CN110619225A - Practitioner electronic identity card generation method suitable for dynamic public security management and control - Google Patents
Practitioner electronic identity card generation method suitable for dynamic public security management and control Download PDFInfo
- Publication number
- CN110619225A CN110619225A CN201910832339.0A CN201910832339A CN110619225A CN 110619225 A CN110619225 A CN 110619225A CN 201910832339 A CN201910832339 A CN 201910832339A CN 110619225 A CN110619225 A CN 110619225A
- Authority
- CN
- China
- Prior art keywords
- practitioner
- basic
- information data
- identity card
- base map
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 239000011159 matrix material Substances 0.000 claims description 20
- 230000006870 function Effects 0.000 claims description 9
- 101100217298 Mus musculus Aspm gene Proteins 0.000 claims description 8
- 238000004364 calculation method Methods 0.000 claims description 8
- 239000003446 ligand Substances 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 5
- 238000012795 verification Methods 0.000 description 3
- 230000002708 enhancing effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 210000000481 breast Anatomy 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Educational Administration (AREA)
- Primary Health Care (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a practitioner electronic identity card generation method suitable for dynamic public security management and control. Which comprises the following steps: step 1, encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitionerbsAnd the length L of the basic information data ciphertext of the practitionerskAnd encrypting the key string Kbs(ii) a Step 2, providing a basic base map, and superposing basic identity information of a practitioner and a front photo of the practitioner on the basic base map; step 3, according to the basic base map and the basic information data ciphertext length L of the practitionerskAnd encrypting the key string KbsGenerating a non-repeating random coordinate number sequence; step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitionerbsMerged with the base picture. The invention can effectively generate the electronic identity card of the practitioner, and is convenient for checking the practitionerAnd whether the registration is normal or not is performed, and management control of the practitioner is strengthened.
Description
Technical Field
The invention relates to a method, in particular to a method for generating an electronic identity card of a practitioner, which is suitable for dynamic management and control of public security.
Background
The management and control of the personnel in the public security and public security industry are always the key focus of public security, and the personnel identity, the personnel engaged in the industry work and the like can be on duty after being authenticated and registered.
In the past, a card issuing system is adopted, and before a practitioner goes on duty, the practitioner goes to a specified place to register and issues a post-issuing certificate card. Nowadays, with the technical upgrade, practitioners registered for each registration no longer use physical cards, but use electronic virtual cards instead, and how to effectively generate electronic identity cards for the practitioners is a current technical problem.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provide a method for generating an electronic identity card of a practitioner suitable for dynamic public security management and control, which can effectively generate the electronic identity card of the practitioner, is convenient for checking whether the practitioner is normally registered or not and enhances the management and control of the practitioner.
According to the technical scheme provided by the invention, the generation method of the electronic identity card of the practitioner suitable for dynamic management and control of the public security comprises the following steps:
step 1, providing basic identity information of a practitioner, and encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitionerbsAnd the length L of the basic information data ciphertext of the practitionerskAnd encrypting the key string KbsThe basic identity information comprises a name, an identity card number and a registration date;
step 2, providing a basic base map of the electronic identity card of the practitioner, and superposing basic identity information of the practitioner and a front photo of the practitioner on the basic base map of the electronic identity card of the practitioner;
step 3,According to the basic base map and the basic information data ciphertext length L of the practitionerskAnd encrypting the key string KbsGenerating a non-repeating random coordinate number sequence;
step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitionerbsAnd combining with the basic picture to obtain the required electronic identity card of the practitioner.
In the step 1, the method specifically comprises the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitionerbs;
Step 1.2, utilizing abstract algorithm SHA1 to carry out basic information data variable S on the practitionerbsEncrypting to obtain an encryption key string K with a 20-byte stringbsThe encryption key string KbsThe key string length of is LK;
step 1.3, encrypting the secret key string KbsA matrix M1 of 2 x 10, the matrix M1 being
Preparing an operator matrix M of 2 x 3subOperator matrix MsubIs composed ofThe operator matrix MsubConvolution operation is carried out on the DES secret key DK and the matrix M1 to generate 8 bytesbsSaid DES key DKbsIs composed ofKey DK according to DESbsCan obtain basic information data cipher text Sk of the practitionerbsSaid practitioner basic information data cipher text SkbsIs Skbs=FDES(Sbs,Kbs) Wherein F isDESFor the encryption function of DES, the basic information data cipher text Sk of the practitionerbsHas a length of Lsk。
In the step 2, the method specifically comprises the following steps:
step 2.1, providing the required basic base map, wherein the format of the basic base map is BMP, the resolution is 720 x 472, the bit depth is 24, and the size of the basic picture file is LbpWidth of picture WbpPicture height of Hbp;
And 2.2, superposing the basic identity information of the practitioner and the front photo of the practitioner to the position required by the basic base map of the electronic identity card of the practitioner to obtain the appearance of the electronic identity card of the practitioner.
In the step 3, the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string KbsObtaining random number seed RsThe random number seed RsIs composed of
Step 3.2, setting coordinate variable array P [ len]Wherein, the size of len and the length L of the basic information data cryptograph of the practitionerskSame as, P2]={P[0],P[1]…P[len-1]Each P [ i ]]Is a structure body, i has a value range of 0-len, Pi]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as the origin of the coordinates;
step 3.3, setting a random coordinate array R [ len ], wherein R [ ] [ { R [0], R [1] … R [ len-1] }, each R [ j ] is a structure, and the value range of j is 0-len, so as to obtain,
R[j].x=rand(Rs);
R[j].y=rand(Rs);
P[j].x=R[j].x modWbp*3;
P[j].y=R[j].y mod Hbp;
wherein j ═ {0, Lsk-1, rand being a random number generating function; in the presence of a ligand to obtain P [ j]Then, P [ j ] is added]With already obtained P [1]]To P [ j-1]By comparison, if P [ j ]]And P1]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4 obtaining the array according to the above stepsLength LskIs random coordinate series of (2)]。
In step 4, the 1-dimensional array D2 is defined herein],D[]={D[0],D[1]…D[m-1]},m=LskEach of which is a 1-dimensional array D [ n ]]The calculation formula is as follows:
D[n]=P[n].y*Wbp*3+P[n].x,n={0,m-1};
setting the memory first address pointer of the data part of the basic base map as Buf, and setting Skbs[n]According to the value of D [ n ]]The positions are written into the data part of the basic base map one by one to replace the original RGB values, and the specific replacement mode is as follows:
Buf[D[n]]=Skbs[n];
after the replacement is completed, the cipher text Sk of the basic information data of the practitioner is realizedbsAnd combining with the basic picture to obtain the required electronic identity card of the practitioner.
The invention has the advantages that: can effectively generate the electronic identity card file of the practitioner which can not be counterfeited and encrypt the basic information data Sk of the practitionerbsThe method is characterized in that a mode of discrete coordinates is combined with a basic base map, a secret key used for encryption and a random number seed used for calculating the discrete coordinates are obtained from summary data calculated by a summary algorithm SHA1 in basic identity information of practitioners, the method has uniqueness and irreproducibility for each practitioner, an electronic identity card file can be stored in a mobile phone and can be used for identity verification at any time, and as a public security and public security management department, the method is of great help for verifying whether the practitioner is normally registered and enhancing the management control degree of the practitioner.
Drawings
FIG. 1 is a schematic diagram of the basic base diagram of the present invention.
Fig. 2 is a schematic diagram of basic identity information of a practitioner and a front photograph of the practitioner superimposed on a basic base map of an electronic identity card of the practitioner according to the present invention.
FIG. 3 is a schematic diagram of establishing a coordinate system according to the base map.
FIG. 4 is a diagram of the data portion of the underlying base map of the present invention.
Detailed Description
The invention is further illustrated by the following specific figures and examples.
In order to effectively generate an electronic identity card of a practitioner, facilitate checking whether the practitioner normally registers or not and strengthen management control on the practitioner, the invention provides basic identity information of the practitioner and encrypts the provided basic identity information to obtain basic information data cipher text Sk of the practitioner in step 1bsAnd the length L of the basic information data ciphertext of the practitionerskAnd encrypting the key string KbsThe basic identity information comprises a name, an identity card number and a registration date;
specifically, step 1 mainly includes the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitionerbs;
In the embodiment of the invention, the basic information name, the identity card number and the registration date of a practitioner and the information content adopt a fixed-length mode to form a fixed-length content character string, wherein:
name: defining the name XM, the length is 32 bytes, and the longest length supports 16 Chinese characters;
identification card number: defining a name SFZH, length 18 bytes;
the registration date: defining a name DJRQ, 8 bytes in length (yesterday YYYYMMDD);
defining the basic information data variable of the practitioner as SbsDefining a data variable S of the basic information of the practitionerbsLength Lbs32+16+ 8-56 (bytes), Sbs=XM&SFZH&DJRQ。
Step 1.2, utilizing SHA1 abstract algorithm to carry out data variable S on basic information of practitionerbsEncrypting to obtain an encryption key string K with a 20-byte stringbsThe encryption key string KbsIs a key ofThe string length is LK;
in the embodiment of the present invention, the key generation decision adopts a relatively fixed key manner, that is, each defined practitioner has a specific key, the key is obtained by calculation according to the basic information of the practitioner, and the key is a unique term for each practitioner and is not repeated. In particular, the data variable S is based on the aforementioned practitioner basic informationbsGenerating a secret key by the internal character string for subsequent text encryption and other purposes; defining an encryption key as KbsAdopting SHA1 abstract algorithm, and obtaining basic information data variable S of practitionerbsThe character string is used for calculating and obtaining the key string.
Defining SHA1 cryptographic function name as FSHA1, from which
Kbs=FSHA1(Sbs);
Final encryption key string KbsIs a 160-bit, i.e., 20-byte, string. LK is defined as the length of the encryption key string, and is defined according to SHA1 as a fixed value of 20.
Step 1.3, encrypting the secret key string KbsA matrix M1 of 2 x 10, the matrix M1 being
Preparing an operator matrix M of 2 x 3subOperator matrix MsubIs composed ofThe operator matrix MsubConvolution operation is carried out on the DES secret key DK and the matrix M1 to generate 8 bytesbsSaid DES key DKbsIs composed ofKey DK according to DESbsCan obtain basic information data cipher text Sk of the practitionerbsSaid practitioner basic information data cipher text SkbsIs Skbs=FDES(Sbs,Kbs) Wherein F isDESFor DES encryption functionNumber, practitioner basic information data cipher text SkbsHas a length of Lsk。
In the embodiment of the invention, the basic identity information of the practitioner is encrypted, and a plaintext is processed into a ciphertext; because the data information is not used for online data transmission in subsequent use, the DES encryption algorithm is adopted to encrypt the basic identity information of the practitioner, and the key is the encryption key string K generated in the previous stepbs. The generated cipher text is used as a component of the electronic identity card of the practitioner.
Here, the basic information data ciphertext of the practitioner is defined as SkbsThe DES key string is DKbsFirstly, a DES key string is calculated according to the encrypted key string Kbs, the DES key is 64 bits (8 bytes), and the calculation process is as follows:
20 bytes of encryption key string KbsConversion to 2 x 10 matrix M1
Preparing a 2 x 3 operator matrix Msub,And generating an 8-byte DES key by convolution of the two matrixes:the specific convolution calculation process is well known to those skilled in the art and will not be described herein. V0, V1, … and V7 are DES key strings obtained by convolution calculation.
Finally, the DES secret key DK obtained by the calculationbsTo calculate the encryption; defining DES encryption function name FDESFrom which Sk is obtainedbs=FDES(Sbs,Kbs)。
Here, a practitioner basic information data ciphertext Sk is definedbsHas a length of Lsk(unit: byte), the above process can eventually be applied to severalThe numerical items can be used for subsequent process treatment: basic information data cipher text Sk of practitionerbsAnd the length L of the basic information data ciphertext of the practitionersk(unit: byte), encryption key string Kbs(20 bytes).
Step 2, providing a basic base map of the electronic identity card of the practitioner, and superposing basic identity information of the practitioner and a front photo of the practitioner on the basic base map of the electronic identity card of the practitioner;
in the embodiment of the invention, the electronic identity card file of the practitioner is finally the picture file, in the using process, in order to prevent counterfeiting by people, fixed values are adopted on various parameters such as format, resolution ratio and the like of the picture file, so that the authenticity can be distinguished when the verification is carried out, and the picture format and the fixed parameters are defined as follows:
the picture format is as follows: BMP; resolution ratio: 720 x 472 (width 720 pixels, height 472 pixels); bit depth: 24.
defining a base picture file size of LbpWidth of picture WbpPicture height of HbpFrom the parameters of the base map, we can obtain:
Wbp=720;
Hbp=472;
Lbp=54+Wbp*Hbp3 +720 + 472 + 3-1019574 (unit: byte).
The case of the base image is shown as breast 1. On the basis of the basic base map, information superposition is needed to be carried out on the electronic identity card pictures of the employees. Including basic information of the practitioner and the front photo of the practitioner, the electronic identity card picture can be finished in appearance after superposition. The contents to be superimposed are as follows:
the name of the practitioner, the identification card number of the practitioner, the electronic identity card number of the practitioner, the registration date of the practitioner and the front photo of the practitioner. The situation after the superimposition is shown in fig. 2.
Each content is superimposed on the designated coordinate position of the base picture. And (4) completing the appearance processing of the electronic card picture by the practitioner, preparing to merge the picture and the data, and generating an electronic identity card file.
Step 3, according to the basic base map and the basic information data ciphertext length L of the practitionerskAnd encrypting the key string KbsGenerating a non-repeating random coordinate number sequence;
the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string KbsObtaining random number seed RsThe random number seed RsIs composed of
The work of the stage is to generate a random coordinate position of data superposition by using a random number sequence so as to generate the basic information data cipher text Sk of the practitioner generated in the previous stagebsDiscretely incorporated into the picture file.
The random numbers generated by the rand function are not completely random in nature but are a group of pseudo-random number sequences, but are not false random numbers, the values of the continuously generated random number sequences are determined by the values of the random number seeds, and the same random number sequences can be generated by setting the same values of the random number seeds through the srand function. By utilizing this characteristic, the encryption key string K can be generated from the basic information of each workerbsTo dynamically generate a relatively fixed random number seed for each practitioner to obtain a set of random number sequences corresponding to each practitioner. In the embodiment of the invention, the random number seed RsIs composed of
Step 3.2, setting coordinate variable array P [ len]Wherein, the size of len and the length L of the basic information data cryptograph of the practitionerskSame as, P2]={P[0],P[1]…P[len-1]Each P [ i ]]Is a structure body, i has a value range of 0-len, Pi]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as the origin of the coordinates;
in the embodiment of the invention, the step is to generate a set of non-repeating random coordinates according to the produced continuous random number sequence. Defining random coordinate variable array P [ len ]]Wherein len is array length, and its value and practitioner basic information data ciphertext length LskThe same is true.
Establishing a coordinate system by using the base map, taking the upper left corner of the picture as the origin of coordinates, the horizontal direction as the X axis, and the vertical direction as the Y axis, wherein the X axis is in bytes, that is, each pixel value of the base map with 24-bit depth contains 3 bytes, and deriving the X axis and the Y axis as follows:
the Y axis is the height of the picture, and the value range is that { Y |0 is less than or equal to Y<Hbp}; hbp was previously defined as the height of the base map; the X axis is the width of the picture, and the value range is { X |0 ≦ X<Wbp*3},WbpPreviously defined as the width of the underlying base map. As shown in fig. 3 and 4.
Step 3.3, setting a random coordinate array R [ len ], wherein R [ ] [ { R [0], R [1] … R [ len-1] }, each R [ j ] is a structure, and the value range of j is 0-len, so as to obtain,
R[j].x=rand(Rs);
R[j].y=rand(Rs);
P[j].x=R[j].x modWbp*3;
P[j].y=R[j].y mod Hbp;
wherein j ═ {0, Lsk-1, rand being a random number generating function; in the presence of a ligand to obtain P [ j]Then, P [ j ] is added]With already obtained P [1]]To P [ j-1]By comparison, if P [ j ]]And P1]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4, obtaining the length L of the array according to the stepsskIs random coordinate series of (2)]。
In the embodiment of the invention, the non-repeated random coordinate number sequence can be generated after the steps are carried out.
