CN110619225B - Electronic identity card generation method suitable for public security dynamic management and control of employees - Google Patents

Electronic identity card generation method suitable for public security dynamic management and control of employees Download PDF

Info

Publication number
CN110619225B
CN110619225B CN201910832339.0A CN201910832339A CN110619225B CN 110619225 B CN110619225 B CN 110619225B CN 201910832339 A CN201910832339 A CN 201910832339A CN 110619225 B CN110619225 B CN 110619225B
Authority
CN
China
Prior art keywords
practitioner
basic
base map
information data
identity card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910832339.0A
Other languages
Chinese (zh)
Other versions
CN110619225A (en
Inventor
陈宙
边鹏程
周莹洁
陈涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI PUBLIC SECURITY BUREAU
Jiangsu Aerospace Dawei Technology Co Ltd
Original Assignee
WUXI PUBLIC SECURITY BUREAU
Jiangsu Aerospace Dawei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI PUBLIC SECURITY BUREAU, Jiangsu Aerospace Dawei Technology Co Ltd filed Critical WUXI PUBLIC SECURITY BUREAU
Priority to CN201910832339.0A priority Critical patent/CN110619225B/en
Publication of CN110619225A publication Critical patent/CN110619225A/en
Application granted granted Critical
Publication of CN110619225B publication Critical patent/CN110619225B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method for generating an electronic identity card of a practitioner, which is suitable for dynamic public security management and control. The method comprises the following steps: step 1, encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitioner bs And the length L of the basic information data ciphertext of the practitioner sk And encrypting the key string K bs (ii) a Step 2, providing a basic base map, and superposing basic identity information of a practitioner and a front photo of the practitioner on the basic base map; step 3, according to the basic base map and the basic information data ciphertext length L of the practitioner sk And encrypting the key string K bs Generating a non-repeating random coordinate number sequence; step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitioner bs Merged with the base picture. The invention can effectively generate the electronic identity card of the practitioner, is convenient for checking whether the practitioner is normally registered or not, and enhances the management control of the practitioner.

Description

Electronic identity card generation method suitable for public security dynamic management and control of employees
Technical Field
The invention relates to a method, in particular to a method for generating an electronic identity card of a practitioner, which is suitable for dynamic management and control of public security.
Background
The management and control of the personnel in the public security and public security industry are always the key focus of public security, and the personnel identity, the personnel engaged in the industry work and the like can be on duty after being authenticated and registered.
In the past, a card issuing system is adopted, and before a practitioner goes on duty, the practitioner goes to a specified place to register and issues a post-issuing certificate card. Nowadays, with the technical upgrade, practitioners registered for each registration no longer use physical cards, but use electronic virtual cards instead, and how to effectively generate electronic identity cards for the practitioners is a current technical problem.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provide a method for generating an electronic identity card of a practitioner suitable for dynamic public security management and control, which can effectively generate the electronic identity card of the practitioner, is convenient for checking whether the practitioner is normally registered or not and enhances the management and control of the practitioner.
According to the technical scheme provided by the invention, the generation method of the electronic identity card of the practitioner suitable for the dynamic management and control of the public security comprises the following steps:
step 1, providing basic identity information of a practitioner, and encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitioner bs And the length L of the basic information data ciphertext of the practitioner sk And encrypting the key string K bs The basic identity information comprises a name, an identity card number and a registration date;
step 2, providing a basic base map of the electronic identity card of the practitioner, and superposing basic identity information of the practitioner and the front photo of the practitioner on the basic base map of the electronic identity card of the practitioner;
step 3, according to the basic base map and the basic information data ciphertext length L of the practitioner sk And encrypting the key string K bs Generating a non-repeating random coordinate number sequence;
step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitioner bs And combining with the basic base map to obtain the required electronic identity card of the practitioner.
In the step 1, the method specifically comprises the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitioner bs
Step 1.2, utilizing abstract algorithm SHA1 to carry out basic information data variable S on the practitioner bs Encrypting to obtain an encryption key string K with 20 byte string bs The encryption key string K bs The key string length of is LK;
step 1.3, encrypting the secret key string K bs Converting into matrix M1 of 2 x 10, wherein the matrix M1 is
Figure GDA0004054002610000011
Preparing 2 x 3 operator matrix M sub Operator matrix M sub Is composed of
Figure GDA0004054002610000012
The operator matrix M is divided into sub After convolution operation is carried out on the matrix M1, a DES secret key DK with 8 bytes is generated bs Said DES key DK bs Is->
Figure GDA0004054002610000022
According to DES key DK bs Can obtain basic information data cipher text Sk of the practitioner bs Said practitioner basic information data cipher text Sk bs Is Sk bs =F DES (S bs ,K bs ) Wherein, F DES For the encryption function of DES, the basic information data cipher text Sk of the practitioner bs Has a length of L sk
In the step 2, the method specifically comprises the following steps:
step 2.1, providing the required basic base map, wherein the format of the basic base map is BMP, the resolution is 720 × 472, the bit depth is 24, and the file size of the basic picture is L bp Width of picture W bp Height of picture H bp
And 2.2, superposing the basic identity information of the practitioner and the front photo of the practitioner to the position required by the basic base map of the electronic identity card of the practitioner to obtain the appearance of the electronic identity card of the practitioner.
In the step 3, the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string K bs Obtaining random number seed R s The random number seed R s Is composed of
Figure GDA0004054002610000021
Step 3.2, setting coordinate variable array P [ len]Wherein, the size of len and the cryptograph length L of the basic information data of the practitioner sk Same as, P2]={P[0],P[1]…P[len-1]Each P [ i ]]Is a structure body, i has a value range of 0-len, pi]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as a coordinate origin;
step 3.3, setting a random coordinate array R [ len ], R [ = { R [0], R [1] \8230, R [ len-1] }, wherein each R [ j ] is a structural body, the value range of j is 0-len, and obtaining,
R[j].x=rand(R s );
R[j].y=rand(R s );
P[j].x=R[j].x modW bp *3;
P[j].y=R[j].y mod H bp
wherein j = {0, L sk -1}, rand being a random number generating function; in the presence of a ligand to obtain P [ j]Then, P [ j ] is added]With already obtained P [1]]To P [ j-1]By comparison, if P [ j ]]And P1]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4, obtaining the length L of the array according to the steps sk Is random coordinate series of (2)]。
In step 4, the 1-dimensional array D2 [ 2 ] is defined herein],D[]={D[0],D[1]…D[m-1]},m=L sk Each of which is a 1-dimensional array D [ n ]]The calculation formula is as follows:
D[n]=P[n].y*W bp *3+P[n].x,n={0,m-1};
setting the memory first address pointer of the data part of the basic base map as Buf, and setting Sk bs [n]According to the value of D [ n ]]The positions are written into the data part of the basic base map one by one to replace the original RGB values, and the specific replacement mode is as follows:
Buf[D[n]]=Sk bs [n];
after the above replacement is completed, the implementation will be appliedPersonnel basic information data cipher text Sk bs And combining with the basic picture to obtain the required electronic identity card of the practitioner.
The invention has the advantages that: can effectively generate the electronic identity card file of the practitioner which can not be counterfeited and encrypt the basic information data Sk of the practitioner bs The method is characterized in that a mode of discrete coordinates is combined with a basic base map, a secret key used for encryption and a random number seed used for calculating the discrete coordinates are obtained from abstract data calculated by an abstract algorithm SHA1 in basic identity information of practitioners, uniqueness and irreproducibility are provided for each practitioner, an electronic identity card file can be stored in a mobile phone and identity verification can be performed at any time, and as a public security and public security management department, the method is of great help for verifying whether the practitioner is normally registered and enhancing the management control degree of the practitioner.
Drawings
FIG. 1 is a schematic diagram of the basic base diagram of the present invention.
Fig. 2 is a schematic diagram of basic identity information of a practitioner and a front photograph of the practitioner superimposed on a basic base map of an electronic identity card of the practitioner according to the present invention.
FIG. 3 is a schematic diagram of establishing a coordinate system according to the base map.
FIG. 4 is a diagram of the data portion of the underlying base map of the present invention.
Detailed Description
The invention is further illustrated by the following specific figures and examples.
In order to effectively generate an electronic identity card of a practitioner, facilitate checking whether the practitioner normally registers or not and strengthen management control on the practitioner, the invention provides basic identity information of the practitioner and encrypts the provided basic identity information to obtain basic information data cipher text Sk of the practitioner in step 1 bs And the length L of the basic information data ciphertext of the practitioner sk And encrypting the key string K bs The basic identity information comprises a name, an identity card number and a registration date;
specifically, step 1 mainly includes the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitioner bs
In the embodiment of the invention, basic information names, identity card numbers and registration dates of employees and information contents adopt a fixed-length mode to form a fixed-length content character string, wherein:
name: defining the name XM, the length is 32 bytes, and the longest length supports 16 Chinese characters;
identification card number: defining a name SFZH, length 18 bytes;
the registration date: defining a name DJRQ, 8 bytes in length (yesterday YYYYMMDD);
defining the basic information data variable of the practitioner as S bs Defining a data variable S of the basic information of the practitioner bs Length L bs =32+16+8 + 56 (byte), then S bs =XM&SFZH&DJRQ。
Figure GDA0004054002610000031
Step 1.2, using SHA1 abstract algorithm to perform data variable S on basic information of practitioner bs Encrypting to obtain an encryption key string K with a 20-byte string bs The encryption key string K bs The length of the key string is LK;
in the embodiment of the present invention, the key generation decision is determined by using a relatively fixed key manner, that is, each defined practitioner has a specific key, the key is obtained by calculation according to the basic information of the practitioner, and the key is a unique item for each practitioner and is not repeated. In particular, the data variable S is based on the aforementioned practitioner basic information bs Generating a secret key by the internal character string for subsequent text encryption and other purposes; defining an encryption key as K bs Adopting SHA1 abstract algorithm, and obtaining basic information data variable S of practitioner bs The character string is used for calculating and obtaining the key string.
Defining the SHA1 cryptographic function name as FSHA1, from which
K bs =FSHA1(S bs );
Final encryption key string K bs Is a 160 bit, 20 byte string. LK is defined as the length of the encryption key string, and is defined according to SHA1 as a fixed value 20.
Step 1.3, encrypting the key string K bs Converting into matrix M1 of 2 x 10, wherein the matrix M1 is
Figure GDA0004054002610000041
/>
Preparing 2 x 3 operator matrix M sub Operator matrix M sub Is composed of
Figure GDA0004054002610000042
The operator matrix M is divided into sub After convolution operation is carried out on the matrix M1, a DES secret key DK with 8 bytes is generated bs Said DES Key DK bs Is DK bs =M1╳○M sub =[V0,V1…V7](ii) a Key DK according to DES bs Can obtain basic information data cipher text Sk of the practitioner bs Said practitioner basic information data cipher text Sk bs Is Sk bs =F DES (S bs ,DK bs ) Wherein F is DES For the encryption function of DES, the basic information data cipher text Sk of the practitioner bs Has a length of L sk
In the embodiment of the invention, the basic identity information of the practitioner is encrypted, and a plaintext is processed into a ciphertext; because the data information is not used for online data transmission in subsequent use, the DES encryption algorithm is adopted to encrypt the basic identity information of the practitioner, and the key is the encryption key string K generated in the previous step bs . The generated cipher text is used as a component of the electronic identity card of the practitioner.
Here, the basic information data ciphertext of the practitioner is defined as Sk bs The DES key string is DK bs Firstly, the DES key string is calculated,the method is obtained by calculation according to an encryption key string Kbs, the DES key is 64 bits (8 bytes), and the calculation process is as follows:
20 bytes of encryption key string K bs Conversion to 2 x 10 matrix M1
Figure GDA0004054002610000043
Preparing a 2 x 3 operator matrix M sub
Figure GDA0004054002610000044
And generating an 8-byte DES key by convolution of the two matrixes: />
Figure GDA0004054002610000045
The specific convolution calculation process is well known to those skilled in the art and will not be described herein. V0, V1, \ 8230, V7 is DES key string obtained by convolution calculation.
Finally, the DES secret key DK obtained by the calculation bs To calculate the encryption; defining DES encryption function name F DES From which Sk can be obtained bs =FDES(S bs ,DK bs )。
Here, a practitioner basic information data cipher text Sk is defined bs Has a length of L sk (unit: byte), through the above process, it is finally possible to make the following several numerical terms available for the subsequent process treatment: practitioner basic information data cipher text Sk bs And the length L of the basic information data ciphertext of the practitioner sk (unit: byte), encryption key string K bs (20 bytes).
Step 2, providing a basic base map of the electronic identity card of the practitioner, and superposing basic identity information of the practitioner and a front photo of the practitioner on the basic base map of the electronic identity card of the practitioner;
in the embodiment of the invention, the electronic identity card file of the practitioner is finally the picture file, in the using process, in order to prevent counterfeiting by people, fixed values are adopted on various parameters such as format, resolution ratio and the like of the picture file, so that the authenticity can be distinguished when the verification is carried out, and the picture format and the fixed parameters are defined as follows:
the picture format is as follows: BMP; resolution ratio: 720 x 472 (width 720 pixels, height 472 pixels); bit depth: 24.
defining a base picture file size of L bp Width of picture W bp Height of picture H bp From the parameters of the base map, we can obtain:
W bp =720;
H bp =472;
L bp =54+W bp *H bp *3=54+720 + 472 + 3=1019574 (unit: byte).
The situation of the underlying base map is shown in fig. 1. On the basis of the basic base map, information superposition is needed to be carried out on the electronic identity card pictures of the employees. Including basic information of the practitioner and the front photo of the practitioner, the electronic identity card picture can be finished in appearance after superposition. The contents to be superimposed are as follows:
the name of the practitioner, the identification card number of the practitioner, the electronic identity card number of the practitioner, the registration date of the practitioner and the front photo of the practitioner. The superimposed situation is shown in fig. 2.
Each content is superimposed on the designated coordinate position of the base picture. And (4) completing the appearance processing of the electronic card picture by the practitioner, preparing to merge the picture and the data, and generating an electronic identity card file.
Step 3, according to the basic base map and the basic information data ciphertext length L of the practitioner sk And encrypting the key string K bs Generating a non-repeating random coordinate number sequence;
the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string K bs Obtaining random number seed R s The random number seed R s Is composed of
Figure GDA0004054002610000051
The work at this stage is generated using a random number sequenceForming random coordinate positions of data superposition, thereby generating the basic information data cipher text Sk of the completed practitioner in the previous stage bs Discretely incorporated into the picture file.
The random number generated by using the rand function is not completely random but is a group of pseudo random number sequences, but is not a fake random number, the value of the continuously generated random number sequence is determined by the value of the random number seed, and the same random number sequence can be generated by setting the same value of the random number seed through the strand function. By utilizing this characteristic, the encryption key string K can be generated from the basic information of each worker bs To dynamically generate a relatively fixed random number seed for each practitioner to obtain a set of random number sequences corresponding to each practitioner. In the embodiment of the invention, the random number seed R s Is composed of
Figure GDA0004054002610000052
Step 3.2, setting coordinate variable array P [ len ]]Wherein, the size of len and the cryptograph length L of the basic information data of the practitioner sk Same as, P2]={P[0],P[1]…P[len-1]Each P [ i ]]Is a structure body, i has a value range of 0-len, pi]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as the origin of the coordinates;
in the embodiment of the invention, the step is to generate a set of non-repeating random coordinates according to the produced continuous random number sequence. Defining random coordinate variable array P [ len ]]Wherein len is array length, and its value and practitioner basic information data ciphertext length L sk The same is true.
Establishing a coordinate system by using the base map, taking the upper left corner of the picture as an origin of coordinates, the horizontal direction as an X axis, and the vertical direction as a Y axis, wherein the X axis is in bytes, that is, each pixel value of the base map with 24-bit depth contains 3 bytes, and deriving the X axis and the Y axis in the following ranges:
the Y axis is the height of the picture, and the value range is that { Y |0 is less than or equal to Y<H bp }; hbp was previously defined as the height of the base map; the X axis is the width of the picture, and the value interval is { X |0≤X<W bp *3},W bp Previously defined as the width of the underlying base map. As shown in fig. 3 and 4.
Step 3.3, setting a random coordinate array R [ len ], R [ ] = { R [0], R [1] \8230, R [ len-1] }, wherein each R [ j ] is a structure, and the value range of j is 0-len to obtain,
R[j].x=rand(R s );
R[j].y=rand(R s );
P[j].x=R[j].x modW bp *3;
P[j].y=R[j].y mod H bp
wherein j = {0, L sk -1, rand being a random number generating function; in the presence of a ligand to obtain P [ j]Then, P [ j ] is added]With already obtained P [1]]To P [ j-1]By comparison, if P [ j ]]And P1]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4, obtaining the length L of the array according to the steps sk Is random coordinate series of (2)]。
In the embodiment of the invention, the non-repeated random coordinate number sequence can be generated after the steps are carried out.
Step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitioner bs And combining with the basic base map to obtain the required electronic identity card of the practitioner.
In the BMP picture format, the data portion of the BMP picture format is a continuous memory segment, and the coordinate data needs to be converted from 2-dimensional data to 1-dimensional data for practical use.
Here, the 1-dimensional array D2 is defined],D[]={D[0],D[1]…D[m-1]},m=L sk Each of which is a 1-dimensional array D [ n ]]The calculation formula is as follows:
D[n]=P[n].y*W bp *3+P[n].x,n={0,m-1};
setting the memory first address pointer of the data part of the basic base map as Buf, and setting Sk bs [n]According to the value of D [ n ]]The positions are written into the data part of the basic base map one by one to replace the original RGB values, and the specific replacement mode is as follows:
Buf[D[n]]=Sk bs [n];
after the replacement is completed, the basic information data cipher text Skbs of the practitioner is merged with the basic picture, so that the required electronic identity card of the practitioner is obtained.
In the embodiment of the invention, the encrypted practitioner basic identity information is discretely combined with the basic base map, the number of bytes of ciphertext data is less than that of the whole BMP file, the display of the BMP file picture is not influenced after the discrete combination, and the file formed by combining the data and the picture is used as the electronic identity card file of the practitioner.
The invention can effectively generate the electronic identity card file of the practitioner who can not be counterfeited and encrypt the basic information data Sk of the practitioner bs The method is characterized in that a mode of discrete coordinates is combined with a basic base map, a secret key used for encryption and a random number seed used for calculating the discrete coordinates are obtained from abstract data calculated by an abstract algorithm SHA1 in basic identity information of workers, each worker has uniqueness and irreproducibility, an electronic identity card file can be stored in a mobile phone, the workers move an APP or open a WEB of the mobile phone, the pictures are selected and can be verified, identity verification is carried out at any time, and as a public security and public security management department, the method is greatly helpful for verifying whether the workers normally register and enhancing the management control degree of the workers.

Claims (2)

1. A practitioner electronic identity card generation method suitable for public security dynamic management and control is characterized by comprising the following steps:
step 1, providing basic identity information of a practitioner, and encrypting the provided basic identity information to obtain basic information data cipher text Sk of the practitioner bs And the length L of the basic information data ciphertext of the practitioner sk And encrypting the key string K bs The basic identity information comprises a name, an identity card number and a registration date;
step 2, providing a basic base map of the electronic identity card of the practitioner, and superposing basic identity information of the practitioner and a front photo of the practitioner on the basic base map of the electronic identity card of the practitioner;
step 3, according to the basic base map and the basic information data ciphertext length L of the practitioner sk And encrypting the key string K bs Generating a non-repeating random coordinate number sequence;
step 4, using the non-repeated random coordinate series to encrypt the basic information data cipher text Sk of the practitioner bs Combining with the basic base map to obtain the required electronic identity card of the practitioner;
in the step 1, the method specifically comprises the following steps:
step 1.1, obtaining basic information data variable S of the practitioner according to the basic identity information of the practitioner bs
Step 1.2, utilizing abstract algorithm SHA1 to carry out basic information data variable S on the practitioner bs Encrypting to obtain an encryption key string K with 20 byte string bs The encryption key string K bs The key string length of is LK;
step 1.3, encrypting the secret key string K bs Converting into matrix M1 of 2 x 10, wherein the matrix M1 is
Figure FDA0004054930470000011
Preparing 2 x 3 operator matrix M sub Operator matrix M sub Is composed of
Figure FDA0004054930470000012
The operator matrix M is divided into sub After convolution operation is carried out on the matrix M1, a DES secret key DK with 8 bytes is generated bs Said DES key DK bs Is composed of
Figure FDA0004054930470000013
According to DES key DK bs Can obtain basic information data cipher text Sk of the practitioner bs Said practitioner basic information data cipher text Sk bs Is Sk bs =F DES (S bs ,DK bs ) Wherein, F DES For the encryption function of DES, the basic information data cipher text Sk of the practitioner bs Has a length of L sk
In the step 2, the method specifically comprises the following steps:
step 2.1, providing the required base map, wherein the format of the base map is BMP, the resolution is 720 × 472, the bit depth is 24, and the file size of the base map is L bp Width of picture is W bp Height of picture H bp
Step 2.2, superposing the basic identity information of the practitioner and the front photo of the practitioner to the position required by the basic base map of the electronic identity card of the practitioner to obtain the appearance of the electronic identity card of the practitioner;
in the step 3, the method specifically comprises the following steps:
step 3.1, utilizing the encryption key string K bs Obtaining random number seed R s The random number seed R s Is composed of
Figure FDA0004054930470000014
Step 3.2, setting coordinate variable array P [ len ]]Wherein, the size of len and the cryptograph length L of the basic information data of the practitioner sk Same as, P2]={P[0],P[1],P[i],…P[len-1]H, each P [ i }]Is a structural body, the value range of i is 0-len-1]Coordinates in two directions of an X axis and a Y axis are included, and a coordinate system is established by taking the upper left corner of the basic base map as the origin of the coordinates;
step 3.3, setting a random coordinate array R [ len ], R [ ] = { R [0], R [1], R [ j ], \8230, R [ len-1] }, wherein each R [ j ] is a structural body, the value range of j is 0-len-1, and obtaining,
R[j].x=rand(R s );
R[j].y=rand(R s );
P[j].x=R[j].xmodW bp *3;
P[j].y=R[j].ymodH bp
wherein j = {0, L sk -1, rand being a random number generating function; in the presence of a compound to obtain P [ j]Then, P [ j ] is added]And has obtainedP [0] of]To P [ j-1]By comparison, if P [ j ]]And P [0]]To P [ j-1]When the same value exists in the P [ j ], the P [ j ] is regenerated];
Step 3.4, obtaining the length L of the array according to the steps sk Is a random coordinate number sequence of (2)]。
2. The method for generating an electronic identity card for a practitioner suitable for the dynamic regulation of public security as claimed in claim 1, wherein in step 4, the 1-dimensional array D2 is defined herein],D[]={D[0],D[1]…D[m-1]},m=L sk Wherein the element D [ n ] in the 1-dimensional array]The calculation formula of (a) is as follows:
D[n]=P[n].y*W bp *3+P[n].x,n={0,m-1};
setting the memory initial address pointer of the data part of the basic base map as Buf, and setting Sk bs [n]According to the value of D [ n ]]The positions are written into the data part of the basic base map one by one to replace the original RGB values, and the specific replacement mode is as follows:
Buf[D[n]]=Sk bs [n];
after the replacement is completed, the cipher text Sk of the basic information data of the practitioner is realized bs And combining with the basic base map to obtain the required electronic identity card of the practitioner.
CN201910832339.0A 2019-09-04 2019-09-04 Electronic identity card generation method suitable for public security dynamic management and control of employees Active CN110619225B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910832339.0A CN110619225B (en) 2019-09-04 2019-09-04 Electronic identity card generation method suitable for public security dynamic management and control of employees

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910832339.0A CN110619225B (en) 2019-09-04 2019-09-04 Electronic identity card generation method suitable for public security dynamic management and control of employees

Publications (2)

Publication Number Publication Date
CN110619225A CN110619225A (en) 2019-12-27
CN110619225B true CN110619225B (en) 2023-04-14

Family

ID=68922237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910832339.0A Active CN110619225B (en) 2019-09-04 2019-09-04 Electronic identity card generation method suitable for public security dynamic management and control of employees

Country Status (1)

Country Link
CN (1) CN110619225B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162489A (en) * 2007-11-26 2008-04-16 唐荣华 Personate photograph producing method used for keep input secret and method of use thereof
CN102420834A (en) * 2011-12-29 2012-04-18 公安部第三研究所 Generation and verification control method for network identity code in electronic network identity card
CN103177364A (en) * 2011-12-26 2013-06-26 中国银联股份有限公司 Transaction processing method based on electronic signature
CN105184725A (en) * 2015-09-28 2015-12-23 公安部第一研究所 Network mapping document generated based on electronic legal identity document entity
WO2016041235A1 (en) * 2014-09-17 2016-03-24 苏州海博智能系统有限公司 Electronic cash data authorization method, payment method and virtual card
CN107945080A (en) * 2016-10-13 2018-04-20 杭州悉尔科技有限公司 A kind of electronic identity card awarding method and system based on biological identification technology
CN109284598A (en) * 2018-07-23 2019-01-29 深圳点猫科技有限公司 A kind of method and electronic equipment generating electronic identity card in the education cloud platform page
CN109460388A (en) * 2018-10-18 2019-03-12 中国联合网络通信集团有限公司 Electronic card generation method, device and storage medium
CN109766979A (en) * 2019-01-18 2019-05-17 北京思源互联科技有限公司 Two-dimensional code generation method, verification method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162489A (en) * 2007-11-26 2008-04-16 唐荣华 Personate photograph producing method used for keep input secret and method of use thereof
CN103177364A (en) * 2011-12-26 2013-06-26 中国银联股份有限公司 Transaction processing method based on electronic signature
CN102420834A (en) * 2011-12-29 2012-04-18 公安部第三研究所 Generation and verification control method for network identity code in electronic network identity card
WO2016041235A1 (en) * 2014-09-17 2016-03-24 苏州海博智能系统有限公司 Electronic cash data authorization method, payment method and virtual card
CN105184725A (en) * 2015-09-28 2015-12-23 公安部第一研究所 Network mapping document generated based on electronic legal identity document entity
CN107945080A (en) * 2016-10-13 2018-04-20 杭州悉尔科技有限公司 A kind of electronic identity card awarding method and system based on biological identification technology
CN109284598A (en) * 2018-07-23 2019-01-29 深圳点猫科技有限公司 A kind of method and electronic equipment generating electronic identity card in the education cloud platform page
CN109460388A (en) * 2018-10-18 2019-03-12 中国联合网络通信集团有限公司 Electronic card generation method, device and storage medium
CN109766979A (en) * 2019-01-18 2019-05-17 北京思源互联科技有限公司 Two-dimensional code generation method, verification method and device

Also Published As

Publication number Publication date
CN110619225A (en) 2019-12-27

Similar Documents

Publication Publication Date Title
CN110839026B (en) Data processing method based on block chain and related equipment
CN108229188B (en) Method for signing file and verifying file by using identification key
US5781635A (en) Method and apparatus for improved digital message transaction model
US20070277040A1 (en) Electronically Signing a Document
JPH07191602A (en) Electronic autographing method and device
CN106548353B (en) Commodity anti-counterfeiting code generation and verification method
CN109800585B (en) Image interpolation space completely reversible separable ciphertext domain information hiding algorithm
JP2000358026A (en) Method for executing transaction by certified user of personal identification card while using transaction terminal and method for issuing personal identification card to certified user
CN101789067A (en) Electronic document signature protecting method and system
CN109583158B (en) Electronic license copy generation method based on dynamic watermark
CN105635187B (en) Method and device for generating electronic file with stamp and method and device for authenticating electronic file with stamp
CN109614803B (en) Bill anti-counterfeiting method and system
JP2001511544A (en) Document or message security deployments that use the numeric hash function
WO2007034255A1 (en) Method, apparatus and system for generating a digital signature linked to a biometric identifier
CN107665314B (en) The trusted processes method and device signed on the electronic document
CN108268779B (en) Processing method and system for carrying out short ciphertext signature on invoice
CN105490814B (en) A kind of ticketing service real name identification method and system based on three-dimension code
JP2017021603A (en) Validity confirmation device, method, medium issuing device, method, and program
CN114491462A (en) Method, system, equipment and storage medium for signing multiple electronic documents once
CN104517257A (en) Method for manufacturing and verifying anti-counterfeiting digital certificate
CN110619225B (en) Electronic identity card generation method suitable for public security dynamic management and control of employees
WO2018211475A1 (en) Method for the creation of a document provided with a high-security digital signature
CN101877118A (en) Electronic document authenticity identification system
JP5913041B2 (en) Secret information concealment device, secret information restoration device, secret information concealment program, and secret information restoration program
US20150014980A1 (en) Method and system for authenticating printed documents

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant