CN112100983A - Identification code used in system and generation method of identification code - Google Patents

Identification code used in system and generation method of identification code Download PDF

Info

Publication number
CN112100983A
CN112100983A CN202010819398.7A CN202010819398A CN112100983A CN 112100983 A CN112100983 A CN 112100983A CN 202010819398 A CN202010819398 A CN 202010819398A CN 112100983 A CN112100983 A CN 112100983A
Authority
CN
China
Prior art keywords
code
identification code
identification
time
specific
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010819398.7A
Other languages
Chinese (zh)
Inventor
马占业
李宝潭
何刚
李现伟
徐鹏
李燕
李洪峰
杨校辉
胡道栋
陈志刚
王艳
尹新涛
苏杭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuji Group Co Ltd
XJ Electric Co Ltd
Xuchang XJ Software Technology Co Ltd
Original Assignee
Xuji Group Co Ltd
XJ Electric Co Ltd
Xuchang XJ Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuji Group Co Ltd, XJ Electric Co Ltd, Xuchang XJ Software Technology Co Ltd filed Critical Xuji Group Co Ltd
Priority to CN202010819398.7A priority Critical patent/CN112100983A/en
Publication of CN112100983A publication Critical patent/CN112100983A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/126Character encoding

Abstract

The invention relates to a method for generating an identification code in a system and the identification code used in the system, which is generated by an algorithm formula, adopts different modes to rationalize storage, verifies the legality and validity of the identification code, uses the identification code to carry out information display and information interaction, and has the characteristics of diversified storage modes, diversified storage media, diversified storage granularity and diversified use.