Step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitionerbsAnd combining with the basic picture to obtain the required electronic identity card of the practitioner.
In the BMP picture format, the data portion of the BMP picture format is a continuous memory segment, and the coordinate data needs to be converted from 2-dimensional data to 1-dimensional data for practical use.
Here, the 1-dimensional array D2 is defined],D[]={D[0],D[1]…D[m-1]},m=LskEach of which is a 1-dimensional array D [ n ]]The calculation formula is as follows:
D[n]=P[n].y*Wbp*3+P[n].x,n={0,m-1};
setting the memory first address pointer of the data part of the basic base map as Buf, and setting Skbs[n]According to the value of D [ n ]]The positions are written into the data part of the basic base map one by one to replace the original RGB values, and the specific replacement mode is as follows:
Buf[D[n]]=Skbs[n];
after the replacement is completed, the basic information data cipher text Skbs of the practitioner is merged with the basic picture, so that the required electronic identity card of the practitioner is obtained.
In the embodiment of the invention, the encrypted practitioner basic remaining information is discretely merged with the basic base map, the number of bytes of ciphertext data is less than that of the whole BMP file, the display of the BMP file picture is not influenced after the discrete merging, and the file formed by merging the data and the picture is used as the electronic identity card file of the practitioner.
The invention can effectively generate the electronic identity card file of the practitioner who can not be counterfeited and encrypt the basic information data Sk of the practitionerbsThe method is characterized in that a mode of discrete coordinates is combined with a basic base map, a secret key used for encryption and a random number seed used for calculating the discrete coordinates are obtained from abstract data calculated by an abstract algorithm SHA1 in basic identity information of practitioners, the method has uniqueness and irreproducibility for each practitioner, an electronic identity card file can be stored in a mobile phone, the practitioner can move an APP or open a WEB of the mobile phone, the picture can be verified after being selected, identity verification can be performed at any time, and as a public security and public security management department, the method is greatly helpful for verifying whether the practitioner is normally registered or not and enhancing the management control degree of the practitioner.
Claims (5)
1. A practitioner electronic identity card generation method suitable for dynamic public security management and control is characterized by comprising the following steps:
step 1, providing basic identity information of a practitioner, and encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitionerbsAnd the length L of the basic information data ciphertext of the practitionerskAnd encrypting the key string KbsThe basic identity information comprises a name, an identity card number and a registration date;
step 2, providing a basic base map of the electronic identity card of the practitioner, and superposing basic identity information of the practitioner and a front photo of the practitioner on the basic base map of the electronic identity card of the practitioner;
step 3, according to the basic base map and the basic information data ciphertext length L of the practitionerskAnd encrypting the key string KbsGenerating a non-repeating random coordinate number sequence;
step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitionerbsAnd combining with the basic picture to obtain the required electronic identity card of the practitioner.
2. The method for generating an electronic identity card for a practitioner, suitable for dynamic management and control of public security as claimed in claim 1, wherein the step 1 specifically comprises the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitionerbs;
Step 1.2, utilizing abstract algorithm SHA1 to carry out basic information data variable S on the practitionerbsEncrypting to obtain an encryption key string K with a 20-byte stringbsThe encryption key string KbsThe key string length of is LK;
step 1.3, encrypting the secret key string KbsA matrix M1 of 2 x 10, the matrix M1 being
Preparing an operator matrix M of 2 x 3subOperator matrix MsubIs composed ofThe operator matrix MsubConvolution operation is carried out on the DES secret key DK and the matrix M1 to generate 8 bytesbsSaid DES key DKbsIs composed ofKey DK according to DESbsCan obtain basic information data cipher text Sk of the practitionerbsSaid practitioner basic information data cipher text SkbsIs Skbs=FDES(Sbs,Kbs) Wherein F isDESFor the encryption function of DES, the basic information data cipher text Sk of the practitionerbsHas a length of Lsk。
3. The practitioner electronic identity card generation method suitable for dynamic police management and control according to claim 1, wherein the step 2 specifically comprises the following steps:
step 2.1, providing the required basic base map, wherein the format of the basic base map is BMP, the resolution is 720 x 472, the bit depth is 24, and the size of the basic picture file is LbpWidth of picture WbpPicture height of Hbp;
And 2.2, superposing the basic identity information of the practitioner and the front photo of the practitioner to the position required by the basic base map of the electronic identity card of the practitioner to obtain the appearance of the electronic identity card of the practitioner.
4. The practitioner electronic identity card generation method suitable for dynamic police management and control according to claim 3, wherein in step 3, the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string KbsObtaining random number seed RsThe random number seed RsIs composed of
Step 3.2, setting coordinate variable array P [ len]Wherein, the size of len and the length L of the basic information data cryptograph of the practitionerskSame as, P2]={P[0],P[1]…P[len-1]Each P [ i ]]Is a structure body, i has a value range of 0-len, Pi]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as the origin of the coordinates;
step 3.3, setting a random coordinate array R [ len ], wherein R [ ] [ { R [0], R [1] … R [ len-1] }, each R [ j ] is a structure, and the value range of j is 0-len, so as to obtain,
R[j].x=rand(Rs);
R[j].y=rand(Rs);
P[j].x=R[j].x mod Wbp*3;
P[j].y=R[j].y mod Hbp;
wherein j ═ {0, Lsk-1, rand being a random number generating function; in the presence of a ligand to obtain P [ j]Then, P [ j ] is added]With already obtained P [1]]To P [ j-1]By comparison, if P [ j ]]And P1]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4, obtaining the length L of the array according to the stepsskIs random coordinate series of (2)]。
5. The method as claimed in claim 4, wherein in step 4, the 1-dimensional array D2 is defined as],D[]={D[0],D[1]…D[m-1]},m=LskEach of which is a 1-dimensional array D [ n ]]The calculation formula is as follows:
D[n]=P[n].y*Wbp*3+P[n].x,n={0,m-1};
setting the memory first address pointer of the data part of the basic base map as Buf, and setting Skbs[n]According to the value of D [ n ]]The data portions of the base map are written one by one in place of the original RGB valuesThe body replacement mode is as follows:
Buf[D[n]]=Skbs[n];
after the replacement is completed, the cipher text Sk of the basic information data of the practitioner is realizedbsAnd combining with the basic picture to obtain the required electronic identity card of the practitioner.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910832339.0A CN110619225B (en) | 2019-09-04 | 2019-09-04 | Electronic identity card generation method suitable for public security dynamic management and control of employees |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910832339.0A CN110619225B (en) | 2019-09-04 | 2019-09-04 | Electronic identity card generation method suitable for public security dynamic management and control of employees |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110619225A true CN110619225A (en) | 2019-12-27 |
CN110619225B CN110619225B (en) | 2023-04-14 |
Family
ID=68922237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910832339.0A Active CN110619225B (en) | 2019-09-04 | 2019-09-04 | Electronic identity card generation method suitable for public security dynamic management and control of employees |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110619225B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101162489A (en) * | 2007-11-26 | 2008-04-16 | 唐荣华 | Personate photograph producing method used for keep input secret and method of use thereof |
CN102420834A (en) * | 2011-12-29 | 2012-04-18 | 公安部第三研究所 | Method for generating and checking network identity identification code in network electronic identity card |
CN103177364A (en) * | 2011-12-26 | 2013-06-26 | 中国银联股份有限公司 | Transaction processing method based on electronic signature |
CN105184725A (en) * | 2015-09-28 | 2015-12-23 | 公安部第一研究所 | Network mapping document generated based on electronic legal identity document entity |
WO2016041235A1 (en) * | 2014-09-17 | 2016-03-24 | 苏州海博智能系统有限公司 | Electronic cash data authorization method, payment method and virtual card |
CN107945080A (en) * | 2016-10-13 | 2018-04-20 | 杭州悉尔科技有限公司 | A kind of electronic identity card awarding method and system based on biological identification technology |
CN109284598A (en) * | 2018-07-23 | 2019-01-29 | 深圳点猫科技有限公司 | A kind of method and electronic equipment generating electronic identity card in the education cloud platform page |
CN109460388A (en) * | 2018-10-18 | 2019-03-12 | 中国联合网络通信集团有限公司 | Electronic card generation method, device and storage medium |
CN109766979A (en) * | 2019-01-18 | 2019-05-17 | 北京思源互联科技有限公司 | Two-dimensional code generation method, verification method and device |
-
2019
- 2019-09-04 CN CN201910832339.0A patent/CN110619225B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101162489A (en) * | 2007-11-26 | 2008-04-16 | 唐荣华 | Personate photograph producing method used for keep input secret and method of use thereof |
CN103177364A (en) * | 2011-12-26 | 2013-06-26 | 中国银联股份有限公司 | Transaction processing method based on electronic signature |
CN102420834A (en) * | 2011-12-29 | 2012-04-18 | 公安部第三研究所 | Method for generating and checking network identity identification code in network electronic identity card |
US20140331291A1 (en) * | 2011-12-29 | 2014-11-06 | The Third Institute Of The Ministry Of Public Security | Method for generating and check-controlling network identity indentification code in network electronic identification card |
WO2016041235A1 (en) * | 2014-09-17 | 2016-03-24 | 苏州海博智能系统有限公司 | Electronic cash data authorization method, payment method and virtual card |
CN105184725A (en) * | 2015-09-28 | 2015-12-23 | 公安部第一研究所 | Network mapping document generated based on electronic legal identity document entity |
CN107945080A (en) * | 2016-10-13 | 2018-04-20 | 杭州悉尔科技有限公司 | A kind of electronic identity card awarding method and system based on biological identification technology |
CN109284598A (en) * | 2018-07-23 | 2019-01-29 | 深圳点猫科技有限公司 | A kind of method and electronic equipment generating electronic identity card in the education cloud platform page |
CN109460388A (en) * | 2018-10-18 | 2019-03-12 | 中国联合网络通信集团有限公司 | Electronic card generation method, device and storage medium |
CN109766979A (en) * | 2019-01-18 | 2019-05-17 | 北京思源互联科技有限公司 | Two-dimensional code generation method, verification method and device |
Also Published As
Publication number | Publication date |
---|---|
CN110619225B (en) | 2023-04-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110839026B (en) | Data processing method based on block chain and related equipment | |
EP2151796A1 (en) | An implement method and a device of electronic seal | |
CN109800585B (en) | Image interpolation space completely reversible separable ciphertext domain information hiding algorithm | |
AU2008261152A1 (en) | Privacy-Protected Biometric Tokens | |
JPH07191602A (en) | Electronic autographing method and device | |
CN101789067A (en) | Electronic document signature protecting method and system | |
Pramanik et al. | Signature image hiding in color image using steganography and cryptography based on digital signature concepts | |
CN110390623A (en) | A kind of image media safety certification restoration methods based on secret sharing | |
CN1838172A (en) | Method and apparatus for inlaying watermark in digital image and digital camera capable of adding watermark | |
CN112910656B (en) | Compressed sensing data transmission method based on digital signcryption | |
Sridevi et al. | Image steganography combined with cryptography | |
CN105490814B (en) | A kind of ticketing service real name identification method and system based on three-dimension code | |
CN110619225B (en) | Electronic identity card generation method suitable for public security dynamic management and control of employees | |
CN106503771A (en) | A kind of Quick Response Code fidelity systems | |
JP5913041B2 (en) | Secret information concealment device, secret information restoration device, secret information concealment program, and secret information restoration program | |
CN111131657A (en) | Chaos medical image tamper-proof encryption method based on self-verification matrix | |
CN101877118A (en) | Electronic document authenticity identification system | |
US20150014980A1 (en) | Method and system for authenticating printed documents | |
CN113935073A (en) | Seal generation and verification method supporting main body and content authentication | |
Selvaraju et al. | A method to improve the security level of ATM banking systems using AES algorithm | |
CN110364237B (en) | Tamper-proof method and device for electronic prescription | |
KR20220125130A (en) | Electronic contract processing server that processes electronic contracts between parties by utilizing the two-dimensional code and operating method thereof | |
Chavan et al. | Data embedding technique using secret fragment visible mosaic image for covered communication | |
Hegde et al. | Exploring the Effectiveness of Steganography Techniques: A Comparative Analysis | |
EP3594838A1 (en) | Method for recovering a secret key securely stored in a secure element |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |