor that encryption forms corresponding number is carried out to each identity information using at least one cipher mode;
The information factor is packaged as encryption message and is sent to server, so that the server carries out the encryption message Decryption obtains each information factor, and then generates electronic identity voucher according to all information factors, wherein the electronic identity with Card is encrypted using the authentication code and biological information of registration user's typing as key.
7. electronic identity voucher generation method according to claim 6, which is characterized in that the ID card information includes: Address name, user's gender, certificate card number, certificate validity period, finger print information and identity card DN code;And/or the biology spy Reference breath to be formed by encoding to facial image progress base64.
8. electronic identity voucher generation method according to claim 6, which is characterized in that the electronic identity voucher is two Tie up code mark.
9. electronic identity voucher generation method according to claim 6, which is characterized in that further include:
The authentication code of typing registration user.
10. electronic identity voucher generation method according to claim 6, which is characterized in that the identity information further includes Reserved customer information.
11. a kind of for generating the server of electronic identity voucher characterized by comprising
Message receiving module is encrypted, receives the encryption message that terminal is sent, the encryption message includes multiple information factors, each The information factor carries out encryption formation, and the encryption side of at least two information factors by an identity information to registration user Formula is different, and the identity information includes ID card information;
Deciphering module is decrypted the encryption message, obtains each information factor;
Electronic identity voucher generation module generates electronic identity voucher according to all information factors, and using registration user's typing Authentication code and biological information as key encryption store the electronic identity.
12. server according to claim 11, which is characterized in that the ID card information includes: address name, user Gender, certificate card number, certificate validity period, finger print information and identity card DN code, and/or,
The biological information to be formed by encoding to facial image progress base64.
13. server according to claim 11, which is characterized in that the electronic identity voucher is two dimensional code mark.
14. server according to claim 11, which is characterized in that further include:
ID card information authentication module authenticates the ID card information, determines whether the ID card information is correct; And/or
Further include:
Authentication code receiving module receives the authentication code of registration user's typing.
15. server according to claim 11, which is characterized in that the identity information further includes reserved customer information.
16. a kind of for generating the terminal of electronic identity voucher characterized by comprising
Identity information acquisition module obtains multiple identity informations of registration user, and the identity information includes ID card information;
Encrypting module, using at least one cipher mode to each identity information carry out encryption formed the information of corresponding number because Son;
Message sending module is encrypted, the information factor is packaged as encryption message and is sent to server, so that the server The encryption message is decrypted to obtain each information factor, and then generates electronic identity voucher according to all information factors, Wherein the electronic identity voucher is encrypted using the authentication code and biological information of registration user's typing as key.
17. terminal according to claim 16, which is characterized in that the ID card information includes: address name, Yong Huxing Not, certificate card number, certificate validity period, finger print information and identity card DN code;And/or the biological information passes through to people Face image carries out base64 and encodes to be formed.
18. terminal according to claim 16, which is characterized in that the electronic identity voucher is two dimensional code mark.
19. terminal according to claim 16, which is characterized in that further include:
Authentication code recording module, authentication code described in typing.
20. terminal according to claim 16, which is characterized in that the identity information further includes reserved customer information.
21. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes the described in any item methods of claims 1 to 10 when executing described program The step of.
22. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of claims 1 to 10 described in any item methods are realized when processor executes.
CN201910716878.8A 2019-08-05 2019-08-05 Electronic identity voucher generation method, terminal and server Pending CN110401542A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910716878.8A CN110401542A (en) 2019-08-05 2019-08-05 Electronic identity voucher generation method, terminal and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910716878.8A CN110401542A (en) 2019-08-05 2019-08-05 Electronic identity voucher generation method, terminal and server

Publications (1)

Publication Number Publication Date
CN110401542A true CN110401542A (en) 2019-11-01

Family

ID=68327431

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910716878.8A Pending CN110401542A (en) 2019-08-05 2019-08-05 Electronic identity voucher generation method, terminal and server

Country Status (1)

Country Link
CN (1) CN110401542A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955858A (en) * 2019-11-12 2020-04-03 广州大白互联网科技有限公司 Information management method of network license platform
CN110995659A (en) * 2019-11-12 2020-04-10 广州大白互联网科技有限公司 Method and system for generating network authentication data
CN111431873A (en) * 2020-03-11 2020-07-17 山东超越数控电子股份有限公司 Method, system, device and medium for reporting information
CN112383399A (en) * 2020-11-06 2021-02-19 新大陆(福建)公共服务有限公司 Key processing method, system, device and medium for self-adaptive matching identity platform
CN112597458A (en) * 2020-12-22 2021-04-02 北京八分量信息科技有限公司 Method and device for identity authentication based on trusted authentication and related product
CN113691366A (en) * 2020-05-16 2021-11-23 成都天瑞芯安科技有限公司 Desensitized secure biometric identity authentication system
CN114022335A (en) * 2022-01-10 2022-02-08 中航信移动科技有限公司 Electronic identity authentication method and device based on dynamic timeliness and electronic equipment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601325A (en) * 2013-10-31 2015-05-06 华为技术有限公司 Data encryption method, device, equipment and system and data decryption method, device, equipment and system
CN104881280A (en) * 2015-05-13 2015-09-02 南京邮电大学 Multi-search supporting design method for encrypted database middleware
CN105429761A (en) * 2015-12-29 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Key generation method and device
CN105656870A (en) * 2015-06-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device and system
CN105847233A (en) * 2016-03-10 2016-08-10 浪潮集团有限公司 Switch which carries out encrypted transmission according to fields
CN106375083A (en) * 2016-09-30 2017-02-01 广东网金控股股份有限公司 Encryption-decryption method based on Base64 and device thereof
US20180069696A1 (en) * 2015-04-14 2018-03-08 Samsung Sds Co., Ltd. Encrypted data management method and device
CN108540470A (en) * 2018-04-04 2018-09-14 中国工商银行股份有限公司 Verification System and method based on digital certificate label
CN108595971A (en) * 2018-04-25 2018-09-28 杭州闪捷信息科技股份有限公司 A kind of database adaptive refinement method
CN109005151A (en) * 2018-06-13 2018-12-14 四川斐讯信息技术有限公司 A kind of encryption of information, decryption processing method and processing terminal
CN109450642A (en) * 2018-11-05 2019-03-08 郑州云海信息技术有限公司 The treating method and apparatus of network ciphertext data

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601325A (en) * 2013-10-31 2015-05-06 华为技术有限公司 Data encryption method, device, equipment and system and data decryption method, device, equipment and system
US20180069696A1 (en) * 2015-04-14 2018-03-08 Samsung Sds Co., Ltd. Encrypted data management method and device
CN104881280A (en) * 2015-05-13 2015-09-02 南京邮电大学 Multi-search supporting design method for encrypted database middleware
CN105656870A (en) * 2015-06-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device and system
CN105429761A (en) * 2015-12-29 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Key generation method and device
CN105847233A (en) * 2016-03-10 2016-08-10 浪潮集团有限公司 Switch which carries out encrypted transmission according to fields
CN106375083A (en) * 2016-09-30 2017-02-01 广东网金控股股份有限公司 Encryption-decryption method based on Base64 and device thereof
CN108540470A (en) * 2018-04-04 2018-09-14 中国工商银行股份有限公司 Verification System and method based on digital certificate label
CN108595971A (en) * 2018-04-25 2018-09-28 杭州闪捷信息科技股份有限公司 A kind of database adaptive refinement method
CN109005151A (en) * 2018-06-13 2018-12-14 四川斐讯信息技术有限公司 A kind of encryption of information, decryption processing method and processing terminal
CN109450642A (en) * 2018-11-05 2019-03-08 郑州云海信息技术有限公司 The treating method and apparatus of network ciphertext data

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955858A (en) * 2019-11-12 2020-04-03 广州大白互联网科技有限公司 Information management method of network license platform
CN110995659A (en) * 2019-11-12 2020-04-10 广州大白互联网科技有限公司 Method and system for generating network authentication data
CN110995659B (en) * 2019-11-12 2022-02-22 广州大白互联网科技有限公司 Method and system for generating network authentication data
CN111431873A (en) * 2020-03-11 2020-07-17 山东超越数控电子股份有限公司 Method, system, device and medium for reporting information
CN113691366A (en) * 2020-05-16 2021-11-23 成都天瑞芯安科技有限公司 Desensitized secure biometric identity authentication system
CN112383399A (en) * 2020-11-06 2021-02-19 新大陆(福建)公共服务有限公司 Key processing method, system, device and medium for self-adaptive matching identity platform
CN112383399B (en) * 2020-11-06 2024-01-26 新大陆(福建)公共服务有限公司 Key processing method, system, equipment and medium of self-adaptive matching identity platform
CN112597458A (en) * 2020-12-22 2021-04-02 北京八分量信息科技有限公司 Method and device for identity authentication based on trusted authentication and related product
CN112597458B (en) * 2020-12-22 2023-12-01 北京八分量信息科技有限公司 Method, device and related product for identity authentication based on trusted authentication
CN114022335A (en) * 2022-01-10 2022-02-08 中航信移动科技有限公司 Electronic identity authentication method and device based on dynamic timeliness and electronic equipment
CN114022335B (en) * 2022-01-10 2022-03-18 中航信移动科技有限公司 Electronic identity authentication method and device based on dynamic timeliness and electronic equipment

Similar Documents

Publication Publication Date Title
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
EP3721578B1 (en) Methods and systems for recovering data using dynamic passwords
CN110401542A (en) Electronic identity voucher generation method, terminal and server
CN105453483B (en) For method and apparatus derived from the key based on image
US10318932B2 (en) Payment card processing system with structure preserving encryption
CN110383757A (en) System and method for safe handling electronic identity
US20170026180A1 (en) Method and database system for secure storage and communication of information
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN107566117A (en) A kind of block chain key management system and method
CN110462658A (en) For providing system and method for the digital identity record to verify the identity of user
CN109583219A (en) A kind of data signature, encryption and preservation method, apparatus and equipment
CN110326251A (en) The system and method that the general dispersion solution of user is verified using cross validation feature are provided
CN207489017U (en) Data desensitization system
CN106452775A (en) Method and apparatus for accomplishing electronic signing and signing server
US20160098698A1 (en) Methods for enabling mobile payments
CN104462949B (en) The call method and device of a kind of plug-in unit
CN108876593A (en) A kind of online transaction method and apparatus
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
EP4049403A2 (en) Optimized private biometric matching
Saranya et al. Efficient mobile security for E health care application in cloud for secure payment using key distribution
CN103942896A (en) System for money withdrawing without card on ATM
CN108805574B (en) Transaction method and system based on privacy protection
CN111222178A (en) Data signature method and device
CN109903052A (en) A kind of block chain endorsement method and mobile device
US20230154260A1 (en) Token based secure access to a locker system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191101

RJ01 Rejection of invention patent application after publication