Description

Identification code used in system and generation method of identification code
Technical Field
The invention belongs to the technical related field of information-based systems, and particularly relates to an identification code used in a system and a method for generating the identification code.
Background
With the maturity and rapid development of internet and internet of things technologies and the popularization of information systems in various industries, the interaction of the systems is more and more frequent, the complexity is higher and higher, various identification codes in system software are commonly used, and the information interaction is increased day by day, but the current identification codes are not defined and used randomly, so that design defects in aspects of expandability of system functions, interaction compatibility among systems, interaction stability between the systems and external entity equipment and the like exist, the inconvenience of users and repeated development of the systems are caused frequently, and the identification codes are generated according to rules for standardizing the identification codes of the system software, are stored reasonably and are used efficiently for information interaction.
Disclosure of Invention
Under the background situation, the invention provides the identification code used in the system and the generation method of the identification code, the identification code used in the system can be automatically generated through an algorithm formula, and the method has the characteristics of diversified storage modes, diversified storage media, diversified storage granularity and diversified application.
In order to achieve the above object, according to one aspect of the present invention, there is provided a method for generating an identification code in a system, wherein the conf (m) function generates a model information code according to a specific model, and m is the specific model used for generating the code in the system; the Ran function generates a random number code according to a specific algorithm; the time (t) function generates a date-time code according to the current time, wherein t is the current time; the Oam (b) function generates a service type code according to a specific service type, and b is the specific service type used for generating the code in the system; the function C generates a check code according to a specific check rule so as to verify the validity of the identification code; the E () function carries out encryption and decryption calculation on the identification code according to a specific encryption and decryption algorithm, and the use safety of the identification code is guaranteed.
Further, the model information code is a specific code for the system generated by modeling according to various model information code specifications in the system, and is a part of the identification code.
Further, the random number code is generated using a random function or a specific algorithm, and is part of the identification code.
Further, the time-of-day code is time-of-day information contained in the identification code, and is generated using a time-of-day function time (t), which is part of the identification code.
Further, the service type code is a code for a specific service of the system generated according to a service type code definition designed in the system, and is a part of the identification code.
Further, the check code is calculated according to a check algorithm and is part of the identification code.
Further, after the identification code is generated, the identification code is stored and interacted in a plaintext or ciphertext mode, and the identification code is encrypted and decrypted by adopting a preset encryption and decryption algorithm.
According to another aspect of the present invention, there is provided an identification code for use in a system, the identification code comprising: the identification code comprises a model information code, a random number code, a date and time code, a service type code and a check code, wherein the identification code is generated by the generation method.
Further, the identification code is stored in a manner of at least one of a database, a file and a picture, at least one of a computer disk, a computer memory and an external entity device, and in a dispersed or integral storage manner.
Furthermore, the identification code is used for displaying information in a graphical interface mode, transmitting identification code information inside the system, interacting with identification code information of an external system and interacting with identification code information between the system and the entity equipment.
In summary, the method for generating the identification code in the system and the identification code used in the system provided by the invention are generated by an algorithm formula, are reasonably stored in different modes, are used for checking the legality and validity of the identification code, are used for information display and information interaction, and have the characteristics of diversified storage modes, diversified storage media, diversified storage granularity and diversified use.
Drawings
FIG. 1 is a diagram of the relationship of generation, storage, verification and use of identification codes in the system of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
The invention provides an identification code used in a system and a method for generating the identification code, which can automatically generate the identification code used in the system through an algorithm formula and have the characteristics of diversified storage modes, diversified storage media, diversified storage granularity and diversified use. In the following, the technical solution of the present invention is described in detail, and according to an embodiment of the present invention, an identification code used in a system is provided. The identification codes adopted in the system software are of various types, and the following classification methods are mainly adopted according to different division dimensions: dynamic and static identification codes, configuration class and service class identification codes, online and offline identification codes, and direct and indirect identification codes. The dynamic identification code dynamically changes along with various parameters of the system, such as a service serial number, user information, a state and the like; the static identification code is not changed once generated. The dynamic and static identification codes can be applied to different scenes in system software according to requirements. Configuring class identification codes for service definitions of system software, such as administrative divisions, operation units, facility models, custom prefixes and the like; the service identification code is used for various production services of the system software, such as a service serial number, user information, an operation strategy and the like. The online identification code can be normally used when the system needs to be operated online; the off-line identification code can still be normally used when the system is off-line. The direct identification code contains all information of the identification code and can be directly used; the indirect identification code can not be directly used, is a part of the identification code or an intermediate parameter of the generation process, and needs to be comprehensively calculated again to obtain the final usable identification code. Direct and indirect identification codes are opposite, for example, administrative division codes can directly serve as identification codes to identify regional information and can serve as model information codes in service serial number identification codes.
In this embodiment of the present invention, the identification code includes: model information encoding, random number encoding, date and time encoding, service type encoding and check encoding. Wherein the model information code is a specific code for the system generated by modeling according to a configuration class information code specification in the system, and is a part of the identification code. The random number code is generated using a random function or a specific algorithm and is part of the identification code. The time-of-day code, which is the time-of-day information contained in the identification code, is generated using the time-of-day function time (t), and is part of the identification code. The service type code is a code for a specific service of the system generated according to a service type code definition designed in the system, and is part of the identification code. The check code is calculated according to a check algorithm and is part of the identification code. And after the identification code is generated, the identification code is stored and interacted in a plaintext or ciphertext mode, and the identification code is encrypted and decrypted by adopting a preset encryption and decryption algorithm.
The identification code provided by the invention can be stored in a multi-mode storage mode, and particularly reflects the diversification of the storage mode, the diversification of the storage medium and the diversification of the storage granularity. In terms of storage mode, the identification code can be stored in various modes such as a database, a file, a picture and the like, and the content of the identification code is read and analyzed by adopting corresponding computer technology. In terms of the storage medium, the identification code data can be finally stored in media such as a computer disk, a computer memory, an external entity device, and the like. In terms of storage granularity, the identification codes can be stored in the system software in a scattered or integral mode, and the stored granularity can be customized according to needs.
After the identification code is generated, the validity and validity of the identification code also need to be checked, specifically including validity check of the identification code generation and validity check of the identification code usage. And according to the system design standard, the legality of the identification code is verified after the identification code is generated, and the verified party can be stored and used. And according to the system design standard, the validity of the identification code is verified when the identification code is used, and a legal party can be verified for use.
In terms of use, the identification code can be used for system software to display identification code information, for interaction of identification code information inside the system software, and interaction of identification code information with an external system or entity device. Specifically, the identification code information can be displayed in a form of a graphical interface; can be used for the transmission of the system internal identification code information; can interact with the identification code information of an external system; and the method can also be used for the identification code information interaction between the system software and the entity equipment.
According to another embodiment of the invention, a method for generating the identification code in the system is provided, which is calculated by the above single or multiple comprehensive encryption and decryption algorithms of model information coding, random number coding, date and time coding, service type coding, check coding and the like according to the definition of system software. The invention not only provides a method for generating the identification code, but also relates to the storage and the use of the identification code after the identification code is generated, and a graph of the relationship among generation, storage, verification and use of the identification code in the system software of the invention is shown in fig. 1. The following detailed description is made with reference to the accompanying drawings. According to this embodiment, the identification codes in the system include: model information encoding, random number encoding, date and time encoding, service type encoding and check encoding. The model information code is a specific code for the system generated by modeling according to the configuration class information code specification in the system, and is a part of the identification code. The random number code is generated using a random function or a specific algorithm and is part of the identification code. The time-of-day code, which is the time-of-day information contained in the identification code, is generated using the time-of-day function time (t), and is part of the identification code. The service type code is a code for a specific service of the system generated according to a service type code definition designed in the system, and is part of the identification code. The check code is calculated according to a check algorithm and is part of the identification code. And after the identification code is generated, the identification code is stored and interacted in a plaintext or ciphertext mode, and the identification code is encrypted and decrypted by adopting a preset encryption and decryption algorithm.
The identification code is generated by the following formula:
Icode(m,t,b)=E(Conf(m)+Ran+Time(t)+Oam(b)+C)
the function Conf (m) is a function for generating a model information code according to a code specification, the function generates the model information code according to a specific model, and m is a specific model used for generating the code in a system, such as various specific models required by system applications such as an administrative division model, an organization mechanism model, an asset model and the like; a Ran function generates a random number code, the function generates the random number code according to a specific algorithm, the specific algorithm is various random number calculation methods required by the system, for example, a unique symbol in the system is generated by adopting the random function; a time (t) function generates a date-time code, the function generates the date-time code according to the current time, t is the current time, for example, the current time is data combined according to a format of year, month, day, hour, minute and second; the method comprises the following steps that (a) an Oam (b) function generates a service type code, the function generates the service type code according to a specific service type, and b is the specific service type used for generating the code in the system, such as various specific service types defined by system application, such as a transaction type, a construction type and the like; generating a check code by a function C, wherein the function generates the check code according to a specific check rule and is used for verifying the legality of the identification code, and the specific check algorithm is various check calculation methods required by the system; the E () function performs encryption and decryption calculation on the identification code, and the function performs encryption and decryption calculation on the identification code according to a specific encryption and decryption algorithm, so that the use safety of the identification code is guaranteed, for example, the commonly used encryption and decryption algorithms such as MD5, SHA1 and HMAC. And the Icode (m, t, b) function generates an identification code for a specific scene of the system after being calculated by an encryption and decryption function E () according to the model information coding function Conf (m), the random number coding function Ran, the date and time coding function Time (t), the service type coding function Oam (b) and the check coding function C. The identification code generated by the calculation method can be used for various informationized system software such as office, production, shopping, transaction management and the like, but is not limited to the informationized system software.
When the generated identification code is stored, a multi-mode storage mode can be adopted for storage, and specifically, the storage mode is diversified, the storage medium is diversified, and the storage granularity is diversified. In terms of storage mode, the identification code can be stored in various modes such as a database, a file, a picture and the like, and the content of the identification code is read and analyzed by adopting corresponding computer technology. In terms of the storage medium, the identification code data can be finally stored in media such as a computer disk, a computer memory, an external entity device, and the like. In terms of storage granularity, the identification code can be stored in system software in a scattered or integral mode, the stored granularity can be defined according to needs, for example, the face feature value used for user identity recognition can be stored in the system in a scattered mode, and the face feature value captured and collected can be matched and verified in the validity of the user identity through a face recognition algorithm.
After the identification code is generated, the validity and validity of the identification code also need to be checked, specifically including validity check of identification code generation and validity check of identification code use. And according to the system design standard, the legality of the identification code is verified after the identification code is generated, and the legal party can be stored and used for verification, such as the uniqueness of the identification code, a self-defined verification algorithm of system software and the like. According to the design standard of the system, when the identification code is used, the validity of the identification code is checked, and the identification code can be used by a legal party, such as whether the identification code is expired or not, whether the use of the identification code has authority or not and the like.
The generated identification code can be finally used for displaying identification code information of the system software, interacting the identification code information inside the system software and interacting the identification code information with an external system or entity device. Specifically, the identification code information can be displayed in a form of a graphical interface; the method can be used for transferring the system internal identification code information, such as generating and storing the service class identification code; the method can interact with the identification code information of the external system, for example, the identification code information of the external system is sent to or acquired from the external system through an API; the method can also be used for the interaction of the identification code information between the system software and the entity equipment, such as the reading and writing of card information.
In summary, the present invention relates to an identification code used in a system and a method for generating the identification code, which can automatically generate the identification code used in the system through an algorithm formula, and have the characteristics of diversified storage methods, diversified storage media, diversified storage granularity, and diversified usage, and can be used for displaying identification code information, interacting identification code information inside the system, interacting identification code information with an external system, and interacting identification code information with an entity device.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (10)

