CN113541953A - Authentication method for traffic passenger transport information management system - Google Patents
Authentication method for traffic passenger transport information management system Download PDFInfo
- Publication number
- CN113541953A CN113541953A CN202010316906.XA CN202010316906A CN113541953A CN 113541953 A CN113541953 A CN 113541953A CN 202010316906 A CN202010316906 A CN 202010316906A CN 113541953 A CN113541953 A CN 113541953A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- authentication method
- management module
- information management
- management system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012163 sequencing technique Methods 0.000 claims abstract description 8
- 238000004891 communication Methods 0.000 description 3
- 238000005617 Overman rearrangement reaction Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Abstract
The invention relates to an authentication method for a traffic passenger transport information management system, which comprises the following steps: appointing a random key; the mobile terminal acquires employee job numbers and current system time stamps, performs first sequencing and splicing, continues splicing random keys, and generates a first abstract through a hash algorithm; the mobile terminal uploads the employee job number, the current system timestamp and the first abstract to a background management module; and generating a second abstract according to the method of the mobile terminal connection information generation step, comparing the second abstract with the first abstract, judging an illegal request, refusing to access the mobile terminal by the background management module if the request is the illegal request, and accessing the mobile terminal by the background management module if the request is not the illegal request. Compared with the prior art, the method is efficient and safe, and can prevent the illegal access of a third party to the HR enterprise by using the interface opened to the small assistant.
Description
Technical Field
The invention relates to the field of traffic passenger transport, in particular to an authentication method for a traffic passenger transport information management system.
Background
At first, a commuter vehicle is managed by paper bills, and due to the fact that the paper bills are inconvenient to manage in a centralized mode, vehicle scheduling is unreasonable, the situations of overmans, vacant seats and the like exist, the paper bills are inconvenient to count, and therefore the system is very labor-consuming in operation.
At present, the traffic passenger transport information management system for the commuter vehicle service gradually changes to digitization and informatization, but the communication safety is still not guaranteed in the digitization and informatization processes.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide an authentication method for a traffic passenger transport information management system, which improves the communication safety of the traffic passenger transport information management system.
The purpose of the invention can be realized by the following technical scheme:
an authentication method for a traffic passenger transport information management system, wherein the traffic passenger transport information management system comprises a background management module and a mobile terminal, the background management module is accessed to the mobile terminal through the authentication method, and the authentication method comprises the following steps:
a random key generation step: the background management module and the mobile terminal appoint a random key;
a mobile terminal connection information generation step: the mobile terminal acquires employee job numbers and current system timestamps needing to access the background management module, performs first sequencing according to ASCII codes, splices the employee job numbers and the current system timestamps into a first character string, continues to splice an appointed random key to obtain a second character string, and generates a first abstract through a first hash algorithm according to the second character string;
uploading connection information of the mobile terminal: the mobile terminal uploads the employee job number, the current system timestamp and the first abstract to a background management module;
a background management module authentication step: and after the employee job number and the current system timestamp transmitted by the mobile terminal are subjected to first sequencing according to ASCII codes and are spliced into a third character string, continuously splicing an agreed random key to obtain a fourth character string, generating a second abstract through a first hash algorithm according to the fourth character string, comparing the second abstract with the first abstract, and judging an illegal request, wherein if the illegal request is an illegal request, the background management module refuses to access the mobile terminal, and otherwise, the background management module accesses the mobile terminal.
Further, the first hash algorithm is an MD5 algorithm.
Further, the step of generating the random key further comprises replacing the random key periodically.
Furthermore, the mobile terminal is a mobile terminal with an HR small assistant function, the traffic passenger information management system is provided with an HR small assistant interface for accessing the HR small assistant, and the background management module accesses the HR small assistant of the mobile terminal through the HR small assistant interface by adopting the authentication method.
Further, the authentication step of the background management module further comprises judging illegal requests based on the time stamp.
Further, the determining of the illegal request based on the timestamp specifically includes determining that the illegal request is an illegal request if the current system timestamp transmitted by the mobile terminal is after the current time and is more than a first time preset from the current time interval.
Further, the first time is 5 minutes.
Further, the determining of the illegal request based on the timestamp specifically includes determining that the illegal request is an illegal request if the current system timestamp transmitted by the mobile terminal is before the current time and is more than or equal to a second time preset at a time interval with the current time.
Further, the second time is half an hour.
Further, the authentication step of the background management module further comprises judging illegal requests based on employee numbers, wherein the judging of illegal requests based on employee numbers specifically comprises the steps of searching the employee numbers transmitted by the mobile terminal in the traffic passenger information management system, and judging illegal requests if the employee numbers are not searched.
Compared with the prior art, the invention has the following advantages:
(1) the authentication method for the traffic passenger transport information management system provided by the invention is efficient and safe, and can prevent the illegal access of a third party to a small assistant of an HR enterprise by using an interface opened to the third party.
(2) The invention ensures the reliable operation of the authentication algorithm by appointing a random key between the background management module and the mobile terminal, wherein the key is not public and is not used as parameter transmission, and a third party cannot know the key.
(3) The authentication method of the invention also judges the illegal request of the connection of the mobile terminal from two aspects of the time stamp and the employee work number, is considered comprehensively, and improves the reliability of the authentication method of the invention.
(4) The random key agreed by the background management module and the mobile terminal can be replaced regularly, so that the random key is further prevented from being cracked and leaked.
Drawings
Fig. 1 is a schematic flowchart of an authentication method according to embodiment 1 of the present invention;
fig. 2 is a flowchart illustrating an authentication method according to embodiment 2 of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and specific embodiments. The present embodiment is implemented on the premise of the technical solution of the present invention, and a detailed implementation manner and a specific operation process are given, but the scope of the present invention is not limited to the following embodiments.
Example 1
As shown in fig. 1, the present embodiment provides an authentication method for a transportation passenger information management system, where the transportation passenger information management system includes a background management module and a mobile terminal, the mobile terminal has a function of a small HR assistant, the background management module accesses the small HR assistant of the mobile terminal through the authentication method, and the authentication method includes the following steps:
random key generation step S1: the background management module and the mobile terminal appoint a random key; the random key is not public, is not transmitted as a parameter, and is configurable and can be replaced periodically.
Mobile terminal connection information generation step S2: the HR small assistant acquires job numbers jobnumber and current system timestamp random _ str of employees needing to access the background management module, performs first sequencing according to ASCII codes and splices the job numbers into a first character string, then continues to splice an agreed random key to obtain a second character string (for example, jobnumber is 001 and random _ str is 1560820185000 and key is FFEEBB), and generates a first abstract through a first hash algorithm according to the second character string; in this embodiment, the first hash algorithm is an MD5 algorithm.
A mobile terminal connection information uploading step S3: the HR small assistant uploads the employee job number, the current system timestamp and the first abstract to a background management module;
background management module authentication step S4: and after the employee job number and the current system timestamp transmitted by the HR small assistant are subjected to first sequencing according to ASCII codes and spliced into a third character string, continuously splicing an agreed random key to obtain a fourth character string, generating a second abstract through a first hash algorithm according to the fourth character string, comparing the second abstract with the first abstract, judging an illegal request, refusing to access the HR small assistant by a background management module if the illegal request is an illegal request, prompting illegal access, and accessing the HR small assistant by an unauthorized management module, or accessing the background management module into the HR small assistant.
The authentication step of the background management module also comprises the judgment of illegal requests based on the time stamp.
The specific judgment of the illegal request based on the timestamp is that if the current system timestamp transmitted by the HR small assistant is after the current time and is more than a first time preset at a current time interval, the request is judged to be an illegal request, the illegal request is prompted, and whether the time system time is correct is checked.
Specifically, the illegal request judgment based on the timestamp is that if the current system timestamp transmitted by the HR small assistant is before the current time and is more than a second time preset at a time interval with the current time, the request is judged to be an illegal request, the illegal request is prompted, and the request is expired.
The background management module authentication step also comprises the step of carrying out illegal request judgment based on the employee work number, wherein the illegal request judgment based on the employee work number specifically comprises the steps of searching the employee work number transmitted by the HR small assistant in the traffic passenger transport information management system, prompting the employee not to take a commuting vehicle if the employee is not found, passing authentication if corresponding passenger information is found, allowing access, using and positioning the same as the micro-communication public number login after the access, recording and inquiring the bus, evaluating the bus, feeding back the opinion, recharging and the like.
Example 2
As shown in fig. 2, this embodiment is substantially the same as embodiment 1, and the difference is the authentication step of the background management module, and in this embodiment, the authentication step of the background management module specifically includes:
1) if the time indicated by the time stamp is five minutes after the current time, an illegal request is prompted to check whether the time system time is correct. Otherwise, the next step is continued.
2) If the time indicated by the timestamp is half an hour before the current time, an illegal request is prompted and the request has expired. Otherwise, the next step is continued.
3) And after the employee job number and the current system timestamp transmitted by the HR small assistant are subjected to first sequencing according to ASCII codes and spliced into a third character string, continuously splicing an agreed random key to obtain a fourth character string, generating a second abstract through a first hash algorithm according to the fourth character string, comparing the second abstract with the first abstract transmitted by the HR small assistant, and prompting illegal access and unauthorized access if the second abstract is inconsistent with the first abstract, otherwise, continuing the next step.
4) And searching the employee job number transmitted by the HR small assistant, if the corresponding passenger information is not found, prompting the employee not to take the commuting bus, if the corresponding passenger information is found, authenticating the employee, allowing the access, positioning the employee after the access in the same way as the micro-message public number login, recording and inquiring the bus taking record, evaluating the bus taking, feeding back the opinion, recharging and the like.
The foregoing detailed description of the preferred embodiments of the invention has been presented. It should be understood that numerous modifications and variations could be devised by those skilled in the art in light of the present teachings without departing from the inventive concepts. Therefore, the technical solutions available to those skilled in the art through logic analysis, reasoning and limited experiments based on the prior art according to the concept of the present invention should be within the scope of protection defined by the claims.
Claims (10)
1. An authentication method for a traffic passenger transport information management system, wherein the traffic passenger transport information management system comprises a background management module and a mobile terminal, and is characterized in that the background management module is accessed to the mobile terminal through the authentication method, and the authentication method comprises the following steps:
a random key generation step: the background management module and the mobile terminal appoint a random key;
a mobile terminal connection information generation step: the mobile terminal acquires employee job numbers and current system timestamps needing to access the background management module, performs first sequencing according to ASCII codes, splices the employee job numbers and the current system timestamps into a first character string, continues to splice an appointed random key to obtain a second character string, and generates a first abstract through a first hash algorithm according to the second character string;
uploading connection information of the mobile terminal: the mobile terminal uploads the employee job number, the current system timestamp and the first abstract to a background management module;
a background management module authentication step: and after the employee job number and the current system timestamp transmitted by the mobile terminal are subjected to first sequencing according to ASCII codes and are spliced into a third character string, continuously splicing an agreed random key to obtain a fourth character string, generating a second abstract through a first hash algorithm according to the fourth character string, comparing the second abstract with the first abstract, and judging an illegal request, wherein if the illegal request is an illegal request, the background management module refuses to access the mobile terminal, and otherwise, the background management module accesses the mobile terminal.
2. The authentication method for the transportation passenger transportation information management system according to claim 1, wherein the first hash algorithm is an MD5 algorithm.
3. The authentication method for the transportation passenger transportation information management system as claimed in claim 1, wherein the step of generating the random key further comprises replacing the random key periodically.
4. The authentication method for the transportation passenger transportation information management system according to claim 1, wherein the mobile terminal is a mobile terminal with an HR small assistant function, the transportation passenger transportation information management system opens an HR small assistant interface for accessing the HR small assistant, and the background management module accesses the HR small assistant of the mobile terminal through the HR small assistant interface by using the authentication method.
5. The authentication method for the transportation passenger transportation information management system as claimed in claim 1, wherein the background management module authentication step further comprises making an illegal request judgment based on a timestamp.
6. The authentication method for the transportation passenger transportation information management system according to claim 5, wherein the illegal request judgment based on the timestamp is specifically that the illegal request is judged if the current system timestamp transmitted by the mobile terminal is after the current time and is more than a first time preset from the current time interval.
7. The authentication method for the transportation passenger information management system according to claim 6, wherein the first time is 5 minutes.
8. The authentication method for the transportation passenger transportation information management system according to claim 5, wherein the illegal request judgment based on the timestamp is specifically that the illegal request is judged if the current system timestamp transmitted by the mobile terminal is before the current time and is more than a second time preset from the current time interval.
9. The authentication method for the transportation passenger information management system according to claim 8, wherein the second time is half an hour.
10. The authentication method for the transportation passenger transport information management system according to claim 1, wherein the background management module authentication step further comprises performing illegal request judgment based on the employee serial number, the illegal request judgment based on the employee serial number specifically comprises searching the employee serial number transmitted by the mobile terminal in the transportation passenger transport information management system, and judging as the illegal request if the employee serial number is not searched.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010316906.XA CN113541953A (en) | 2020-04-21 | 2020-04-21 | Authentication method for traffic passenger transport information management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010316906.XA CN113541953A (en) | 2020-04-21 | 2020-04-21 | Authentication method for traffic passenger transport information management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113541953A true CN113541953A (en) | 2021-10-22 |
Family
ID=78093815
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010316906.XA Pending CN113541953A (en) | 2020-04-21 | 2020-04-21 | Authentication method for traffic passenger transport information management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113541953A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107493286A (en) * | 2017-08-23 | 2017-12-19 | 杭州安恒信息技术有限公司 | A kind of RPC remote procedure calling (PRC) methods based on secure authentication |
WO2019019593A1 (en) * | 2017-07-28 | 2019-01-31 | 深圳市光峰光电技术有限公司 | Stateless communication security signature method, terminal and server end |
-
2020
- 2020-04-21 CN CN202010316906.XA patent/CN113541953A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019019593A1 (en) * | 2017-07-28 | 2019-01-31 | 深圳市光峰光电技术有限公司 | Stateless communication security signature method, terminal and server end |
CN107493286A (en) * | 2017-08-23 | 2017-12-19 | 杭州安恒信息技术有限公司 | A kind of RPC remote procedure calling (PRC) methods based on secure authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109766673B (en) | Alliance type audio and video copyright block chain system and audio and video copyright chaining method | |
CN110111472B (en) | Vehicle key control method and device | |
CN111783075A (en) | Authority management method, device and medium based on secret key and electronic equipment | |
CN103107985A (en) | Cloud terminal authentication method, system and device | |
CN107832602A (en) | A kind of unified electronic seal system based on mark | |
CN113541953A (en) | Authentication method for traffic passenger transport information management system | |
TW201638818A (en) | Digital identity and authorization for machines with replaceable parts | |
KR20190109804A (en) | Apparatus and method of car calling service in autonomous vehicle | |
CN117014197A (en) | MSK system-based data exchange method and apparatus | |
CN105610855A (en) | Method and device for login verification of cross-domain system | |
CN106992999A (en) | A kind of cross-server data communication processing method | |
CN112347494A (en) | Encryption reconciliation method and system based on block chain | |
CN107370605A (en) | One kind is based on SHA256 challenge response certification bluetooth lock management methods | |
CN111050326A (en) | Short message verification method, device, equipment and medium based on block chain | |
CN111400767B (en) | Method for providing data storage outside distributed data pool | |
CN107046529B (en) | Vehicle-road cooperative secure communication method based on hash encryption | |
CN114154965A (en) | Collaborative law enforcement and case handling management method and system based on block chain | |
CN114240349A (en) | Ecological environment supervision method and system based on block chain | |
CN114266080A (en) | Data integrity protection method and system based on state cryptographic algorithm | |
CN107919917B (en) | Method for preventing illegal ONU registration from getting online | |
CN113127930A (en) | Charging data processing method, device and computer readable storage medium | |
CN112035891A (en) | Decentralized electronic contract certification platform | |
CN111935252B (en) | Information updating method based on block chain and server | |
US20240056297A1 (en) | Establishing trust by a community of vehicles | |
CN117332395B (en) | Data management method and system for data sharing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211022 |
|
RJ01 | Rejection of invention patent application after publication |