CN113541953A - Authentication method for traffic passenger transport information management system - Google Patents

Authentication method for traffic passenger transport information management system Download PDF

Info

Publication number
CN113541953A
CN113541953A CN202010316906.XA CN202010316906A CN113541953A CN 113541953 A CN113541953 A CN 113541953A CN 202010316906 A CN202010316906 A CN 202010316906A CN 113541953 A CN113541953 A CN 113541953A
Authority
CN
China
Prior art keywords
mobile terminal
authentication method
management module
information management
management system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010316906.XA
Other languages
Chinese (zh)
Inventor
李兵
陈琪
翁祁
冯英龙
毕建龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Dazhong Xiangyun Transport Management Co ltd
Original Assignee
Shanghai Dazhong Xiangyun Transport Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Dazhong Xiangyun Transport Management Co ltd filed Critical Shanghai Dazhong Xiangyun Transport Management Co ltd
Priority to CN202010316906.XA priority Critical patent/CN113541953A/en
Publication of CN113541953A publication Critical patent/CN113541953A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Abstract

The invention relates to an authentication method for a traffic passenger transport information management system, which comprises the following steps: appointing a random key; the mobile terminal acquires employee job numbers and current system time stamps, performs first sequencing and splicing, continues splicing random keys, and generates a first abstract through a hash algorithm; the mobile terminal uploads the employee job number, the current system timestamp and the first abstract to a background management module; and generating a second abstract according to the method of the mobile terminal connection information generation step, comparing the second abstract with the first abstract, judging an illegal request, refusing to access the mobile terminal by the background management module if the request is the illegal request, and accessing the mobile terminal by the background management module if the request is not the illegal request. Compared with the prior art, the method is efficient and safe, and can prevent the illegal access of a third party to the HR enterprise by using the interface opened to the small assistant.

Description

Authentication method for traffic passenger transport information management system
Technical Field
The invention relates to the field of traffic passenger transport, in particular to an authentication method for a traffic passenger transport information management system.
Background
At first, a commuter vehicle is managed by paper bills, and due to the fact that the paper bills are inconvenient to manage in a centralized mode, vehicle scheduling is unreasonable, the situations of overmans, vacant seats and the like exist, the paper bills are inconvenient to count, and therefore the system is very labor-consuming in operation.
At present, the traffic passenger transport information management system for the commuter vehicle service gradually changes to digitization and informatization, but the communication safety is still not guaranteed in the digitization and informatization processes.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide an authentication method for a traffic passenger transport information management system, which improves the communication safety of the traffic passenger transport information management system.
The purpose of the invention can be realized by the following technical scheme:
an authentication method for a traffic passenger transport information management system, wherein the traffic passenger transport information management system comprises a background management module and a mobile terminal, the background management module is accessed to the mobile terminal through the authentication method, and the authentication method comprises the following steps:
a random key generation step: the background management module and the mobile terminal appoint a random key;
a mobile terminal connection information generation step: the mobile terminal acquires employee job numbers and current system timestamps needing to access the background management module, performs first sequencing according to ASCII codes, splices the employee job numbers and the current system timestamps into a first character string, continues to splice an appointed random key to obtain a second character string, and generates a first abstract through a first hash algorithm according to the second character string;
uploading connection information of the mobile terminal: the mobile terminal uploads the employee job number, the current system timestamp and the first abstract to a background management module;
a background management module authentication step: and after the employee job number and the current system timestamp transmitted by the mobile terminal are subjected to first sequencing according to ASCII codes and are spliced into a third character string, continuously splicing an agreed random key to obtain a fourth character string, generating a second abstract through a first hash algorithm according to the fourth character string, comparing the second abstract with the first abstract, and judging an illegal request, wherein if the illegal request is an illegal request, the background management module refuses to access the mobile terminal, and otherwise, the background management module accesses the mobile terminal.
Further, the first hash algorithm is an MD5 algorithm.
Further, the step of generating the random key further comprises replacing the random key periodically.
Furthermore, the mobile terminal is a mobile terminal with an HR small assistant function, the traffic passenger information management system is provided with an HR small assistant interface for accessing the HR small assistant, and the background management module accesses the HR small assistant of the mobile terminal through the HR small assistant interface by adopting the authentication method.
Further, the authentication step of the background management module further comprises judging illegal requests based on the time stamp.
Further, the determining of the illegal request based on the timestamp specifically includes determining that the illegal request is an illegal request if the current system timestamp transmitted by the mobile terminal is after the current time and is more than a first time preset from the current time interval.
Further, the first time is 5 minutes.
Further, the determining of the illegal request based on the timestamp specifically includes determining that the illegal request is an illegal request if the current system timestamp transmitted by the mobile terminal is before the current time and is more than or equal to a second time preset at a time interval with the current time.
Further, the second time is half an hour.
Further, the authentication step of the background management module further comprises judging illegal requests based on employee numbers, wherein the judging of illegal requests based on employee numbers specifically comprises the steps of searching the employee numbers transmitted by the mobile terminal in the traffic passenger information management system, and judging illegal requests if the employee numbers are not searched.
Compared with the prior art, the invention has the following advantages:
(1) the authentication method for the traffic passenger transport information management system provided by the invention is efficient and safe, and can prevent the illegal access of a third party to a small assistant of an HR enterprise by using an interface opened to the third party.
(2) The invention ensures the reliable operation of the authentication algorithm by appointing a random key between the background management module and the mobile terminal, wherein the key is not public and is not used as parameter transmission, and a third party cannot know the key.
(3) The authentication method of the invention also judges the illegal request of the connection of the mobile terminal from two aspects of the time stamp and the employee work number, is considered comprehensively, and improves the reliability of the authentication method of the invention.
(4) The random key agreed by the background management module and the mobile terminal can be replaced regularly, so that the random key is further prevented from being cracked and leaked.
Drawings
Fig. 1 is a schematic flowchart of an authentication method according to embodiment 1 of the present invention;
fig. 2 is a flowchart illustrating an authentication method according to embodiment 2 of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and specific embodiments. The present embodiment is implemented on the premise of the technical solution of the present invention, and a detailed implementation manner and a specific operation process are given, but the scope of the present invention is not limited to the following embodiments.
Example 1
As shown in fig. 1, the present embodiment provides an authentication method for a transportation passenger information management system, where the transportation passenger information management system includes a background management module and a mobile terminal, the mobile terminal has a function of a small HR assistant, the background management module accesses the small HR assistant of the mobile terminal through the authentication method, and the authentication method includes the following steps:
random key generation step S1: the background management module and the mobile terminal appoint a random key; the random key is not public, is not transmitted as a parameter, and is configurable and can be replaced periodically.
Mobile terminal connection information generation step S2: the HR small assistant acquires job numbers jobnumber and current system timestamp random _ str of employees needing to access the background management module, performs first sequencing according to ASCII codes and splices the job numbers into a first character string, then continues to splice an agreed random key to obtain a second character string (for example, jobnumber is 001 and random _ str is 1560820185000 and key is FFEEBB), and generates a first abstract through a first hash algorithm according to the second character string; in this embodiment, the first hash algorithm is an MD5 algorithm.
A mobile terminal connection information uploading step S3: the HR small assistant uploads the employee job number, the current system timestamp and the first abstract to a background management module;
background management module authentication step S4: and after the employee job number and the current system timestamp transmitted by the HR small assistant are subjected to first sequencing according to ASCII codes and spliced into a third character string, continuously splicing an agreed random key to obtain a fourth character string, generating a second abstract through a first hash algorithm according to the fourth character string, comparing the second abstract with the first abstract, judging an illegal request, refusing to access the HR small assistant by a background management module if the illegal request is an illegal request, prompting illegal access, and accessing the HR small assistant by an unauthorized management module, or accessing the background management module into the HR small assistant.
The authentication step of the background management module also comprises the judgment of illegal requests based on the time stamp.
The specific judgment of the illegal request based on the timestamp is that if the current system timestamp transmitted by the HR small assistant is after the current time and is more than a first time preset at a current time interval, the request is judged to be an illegal request, the illegal request is prompted, and whether the time system time is correct is checked.
Specifically, the illegal request judgment based on the timestamp is that if the current system timestamp transmitted by the HR small assistant is before the current time and is more than a second time preset at a time interval with the current time, the request is judged to be an illegal request, the illegal request is prompted, and the request is expired.
The background management module authentication step also comprises the step of carrying out illegal request judgment based on the employee work number, wherein the illegal request judgment based on the employee work number specifically comprises the steps of searching the employee work number transmitted by the HR small assistant in the traffic passenger transport information management system, prompting the employee not to take a commuting vehicle if the employee is not found, passing authentication if corresponding passenger information is found, allowing access, using and positioning the same as the micro-communication public number login after the access, recording and inquiring the bus, evaluating the bus, feeding back the opinion, recharging and the like.
Example 2
As shown in fig. 2, this embodiment is substantially the same as embodiment 1, and the difference is the authentication step of the background management module, and in this embodiment, the authentication step of the background management module specifically includes:
1) if the time indicated by the time stamp is five minutes after the current time, an illegal request is prompted to check whether the time system time is correct. Otherwise, the next step is continued.
2) If the time indicated by the timestamp is half an hour before the current time, an illegal request is prompted and the request has expired. Otherwise, the next step is continued.
3) And after the employee job number and the current system timestamp transmitted by the HR small assistant are subjected to first sequencing according to ASCII codes and spliced into a third character string, continuously splicing an agreed random key to obtain a fourth character string, generating a second abstract through a first hash algorithm according to the fourth character string, comparing the second abstract with the first abstract transmitted by the HR small assistant, and prompting illegal access and unauthorized access if the second abstract is inconsistent with the first abstract, otherwise, continuing the next step.
4) And searching the employee job number transmitted by the HR small assistant, if the corresponding passenger information is not found, prompting the employee not to take the commuting bus, if the corresponding passenger information is found, authenticating the employee, allowing the access, positioning the employee after the access in the same way as the micro-message public number login, recording and inquiring the bus taking record, evaluating the bus taking, feeding back the opinion, recharging and the like.
The foregoing detailed description of the preferred embodiments of the invention has been presented. It should be understood that numerous modifications and variations could be devised by those skilled in the art in light of the present teachings without departing from the inventive concepts. Therefore, the technical solutions available to those skilled in the art through logic analysis, reasoning and limited experiments based on the prior art according to the concept of the present invention should be within the scope of protection defined by the claims.

Claims (10)

1. An authentication method for a traffic passenger transport information management system, wherein the traffic passenger transport information management system comprises a background management module and a mobile terminal, and is characterized in that the background management module is accessed to the mobile terminal through the authentication method, and the authentication method comprises the following steps:
a random key generation step: the background management module and the mobile terminal appoint a random key;
a mobile terminal connection information generation step: the mobile terminal acquires employee job numbers and current system timestamps needing to access the background management module, performs first sequencing according to ASCII codes, splices the employee job numbers and the current system timestamps into a first character string, continues to splice an appointed random key to obtain a second character string, and generates a first abstract through a first hash algorithm according to the second character string;
uploading connection information of the mobile terminal: the mobile terminal uploads the employee job number, the current system timestamp and the first abstract to a background management module;
a background management module authentication step: and after the employee job number and the current system timestamp transmitted by the mobile terminal are subjected to first sequencing according to ASCII codes and are spliced into a third character string, continuously splicing an agreed random key to obtain a fourth character string, generating a second abstract through a first hash algorithm according to the fourth character string, comparing the second abstract with the first abstract, and judging an illegal request, wherein if the illegal request is an illegal request, the background management module refuses to access the mobile terminal, and otherwise, the background management module accesses the mobile terminal.
2. The authentication method for the transportation passenger transportation information management system according to claim 1, wherein the first hash algorithm is an MD5 algorithm.
3. The authentication method for the transportation passenger transportation information management system as claimed in claim 1, wherein the step of generating the random key further comprises replacing the random key periodically.
4. The authentication method for the transportation passenger transportation information management system according to claim 1, wherein the mobile terminal is a mobile terminal with an HR small assistant function, the transportation passenger transportation information management system opens an HR small assistant interface for accessing the HR small assistant, and the background management module accesses the HR small assistant of the mobile terminal through the HR small assistant interface by using the authentication method.
5. The authentication method for the transportation passenger transportation information management system as claimed in claim 1, wherein the background management module authentication step further comprises making an illegal request judgment based on a timestamp.
6. The authentication method for the transportation passenger transportation information management system according to claim 5, wherein the illegal request judgment based on the timestamp is specifically that the illegal request is judged if the current system timestamp transmitted by the mobile terminal is after the current time and is more than a first time preset from the current time interval.
7. The authentication method for the transportation passenger information management system according to claim 6, wherein the first time is 5 minutes.
8. The authentication method for the transportation passenger transportation information management system according to claim 5, wherein the illegal request judgment based on the timestamp is specifically that the illegal request is judged if the current system timestamp transmitted by the mobile terminal is before the current time and is more than a second time preset from the current time interval.
9. The authentication method for the transportation passenger information management system according to claim 8, wherein the second time is half an hour.
10. The authentication method for the transportation passenger transport information management system according to claim 1, wherein the background management module authentication step further comprises performing illegal request judgment based on the employee serial number, the illegal request judgment based on the employee serial number specifically comprises searching the employee serial number transmitted by the mobile terminal in the transportation passenger transport information management system, and judging as the illegal request if the employee serial number is not searched.
CN202010316906.XA 2020-04-21 2020-04-21 Authentication method for traffic passenger transport information management system Pending CN113541953A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010316906.XA CN113541953A (en) 2020-04-21 2020-04-21 Authentication method for traffic passenger transport information management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010316906.XA CN113541953A (en) 2020-04-21 2020-04-21 Authentication method for traffic passenger transport information management system

Publications (1)

Publication Number Publication Date
CN113541953A true CN113541953A (en) 2021-10-22

Family

ID=78093815

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010316906.XA Pending CN113541953A (en) 2020-04-21 2020-04-21 Authentication method for traffic passenger transport information management system

Country Status (1)

Country Link
CN (1) CN113541953A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107493286A (en) * 2017-08-23 2017-12-19 杭州安恒信息技术有限公司 A kind of RPC remote procedure calling (PRC) methods based on secure authentication
WO2019019593A1 (en) * 2017-07-28 2019-01-31 深圳市光峰光电技术有限公司 Stateless communication security signature method, terminal and server end

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019019593A1 (en) * 2017-07-28 2019-01-31 深圳市光峰光电技术有限公司 Stateless communication security signature method, terminal and server end
CN107493286A (en) * 2017-08-23 2017-12-19 杭州安恒信息技术有限公司 A kind of RPC remote procedure calling (PRC) methods based on secure authentication

Similar Documents

Publication Publication Date Title
CN109766673B (en) Alliance type audio and video copyright block chain system and audio and video copyright chaining method
CN110111472B (en) Vehicle key control method and device
CN111783075A (en) Authority management method, device and medium based on secret key and electronic equipment
CN103107985A (en) Cloud terminal authentication method, system and device
CN107832602A (en) A kind of unified electronic seal system based on mark
CN113541953A (en) Authentication method for traffic passenger transport information management system
TW201638818A (en) Digital identity and authorization for machines with replaceable parts
KR20190109804A (en) Apparatus and method of car calling service in autonomous vehicle
CN117014197A (en) MSK system-based data exchange method and apparatus
CN105610855A (en) Method and device for login verification of cross-domain system
CN106992999A (en) A kind of cross-server data communication processing method
CN112347494A (en) Encryption reconciliation method and system based on block chain
CN107370605A (en) One kind is based on SHA256 challenge response certification bluetooth lock management methods
CN111050326A (en) Short message verification method, device, equipment and medium based on block chain
CN111400767B (en) Method for providing data storage outside distributed data pool
CN107046529B (en) Vehicle-road cooperative secure communication method based on hash encryption
CN114154965A (en) Collaborative law enforcement and case handling management method and system based on block chain
CN114240349A (en) Ecological environment supervision method and system based on block chain
CN114266080A (en) Data integrity protection method and system based on state cryptographic algorithm
CN107919917B (en) Method for preventing illegal ONU registration from getting online
CN113127930A (en) Charging data processing method, device and computer readable storage medium
CN112035891A (en) Decentralized electronic contract certification platform
CN111935252B (en) Information updating method based on block chain and server
US20240056297A1 (en) Establishing trust by a community of vehicles
CN117332395B (en) Data management method and system for data sharing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211022

RJ01 Rejection of invention patent application after publication