1. A method for generating an identification code in a system, wherein the identification code comprises: the identification code comprises a model information code, a random number code, a date and time code, a service type code and a check code, wherein the identification code is generated by the following formula:
Icode(m,t,b)=E(Conf(m)+Ran+Time(t)+Oam(b)+C)
wherein, the Conf (m) function generates a model information code according to a specific model, and m is the specific model used for generating the code in the system; the Ran function generates a random number code according to a specific algorithm; the time (t) function generates a date-time code according to the current time, wherein t is the current time; the Oam (b) function generates a service type code according to a specific service type, and b is the specific service type used for generating the code in the system; the function C generates a check code according to a specific check rule so as to verify the validity of the identification code; the E () function carries out encryption and decryption calculation on the identification code according to a specific encryption and decryption algorithm, and the use safety of the identification code is guaranteed.
2. The generation method according to claim 1, wherein the model information code is a specific code for the system, which is generated by modeling according to various types of model information code specifications in the system, and is a part of the identification code.
3. The generation method according to claim 1, characterized in that the random number code is generated using a random function or a specific algorithm, being part of the identification code.
4. The generation method according to claim 1, characterized in that the time-of-day code is time-of-day information contained in an identification code, generated using the time-of-day function time (t), being part of the identification code.
5. The generation method according to claim 1, characterized in that the service type code is a code for the system specific service generated according to a service type code definition designed in the system, being part of an identification code.
6. The generation method according to claim 1, characterized in that the check code is calculated as a check algorithm, being part of the identification code.
7. The generation method of claim 1, wherein the identification code is stored and interacted in a plaintext or ciphertext manner after being generated, and a preset encryption and decryption algorithm is adopted to perform encryption and decryption calculation on the identification code.
8. An identification code for use in a system, the identification code comprising: a model information code, a random number code, a time-of-day code, a type of service code and a verification code, said identification code being generated by the method of any one of claims 1 to 7.
9. The identification code according to claim 8, wherein the identification code is stored in a manner of at least one of a database, a file, and a picture, at least one of a computer disk, a computer memory, and an external entity device, and distributed or integrated storage.
10. The identification code according to claim 8, wherein the identification code is used for displaying information through a graphical interface, transferring identification code information inside a system, interacting with identification code information of an external system and interacting with identification code information between the system and a physical device.
CN202010819398.7A 2020-08-14 2020-08-14 Identification code used in system and generation method of identification code Pending CN112100983A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010819398.7A CN112100983A (en) 2020-08-14 2020-08-14 Identification code used in system and generation method of identification code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010819398.7A CN112100983A (en) 2020-08-14 2020-08-14 Identification code used in system and generation method of identification code

Publications (1)

Publication Number Publication Date
CN112100983A true CN112100983A (en) 2020-12-18

Family

ID=73752887

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010819398.7A Pending CN112100983A (en) 2020-08-14 2020-08-14 Identification code used in system and generation method of identification code

Country Status (1)

Country Link
CN (1) CN112100983A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1159920A (en) * 1978-05-03 1984-01-03 Martin M. Atalla Method and apparatus for securing data transmissions
US20050271207A1 (en) * 2004-06-05 2005-12-08 Helmut Frey Method and system for chaotic digital signature, encryption, and authentication
US20070177433A1 (en) * 2005-09-07 2007-08-02 Jean-Francois Poirier Method and system for data security of recording media
CN101034985A (en) * 2007-02-09 2007-09-12 华中科技大学 Method and system for the anti-counterfeit of the mobile phone with the dynamic code
CN102801736A (en) * 2011-12-29 2012-11-28 公安部第三研究所 Generation and verification control method of network identity identification code in network electronic identity card
CN106846506A (en) * 2017-01-25 2017-06-13 腾讯科技(深圳)有限公司 A kind of method and system that Information Authentication is carried out based on message identification code
WO2018086515A1 (en) * 2016-11-08 2018-05-17 王栋 Verification construction method and device capable of offline verification of safety information tag
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
CN110177001A (en) * 2019-05-21 2019-08-27 广东联合电子服务股份有限公司 A kind of NFC circle deposit method, system and storage medium based on soft certificate
CN110210270A (en) * 2019-05-28 2019-09-06 中国电力科学研究院有限公司 Two-dimensional barcode information safety encryption and system and image in 2 D code analytic method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1159920A (en) * 1978-05-03 1984-01-03 Martin M. Atalla Method and apparatus for securing data transmissions
US20050271207A1 (en) * 2004-06-05 2005-12-08 Helmut Frey Method and system for chaotic digital signature, encryption, and authentication
US20070177433A1 (en) * 2005-09-07 2007-08-02 Jean-Francois Poirier Method and system for data security of recording media
CN101034985A (en) * 2007-02-09 2007-09-12 华中科技大学 Method and system for the anti-counterfeit of the mobile phone with the dynamic code
CN102801736A (en) * 2011-12-29 2012-11-28 公安部第三研究所 Generation and verification control method of network identity identification code in network electronic identity card
WO2018086515A1 (en) * 2016-11-08 2018-05-17 王栋 Verification construction method and device capable of offline verification of safety information tag
CN106846506A (en) * 2017-01-25 2017-06-13 腾讯科技(深圳)有限公司 A kind of method and system that Information Authentication is carried out based on message identification code
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
CN110177001A (en) * 2019-05-21 2019-08-27 广东联合电子服务股份有限公司 A kind of NFC circle deposit method, system and storage medium based on soft certificate
CN110210270A (en) * 2019-05-28 2019-09-06 中国电力科学研究院有限公司 Two-dimensional barcode information safety encryption and system and image in 2 D code analytic method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张军永;黄小庆;曹一家;朱玉生;何杰;: "输变电设备物联网的设备编码标识", 电力系统自动化, no. 09 *
范承啸;符浩军;张海勃;: "一种地名唯一标识码编码方法及应用模式", 测绘与空间地理信息, no. 10 *

Similar Documents

Publication Publication Date Title
CN109643354B (en) Encryption key exchange procedure using access means
KR102421956B1 (en) Information processing devices and information processing methods
US9280770B2 (en) Secure point of sale presentation of a barcode at an information handling system display
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
Park Security scheme for managing a large quantity of individual information in RFID environment
US20140258132A1 (en) System and method for secure electronic transaction
CA2399476A1 (en) Method and system providing in-line pre-production data preparation and personalization solutions for smart cards
CN104011760A (en) Method for generating one-time card number
US20200242597A1 (en) Auditing system using a trusted and cryptographically secure database
US11080368B2 (en) Digital rights management system and digital rights protection method
CN109583224A (en) A kind of privacy of user data processing method, device, equipment and system
CN113538004A (en) Asset management resume evidence accumulation system and method based on block chain
CN108399521A (en) Logistics Distribution Method, device, server and storage medium
CN108347629A (en) Video file processing method, device, server and storage medium
TWM590271U (en) Business process system
CN111666577B (en) Data decryption method, device, equipment and storage medium
CN113792307A (en) Seal management method and device and electronic equipment
US8099439B2 (en) System and method for generating a unified service model
CN112100983A (en) Identification code used in system and generation method of identification code
CN115186301B (en) Information processing method, information processing device, computer equipment and computer readable storage medium
CN110059081A (en) Data output method, device and the computer equipment shown based on data
CN108881106B (en) System and method for network electronic identity verification
CN111079187B (en) Smart card and file management method thereof
KR20110109073A (en) A method and apparatus for informing usage result for a card
CN108418826A (en) Video file processing method, device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination