CN110619225B - Electronic identity card generation method suitable for public security dynamic management and control of employees - Google Patents
Electronic identity card generation method suitable for public security dynamic management and control of employees Download PDFInfo
- Publication number
- CN110619225B CN110619225B CN201910832339.0A CN201910832339A CN110619225B CN 110619225 B CN110619225 B CN 110619225B CN 201910832339 A CN201910832339 A CN 201910832339A CN 110619225 B CN110619225 B CN 110619225B
- Authority
- CN
- China
- Prior art keywords
- practitioner
- basic
- base map
- information data
- identity card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 239000011159 matrix material Substances 0.000 claims description 20
- 230000006870 function Effects 0.000 claims description 10
- 238000004364 calculation method Methods 0.000 claims description 9
- 101100217298 Mus musculus Aspm gene Proteins 0.000 claims description 8
- 150000001875 compounds Chemical class 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 5
- 238000012795 verification Methods 0.000 description 3
- 230000002708 enhancing effect Effects 0.000 description 2
- 239000003446 ligand Substances 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Educational Administration (AREA)
- Primary Health Care (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a method for generating an electronic identity card of a practitioner, which is suitable for dynamic public security management and control. The method comprises the following steps: step 1, encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitioner bs And the length L of the basic information data ciphertext of the practitioner sk And encrypting the key string K bs (ii) a Step 2, providing a basic base map, and superposing basic identity information of a practitioner and a front photo of the practitioner on the basic base map; step 3, according to the basic base map and the basic information data ciphertext length L of the practitioner sk And encrypting the key string K bs Generating a non-repeating random coordinate number sequence; step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitioner bs Merged with the base picture. The invention can effectively generate the electronic identity card of the practitioner, is convenient for checking whether the practitioner is normally registered or not, and enhances the management control of the practitioner.
Description
Technical Field
The invention relates to a method, in particular to a method for generating an electronic identity card of a practitioner, which is suitable for dynamic management and control of public security.
Background
The management and control of the personnel in the public security and public security industry are always the key focus of public security, and the personnel identity, the personnel engaged in the industry work and the like can be on duty after being authenticated and registered.
In the past, a card issuing system is adopted, and before a practitioner goes on duty, the practitioner goes to a specified place to register and issues a post-issuing certificate card. Nowadays, with the technical upgrade, practitioners registered for each registration no longer use physical cards, but use electronic virtual cards instead, and how to effectively generate electronic identity cards for the practitioners is a current technical problem.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provide a method for generating an electronic identity card of a practitioner suitable for dynamic public security management and control, which can effectively generate the electronic identity card of the practitioner, is convenient for checking whether the practitioner is normally registered or not and enhances the management and control of the practitioner.
According to the technical scheme provided by the invention, the generation method of the electronic identity card of the practitioner suitable for the dynamic management and control of the public security comprises the following steps:
step 1, providing basic identity information of a practitioner, and encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitioner bs And the length L of the basic information data ciphertext of the practitioner sk And encrypting the key string K bs The basic identity information comprises a name, an identity card number and a registration date;
step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitioner bs And combining with the basic base map to obtain the required electronic identity card of the practitioner.
In the step 1, the method specifically comprises the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitioner bs ;
Step 1.2, utilizing abstract algorithm SHA1 to carry out basic information data variable S on the practitioner bs Encrypting to obtain an encryption key string K with 20 byte string bs The encryption key string K bs The key string length of is LK;
step 1.3, encrypting the secret key string K bs Converting into matrix M1 of 2 x 10, wherein the matrix M1 is
Preparing 2 x 3 operator matrix M sub Operator matrix M sub Is composed ofThe operator matrix M is divided into sub After convolution operation is carried out on the matrix M1, a DES secret key DK with 8 bytes is generated bs Said DES key DK bs Is->According to DES key DK bs Can obtain basic information data cipher text Sk of the practitioner bs Said practitioner basic information data cipher text Sk bs Is Sk bs =F DES (S bs ,K bs ) Wherein, F DES For the encryption function of DES, the basic information data cipher text Sk of the practitioner bs Has a length of L sk 。
In the step 2, the method specifically comprises the following steps:
step 2.1, providing the required basic base map, wherein the format of the basic base map is BMP, the resolution is 720 × 472, the bit depth is 24, and the file size of the basic picture is L bp Width of picture W bp Height of picture H bp ;
And 2.2, superposing the basic identity information of the practitioner and the front photo of the practitioner to the position required by the basic base map of the electronic identity card of the practitioner to obtain the appearance of the electronic identity card of the practitioner.
In the step 3, the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string K bs Obtaining random number seed R s The random number seed R s Is composed of
Step 3.2, setting coordinate variable array P [ len]Wherein, the size of len and the cryptograph length L of the basic information data of the practitioner sk Same as, P2]={P[0],P[1]…P[len-1]Each P [ i ]]Is a structure body, i has a value range of 0-len, pi]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as a coordinate origin;
step 3.3, setting a random coordinate array R [ len ], R [ = { R [0], R [1] \8230, R [ len-1] }, wherein each R [ j ] is a structural body, the value range of j is 0-len, and obtaining,
R[j].x=rand(R s );
R[j].y=rand(R s );
P[j].x=R[j].x modW bp *3;
P[j].y=R[j].y mod H bp ;
wherein j = {0, L sk -1}, rand being a random number generating function; in the presence of a ligand to obtain P [ j]Then, P [ j ] is added]With already obtained P [1]]To P [ j-1]By comparison, if P [ j ]]And P1]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4, obtaining the length L of the array according to the steps sk Is random coordinate series of (2)]。
In step 4, the 1-dimensional array D2 [ 2 ] is defined herein],D[]={D[0],D[1]…D[m-1]},m=L sk Each of which is a 1-dimensional array D [ n ]]The calculation formula is as follows:
D[n]=P[n].y*W bp *3+P[n].x,n={0,m-1};
setting the memory first address pointer of the data part of the basic base map as Buf, and setting Sk bs [n]According to the value of D [ n ]]The positions are written into the data part of the basic base map one by one to replace the original RGB values, and the specific replacement mode is as follows:
Buf[D[n]]=Sk bs [n];
after the above replacement is completed, the implementation will be appliedPersonnel basic information data cipher text Sk bs And combining with the basic picture to obtain the required electronic identity card of the practitioner.
The invention has the advantages that: can effectively generate the electronic identity card file of the practitioner which can not be counterfeited and encrypt the basic information data Sk of the practitioner bs The method is characterized in that a mode of discrete coordinates is combined with a basic base map, a secret key used for encryption and a random number seed used for calculating the discrete coordinates are obtained from abstract data calculated by an abstract algorithm SHA1 in basic identity information of practitioners, uniqueness and irreproducibility are provided for each practitioner, an electronic identity card file can be stored in a mobile phone and identity verification can be performed at any time, and as a public security and public security management department, the method is of great help for verifying whether the practitioner is normally registered and enhancing the management control degree of the practitioner.
Drawings
FIG. 1 is a schematic diagram of the basic base diagram of the present invention.
Fig. 2 is a schematic diagram of basic identity information of a practitioner and a front photograph of the practitioner superimposed on a basic base map of an electronic identity card of the practitioner according to the present invention.
FIG. 3 is a schematic diagram of establishing a coordinate system according to the base map.
FIG. 4 is a diagram of the data portion of the underlying base map of the present invention.
Detailed Description
The invention is further illustrated by the following specific figures and examples.
In order to effectively generate an electronic identity card of a practitioner, facilitate checking whether the practitioner normally registers or not and strengthen management control on the practitioner, the invention provides basic identity information of the practitioner and encrypts the provided basic identity information to obtain basic information data cipher text Sk of the practitioner in step 1 bs And the length L of the basic information data ciphertext of the practitioner sk And encrypting the key string K bs The basic identity information comprises a name, an identity card number and a registration date;
specifically, step 1 mainly includes the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitioner bs ;
In the embodiment of the invention, basic information names, identity card numbers and registration dates of employees and information contents adopt a fixed-length mode to form a fixed-length content character string, wherein:
name: defining the name XM, the length is 32 bytes, and the longest length supports 16 Chinese characters;
identification card number: defining a name SFZH, length 18 bytes;
the registration date: defining a name DJRQ, 8 bytes in length (yesterday YYYYMMDD);
defining the basic information data variable of the practitioner as S bs Defining a data variable S of the basic information of the practitioner bs Length L bs =32+16+8 + 56 (byte), then S bs =XM&SFZH&DJRQ。
Step 1.2, using SHA1 abstract algorithm to perform data variable S on basic information of practitioner bs Encrypting to obtain an encryption key string K with a 20-byte string bs The encryption key string K bs The length of the key string is LK;
in the embodiment of the present invention, the key generation decision is determined by using a relatively fixed key manner, that is, each defined practitioner has a specific key, the key is obtained by calculation according to the basic information of the practitioner, and the key is a unique item for each practitioner and is not repeated. In particular, the data variable S is based on the aforementioned practitioner basic information bs Generating a secret key by the internal character string for subsequent text encryption and other purposes; defining an encryption key as K bs Adopting SHA1 abstract algorithm, and obtaining basic information data variable S of practitioner bs The character string is used for calculating and obtaining the key string.
Defining the SHA1 cryptographic function name as FSHA1, from which
K bs =FSHA1(S bs );
Final encryption key string K bs Is a 160 bit, 20 byte string. LK is defined as the length of the encryption key string, and is defined according to SHA1 as a fixed value 20.
Step 1.3, encrypting the key string K bs Converting into matrix M1 of 2 x 10, wherein the matrix M1 is
Preparing 2 x 3 operator matrix M sub Operator matrix M sub Is composed ofThe operator matrix M is divided into sub After convolution operation is carried out on the matrix M1, a DES secret key DK with 8 bytes is generated bs Said DES Key DK bs Is DK bs =M1╳○M sub =[V0,V1…V7](ii) a Key DK according to DES bs Can obtain basic information data cipher text Sk of the practitioner bs Said practitioner basic information data cipher text Sk bs Is Sk bs =F DES (S bs ,DK bs ) Wherein F is DES For the encryption function of DES, the basic information data cipher text Sk of the practitioner bs Has a length of L sk 。
In the embodiment of the invention, the basic identity information of the practitioner is encrypted, and a plaintext is processed into a ciphertext; because the data information is not used for online data transmission in subsequent use, the DES encryption algorithm is adopted to encrypt the basic identity information of the practitioner, and the key is the encryption key string K generated in the previous step bs . The generated cipher text is used as a component of the electronic identity card of the practitioner.
Here, the basic information data ciphertext of the practitioner is defined as Sk bs The DES key string is DK bs Firstly, the DES key string is calculated,the method is obtained by calculation according to an encryption key string Kbs, the DES key is 64 bits (8 bytes), and the calculation process is as follows:
20 bytes of encryption key string K bs Conversion to 2 x 10 matrix M1
Preparing a 2 x 3 operator matrix M sub ,And generating an 8-byte DES key by convolution of the two matrixes: />The specific convolution calculation process is well known to those skilled in the art and will not be described herein. V0, V1, \ 8230, V7 is DES key string obtained by convolution calculation.
Finally, the DES secret key DK obtained by the calculation bs To calculate the encryption; defining DES encryption function name F DES From which Sk can be obtained bs =FDES(S bs ,DK bs )。
Here, a practitioner basic information data cipher text Sk is defined bs Has a length of L sk (unit: byte), through the above process, it is finally possible to make the following several numerical terms available for the subsequent process treatment: practitioner basic information data cipher text Sk bs And the length L of the basic information data ciphertext of the practitioner sk (unit: byte), encryption key string K bs (20 bytes).
in the embodiment of the invention, the electronic identity card file of the practitioner is finally the picture file, in the using process, in order to prevent counterfeiting by people, fixed values are adopted on various parameters such as format, resolution ratio and the like of the picture file, so that the authenticity can be distinguished when the verification is carried out, and the picture format and the fixed parameters are defined as follows:
the picture format is as follows: BMP; resolution ratio: 720 x 472 (width 720 pixels, height 472 pixels); bit depth: 24.
defining a base picture file size of L bp Width of picture W bp Height of picture H bp From the parameters of the base map, we can obtain:
W bp =720;
H bp =472;
L bp =54+W bp *H bp *3=54+720 + 472 + 3=1019574 (unit: byte).
The situation of the underlying base map is shown in fig. 1. On the basis of the basic base map, information superposition is needed to be carried out on the electronic identity card pictures of the employees. Including basic information of the practitioner and the front photo of the practitioner, the electronic identity card picture can be finished in appearance after superposition. The contents to be superimposed are as follows:
the name of the practitioner, the identification card number of the practitioner, the electronic identity card number of the practitioner, the registration date of the practitioner and the front photo of the practitioner. The superimposed situation is shown in fig. 2.
Each content is superimposed on the designated coordinate position of the base picture. And (4) completing the appearance processing of the electronic card picture by the practitioner, preparing to merge the picture and the data, and generating an electronic identity card file.
the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string K bs Obtaining random number seed R s The random number seed R s Is composed of
The work at this stage is generated using a random number sequenceForming random coordinate positions of data superposition, thereby generating the basic information data cipher text Sk of the completed practitioner in the previous stage bs Discretely incorporated into the picture file.
The random number generated by using the rand function is not completely random but is a group of pseudo random number sequences, but is not a fake random number, the value of the continuously generated random number sequence is determined by the value of the random number seed, and the same random number sequence can be generated by setting the same value of the random number seed through the strand function. By utilizing this characteristic, the encryption key string K can be generated from the basic information of each worker bs To dynamically generate a relatively fixed random number seed for each practitioner to obtain a set of random number sequences corresponding to each practitioner. In the embodiment of the invention, the random number seed R s Is composed of
Step 3.2, setting coordinate variable array P [ len ]]Wherein, the size of len and the cryptograph length L of the basic information data of the practitioner sk Same as, P2]={P[0],P[1]…P[len-1]Each P [ i ]]Is a structure body, i has a value range of 0-len, pi]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as the origin of the coordinates;
in the embodiment of the invention, the step is to generate a set of non-repeating random coordinates according to the produced continuous random number sequence. Defining random coordinate variable array P [ len ]]Wherein len is array length, and its value and practitioner basic information data ciphertext length L sk The same is true.
Establishing a coordinate system by using the base map, taking the upper left corner of the picture as an origin of coordinates, the horizontal direction as an X axis, and the vertical direction as a Y axis, wherein the X axis is in bytes, that is, each pixel value of the base map with 24-bit depth contains 3 bytes, and deriving the X axis and the Y axis in the following ranges:
the Y axis is the height of the picture, and the value range is that { Y |0 is less than or equal to Y<H bp }; hbp was previously defined as the height of the base map; the X axis is the width of the picture, and the value interval is { X |0≤X<W bp *3},W bp Previously defined as the width of the underlying base map. As shown in fig. 3 and 4.
Step 3.3, setting a random coordinate array R [ len ], R [ ] = { R [0], R [1] \8230, R [ len-1] }, wherein each R [ j ] is a structure, and the value range of j is 0-len to obtain,
R[j].x=rand(R s );
R[j].y=rand(R s );
P[j].x=R[j].x modW bp *3;
P[j].y=R[j].y mod H bp ;
wherein j = {0, L sk -1, rand being a random number generating function; in the presence of a ligand to obtain P [ j]Then, P [ j ] is added]With already obtained P [1]]To P [ j-1]By comparison, if P [ j ]]And P1]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4, obtaining the length L of the array according to the steps sk Is random coordinate series of (2)]。
In the embodiment of the invention, the non-repeated random coordinate number sequence can be generated after the steps are carried out.
Step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitioner bs And combining with the basic base map to obtain the required electronic identity card of the practitioner.
In the BMP picture format, the data portion of the BMP picture format is a continuous memory segment, and the coordinate data needs to be converted from 2-dimensional data to 1-dimensional data for practical use.
Here, the 1-dimensional array D2 is defined],D[]={D[0],D[1]…D[m-1]},m=L sk Each of which is a 1-dimensional array D [ n ]]The calculation formula is as follows:
D[n]=P[n].y*W bp *3+P[n].x,n={0,m-1};
setting the memory first address pointer of the data part of the basic base map as Buf, and setting Sk bs [n]According to the value of D [ n ]]The positions are written into the data part of the basic base map one by one to replace the original RGB values, and the specific replacement mode is as follows:
Buf[D[n]]=Sk bs [n];
after the replacement is completed, the basic information data cipher text Skbs of the practitioner is merged with the basic picture, so that the required electronic identity card of the practitioner is obtained.
In the embodiment of the invention, the encrypted practitioner basic identity information is discretely combined with the basic base map, the number of bytes of ciphertext data is less than that of the whole BMP file, the display of the BMP file picture is not influenced after the discrete combination, and the file formed by combining the data and the picture is used as the electronic identity card file of the practitioner.
The invention can effectively generate the electronic identity card file of the practitioner who can not be counterfeited and encrypt the basic information data Sk of the practitioner bs The method is characterized in that a mode of discrete coordinates is combined with a basic base map, a secret key used for encryption and a random number seed used for calculating the discrete coordinates are obtained from abstract data calculated by an abstract algorithm SHA1 in basic identity information of workers, each worker has uniqueness and irreproducibility, an electronic identity card file can be stored in a mobile phone, the workers move an APP or open a WEB of the mobile phone, the pictures are selected and can be verified, identity verification is carried out at any time, and as a public security and public security management department, the method is greatly helpful for verifying whether the workers normally register and enhancing the management control degree of the workers.
Claims (2)
1. A practitioner electronic identity card generation method suitable for public security dynamic management and control is characterized by comprising the following steps:
step 1, providing basic identity information of a practitioner, and encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitioner bs And the length L of the basic information data ciphertext of the practitioner sk And encrypting the key string K bs The basic identity information comprises a name, an identity card number and a registration date;
step 2, providing a basic base map of the electronic identity card of the practitioner, and superposing basic identity information of the practitioner and a front photo of the practitioner on the basic base map of the electronic identity card of the practitioner;
step 3, according to the basic base map and the basic information data ciphertext length L of the practitioner sk And encrypting the key string K bs Generating a non-repeating random coordinate number sequence;
step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitioner bs Combining with the basic base map to obtain the required electronic identity card of the practitioner;
in the step 1, the method specifically comprises the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitioner bs ;
Step 1.2, utilizing abstract algorithm SHA1 to carry out basic information data variable S on the practitioner bs Encrypting to obtain an encryption key string K with 20 byte string bs The encryption key string K bs The key string length of is LK;
step 1.3, encrypting the secret key string K bs Converting into matrix M1 of 2 x 10, wherein the matrix M1 is
Preparing 2 x 3 operator matrix M sub Operator matrix M sub Is composed ofThe operator matrix M is divided into sub After convolution operation is carried out on the matrix M1, a DES secret key DK with 8 bytes is generated bs Said DES key DK bs Is composed ofAccording to DES key DK bs Can obtain basic information data cipher text Sk of the practitioner bs Said practitioner basic information data cipher text Sk bs Is Sk bs =F DES (S bs ,DK bs ) Wherein, F DES For the encryption function of DES, the basic information data cipher text Sk of the practitioner bs Has a length of L sk ;
In the step 2, the method specifically comprises the following steps:
step 2.1, providing the required base map, wherein the format of the base map is BMP, the resolution is 720 × 472, the bit depth is 24, and the file size of the base map is L bp Width of picture is W bp Height of picture H bp ;
Step 2.2, superposing the basic identity information of the practitioner and the front photo of the practitioner to the position required by the basic base map of the electronic identity card of the practitioner to obtain the appearance of the electronic identity card of the practitioner;
in the step 3, the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string K bs Obtaining random number seed R s The random number seed R s Is composed of
Step 3.2, setting coordinate variable array P [ len ]]Wherein, the size of len and the cryptograph length L of the basic information data of the practitioner sk Same as, P2]={P[0],P[1],P[i],…P[len-1]H, each P [ i }]Is a structural body, the value range of i is 0-len-1]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as the origin of the coordinates;
step 3.3, setting a random coordinate array R [ len ], R [ ] = { R [0], R [1], R [ j ], \8230, R [ len-1] }, wherein each R [ j ] is a structural body, the value range of j is 0-len-1, and obtaining,
R[j].x=rand(R s );
R[j].y=rand(R s );
P[j].x=R[j].xmodW bp *3;
P[j].y=R[j].ymodH bp ;
wherein j = {0, L sk -1, rand being a random number generating function; in the presence of a compound to obtain P [ j]Then, P [ j ] is added]And has obtainedP [0] of]To P [ j-1]By comparison, if P [ j ]]And P [0]]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4, obtaining the length L of the array according to the steps sk Is a random coordinate number sequence of (2)]。
2. The method for generating an electronic identity card for a practitioner suitable for the dynamic regulation of public security as claimed in claim 1, wherein in step 4, the 1-dimensional array D2 is defined herein],D[]={D[0],D[1]…D[m-1]},m=L sk Wherein the element D [ n ] in the 1-dimensional array]The calculation formula of (a) is as follows:
D[n]=P[n].y*W bp *3+P[n].x,n={0,m-1};
setting the memory initial address pointer of the data part of the basic base map as Buf, and setting Sk bs [n]According to the value of D [ n ]]The positions are written into the data part of the basic base map one by one to replace the original RGB values, and the specific replacement mode is as follows:
Buf[D[n]]=Sk bs [n];
after the replacement is completed, the cipher text Sk of the basic information data of the practitioner is realized bs And combining with the basic base map to obtain the required electronic identity card of the practitioner.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910832339.0A CN110619225B (en) | 2019-09-04 | 2019-09-04 | Electronic identity card generation method suitable for public security dynamic management and control of employees |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910832339.0A CN110619225B (en) | 2019-09-04 | 2019-09-04 | Electronic identity card generation method suitable for public security dynamic management and control of employees |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110619225A CN110619225A (en) | 2019-12-27 |
CN110619225B true CN110619225B (en) | 2023-04-14 |
Family
ID=68922237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910832339.0A Active CN110619225B (en) | 2019-09-04 | 2019-09-04 | Electronic identity card generation method suitable for public security dynamic management and control of employees |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110619225B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101162489A (en) * | 2007-11-26 | 2008-04-16 | 唐荣华 | Personate photograph producing method used for keep input secret and method of use thereof |
CN102420834A (en) * | 2011-12-29 | 2012-04-18 | 公安部第三研究所 | Generation and verification control method for network identity code in electronic network identity card |
CN103177364A (en) * | 2011-12-26 | 2013-06-26 | 中国银联股份有限公司 | Transaction processing method based on electronic signature |
CN105184725A (en) * | 2015-09-28 | 2015-12-23 | 公安部第一研究所 | Network mapping document generated based on electronic legal identity document entity |
WO2016041235A1 (en) * | 2014-09-17 | 2016-03-24 | 苏州海博智能系统有限公司 | Electronic cash data authorization method, payment method and virtual card |
CN107945080A (en) * | 2016-10-13 | 2018-04-20 | 杭州悉尔科技有限公司 | A kind of electronic identity card awarding method and system based on biological identification technology |
CN109284598A (en) * | 2018-07-23 | 2019-01-29 | 深圳点猫科技有限公司 | A kind of method and electronic equipment generating electronic identity card in the education cloud platform page |
CN109460388A (en) * | 2018-10-18 | 2019-03-12 | 中国联合网络通信集团有限公司 | Electronic card generation method, device and storage medium |
CN109766979A (en) * | 2019-01-18 | 2019-05-17 | 北京思源互联科技有限公司 | Two-dimensional code generation method, verification method and device |
-
2019
- 2019-09-04 CN CN201910832339.0A patent/CN110619225B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101162489A (en) * | 2007-11-26 | 2008-04-16 | 唐荣华 | Personate photograph producing method used for keep input secret and method of use thereof |
CN103177364A (en) * | 2011-12-26 | 2013-06-26 | 中国银联股份有限公司 | Transaction processing method based on electronic signature |
CN102420834A (en) * | 2011-12-29 | 2012-04-18 | 公安部第三研究所 | Generation and verification control method for network identity code in electronic network identity card |
WO2016041235A1 (en) * | 2014-09-17 | 2016-03-24 | 苏州海博智能系统有限公司 | Electronic cash data authorization method, payment method and virtual card |
CN105184725A (en) * | 2015-09-28 | 2015-12-23 | 公安部第一研究所 | Network mapping document generated based on electronic legal identity document entity |
CN107945080A (en) * | 2016-10-13 | 2018-04-20 | 杭州悉尔科技有限公司 | A kind of electronic identity card awarding method and system based on biological identification technology |
CN109284598A (en) * | 2018-07-23 | 2019-01-29 | 深圳点猫科技有限公司 | A kind of method and electronic equipment generating electronic identity card in the education cloud platform page |
CN109460388A (en) * | 2018-10-18 | 2019-03-12 | 中国联合网络通信集团有限公司 | Electronic card generation method, device and storage medium |
CN109766979A (en) * | 2019-01-18 | 2019-05-17 | 北京思源互联科技有限公司 | Two-dimensional code generation method, verification method and device |
Also Published As
Publication number | Publication date |
---|---|
CN110619225A (en) | 2019-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110839026B (en) | Data processing method based on block chain and related equipment | |
CN108229188B (en) | Method for signing file and verifying file by using identification key | |
US5781635A (en) | Method and apparatus for improved digital message transaction model | |
US20070277040A1 (en) | Electronically Signing a Document | |
JPH07191602A (en) | Electronic autographing method and device | |
CN106548353B (en) | Commodity anti-counterfeiting code generation and verification method | |
CN109800585B (en) | Image interpolation space completely reversible separable ciphertext domain information hiding algorithm | |
JP2000358026A (en) | Method for executing transaction by certified user of personal identification card while using transaction terminal and method for issuing personal identification card to certified user | |
CN101789067A (en) | Electronic document signature protecting method and system | |
CN109583158B (en) | Electronic license copy generation method based on dynamic watermark | |
CN105635187B (en) | Method and device for generating electronic file with stamp and method and device for authenticating electronic file with stamp | |
CN109614803B (en) | Bill anti-counterfeiting method and system | |
JP2001511544A (en) | Document or message security deployments that use the numeric hash function | |
WO2007034255A1 (en) | Method, apparatus and system for generating a digital signature linked to a biometric identifier | |
CN107665314B (en) | The trusted processes method and device signed on the electronic document | |
CN108268779B (en) | Processing method and system for carrying out short ciphertext signature on invoice | |
CN105490814B (en) | A kind of ticketing service real name identification method and system based on three-dimension code | |
JP2017021603A (en) | Validity confirmation device, method, medium issuing device, method, and program | |
CN114491462A (en) | Method, system, equipment and storage medium for signing multiple electronic documents once | |
CN104517257A (en) | Method for manufacturing and verifying anti-counterfeiting digital certificate | |
CN110619225B (en) | Electronic identity card generation method suitable for public security dynamic management and control of employees | |
WO2018211475A1 (en) | Method for the creation of a document provided with a high-security digital signature | |
CN101877118A (en) | Electronic document authenticity identification system | |
JP5913041B2 (en) | Secret information concealment device, secret information restoration device, secret information concealment program, and secret information restoration program | |
US20150014980A1 (en) | Method and system for authenticating printed documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |