CN110619225A - Practitioner electronic identity card generation method suitable for dynamic public security management and control - Google Patents

Practitioner electronic identity card generation method suitable for dynamic public security management and control Download PDF

Info

Publication number
CN110619225A
CN110619225A CN201910832339.0A CN201910832339A CN110619225A CN 110619225 A CN110619225 A CN 110619225A CN 201910832339 A CN201910832339 A CN 201910832339A CN 110619225 A CN110619225 A CN 110619225A
Authority
CN
China
Prior art keywords
practitioner
basic
information data
identity card
base map
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910832339.0A
Other languages
Chinese (zh)
Other versions
CN110619225B (en
Inventor
陈宙
边鹏程
周莹洁
陈涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Aerospace Polytron Technologies Inc
WUXI PUBLIC SECURITY BUREAU
Original Assignee
Jiangsu Aerospace Polytron Technologies Inc
WUXI PUBLIC SECURITY BUREAU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Aerospace Polytron Technologies Inc, WUXI PUBLIC SECURITY BUREAU filed Critical Jiangsu Aerospace Polytron Technologies Inc
Priority to CN201910832339.0A priority Critical patent/CN110619225B/en
Publication of CN110619225A publication Critical patent/CN110619225A/en
Application granted granted Critical
Publication of CN110619225B publication Critical patent/CN110619225B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a practitioner electronic identity card generation method suitable for dynamic public security management and control. Which comprises the following steps: step 1, encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitionerbsAnd the length L of the basic information data ciphertext of the practitionerskAnd encrypting the key string Kbs(ii) a Step 2, providing a basic base map, and superposing basic identity information of a practitioner and a front photo of the practitioner on the basic base map; step 3, according to the basic base map and the basic information data ciphertext length L of the practitionerskAnd encrypting the key string KbsGenerating a non-repeating random coordinate number sequence; step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitionerbsMerged with the base picture. The invention can effectively generate the electronic identity card of the practitioner, and is convenient for checking the practitionerAnd whether the registration is normal or not is performed, and management control of the practitioner is strengthened.

Description

Practitioner electronic identity card generation method suitable for dynamic public security management and control
Technical Field
The invention relates to a method, in particular to a method for generating an electronic identity card of a practitioner, which is suitable for dynamic management and control of public security.
Background
The management and control of the personnel in the public security and public security industry are always the key focus of public security, and the personnel identity, the personnel engaged in the industry work and the like can be on duty after being authenticated and registered.
In the past, a card issuing system is adopted, and before a practitioner goes on duty, the practitioner goes to a specified place to register and issues a post-issuing certificate card. Nowadays, with the technical upgrade, practitioners registered for each registration no longer use physical cards, but use electronic virtual cards instead, and how to effectively generate electronic identity cards for the practitioners is a current technical problem.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provide a method for generating an electronic identity card of a practitioner suitable for dynamic public security management and control, which can effectively generate the electronic identity card of the practitioner, is convenient for checking whether the practitioner is normally registered or not and enhances the management and control of the practitioner.
According to the technical scheme provided by the invention, the generation method of the electronic identity card of the practitioner suitable for dynamic management and control of the public security comprises the following steps:
step 1, providing basic identity information of a practitioner, and encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitionerbsAnd the length L of the basic information data ciphertext of the practitionerskAnd encrypting the key string KbsThe basic identity information comprises a name, an identity card number and a registration date;
step 2, providing a basic base map of the electronic identity card of the practitioner, and superposing basic identity information of the practitioner and a front photo of the practitioner on the basic base map of the electronic identity card of the practitioner;
step 3,According to the basic base map and the basic information data ciphertext length L of the practitionerskAnd encrypting the key string KbsGenerating a non-repeating random coordinate number sequence;
step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitionerbsAnd combining with the basic picture to obtain the required electronic identity card of the practitioner.
In the step 1, the method specifically comprises the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitionerbs
Step 1.2, utilizing abstract algorithm SHA1 to carry out basic information data variable S on the practitionerbsEncrypting to obtain an encryption key string K with a 20-byte stringbsThe encryption key string KbsThe key string length of is LK;
step 1.3, encrypting the secret key string KbsA matrix M1 of 2 x 10, the matrix M1 being
Preparing an operator matrix M of 2 x 3subOperator matrix MsubIs composed ofThe operator matrix MsubConvolution operation is carried out on the DES secret key DK and the matrix M1 to generate 8 bytesbsSaid DES key DKbsIs composed ofKey DK according to DESbsCan obtain basic information data cipher text Sk of the practitionerbsSaid practitioner basic information data cipher text SkbsIs Skbs=FDES(Sbs,Kbs) Wherein F isDESFor the encryption function of DES, the basic information data cipher text Sk of the practitionerbsHas a length of Lsk
In the step 2, the method specifically comprises the following steps:
step 2.1, providing the required basic base map, wherein the format of the basic base map is BMP, the resolution is 720 x 472, the bit depth is 24, and the size of the basic picture file is LbpWidth of picture WbpPicture height of Hbp
And 2.2, superposing the basic identity information of the practitioner and the front photo of the practitioner to the position required by the basic base map of the electronic identity card of the practitioner to obtain the appearance of the electronic identity card of the practitioner.
In the step 3, the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string KbsObtaining random number seed RsThe random number seed RsIs composed of
Step 3.2, setting coordinate variable array P [ len]Wherein, the size of len and the length L of the basic information data cryptograph of the practitionerskSame as, P2]={P[0],P[1]…P[len-1]Each P [ i ]]Is a structure body, i has a value range of 0-len, Pi]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as the origin of the coordinates;
step 3.3, setting a random coordinate array R [ len ], wherein R [ ] [ { R [0], R [1] … R [ len-1] }, each R [ j ] is a structure, and the value range of j is 0-len, so as to obtain,
R[j].x=rand(Rs);
R[j].y=rand(Rs);
P[j].x=R[j].x modWbp*3;
P[j].y=R[j].y mod Hbp
wherein j ═ {0, Lsk-1, rand being a random number generating function; in the presence of a ligand to obtain P [ j]Then, P [ j ] is added]With already obtained P [1]]To P [ j-1]By comparison, if P [ j ]]And P1]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4 obtaining the array according to the above stepsLength LskIs random coordinate series of (2)]。
In step 4, the 1-dimensional array D2 is defined herein],D[]={D[0],D[1]…D[m-1]},m=LskEach of which is a 1-dimensional array D [ n ]]The calculation formula is as follows:
D[n]=P[n].y*Wbp*3+P[n].x,n={0,m-1};
setting the memory first address pointer of the data part of the basic base map as Buf, and setting Skbs[n]According to the value of D [ n ]]The positions are written into the data part of the basic base map one by one to replace the original RGB values, and the specific replacement mode is as follows:
Buf[D[n]]=Skbs[n];
after the replacement is completed, the cipher text Sk of the basic information data of the practitioner is realizedbsAnd combining with the basic picture to obtain the required electronic identity card of the practitioner.
The invention has the advantages that: can effectively generate the electronic identity card file of the practitioner which can not be counterfeited and encrypt the basic information data Sk of the practitionerbsThe method is characterized in that a mode of discrete coordinates is combined with a basic base map, a secret key used for encryption and a random number seed used for calculating the discrete coordinates are obtained from summary data calculated by a summary algorithm SHA1 in basic identity information of practitioners, the method has uniqueness and irreproducibility for each practitioner, an electronic identity card file can be stored in a mobile phone and can be used for identity verification at any time, and as a public security and public security management department, the method is of great help for verifying whether the practitioner is normally registered and enhancing the management control degree of the practitioner.
Drawings
FIG. 1 is a schematic diagram of the basic base diagram of the present invention.
Fig. 2 is a schematic diagram of basic identity information of a practitioner and a front photograph of the practitioner superimposed on a basic base map of an electronic identity card of the practitioner according to the present invention.
FIG. 3 is a schematic diagram of establishing a coordinate system according to the base map.
FIG. 4 is a diagram of the data portion of the underlying base map of the present invention.
Detailed Description
The invention is further illustrated by the following specific figures and examples.
In order to effectively generate an electronic identity card of a practitioner, facilitate checking whether the practitioner normally registers or not and strengthen management control on the practitioner, the invention provides basic identity information of the practitioner and encrypts the provided basic identity information to obtain basic information data cipher text Sk of the practitioner in step 1bsAnd the length L of the basic information data ciphertext of the practitionerskAnd encrypting the key string KbsThe basic identity information comprises a name, an identity card number and a registration date;
specifically, step 1 mainly includes the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitionerbs
In the embodiment of the invention, the basic information name, the identity card number and the registration date of a practitioner and the information content adopt a fixed-length mode to form a fixed-length content character string, wherein:
name: defining the name XM, the length is 32 bytes, and the longest length supports 16 Chinese characters;
identification card number: defining a name SFZH, length 18 bytes;
the registration date: defining a name DJRQ, 8 bytes in length (yesterday YYYYMMDD);
defining the basic information data variable of the practitioner as SbsDefining a data variable S of the basic information of the practitionerbsLength Lbs32+16+ 8-56 (bytes), Sbs=XM&SFZH&DJRQ。
Step 1.2, utilizing SHA1 abstract algorithm to carry out data variable S on basic information of practitionerbsEncrypting to obtain an encryption key string K with a 20-byte stringbsThe encryption key string KbsIs a key ofThe string length is LK;
in the embodiment of the present invention, the key generation decision adopts a relatively fixed key manner, that is, each defined practitioner has a specific key, the key is obtained by calculation according to the basic information of the practitioner, and the key is a unique term for each practitioner and is not repeated. In particular, the data variable S is based on the aforementioned practitioner basic informationbsGenerating a secret key by the internal character string for subsequent text encryption and other purposes; defining an encryption key as KbsAdopting SHA1 abstract algorithm, and obtaining basic information data variable S of practitionerbsThe character string is used for calculating and obtaining the key string.
Defining SHA1 cryptographic function name as FSHA1, from which
Kbs=FSHA1(Sbs);
Final encryption key string KbsIs a 160-bit, i.e., 20-byte, string. LK is defined as the length of the encryption key string, and is defined according to SHA1 as a fixed value of 20.
Step 1.3, encrypting the secret key string KbsA matrix M1 of 2 x 10, the matrix M1 being
Preparing an operator matrix M of 2 x 3subOperator matrix MsubIs composed ofThe operator matrix MsubConvolution operation is carried out on the DES secret key DK and the matrix M1 to generate 8 bytesbsSaid DES key DKbsIs composed ofKey DK according to DESbsCan obtain basic information data cipher text Sk of the practitionerbsSaid practitioner basic information data cipher text SkbsIs Skbs=FDES(Sbs,Kbs) Wherein F isDESFor DES encryption functionNumber, practitioner basic information data cipher text SkbsHas a length of Lsk
In the embodiment of the invention, the basic identity information of the practitioner is encrypted, and a plaintext is processed into a ciphertext; because the data information is not used for online data transmission in subsequent use, the DES encryption algorithm is adopted to encrypt the basic identity information of the practitioner, and the key is the encryption key string K generated in the previous stepbs. The generated cipher text is used as a component of the electronic identity card of the practitioner.
Here, the basic information data ciphertext of the practitioner is defined as SkbsThe DES key string is DKbsFirstly, a DES key string is calculated according to the encrypted key string Kbs, the DES key is 64 bits (8 bytes), and the calculation process is as follows:
20 bytes of encryption key string KbsConversion to 2 x 10 matrix M1
Preparing a 2 x 3 operator matrix MsubAnd generating an 8-byte DES key by convolution of the two matrixes:the specific convolution calculation process is well known to those skilled in the art and will not be described herein. V0, V1, … and V7 are DES key strings obtained by convolution calculation.
Finally, the DES secret key DK obtained by the calculationbsTo calculate the encryption; defining DES encryption function name FDESFrom which Sk is obtainedbs=FDES(Sbs,Kbs)。
Here, a practitioner basic information data ciphertext Sk is definedbsHas a length of Lsk(unit: byte), the above process can eventually be applied to severalThe numerical items can be used for subsequent process treatment: basic information data cipher text Sk of practitionerbsAnd the length L of the basic information data ciphertext of the practitionersk(unit: byte), encryption key string Kbs(20 bytes).
Step 2, providing a basic base map of the electronic identity card of the practitioner, and superposing basic identity information of the practitioner and a front photo of the practitioner on the basic base map of the electronic identity card of the practitioner;
in the embodiment of the invention, the electronic identity card file of the practitioner is finally the picture file, in the using process, in order to prevent counterfeiting by people, fixed values are adopted on various parameters such as format, resolution ratio and the like of the picture file, so that the authenticity can be distinguished when the verification is carried out, and the picture format and the fixed parameters are defined as follows:
the picture format is as follows: BMP; resolution ratio: 720 x 472 (width 720 pixels, height 472 pixels); bit depth: 24.
defining a base picture file size of LbpWidth of picture WbpPicture height of HbpFrom the parameters of the base map, we can obtain:
Wbp=720;
Hbp=472;
Lbp=54+Wbp*Hbp3 +720 + 472 + 3-1019574 (unit: byte).
The case of the base image is shown as breast 1. On the basis of the basic base map, information superposition is needed to be carried out on the electronic identity card pictures of the employees. Including basic information of the practitioner and the front photo of the practitioner, the electronic identity card picture can be finished in appearance after superposition. The contents to be superimposed are as follows:
the name of the practitioner, the identification card number of the practitioner, the electronic identity card number of the practitioner, the registration date of the practitioner and the front photo of the practitioner. The situation after the superimposition is shown in fig. 2.
Each content is superimposed on the designated coordinate position of the base picture. And (4) completing the appearance processing of the electronic card picture by the practitioner, preparing to merge the picture and the data, and generating an electronic identity card file.
Step 3, according to the basic base map and the basic information data ciphertext length L of the practitionerskAnd encrypting the key string KbsGenerating a non-repeating random coordinate number sequence;
the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string KbsObtaining random number seed RsThe random number seed RsIs composed of
The work of the stage is to generate a random coordinate position of data superposition by using a random number sequence so as to generate the basic information data cipher text Sk of the practitioner generated in the previous stagebsDiscretely incorporated into the picture file.
The random numbers generated by the rand function are not completely random in nature but are a group of pseudo-random number sequences, but are not false random numbers, the values of the continuously generated random number sequences are determined by the values of the random number seeds, and the same random number sequences can be generated by setting the same values of the random number seeds through the srand function. By utilizing this characteristic, the encryption key string K can be generated from the basic information of each workerbsTo dynamically generate a relatively fixed random number seed for each practitioner to obtain a set of random number sequences corresponding to each practitioner. In the embodiment of the invention, the random number seed RsIs composed of
Step 3.2, setting coordinate variable array P [ len]Wherein, the size of len and the length L of the basic information data cryptograph of the practitionerskSame as, P2]={P[0],P[1]…P[len-1]Each P [ i ]]Is a structure body, i has a value range of 0-len, Pi]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as the origin of the coordinates;
in the embodiment of the invention, the step is to generate a set of non-repeating random coordinates according to the produced continuous random number sequence. Defining random coordinate variable array P [ len ]]Wherein len is array length, and its value and practitioner basic information data ciphertext length LskThe same is true.
Establishing a coordinate system by using the base map, taking the upper left corner of the picture as the origin of coordinates, the horizontal direction as the X axis, and the vertical direction as the Y axis, wherein the X axis is in bytes, that is, each pixel value of the base map with 24-bit depth contains 3 bytes, and deriving the X axis and the Y axis as follows:
the Y axis is the height of the picture, and the value range is that { Y |0 is less than or equal to Y<Hbp}; hbp was previously defined as the height of the base map; the X axis is the width of the picture, and the value range is { X |0 ≦ X<Wbp*3},WbpPreviously defined as the width of the underlying base map. As shown in fig. 3 and 4.
Step 3.3, setting a random coordinate array R [ len ], wherein R [ ] [ { R [0], R [1] … R [ len-1] }, each R [ j ] is a structure, and the value range of j is 0-len, so as to obtain,
R[j].x=rand(Rs);
R[j].y=rand(Rs);
P[j].x=R[j].x modWbp*3;
P[j].y=R[j].y mod Hbp
wherein j ═ {0, Lsk-1, rand being a random number generating function; in the presence of a ligand to obtain P [ j]Then, P [ j ] is added]With already obtained P [1]]To P [ j-1]By comparison, if P [ j ]]And P1]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4, obtaining the length L of the array according to the stepsskIs random coordinate series of (2)]。
In the embodiment of the invention, the non-repeated random coordinate number sequence can be generated after the steps are carried out.
Step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitionerbsAnd combining with the basic picture to obtain the required electronic identity card of the practitioner.
In the BMP picture format, the data portion of the BMP picture format is a continuous memory segment, and the coordinate data needs to be converted from 2-dimensional data to 1-dimensional data for practical use.
Here, the 1-dimensional array D2 is defined],D[]={D[0],D[1]…D[m-1]},m=LskEach of which is a 1-dimensional array D [ n ]]The calculation formula is as follows:
D[n]=P[n].y*Wbp*3+P[n].x,n={0,m-1};
setting the memory first address pointer of the data part of the basic base map as Buf, and setting Skbs[n]According to the value of D [ n ]]The positions are written into the data part of the basic base map one by one to replace the original RGB values, and the specific replacement mode is as follows:
Buf[D[n]]=Skbs[n];
after the replacement is completed, the basic information data cipher text Skbs of the practitioner is merged with the basic picture, so that the required electronic identity card of the practitioner is obtained.
In the embodiment of the invention, the encrypted practitioner basic remaining information is discretely merged with the basic base map, the number of bytes of ciphertext data is less than that of the whole BMP file, the display of the BMP file picture is not influenced after the discrete merging, and the file formed by merging the data and the picture is used as the electronic identity card file of the practitioner.
The invention can effectively generate the electronic identity card file of the practitioner who can not be counterfeited and encrypt the basic information data Sk of the practitionerbsThe method is characterized in that a mode of discrete coordinates is combined with a basic base map, a secret key used for encryption and a random number seed used for calculating the discrete coordinates are obtained from abstract data calculated by an abstract algorithm SHA1 in basic identity information of practitioners, the method has uniqueness and irreproducibility for each practitioner, an electronic identity card file can be stored in a mobile phone, the practitioner can move an APP or open a WEB of the mobile phone, the picture can be verified after being selected, identity verification can be performed at any time, and as a public security and public security management department, the method is greatly helpful for verifying whether the practitioner is normally registered or not and enhancing the management control degree of the practitioner.

Claims (5)

1. A practitioner electronic identity card generation method suitable for dynamic public security management and control is characterized by comprising the following steps:
step 1, providing basic identity information of a practitioner, and encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitionerbsAnd the length L of the basic information data ciphertext of the practitionerskAnd encrypting the key string KbsThe basic identity information comprises a name, an identity card number and a registration date;
step 2, providing a basic base map of the electronic identity card of the practitioner, and superposing basic identity information of the practitioner and a front photo of the practitioner on the basic base map of the electronic identity card of the practitioner;
step 3, according to the basic base map and the basic information data ciphertext length L of the practitionerskAnd encrypting the key string KbsGenerating a non-repeating random coordinate number sequence;
step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitionerbsAnd combining with the basic picture to obtain the required electronic identity card of the practitioner.
2. The method for generating an electronic identity card for a practitioner, suitable for dynamic management and control of public security as claimed in claim 1, wherein the step 1 specifically comprises the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitionerbs
Step 1.2, utilizing abstract algorithm SHA1 to carry out basic information data variable S on the practitionerbsEncrypting to obtain an encryption key string K with a 20-byte stringbsThe encryption key string KbsThe key string length of is LK;
step 1.3, encrypting the secret key string KbsA matrix M1 of 2 x 10, the matrix M1 being
Preparing an operator matrix M of 2 x 3subOperator matrix MsubIs composed ofThe operator matrix MsubConvolution operation is carried out on the DES secret key DK and the matrix M1 to generate 8 bytesbsSaid DES key DKbsIs composed ofKey DK according to DESbsCan obtain basic information data cipher text Sk of the practitionerbsSaid practitioner basic information data cipher text SkbsIs Skbs=FDES(Sbs,Kbs) Wherein F isDESFor the encryption function of DES, the basic information data cipher text Sk of the practitionerbsHas a length of Lsk
3. The practitioner electronic identity card generation method suitable for dynamic police management and control according to claim 1, wherein the step 2 specifically comprises the following steps:
step 2.1, providing the required basic base map, wherein the format of the basic base map is BMP, the resolution is 720 x 472, the bit depth is 24, and the size of the basic picture file is LbpWidth of picture WbpPicture height of Hbp
And 2.2, superposing the basic identity information of the practitioner and the front photo of the practitioner to the position required by the basic base map of the electronic identity card of the practitioner to obtain the appearance of the electronic identity card of the practitioner.
4. The practitioner electronic identity card generation method suitable for dynamic police management and control according to claim 3, wherein in step 3, the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string KbsObtaining random number seed RsThe random number seed RsIs composed of
Step 3.2, setting coordinate variable array P [ len]Wherein, the size of len and the length L of the basic information data cryptograph of the practitionerskSame as, P2]={P[0],P[1]…P[len-1]Each P [ i ]]Is a structure body, i has a value range of 0-len, Pi]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as the origin of the coordinates;
step 3.3, setting a random coordinate array R [ len ], wherein R [ ] [ { R [0], R [1] … R [ len-1] }, each R [ j ] is a structure, and the value range of j is 0-len, so as to obtain,
R[j].x=rand(Rs);
R[j].y=rand(Rs);
P[j].x=R[j].x mod Wbp*3;
P[j].y=R[j].y mod Hbp
wherein j ═ {0, Lsk-1, rand being a random number generating function; in the presence of a ligand to obtain P [ j]Then, P [ j ] is added]With already obtained P [1]]To P [ j-1]By comparison, if P [ j ]]And P1]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4, obtaining the length L of the array according to the stepsskIs random coordinate series of (2)]。
5. The method as claimed in claim 4, wherein in step 4, the 1-dimensional array D2 is defined as],D[]={D[0],D[1]…D[m-1]},m=LskEach of which is a 1-dimensional array D [ n ]]The calculation formula is as follows:
D[n]=P[n].y*Wbp*3+P[n].x,n={0,m-1};
setting the memory first address pointer of the data part of the basic base map as Buf, and setting Skbs[n]According to the value of D [ n ]]The data portions of the base map are written one by one in place of the original RGB valuesThe body replacement mode is as follows:
Buf[D[n]]=Skbs[n];
after the replacement is completed, the cipher text Sk of the basic information data of the practitioner is realizedbsAnd combining with the basic picture to obtain the required electronic identity card of the practitioner.
CN201910832339.0A 2019-09-04 2019-09-04 Electronic identity card generation method suitable for public security dynamic management and control of employees Active CN110619225B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910832339.0A CN110619225B (en) 2019-09-04 2019-09-04 Electronic identity card generation method suitable for public security dynamic management and control of employees

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910832339.0A CN110619225B (en) 2019-09-04 2019-09-04 Electronic identity card generation method suitable for public security dynamic management and control of employees

Publications (2)

Publication Number Publication Date
CN110619225A true CN110619225A (en) 2019-12-27
CN110619225B CN110619225B (en) 2023-04-14

Family

ID=68922237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910832339.0A Active CN110619225B (en) 2019-09-04 2019-09-04 Electronic identity card generation method suitable for public security dynamic management and control of employees

Country Status (1)

Country Link
CN (1) CN110619225B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162489A (en) * 2007-11-26 2008-04-16 唐荣华 Personate photograph producing method used for keep input secret and method of use thereof
CN102420834A (en) * 2011-12-29 2012-04-18 公安部第三研究所 Method for generating and checking network identity identification code in network electronic identity card
CN103177364A (en) * 2011-12-26 2013-06-26 中国银联股份有限公司 Transaction processing method based on electronic signature
CN105184725A (en) * 2015-09-28 2015-12-23 公安部第一研究所 Network mapping document generated based on electronic legal identity document entity
WO2016041235A1 (en) * 2014-09-17 2016-03-24 苏州海博智能系统有限公司 Electronic cash data authorization method, payment method and virtual card
CN107945080A (en) * 2016-10-13 2018-04-20 杭州悉尔科技有限公司 A kind of electronic identity card awarding method and system based on biological identification technology
CN109284598A (en) * 2018-07-23 2019-01-29 深圳点猫科技有限公司 A kind of method and electronic equipment generating electronic identity card in the education cloud platform page
CN109460388A (en) * 2018-10-18 2019-03-12 中国联合网络通信集团有限公司 Electronic card generation method, device and storage medium
CN109766979A (en) * 2019-01-18 2019-05-17 北京思源互联科技有限公司 Two-dimensional code generation method, verification method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162489A (en) * 2007-11-26 2008-04-16 唐荣华 Personate photograph producing method used for keep input secret and method of use thereof
CN103177364A (en) * 2011-12-26 2013-06-26 中国银联股份有限公司 Transaction processing method based on electronic signature
CN102420834A (en) * 2011-12-29 2012-04-18 公安部第三研究所 Method for generating and checking network identity identification code in network electronic identity card
US20140331291A1 (en) * 2011-12-29 2014-11-06 The Third Institute Of The Ministry Of Public Security Method for generating and check-controlling network identity indentification code in network electronic identification card
WO2016041235A1 (en) * 2014-09-17 2016-03-24 苏州海博智能系统有限公司 Electronic cash data authorization method, payment method and virtual card
CN105184725A (en) * 2015-09-28 2015-12-23 公安部第一研究所 Network mapping document generated based on electronic legal identity document entity
CN107945080A (en) * 2016-10-13 2018-04-20 杭州悉尔科技有限公司 A kind of electronic identity card awarding method and system based on biological identification technology
CN109284598A (en) * 2018-07-23 2019-01-29 深圳点猫科技有限公司 A kind of method and electronic equipment generating electronic identity card in the education cloud platform page
CN109460388A (en) * 2018-10-18 2019-03-12 中国联合网络通信集团有限公司 Electronic card generation method, device and storage medium
CN109766979A (en) * 2019-01-18 2019-05-17 北京思源互联科技有限公司 Two-dimensional code generation method, verification method and device

Also Published As

Publication number Publication date
CN110619225B (en) 2023-04-14

Similar Documents

Publication Publication Date Title
CN110839026B (en) Data processing method based on block chain and related equipment
EP2151796A1 (en) An implement method and a device of electronic seal
CN109800585B (en) Image interpolation space completely reversible separable ciphertext domain information hiding algorithm
AU2008261152A1 (en) Privacy-Protected Biometric Tokens
JPH07191602A (en) Electronic autographing method and device
CN101789067A (en) Electronic document signature protecting method and system
Pramanik et al. Signature image hiding in color image using steganography and cryptography based on digital signature concepts
CN110390623A (en) A kind of image media safety certification restoration methods based on secret sharing
CN1838172A (en) Method and apparatus for inlaying watermark in digital image and digital camera capable of adding watermark
CN112910656B (en) Compressed sensing data transmission method based on digital signcryption
Sridevi et al. Image steganography combined with cryptography
CN105490814B (en) A kind of ticketing service real name identification method and system based on three-dimension code
CN110619225B (en) Electronic identity card generation method suitable for public security dynamic management and control of employees
CN106503771A (en) A kind of Quick Response Code fidelity systems
JP5913041B2 (en) Secret information concealment device, secret information restoration device, secret information concealment program, and secret information restoration program
CN111131657A (en) Chaos medical image tamper-proof encryption method based on self-verification matrix
CN101877118A (en) Electronic document authenticity identification system
US20150014980A1 (en) Method and system for authenticating printed documents
CN113935073A (en) Seal generation and verification method supporting main body and content authentication
Selvaraju et al. A method to improve the security level of ATM banking systems using AES algorithm
CN110364237B (en) Tamper-proof method and device for electronic prescription
KR20220125130A (en) Electronic contract processing server that processes electronic contracts between parties by utilizing the two-dimensional code and operating method thereof
Chavan et al. Data embedding technique using secret fragment visible mosaic image for covered communication
Hegde et al. Exploring the Effectiveness of Steganography Techniques: A Comparative Analysis
EP3594838A1 (en) Method for recovering a secret key securely stored in a secure element

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant