WO2014029258A1 - 证件处理方法及终端 - Google Patents

证件处理方法及终端 Download PDF

Info

Publication number
WO2014029258A1
WO2014029258A1 PCT/CN2013/080366 CN2013080366W WO2014029258A1 WO 2014029258 A1 WO2014029258 A1 WO 2014029258A1 CN 2013080366 W CN2013080366 W CN 2013080366W WO 2014029258 A1 WO2014029258 A1 WO 2014029258A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
certificate information
encryption
database
encrypted file
Prior art date
Application number
PCT/CN2013/080366
Other languages
English (en)
French (fr)
Inventor
朱庆伟
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014029258A1 publication Critical patent/WO2014029258A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • the invention relates to the field of mobile communication technologies, in particular to a method for processing documents and a terminal for an ID card, a bank card and the like. Background technique
  • ID cards such as: ID cards, various credit cards, bank cards, medical insurance cards, various membership cards, meal cards, work cards, etc., countless; People may also need to carry mobile phones, laptops, dictionaries, USB flash drives, various electronic dongle passwords (KEY), etc. All of this is aggregated on one person, which will make people feel burdensome, and with the development of society and technology Innovation, the number of documents people carry is still increasing.
  • the main purpose of the embodiments of the present invention is to provide a method and a terminal for processing a document to at least implement effective management and use of various certificates.
  • an embodiment of the present invention provides a method for processing a document, including: collecting certificate information, encrypting the certificate information by using a predetermined encryption policy, and storing the file information in a database;
  • the certificate information in the database is managed and used based on an authentication policy corresponding to the encryption policy.
  • the collecting the credential information, and performing the predetermined encryption policy on the credential information Encrypted, stored in the database including:
  • the encrypted document information is classified and/or converted and stored in the database.
  • the authenticating policy based on the corresponding encryption policy manages the credential information in the database, including:
  • the document information for the corresponding authority is locally queried, edited, deleted, copied, and/or printed out.
  • the using according to the authentication policy corresponding to the encryption policy, the use of the document information in the database, including:
  • the certificate information of the corresponding authority is sent to the remote destination by using a preset interface and a format encryption.
  • the using including: Receiving, in a preset interface, a certificate information request message of a predetermined format sent by the remote destination; parsing the certificate information request message;
  • the authentication process corresponding to the encryption policy is started, and the first encrypted file of the credential information is obtained from the database;
  • the certificate information of the corresponding authority is encrypted and sent to the remote destination or the destination address specified by the remote destination.
  • the manner of receiving the credential information request message sent by the remote destination comprises at least one of the following: a short message, a multimedia message, and a wireless fidelity (WIFI) network.
  • a short message e.g., a short message
  • a multimedia message e.g., a multimedia message
  • WIFI wireless fidelity
  • the embodiment of the invention further provides a document processing terminal, comprising:
  • the cryptographic module is configured to collect the credential information, and the credential information is encrypted by a predetermined encryption policy and stored in a database;
  • a management module configured to manage and use the credential information in the database based on an authentication policy corresponding to the encryption policy.
  • the collecting and encrypting module comprises:
  • the collecting unit is configured to automatically collect image and text information of the document and/or image information of the user through the camera device; or, receive the document information manually input by the user;
  • An encryption unit configured to assign rights according to a user list, and/or according to a predetermined encryption password algorithm, and/or to multi-stage multi-path encryption, and/or to generate a first encrypted file in a manner of binding storage hardware
  • the document information is encrypted
  • the storage unit is configured to classify and/or convert the encrypted document information and store it in the database.
  • the management module includes:
  • the first authentication initiation unit is configured to start an authentication process corresponding to the encryption policy, Obtaining the first encrypted file of the document information in the library;
  • the first decryption unit is configured to decrypt the first encrypted file to obtain the certificate information of the corresponding authority
  • the processing unit is configured to locally query, edit, delete, copy, and/or print output the certificate information of the corresponding authority.
  • the management module includes:
  • a second authentication initiation unit configured to start an authentication process corresponding to the encryption policy, and obtain a first encrypted file of the certificate information from a database
  • a second decryption unit configured to decrypt the first encrypted file, and obtain the certificate information of the corresponding authority
  • a secondary encryption unit configured to generate a second encrypted file for the certificate information of the corresponding authority in a predetermined encryption manner; the second encrypted file is provided with a use right and a life cycle of the document information;
  • the first information output unit is configured to send, according to the second encrypted file, the certificate information of the corresponding authority to the remote destination by using a preset interface and a format.
  • the management module includes:
  • a receiving unit configured to receive, by using a preset interface, a certificate information request message in a predetermined format sent by the remote destination end;
  • a parsing unit configured to parse the credential information request message
  • a third authentication initiation unit configured to: after the parsing succeeds, start an authentication process corresponding to the encryption policy, and obtain a first encrypted file of the credential information from a database;
  • a third decryption unit configured to decrypt the first encrypted file, and obtain the certificate information of the corresponding authority
  • the second information output unit is configured to encrypt and send the certificate information of the corresponding authority to the remote destination or the destination address specified by the remote destination.
  • a method and a terminal for processing a document according to an embodiment of the present invention, by collecting a user's ID information, encrypting and storing the document information in a database by using a predetermined encryption policy, based on an authentication policy corresponding to the encryption policy, in a database
  • the management and use of the certificate information enables the effective management and use of many ID cards, bank cards and other documents by means of electronic storage, identification and management, so that users do not need to carry many documents with them, and at the same time It can be obtained and used at any time when needed, which is convenient for users to use documents.
  • FIG. 1 is a schematic flow chart of a method for processing a document according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a process of collecting certificate information in a document processing method according to an embodiment of the present invention, encrypting the certificate information by using a predetermined encryption policy, and storing the information in a database;
  • FIG. 3 is a schematic flowchart of managing the certificate information in the database based on an authentication policy corresponding to the encryption policy in the method for processing a certificate according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of using the certificate information in the database based on an authentication policy corresponding to the encryption policy in the method for processing a certificate according to an embodiment of the present invention
  • FIG. 5 is another schematic flowchart of using the certificate information in the database according to an authentication policy corresponding to the encryption policy in a method for processing a certificate according to an embodiment of the present invention
  • FIG. 6 is a schematic diagram of an embodiment of the present invention. Schematic diagram of the structure of the document processing terminal;
  • FIG. 7 is a schematic structural diagram of an acquisition encryption module in a document processing terminal according to an embodiment of the present invention
  • FIG. 8 is a schematic structural diagram of a management module in a certificate processing terminal according to an embodiment of the present invention
  • FIG. 9 is a document processing terminal according to an embodiment of the present invention
  • FIG. 10 is still another schematic structural diagram of a management module in a document processing terminal according to an embodiment of the present invention.
  • the user's ID information is collected, and the ID information is determined by a predetermined encryption policy.
  • the encryption is stored in the database, and the certificate information in the database is managed and used based on the authentication policy corresponding to the encryption policy, and the identity card, bank card, etc. of the user are realized by electronic storage, identification and management. Effective management and use of many documents.
  • an embodiment of the present invention provides a method for processing a document, including: Step S1, collecting certificate information, encrypting the certificate information by using a predetermined encryption policy, and storing the file information in a database;
  • the method of the embodiment can be applied to various mobile terminals, and software for certificate management is installed on the mobile terminal, thereby realizing effective management and use of ID card, bank card and other document information.
  • the collection of the document information can be completed by the automatic information collection system of the document information, or can be realized by manual input by the user.
  • the certificate information When collecting the certificate information, it is collected according to the type of the certificate, mainly including image collection and document content information collection. among them:
  • Document image collection which can include electronic image of the certificate (multi-dimensional image can be considered), multi-dimensional barcode image, personal multi-dimensional image, personal fingerprint image, etc., and the subsequent identification information can be adjusted according to the actual situation.
  • the collection of document content information can be obtained by automatically recognizing the image obtained above. For example, after automatic scanning, the system can automatically process and extract relevant document information, automatically generate relevant information content, and classify and encrypt it in the database.
  • the user can also input the relevant information manually, and the system performs classification and encryption preservation.
  • the pre-set encryption policy can be used to enforce the confidentiality of the document information.
  • the encryption method should be designed strictly, and software encryption, hardware encryption, software and hardware combination encryption authentication and Multi-path multi-stage encryption and other methods. among them:
  • Software encryption includes: encryption according to the user list, encryption password algorithm such as message digest algorithm 5 (MD5, Message Digest algorithm 5) encryption, phased encryption, etc.; hardware encryption includes selection of auxiliary binding according to the hardware supported by the terminal Hardware encryption, binding secure digital (SD, Secure Digital) card, binding User Identity Module (UIM) / Customer Identity Module (SIM, Subscriber Identity Module) card or other storage hardware; Terminals, you can choose to bind specific files to specific paths; for software and hardware combination encryption authentication methods, use SD card or UIM/SIM card and other detachable hardware, according to SD card and SIM card support, increase the corresponding hardware
  • the file read interface is bound to an encrypted authentication file (user can customize).
  • the terminal and the SD/SIM card can be saved and carried separately, and must be used together to greatly enhance the security of the system;
  • encryption authentication methods can be set at each entry such as system login, query, editing, and data information output, or encryption methods can be customized according to the importance of information, such as custom content usage rights and life. Cycles (time and number of uses) and automatic destruction strategies.
  • Step S2 Manage and use the certificate information in the database based on an authentication policy corresponding to the encryption policy.
  • the call can be invoked.
  • the corresponding certificate information in the database is processed accordingly.
  • the system needs to go through the corresponding authentication process when calling the certificate information.
  • the right or decryption process including login authentication, query authentication, file output (print, copy, transfer) authentication, authentication of the service life and number of files sent separately.
  • the authentication process is started, and the system is logged in through the encrypted password that is set.
  • the SD card hardware authentication is bound, and the system automatically reads the set authentication file; when the authentication succeeds, Enter the list of selected users, select the main administrator, and start the main administrator authentication step.
  • the next step is to enter the avatar identification or the fingerprint password identification; after the recognition is successful, the privilege content display list owned by the registrant is entered, and the related operations such as editing, deletion, and the like may be used, wherein editing and deletion may be performed.
  • the related operations such as editing, deletion, and the like may be used, wherein editing and deletion may be performed.
  • the authentication method including operations such as viewing, outputting, and printing is included.
  • the operation that is more important for output and the like will start the secondary authentication mode of the bound SD card content.
  • the encrypted output can be selected, and the file will be separately sent and sent according to the output situation, including limiting the lifetime and usage of the file.
  • step S1 may include: Step S11: automatically acquiring an image of the document and text information and/or image information of the user by the camera device; or receiving the user manually Entered document information;
  • Step S12 generating a first encrypted file pair of the document information according to the user list sub-rights, and/or according to a predetermined encrypted password algorithm, and/or by multi-stage multi-path encryption, and/or by binding storage hardware. Encryption;
  • step S13 the encrypted document information is classified and/or converted and stored in the database.
  • the image automatic identification module can be activated to obtain various document information points. Class save, for all text information and image information and related file information of the system, index and save by simple database management, and individual important information files can be individually encrypted.
  • each document information includes: text description information, original image information, self-generated conversion information ( According to the document type and usage scenario, including two-dimensional barcodes, three-dimensional scanning information, etc.).
  • the inspection confirmation and error correction steps can be added to confirm that the correct information is finally encrypted and stored in the database.
  • the information data can be converted according to the type of the document and the subsequent use. Generate corresponding multidimensional barcode information, multidimensional maps, and so on.
  • the managing the document information in the database according to the authentication policy corresponding to the encryption policy in the step S2 may include:
  • the document information of the corresponding authority is locally queried, edited, deleted, copied, and/or printed output processed.
  • the embodiment implements the management operations of querying, editing, deleting, copying, and printing output of the document information through the above solution.
  • the corresponding document information is invoked, the corresponding information is called according to the privilege of the registrant, and the certificate information is distributed according to the authority.
  • the editing, deletion, printing, projection, copying, etc. greatly improve the security of the user ID information.
  • the use of the identifier information in the database in the step S2 based on the authentication policy corresponding to the encryption policy may include: Step S24, starting the corresponding office Determining an authentication process of the encryption policy, obtaining a first encrypted file of the credential information from a database; Step S25: decrypting the first encrypted file to obtain the certificate information of the corresponding authority; Step S26, generating a second encrypted file for the certificate information of the corresponding authority in a predetermined encryption manner; setting the second encrypted file Have access to the information and life cycle of the document information;
  • Step S27 The certificate information of the corresponding authority is encrypted and sent to the remote destination by using a preset interface and format based on the second encrypted file.
  • the certificate information owner can remotely and automatically transmit the document information through the above solution.
  • the document user sends a bank card information to the user in the mobile terminal as an example.
  • the related information is queried.
  • the system After the user selects the encrypted transmission, the system generates the encrypted file information in a customized format, and encrypts the file.
  • the other party After receiving the bank card information, the other party uses the preset password (which is stipulated by the owner of the certificate, which can be modified according to the actual situation). The user can view the information using the bank card. After that, the file with 4 ⁇ line card information will automatically expire.
  • the use of the credential information in the database in the step S2 based on the authentication policy corresponding to the encryption policy may include: Step S28: The interface receives the certificate information request message in a predetermined format sent by the remote destination; the predetermined format may be a specific format or a fixed format.
  • Step S29 parsing the credential information request message
  • Step S30 after the parsing is successful, starting an authentication process corresponding to the encryption policy, and acquiring a first encrypted file of the credential information from a database;
  • step S31 the first encrypted file is decrypted, and the certificate information of the corresponding authority is obtained.
  • step S32 The certificate information of the corresponding authority is encrypted and sent to the remote destination or the destination address specified by the remote destination.
  • the remote automatic acquisition of the document information by the owner of the document information can be realized by the above solution.
  • the document user stores the target terminal A of the system is not around, and the owner can use any device that can send information to initiate the terminal B, and send the information in the agreed format to the target terminal A.
  • the information content format includes but is not limited to: Handshake password, ID name, required information field (such as number), address to be sent (may be to initiate terminal B, or other address, such as mailbox, etc.).
  • Information transmission methods include, but are not limited to, SMS, MMS, WIFI network, and the like.
  • the system target terminal A After receiving the information, the system target terminal A will automatically parse the information and automatically send the required content file encryption (preset encryption method) to the required address, which may be the originating terminal A, or other addresses, such as a mailbox. After the receiving file is used, it will automatically expire according to the set life cycle.
  • the required content file encryption preset encryption method
  • an embodiment of the present invention provides a document processing terminal, including: an acquisition encryption module 601 and a management module 602, where:
  • the collecting and encrypting module 601 is configured to collect the credential information, and encrypt the credential information by using a predetermined encryption policy, and store the information in the database;
  • the management module 602 is configured to manage and use the credential information in the database based on an authentication policy corresponding to the encryption policy.
  • the terminal can be a variety of mobile terminals, and software for performing document management is installed on the mobile terminal, thereby realizing effective management and use of ID card, bank card and other document information.
  • the collecting and encrypting module 601 collects the credential information, which may be completed by the automatic information collection system of the credential information, or may be implemented by manual input by the user.
  • the certificate information When collecting the certificate information, it is collected according to the type of the certificate, mainly including image collection and document content information collection. among them:
  • Document image collection which can include electronic image of the certificate (multi-dimensional image can be considered), multi-dimensional barcode image, personal multi-dimensional image, personal fingerprint image, etc., and the subsequent identification information can be adjusted according to the actual situation.
  • the collection of document content information can be obtained by automatically recognizing the image obtained above, such as After scanning and taking pictures, the system can automatically process and extract relevant document information, automatically generate relevant information content, and save the classification and encryption to the database.
  • the user can also input the relevant information manually, and the system performs classification and encryption preservation.
  • the pre-set encryption policy can be used to enforce the confidentiality of the document information.
  • the encryption method should be designed strictly, and software encryption, hardware encryption, software and hardware combination encryption authentication, and multi-path multi-stage encryption authentication can be adopted. among them:
  • Software encryption includes: encryption according to the user list, encryption password algorithm such as MD5 encryption, phased encryption, etc.;
  • Hardware encryption includes selecting the auxiliary binding hardware encryption, binding the SD card, binding the UIM/SIM card or other storage hardware according to the hardware supported by the terminal; of course, for the terminal without related hardware, you can choose to bind the specific file of the specific path. ;
  • detachable hardware such as SD card or UIM/SIM card
  • add the corresponding file reading interface on the hardware and bind an encrypted authentication file ( Users can customize).
  • the terminal and the SD/SIM card can be saved and carried separately, and must be used together to greatly enhance the security of the system;
  • encryption authentication methods can be set at each entry such as system login, query, editing, and data information output, or encryption methods can be customized according to the importance of information, such as custom content usage rights and life. Cycles (time and number of uses) and automatic destruction strategies.
  • the system automatically generates the encrypted file with the encryption binding method.
  • the management module 602 can call the corresponding document information in the database to perform corresponding processing.
  • the system needs to go through the corresponding authentication process when calling the certificate information.
  • each authentication or decryption process including the corresponding encryption setting in the user's use process including login authentication, query authentication, file output (printing, copying, transmission) authentication, and the file life of the separately sent file And the number of authentications, etc.
  • the authentication process is started, and the system is logged in through the encrypted password that is set.
  • the SD card hardware authentication is bound, and the system automatically reads the set authentication file; when the authentication succeeds, Enter the list of selected users, select the main administrator, and start the main administrator authentication step.
  • the next step is to enter the avatar identification or the fingerprint password identification; after the recognition is successful, the privilege content display list owned by the registrant is entered, and the related operations such as editing, deletion, and the like may be used, wherein editing and deletion may be performed.
  • the related operations such as editing, deletion, and the like may be used, wherein editing and deletion may be performed.
  • the authentication method including operations such as viewing, outputting, and printing is included.
  • the operation that is more important for output and the like will start the secondary authentication mode of the bound SD card content.
  • the encrypted output can be selected, and the file will be separately sent and sent according to the output situation, including limiting the lifetime and usage of the file.
  • the collection and encryption module 601 includes: an acquisition unit 6011, an encryption unit 6012, and a storage unit 6013, where:
  • the collecting unit 6011 is configured to automatically collect image and text information of the document and/or image information of the user through the camera terminal; or receive the document information manually input by the user;
  • Encryption unit 6012 configured to assign rights according to the user list, and/or according to a predetermined encryption password algorithm, and/or to multi-stage multi-path encryption, and/or to generate a first encrypted file pair in a manner of binding storage hardware.
  • the document information is encrypted;
  • the storage unit 6013 is configured to classify and/or convert the encrypted document information and store it in the database.
  • the automatic image recognition module can be activated to obtain various types of document information classification and storage. For all the text information and image information and related file information of the system, indexing and saving are performed by means of simple database management, and a single important information file can be Choose separate encryption.
  • each document information includes: text description information, original image information, self-generated conversion information ( According to the document type and usage scenario, including two-dimensional barcodes, three-dimensional scanning information, etc.).
  • the inspection confirmation and error correction steps can be added to confirm that the correct information is finally encrypted and stored in the database.
  • the information data is converted according to the type of the certificate and the subsequent use situation. Corresponding multidimensional barcode information, multidimensional maps, etc. can be generated.
  • the management module 602 includes: a first authentication starting unit 6021, a first decrypting unit 6022, and a processing unit 6023, where:
  • the first authentication initiation unit 6021 is configured to start an authentication process corresponding to the encryption policy, and obtain a first encrypted file of the credential information from a database;
  • the first decryption unit 6022 is configured to decrypt the first encrypted file to obtain the certificate information of the corresponding authority;
  • the processing unit 6023 is configured to locally query, edit, delete, copy, and/or print output the certificate information of the corresponding authority.
  • the embodiment implements the query, edit, delete, and complex of the document information by the above solution.
  • Management operations such as system and printout, when the corresponding document information is invoked, the corresponding information is called according to the privilege of the registrant, and the editing, deletion, printing, projection, copying, etc. of the document information are processed by the authority, thereby greatly improving The security of the user ID information.
  • the management module 602 includes: a second authentication activation unit 6024, a second decryption unit 6025, a secondary encryption unit 6026, and a first information output unit 6027, where:
  • the second authentication initiation unit 6024 is configured to start an authentication process corresponding to the encryption policy, and obtain a first encrypted file of the credential information from a database;
  • the second decryption unit 6025 is configured to decrypt the first encrypted file to obtain the certificate information of the corresponding authority
  • the secondary encryption unit 6026 is configured to generate a second encrypted file for the certificate information of the corresponding authority in a predetermined encryption manner; the second encrypted file is provided with a usage authority and a life cycle of the document information;
  • the first information output unit 6027 is configured to send the certificate information of the corresponding authority to the remote destination by using a preset interface and format based on the second encrypted file.
  • the certificate information owner can remotely and automatically transmit the document information through the above solution.
  • the document user sends a bank card information to the user in the mobile terminal as an example.
  • the related information is queried.
  • the system After the user selects the encrypted transmission, the system generates the encrypted file information in a customized format, and encrypts the file.
  • the other party After receiving the bank card information, the other party uses the preset password (which is stipulated by the owner of the certificate, which can be modified according to the actual situation). The user can view the information using the bank card. After that, the file with 4 ⁇ line card information will automatically expire.
  • the management module 602 includes: a receiving unit 6028, a parsing unit 6029, a third authentication starting unit 6030, a third decrypting unit 6031, and a second information output unit 6032, wherein:
  • the receiving unit 6028 is configured to receive, by using the preset interface, a document information request message of a predetermined format sent by the remote destination; the predetermined format may be a specific format or a fixed format.
  • the parsing unit 6029 is configured to parse the credential information request message
  • the third authentication initiation unit 6030 is configured to: after the parsing succeeds, start an authentication process corresponding to the encryption policy, and obtain a first encrypted file of the credential information from a database;
  • the third decryption unit 6031 is configured to decrypt the first encrypted file to obtain the certificate information of the corresponding authority;
  • the second information output unit 6032 is configured to encrypt and send the certificate information of the corresponding authority to the remote destination or the destination address specified by the remote destination.
  • the remote information acquisition of the document information by the owner of the document information can be realized by the above solution.
  • the document user stores the target terminal A of the system is not around, and the owner can use any device that can send information to initiate the terminal B, and send the information in the agreed format to the target terminal A.
  • the information content format includes but is not limited to: Handshake password, ID name, required information field (such as number), address to be sent (may be to initiate terminal B, or other address, such as mailbox, etc.).
  • Information transmission methods include, but are not limited to, SMS, MMS, WIFI network, and the like.
  • the system target terminal A After receiving the information, the system target terminal A will automatically parse the information and automatically send the required content file encryption (preset encryption method) to the required address, which may be the originating terminal A, or other addresses, such as a mailbox. After the receiving file is used, it will automatically expire according to the set life cycle.
  • the required content file encryption preset encryption method
  • the method for processing an example of the present invention and the terminal by collecting the user's ID information, encrypting the document information into a database by using a predetermined encryption policy, and performing the identification information in the database based on the authentication policy corresponding to the encryption policy.
  • Management and use in the way of electronic storage, identification and management, the effective management of the user's ID card, bank card and many other documents The use and use, so that users do not need to carry a large number of documents with them, and at the same time can be obtained and used at any time when needed, which provides convenience for users to use the documents.
  • the identification information of the user is encrypted and stored in the database by using a predetermined encryption policy, and the identification information of the database is managed and used according to the authentication policy corresponding to the encryption policy, thereby
  • the electronic storage, identification and management methods enable the effective management and use of many ID cards, bank cards and other documents, so that users do not need to carry a large number of documents with them, and at the same time can be obtained and used at any time when needed. It is convenient for users to use documents.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Databases & Information Systems (AREA)

Abstract

一种证件处理方法及终端,其方法包括:采集证件信息,对证件信息以预定的加密策略进行加密,存储至数据库中(S1);基于对应加密策略的鉴权策略,对数据库中的证件信息进行管理和使用(S2)。通过采集用户的证件信息,对证件信息以预定的加密策略进行加密存储至数据库中,基于对应所述加密策略的鉴权策略,对数据库中的证件信息进行管理和使用,从而以电子存储、识别及管理的方式,实现了对用户的身份证、银行卡等众多证件的有效管理和使用,使用户不需要随身携带众多的证件,同时又可以在需要使用时随时获取和使用,为用户使用证件提供了方便。

Description

证件处理方法及终端
技术领域
本发明涉及移动通讯技术领域, 尤其涉及一种身份证、 银行卡等证件 处理方法及终端。 背景技术
随着各种信息(IT, Information Technology )技术的发展以及人们生活 的多样性和品质的提高, 人们的生活也变的越来越丰富, 为了满足各种生 活需要, 绑定在人们身上的各种证件, 即身份标识号码(ID, Identity )卡 也在增多, 比如: 身份证、 各种信用卡、 银行卡、 医保卡、 各种会员卡、 饭卡、 工卡等等, 不计其数; 另外, 人们还可能需要携带手机、 笔记本、 词典、 U盘、 各种电子加密狗密码(KEY )等, 所有这一切汇总在一个人 身上, 将使人感到负担繁杂, 而随着社会的发展和技术革新, 人们携带的 证件数量还在增多。
此外, 众多的证件在使用时, 还常常会因为没有随身携带而无法处理 相关事宜, 因此, 有必要对繁多的证件进行有效管理和使用。 发明内容
本发明实施例的主要目的在于提供一种证件处理方法及终端, 以至少 实现对各种证件的有效管理和使用。
为了达到上述目的, 本发明实施例提出一种证件处理方法, 包括: 采集证件信息, 对所述证件信息以预定的加密策略进行加密, 存储至 数据库中;
基于对应所述加密策略的鉴权策略, 对所述数据库中的所述证件信息 进行管理和使用。
优选地, 所述采集证件信息, 对所述证件信息以预定的加密策略进行 加密, 存储至数据库中, 包括:
通过摄像装置自动采集证件的图像及文字信息和 /或用户的图像信息; 或者, 接收用户手动输入的证件信息;
根据使用人列表分权限, 和 /或根据预定的加密口令算法, 和 /或以多阶 段多路径加密, 和 /或以绑定存储硬件的方式生成第一加密文件对所述证件 信息进行加密;
对加密后的证件信息进行分类和 /或转换处理后存储至数据库中。
优选地, 所述基于对应加密策略的鉴权策略, 对所述数据库中的所述 证件信息进行管理, 包括:
启动对应所述加密策略的鉴权流程, 从数据库中获取所述证件信息的 第一加密文件;
对所述第一加密文件进行解密, 获取相应权限的证件信息;
对所述相应权限的证件信息在本地进行查询、 编辑、 删除、 复制和 /或 打印输出处理。
优选地, 所述基于对应所述加密策略的鉴权策略, 对所述数据库中的 所述证件信息进行使用, 包括:
启动对应所述加密策略的鉴权流程, 从数据库中获取所述证件信息的 第一加密文件;
对所述第一加密文件进行解密, 获取相应权限的证件信息;
以预定的加密方式为所述相应权限的证件信息生成第二加密文件; 所 述第二加密文件中设置有证件信息的使用权限和生命周期;
基于所述第二加密文件, 将所述相应权限的证件信息以预置接口和格 式加密发送至远程目的端。
优选地, 所述基于对应所述加密策略的鉴权策略, 对所述数据库中的 所述证件信息进行使用, 包括: 以预置接口接收远程目的端发送的预定格式的证件信息请求消息; 对所述证件信息请求消息进行解析;
当解析成功后, 启动对应所述加密策略的鉴权流程, 从数据库中获取 所述证件信息的第一加密文件;
对所述第一加密文件进行解密, 获取相应权限的证件信息;
将所述相应权限的证件信息加密发送至所述远程目的端或所述远程目 的端指定的目的地址。
优选地, 所述接收远程目的端发送的证件信息请求消息的方式至少包 括以下之一: 短信、 彩信和无线相容性认证 ( WIFI, Wireless Fidelity ) 网 络。
本发明实施例还提出一种证件处理终端, 包括:
采集加密模块, 配置为采集证件信息, 对所述证件信息以预定的加密 策略进行加密, 存储至数据库中;
管理模块, 配置为基于对应所述加密策略的鉴权策略, 对所述数据库 中的所述证件信息进行管理和使用。
优选地, 所述采集加密模块包括:
采集单元, 配置为通过摄像装置自动采集证件的图像及文字信息, 和 / 或用户的图像信息; 或者, 接收用户手动输入的证件信息;
加密单元, 配置为根据使用人列表分权限, 和 /或根据预定的加密口令 算法, 和 /或以多阶段多路径加密, 和 /或以绑定存储硬件的方式生成第一加 密文件对所述证件信息进行加密;
存储单元, 配置为对加密后的证件信息进行分类和 /或转换处理后存储 至数据库中。
优选地, 所述管理模块包括:
第一鉴权启动单元, 配置为启动对应所述加密策略的鉴权流程, 从数 据库中获取所述证件信息的第一加密文件;
第一解密单元, 配置为对所述第一加密文件进行解密, 获取相应权限 的证件信息;
处理单元, 配置为对所述相应权限的证件信息在本地进行查询、 编辑、 删除、 复制和 /或打印输出处理。
优选地, 所述管理模块包括:
第二鉴权启动单元, 配置为启动对应所述加密策略的鉴权流程, 从数 据库中获取所述证件信息的第一加密文件;
第二解密单元, 配置为对所述第一加密文件进行解密, 获取相应权限 的证件信息;
二次加密单元, 配置为以预定的加密方式为所述相应权限的证件信息 生成第二加密文件; 所述第二加密文件中设置有证件信息的使用权限和生 命周期;
第一信息输出单元, 配置为基于所述第二加密文件, 将所述相应权限 的证件信息以预置接口和格式加密发送至远程目的端。
优选地, 所述管理模块包括:
接收单元, 配置为以预置接口接收远程目的端发送的预定格式的证件 信息请求消息;
解析单元, 配置为对所述证件信息请求消息进行解析;
第三鉴权启动单元, 配置为当解析成功后, 启动对应所述加密策略的 鉴权流程, 从数据库中获取所述证件信息的第一加密文件;
第三解密单元, 配置为对所述第一加密文件进行解密, 获取相应权限 的证件信息;
第二信息输出单元, 配置为将所述相应权限的证件信息加密发送至所 述远程目的端或所述远程目的端指定的目的地址。 本发明实施例提出的一种证件处理方法及终端, 通过采集用户的证件 信息, 对证件信息以预定的加密策略进行加密存储至数据库中, 基于对应 所述加密策略的鉴权策略, 对数据库中的证件信息进行管理和使用, 从而 以电子存储、 识别及管理的方式, 实现了对用户的身份证、 银行卡等众多 证件的有效管理和使用, 使用户不需要随身携带众多的证件, 同时又可以 在需要使用时随时获取和使用, 为用户使用证件提供了方便。 附图说明
图 1是本发明实施例的证件处理方法的流程示意图;
图 2是本发明实施例的证件处理方法中采集证件信息, 对所述证件信 息以预定的加密策略进行加密, 存储至数据库中的流程示意图;
图 3是本发明实施例的证件处理方法中基于对应所述加密策略的鉴权 策略, 对所述数据库中的所述证件信息进行管理的流程示意图;
图 4是本发明实施例的证件处理方法中基于对应所述加密策略的鉴权 策略, 对所述数据库中的所述证件信息进行使用的一种流程示意图;
图 5是本发明实施例的证件处理方法中基于对应所述加密策略的鉴权 策略, 对所述数据库中的所述证件信息进行使用的另一种流程示意图; 图 6是本发明实施例的证件处理终端的结构示意图;
图 7是本发明实施例的证件处理终端中采集加密模块的结构示意图; 图 8是本发明实施例的证件处理终端中管理模块的一种结构示意图; 图 9是本发明实施例的证件处理终端中管理模块的另一种结构示意图; 图 10是本发明实施例的证件处理终端中管理模块的又一种结构示意 图。 具体实施方式
本发明实施例中, 采集用户的证件信息, 对证件信息以预定的加密策 略进行加密存储至数据库中, 基于对应所述加密策略的鉴权策略, 对数据 库中的证件信息进行管理和使用, 以电子存储、 识别及管理的方式, 实现 对用户的身份证、 银行卡等众多证件的有效管理和使用。
优选地, 如图 1所示, 本发明一实施例提出一种证件处理方法, 包括: 步骤 Sl, 采集证件信息,对所述证件信息以预定的加密策略进行加密, 存储至数据库中;
本实施例方法可以应用到各种移动终端, 在移动终端上安装进行证件 管理的软件, 实现对身份证、 银行卡等证件信息的有效管理和使用。
优选地, 首先, 采集证件信息, 可以通过证件信息自动采集系统来完 成, 也可以通过用户手动输入实现。
在采集证件信息时, 根据证件类型分别采集, 主要包括图像采集和证 件内容信息采集等。 其中:
证件图像采集, 可以包括证件电子图像(可以考虑多维图像)、 多维条 形码图像、 个人多维图像、 本人指紋图像等内容, 后续可以根据实际情况 对需要采集的证件信息进行调整。
证件内容信息采集, 可以通过上面获得的图像自动识别获得, 比如自 动扫描拍照后, 系统可自动处理提取相关证件信息, 自动生成相关信息内 容, 分类加密保存至数据库中。
用户也可以通过手动输入相关信息, 由系统进行分类加密保存。
为了后续进行有效的电子证件的使用, 信息采集需要根据使用认证系 统进行集成, 主要包括: 证件类型、 应用领域、 证件号码、 电子识别码等。
在对证件信息进行加密时, 可以采用预先设置的加密策略对证件信息 进行力口密。
由于本实施例证件信息涉及个人重要资料和信息, 因此, 其加密方法 设计应较为严格, 可以采用软件加密、 硬件加密、 软硬件组合加密鉴权和 多路径多阶段加密鉴权等方式。 其中:
软件加密包括: 根据使用人列表分权限加密、 加密口令算法例如消息 摘要算法第 5版( MD5, Message Digest algorithm 5 )加密、 分阶段加密等; 硬件加密包括根据终端支持的硬件情况, 选择辅助绑定硬件加密, 绑 定安全数字 ( SD, Secure Digital )卡,绑定用户识别模块( UIM, User Identity Module ) /客户识别模块( SIM, Subscriber Identity Module )卡或其他存储 硬件; 当然对于无相关硬件的终端, 可以选择绑定特定路径的特定文件; 对于软硬件组合加密鉴权方式, 则使用 SD卡或 UIM/SIM卡等可分离 硬件, 根据 SD卡和 SIM卡支持情况, 增加相应的硬件上文件读取接口, 绑定一个加密鉴权文件 (用户可以自定义)。 可以实现终端和 SD/SIM卡分 别保存携带, 而又必须共同使用, 极大地增强系统的安全性;
对应多路径多阶段加密鉴权, 可以在系统登录、 查询、 编辑和资料信 息输出等各个入口设置加密鉴权方式, 也可以根据信息的重要性自定义加 密方法, 比如自定义内容使用权限和生命周期 (分使用时间和次数) 以及 自动销毁策略等。
加密方式一旦完成设置, 系统会自动生成该加密绑定方式的加密文件。 步骤 S2, 基于对应所述加密策略的鉴权策略, 对所述数据库中的所述 证件信息进行管理和使用。
在采集的证件信息存储至数据库中后, 当用户需要修改、 删除或查询 证件信息, 或者需要使用证件信息 (比如用户没有随身携带身份证件而需 要身份证件复制信息的情况下)时, 则可以调用数据库中相应的证件信息, 进行相应处理。
由于证件信息被加密, 在调用证件信息时, 系统需要经过相应的鉴权 处理流程。
对于用户鉴权部分, 包括用户使用过程中对应加密设置情况的各个鉴 权或解密过程, 包括登录鉴权、 查询鉴权、 文件输出 (打印、 复制、 传输) 鉴权, 单独发送的文件使用寿命和次数的鉴权等。
首先, 启动鉴权流程, 通过开始设置的加密口令登录系统, 启动后根 据设置情况,会有绑定 SD卡硬件鉴权,系统自动去读取设置好的鉴权文件; 当鉴权成功后, 进入选择使用人列表, 选择主管理人, 启动主管理人鉴权 步骤。
当鉴权成功后, 进入下一步头像识别或指紋口令识别; 识别成功后进 入该登录人所拥有权限内容显示列表, 可以使用适合的查询编辑删减等相 关操作, 其中编辑和删减等操作可能根据预先设置情况还会有相应的鉴权 步骤。
在证件信息的使用鉴权过程中, 包括查看、 输出和打印等操作的鉴权 方式。其中,对于输出等比较重要的操作会启动绑定的 SD卡内容二次鉴权 方式。 当用户需要输出某个证件信息或文件时, 可以选择加密输出, 文件 将根据输出情形分别加密发送出去, 包括对文件进行生命期和使用次数的 限制。
更为优选地,如图 2所示,作为一种实施方式,上述步骤 S1可以包括: 步骤 Sll, 通过摄像装置自动采集证件的图像及文字信息和 /或用户的 图像信息; 或者, 接收用户手动输入的证件信息;
比如, 通过摄像头直接对证件进行扫描拍照, 并加密保存到数据库中。 步骤 S12, 根据使用人列表分权限, 和 /或根据预定的加密口令算法, 和 /或以多阶段多路径加密, 和 /或以绑定存储硬件的方式生成第一加密文件 对所述证件信息进行加密;
步骤 S13, 对加密后的证件信息进行分类和 /或转换处理后存储至数据 库中。
在保存证件信息时, 可以启动图像自动识别模块获取各种证件信息分 类保存, 对于该系统所有文字信息和图像信息和相关文件信息, 采用简单 数据库管理的方式进行索引和保存, 单个重要信息文件可以选择单独加密。
对于证件信息的分类, 可以采用身份证明系列、 银行卡系列、 信用卡 系列, 会员卡系列、 ID存储卡系列等进行分类; 每个证件信息包括: 文字 描述信息、 原始图像信息、 自生成转换信息(根据该证件类型和使用场景, 包含二维条形码, 三维扫描信息等)。
为了保证信息的正确性, 可以增加检查确认和纠错步骤, 确认正确的 信息最终加密保存到数据库中; 最后, 根据以上证件信息, 根据证件类型 和后续使用情况, 对信息数据进行转换处理, 可以生成相应的多维条形码 信息和多维图等。
如图 3所示, 作为一种实施方式, 所述步骤 S2中基于对应加密策略的 鉴权策略, 对所述数据库中的所述证件信息进行管理, 可以包括:
521 , 启动对应所述加密策略的鉴权流程, 从数据库中获取所述证件信 息的第一加密文件;
522, 对所述第一加密文件进行解密, 获取相应权限的证件信息;
523 , 对所述相应权限的证件信息在本地进行查询、 编辑、 删除、 复制 和 /或打印输出处理。
本实施方式通过上述方案实现了对证件信息的查询、 编辑、 删除、 复 制和打印输出等管理操作, 在调用相应证件信息时, 会根据登录人的权限 调用出相应信息, 并分权限进行证件信息的编辑、 删除、 打印、 投影、 复 制等处理, 从而极大的提高了用户证件信息的安全性。
如图 4所示, 作为一种实施方式, 所述步骤 S2中基于对应所述加密策 略的鉴权策略, 对所述数据库中的所述证件信息进行使用, 可以包括: 步骤 S24, 启动对应所述加密策略的鉴权流程,从数据库中获取所述证 件信息的第一加密文件; 步骤 S25, 对所述第一加密文件进行解密, 获取相应权限的证件信息; 步骤 S26,以预定的加密方式为所述相应权限的证件信息生成第二加密 文件; 所述第二加密文件中设置有证件信息的使用权限和生命周期;
步骤 S27,基于所述第二加密文件,将所述相应权限的证件信息以预置 接口和格式加密发送至远程目的端。
本实施方式通过上述方案, 可以实现证件信息所有人对证件信息进行 远程自动发送。
以证件使用人把移动终端中某个银行卡信息发送给使用人为例, 首先 通过登录鉴权后, 查询到相关信息, 用户选择加密发送后, 系统会采用自 定义格式生成加密文件信息, 加密文件中设置银行卡信息的使用寿命和访 问密码, 对方收到银行卡信息后, 使用预置的密码(该密码为证件所有人 约定, 可以根据实际情况修改)查看, 使用人查看使用银行卡信息完成后, 带有 4艮行卡信息的文件则自动失效。
如图 5所示, 作为另一种实施方式, 所述步骤 S2中基于对应所述加密 策略的鉴权策略, 对所述数据库中的所述证件信息进行使用, 可以包括: 步骤 S28,以预置接口接收远程目的端发送的预定格式的证件信息请求 消息; 该预定格式可以为某个特定格式或固定格式。
步骤 S29, 对所述证件信息请求消息进行解析;
步骤 S30, 当解析成功后, 启动对应所述加密策略的鉴权流程, 从数据 库中获取所述证件信息的第一加密文件;
步骤 S31, 对所述第一加密文件进行解密, 获取相应权限的证件信息; 步骤 S32,将所述相应权限的证件信息加密发送至所述远程目的端或所 述远程目的端指定的目的地址。
本实施方式通过上述方案, 可以实现证件信息所有人对证件信息的远 程自动获取。 例如, 证件使用人存储本系统的目标终端 A没有在身边, 所有人可以 使用任何可以发送信息的设备一发起终端 B, 发送约定格式的信息给本目 标终端 A, 信息内容格式包括但不限于: 握手密码、 证件名称、 需要信息 字段(如号码)、 需要发送的地址(可以是发起终端 B, 也可以是其他地址, 如邮箱等)。 信息传输方式包括但不限于短信、 彩信、 WIFI 网络等。
系统目标终端 A收到后会自动解析该信息, 自动把需要的内容文件加 密 (预置加密方法)发送到需要的地址, 该地址可以是发起终端 A, 也可 以是其他地址, 如邮箱等。 接收端文件使用后, 会根据设置的生命周期自 动失效。
如图 6所示, 本发明一实施例提出一种证件处理终端, 包括: 采集加 密模块 601及管理模块 602, 其中:
采集加密模块 601, 配置为采集证件信息,对所述证件信息以预定的加 密策略进行加密, 存储至数据库中;
管理模块 602, 配置为基于对应所述加密策略的鉴权策略,对所述数据 库中的所述证件信息进行管理和使用。
本实施例终端可以为各种移动终端, 在移动终端上安装进行证件管理 的软件, 实现对身份证、 银行卡等证件信息的有效管理和使用。
优选地, 首先, 采集加密模块 601 采集证件信息, 可以通过证件信息 自动采集系统来完成, 也可以通过用户手动输入实现。
在采集证件信息时, 根据证件类型分别采集, 主要包括图像采集和证 件内容信息采集等。 其中:
证件图像采集, 可以包括证件电子图像(可以考虑多维图像)、 多维条 形码图像、 个人多维图像、 本人指紋图像等内容, 后续可以根据实际情况 对需要采集的证件信息进行调整。
证件内容信息采集, 可以通过上面获得的图像自动识别获得, 比如自 动扫描拍照后, 系统可自动处理提取相关证件信息, 自动生成相关信息内 容, 分类加密保存至数据库中。
用户也可以通过手动输入相关信息, 由系统进行分类加密保存。
为了后续进行有效的电子证件的使用, 信息采集需要根据使用认证系 统进行集成, 主要包括: 证件类型、 应用领域、 证件号码、 电子识别码等。
在对证件信息进行加密时, 可以采用预先设置的加密策略对证件信息 进行力口密。
由于本实施例证件信息涉及个人重要资料和信息, 因此, 其加密方法 设计应较为严格, 可以采用软件加密、 硬件加密、 软硬件组合加密鉴权和 多路径多阶段加密鉴权等方式。 其中:
软件加密包括: 根据使用人列表分权限加密、 加密口令算法例如 MD5 加密、 分阶段加密等;
硬件加密包括根据终端支持的硬件情况, 选择辅助绑定硬件加密, 绑 定 SD卡, 绑定 UIM/SIM卡或其他存储硬件; 当然对于无相关硬件的终端, 可以选择绑定特定路径的特定文件;
对于软硬件组合加密鉴权方式, 则使用 SD卡或 UIM/SIM卡等可分离 硬件, 根据 SD卡和 SIM卡支持情况, 增加相应的硬件上文件读取接口, 绑定一个加密鉴权文件 (用户可以自定义)。 可以实现终端和 SD/SIM卡分 别保存携带, 而又必须共同使用, 极大地增强系统的安全性;
对应多路径多阶段加密鉴权, 可以在系统登录、 查询、 编辑和资料信 息输出等各个入口设置加密鉴权方式, 也可以根据信息的重要性自定义加 密方法, 比如自定义内容使用权限和生命周期 (分使用时间和次数) 以及 自动销毁策略等。
加密方式一旦完成设置, 系统会自动生成该加密绑定方式的加密文件。 在采集的证件信息存储至数据库中后, 当用户需要修改、 删除或查询 证件信息, 或者需要使用证件信息 (比如用户没有随身携带身份证件而需 要身份证件复制信息的情况下) 时, 则可以通过管理模块 602调用数据库 中相应的证件信息, 进行相应处理。
由于证件信息被加密, 在调用证件信息时, 系统需要经过相应的鉴权 处理流程。
对于用户鉴权部分, 包括用户使用过程中对应加密设置情况的各个鉴 权或解密过程, 包括登录鉴权、 查询鉴权、 文件输出 (打印、 复制、 传输) 鉴权, 单独发送的文件使用寿命和次数的鉴权等。
首先, 启动鉴权流程, 通过开始设置的加密口令登录系统, 启动后根 据设置情况,会有绑定 SD卡硬件鉴权,系统自动去读取设置好的鉴权文件; 当鉴权成功后, 进入选择使用人列表, 选择主管理人, 启动主管理人鉴权 步骤。
当鉴权成功后, 进入下一步头像识别或指紋口令识别; 识别成功后进 入该登录人所拥有权限内容显示列表, 可以使用适合的查询编辑删减等相 关操作, 其中编辑和删减等操作可能根据预先设置情况还会有相应的鉴权 步骤。
在证件信息的使用鉴权过程中, 包括查看、 输出和打印等操作的鉴权 方式。其中,对于输出等比较重要的操作会启动绑定的 SD卡内容二次鉴权 方式。 当用户需要输出某个证件信息或文件时, 可以选择加密输出, 文件 将根据输出情形分别加密发送出去, 包括对文件进行生命期和使用次数的 限制。
更为优选地, 如图 7所示, 作为一种实施方式, 所述采集加密模块 601 包括: 采集单元 6011、 加密单元 6012及存储单元 6013, 其中:
采集单元 6011,配置为通过摄像终端自动采集证件的图像及文字信息, 和 /或用户的图像信息; 或者, 接收用户手动输入的证件信息; 加密单元 6012, 配置为根据使用人列表分权限, 和 /或根据预定的加密 口令算法, 和 /或以多阶段多路径加密, 和 /或以绑定存储硬件的方式生成第 一加密文件对所述证件信息进行加密;
存储单元 6013, 配置为对加密后的证件信息进行分类和 /或转换处理后 存储至数据库中。
在保存证件信息时, 可以启动图像自动识别模块获取各种证件信息分 类保存, 对于该系统所有文字信息和图像信息和相关文件信息, 采用简单 数据库管理的方式进行索引和保存, 单个重要信息文件可以选择单独加密。
对于证件信息的分类, 可以采用身份证明系列、 银行卡系列、 信用卡 系列, 会员卡系列、 ID存储卡系列等进行分类; 每个证件信息包括: 文字 描述信息、 原始图像信息、 自生成转换信息(根据该证件类型和使用场景, 包含二维条形码, 三维扫描信息等)。
为了保证证件信息的正确性, 可以增加检查确认和纠错步骤, 确认正 确的信息最终加密保存到数据库中; 最后, 根据以上证件信息, 根据证件 类型和后续使用情况, 对信息数据进行转换处理, 可以生成相应的多维条 形码信息和多维图等。
如图 8所示, 作为一种实施方式, 所述管理模块 602包括: 第一鉴权 启动单元 6021、 第一解密单元 6022及处理单元 6023, 其中:
第一鉴权启动单元 6021, 配置为启动对应所述加密策略的鉴权流程, 从数据库中获取所述证件信息的第一加密文件;
第一解密单元 6022, 配置为对所述第一加密文件进行解密, 获取相应 权限的证件信息;
处理单元 6023, 配置为对所述相应权限的证件信息在本地进行查询、 编辑、 删除、 复制和 /或打印输出处理。
本实施方式通过上述方案实现了对证件信息的查询、 编辑、 删除、 复 制和打印输出等管理操作, 在调用相应证件信息时, 会根据登录人的权限 调用出相应信息, 并分权限进行证件信息的编辑、 删除、 打印、 投影、 复 制等处理, 从而极大的提高了用户证件信息的安全性。
如图 9所示, 作为另一种实施方式, 所述管理模块 602包括: 第二鉴 权启动单元 6024、 第二解密单元 6025、 二次加密单元 6026及第一信息输 出单元 6027, 其中:
第二鉴权启动单元 6024, 配置为启动对应所述加密策略的鉴权流程, 从数据库中获取所述证件信息的第一加密文件;
第二解密单元 6025, 配置为对所述第一加密文件进行解密, 获取相应 权限的证件信息;
二次加密单元 6026, 配置为以预定的加密方式为所述相应权限的证件 信息生成第二加密文件; 所述第二加密文件中设置有证件信息的使用权限 和生命周期;
第一信息输出单元 6027, 配置为基于所述第二加密文件, 将所述相应 权限的证件信息以预置接口和格式加密发送至远程目的端。
本实施方式通过上述方案, 可以实现证件信息所有人对证件信息进行 远程自动发送。
以证件使用人把移动终端中某个银行卡信息发送给使用人为例, 首先 通过登录鉴权后, 查询到相关信息, 用户选择加密发送后, 系统会采用自 定义格式生成加密文件信息, 加密文件中设置银行卡信息的使用寿命和访 问密码, 对方收到银行卡信息后, 使用预置的密码(该密码为证件所有人 约定, 可以根据实际情况修改)查看, 使用人查看使用银行卡信息完成后, 带有 4艮行卡信息的文件则自动失效。
如图 10所示, 作为再一种实施方式, 所述管理模块 602包括: 接收单 元 6028、 解析单元 6029、 第三鉴权启动单元 6030、 第三解密单元 6031及 第二信息输出单元 6032, 其中:
接收单元 6028, 配置为以预置接口接收远程目的端发送的预定格式的 证件信息请求消息; 该预定格式可以为某个特定格式或固定格式。
解析单元 6029, 配置为对所述证件信息请求消息进行解析;
第三鉴权启动单元 6030, 配置为当解析成功后, 启动对应所述加密策 略的鉴权流程, 从数据库中获取所述证件信息的第一加密文件;
第三解密单元 6031, 配置为对所述第一加密文件进行解密, 获取相应 权限的证件信息;
第二信息输出单元 6032, 配置为将所述相应权限的证件信息加密发送 至所述远程目的端或所述远程目的端指定的目的地址。
本实施方式通过上述方案, 可以实现证件信息所有人对证件信息的远 程自动获取。
例如, 证件使用人存储本系统的目标终端 A没有在身边, 所有人可以 使用任何可以发送信息的设备一发起终端 B, 发送约定格式的信息给本目 标终端 A, 信息内容格式包括但不限于: 握手密码、 证件名称、 需要信息 字段(如号码)、 需要发送的地址(可以是发起终端 B, 也可以是其他地址, 如邮箱等)。 信息传输方式包括但不限于短信、 彩信、 WIFI 网络等。
系统目标终端 A收到后会自动解析该信息, 自动把需要的内容文件加 密 (预置加密方法)发送到需要的地址, 该地址可以是发起终端 A, 也可 以是其他地址, 如邮箱等。 接收端文件使用后, 会根据设置的生命周期自 动失效。
本发明实施例证件处理方法及终端, 通过采集用户的证件信息, 对证 件信息以预定的加密策略进行加密存储至数据库中, 基于对应所述加密策 略的鉴权策略, 对数据库中的证件信息进行管理和使用, 从而以电子存储、 识别及管理的方式, 实现了对用户的身份证、 银行卡等众多证件的有效管 理和使用, 使用户不需要随身携带众多的证件, 同时又可以在需要使用时 随时获取和使用, 为用户使用证件提供了方便。
以上所述仅为本发明的优选实施例, 并非因此限制本发明的专利保护 范围, 凡是利用本发明说明书及附图内容所作的等效结构或流程变换, 或 直接或间接运用在其它相关的技术领域, 均同理包括在本发明的专利保护 范围内。 工业实用性
本发明实施例通过采集用户的证件信息, 对证件信息以预定的加密策 略进行加密存储至数据库中, 基于对应所述加密策略的鉴权策略, 对数据 库中的证件信息进行管理和使用, 从而以电子存储、 识别及管理的方式, 实现了对用户的身份证、 银行卡等众多证件的有效管理和使用, 使用户不 需要随身携带众多的证件, 同时又可以在需要使用时随时获取和使用, 为 用户使用证件提供了方便。

Claims

权利要求书
1、 一种证件处理方法, 包括:
采集证件信息, 对所述证件信息以预定的加密策略进行加密, 存储至 数据库中;
基于对应所述加密策略的鉴权策略, 对所述数据库中的所述证件信息 进行管理和使用。
2、 根据权利要求 1所述的方法, 其中, 所述采集证件信息, 对所述证 件信息以预定的加密策略进行加密, 存储至数据库中, 包括:
通过摄像装置自动采集证件的图像及文字信息和 /或用户的图像信息; 或者, 接收用户手动输入的证件信息;
根据使用人列表分权限, 和 /或根据预定的加密口令算法, 和 /或以多阶 段多路径加密, 和 /或以绑定存储硬件的方式生成第一加密文件对所述证件 信息进行加密;
对加密后的证件信息进行分类和 /或转换处理后存储至数据库中。
3、 根据权利要求 1所述的方法, 其中, 所述基于对应加密策略的鉴权 策略, 对所述数据库中的所述证件信息进行管理, 包括:
启动对应所述加密策略的鉴权流程, 从数据库中获取所述证件信息的 第一加密文件;
对所述第一加密文件进行解密, 获取相应权限的证件信息;
对所述相应权限的证件信息在本地进行查询、 编辑、 删除、 复制和 /或 打印输出处理。
4、 根据权利要求 1所述的方法, 其中, 所述基于对应所述加密策略的 鉴权策略, 对所述数据库中的所述证件信息进行使用, 包括:
启动对应所述加密策略的鉴权流程, 从数据库中获取所述证件信息的 第一加密文件; 对所述第一加密文件进行解密, 获取相应权限的证件信息; 以预定的加密方式为所述相应权限的证件信息生成第二加密文件; 所 述第二加密文件中设置有证件信息的使用权限和生命周期;
基于所述第二加密文件, 将所述相应权限的证件信息以预置接口和格 式加密发送至远程目的端。
5、 根据权利要求 1、 2或 3所述的方法, 其中, 所述基于对应所述加 密策略的鉴权策略, 对所述数据库中的所述证件信息进行使用, 包括: 以预置接口接收远程目的端发送的预定格式的证件信息请求消息; 对所述证件信息请求消息进行解析;
当解析成功后, 启动对应所述加密策略的鉴权流程, 从数据库中获取 所述证件信息的第一加密文件;
对所述第一加密文件进行解密, 获取相应权限的证件信息;
将所述相应权限的证件信息加密发送至所述远程目的端或所述远程目 的端指定的目的地址。
6、 根据权利要求 5所述的方法, 其中, 所述接收远程目的端发送的证 件信息请求消息的方式至少包括以下之一: 短信、 彩信和 WIFI网络。
7、 一种证件处理终端, 包括:
采集加密模块, 配置为采集证件信息, 对所述证件信息以预定的加密 策略进行加密, 存储至数据库中;
管理模块, 配置为基于对应所述加密策略的鉴权策略, 对所述数据库 中的所述证件信息进行管理和使用。
8、 根据权利要求 7所述的终端, 其中, 所述采集加密模块包括: 采集单元, 配置为通过摄像装置自动采集证件的图像及文字信息, 和 / 或用户的图像信息; 或者, 接收用户手动输入的证件信息;
加密单元, 配置为根据使用人列表分权限, 和 /或根据预定的加密口令 算法, 和 /或以多阶段多路径加密, 和 /或以绑定存储硬件的方式生成第一加 密文件对所述证件信息进行加密;
存储单元, 配置为对加密后的证件信息进行分类和 /或转换处理后存储 至数据库中。
9、 根据权利要求 7所述的终端, 其中, 所述管理模块包括:
第一鉴权启动单元, 配置为启动对应所述加密策略的鉴权流程, 从数 据库中获取所述证件信息的第一加密文件;
第一解密单元, 配置为对所述第一加密文件进行解密, 获取相应权限 的证件信息;
处理单元, 配置为对所述相应权限的证件信息在本地进行查询、 编辑、 删除、 复制和 /或打印输出处理。
10、 根据权利要求 7所述的终端, 其中, 所述管理模块包括: 第二鉴权启动单元, 配置为启动对应所述加密策略的鉴权流程, 从数 据库中获取所述证件信息的第一加密文件;
第二解密单元, 配置为对所述第一加密文件进行解密, 获取相应权限 的证件信息;
二次加密单元, 配置为以预定的加密方式为所述相应权限的证件信息 生成第二加密文件; 所述第二加密文件中设置有证件信息的使用权限和生 命周期;
第一信息输出单元, 配置为基于所述第二加密文件, 将所述相应权限 的证件信息以预置接口和格式加密发送至远程目的端。
11、 根据权利要求 7、 8或 9所述的终端, 其中, 所述管理模块包括: 接收单元, 配置为以预置接口接收远程目的端发送的预定格式的证件 信息请求消息;
解析单元, 配置为对所述证件信息请求消息进行解析; 第三鉴权启动单元, 配置为当解析成功后, 启动对应所述加密策略的 鉴权流程, 从数据库中获取所述证件信息的第一加密文件;
第三解密单元, 配置为对所述第一加密文件进行解密, 获取相应权限 的证件信息;
第二信息输出单元, 配置为将所述相应权限的证件信息加密发送至所 述远程目的端或所述远程目的端指定的目的地址。
PCT/CN2013/080366 2012-08-21 2013-07-29 证件处理方法及终端 WO2014029258A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210297934.7A CN103632102B (zh) 2012-08-21 2012-08-21 证件处理方法及终端
CN201210297934.7 2012-08-21

Publications (1)

Publication Number Publication Date
WO2014029258A1 true WO2014029258A1 (zh) 2014-02-27

Family

ID=50149406

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/080366 WO2014029258A1 (zh) 2012-08-21 2013-07-29 证件处理方法及终端

Country Status (2)

Country Link
CN (1) CN103632102B (zh)
WO (1) WO2014029258A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883260A (zh) * 2015-06-11 2015-09-02 深圳市易普森科技有限公司 证件信息处理和验证方法、处理终端及验证服务器

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104951704B (zh) * 2015-06-17 2018-07-13 广州市巽腾信息科技有限公司 一种图像信息采集装置及其加密方法
CN106096437A (zh) * 2016-06-02 2016-11-09 努比亚技术有限公司 一种证件卡片管理装置和方法
CN106997469A (zh) * 2017-03-16 2017-08-01 芜湖星途机器人科技有限公司 证件信息采集系统
CN109544089A (zh) * 2018-10-11 2019-03-29 平安科技(深圳)有限公司 基于图像识别建立电子证件的方法、装置和计算机设备
CN109660592B (zh) * 2018-11-05 2021-06-11 视联动力信息技术股份有限公司 一种基于视联网的信息获取方法和装置
CN109783674A (zh) * 2018-12-13 2019-05-21 平安普惠企业管理有限公司 图片识别方法、装置、系统、计算机设备及存储介质
CN112016063A (zh) * 2019-05-29 2020-12-01 福州云豆网络科技有限公司 一种利用des算法构建的银行数据加密方法
CN110795711A (zh) * 2019-11-12 2020-02-14 上海德启信息科技有限公司 身份信息识别方法、装置和设备
CN112949638B (zh) * 2019-11-26 2024-04-05 金毛豆科技发展(北京)有限公司 一种证件图像上传方法和装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1365063A (zh) * 2001-12-12 2002-08-21 湖南省公安厅户政服务中心 公民身份核查新方法
CN101101677A (zh) * 2007-07-13 2008-01-09 臧伟仲 门卫电子信息化自动登记管理设备及系统
CN102402664A (zh) * 2011-12-28 2012-04-04 用友软件股份有限公司 数据访问控制装置和数据访问控制方法
CN202383724U (zh) * 2011-12-30 2012-08-15 中国移动通信集团广东有限公司 业务办理一体机

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6507662B1 (en) * 1998-09-11 2003-01-14 Quid Technologies Llc Method and system for biometric recognition based on electric and/or magnetic properties
AUPQ273799A0 (en) * 1999-09-08 1999-09-30 Accudent Pty Ltd Document authentication method and apparatus
CN1329323A (zh) * 2001-07-31 2002-01-02 郭根龙 证件自动扫描识别与管理方法及其系统
CN101079694A (zh) * 2007-06-14 2007-11-28 上海众恒信息产业有限公司 一种证件制作系统及其方法
CN101510258B (zh) * 2009-01-16 2013-02-13 北京中星微电子有限公司 一种证件验证方法、系统及一种证件验证终端
CN101964079A (zh) * 2009-07-24 2011-02-02 中南融海信用担保有限公司 证件管理系统及方法
CN102156853B (zh) * 2010-02-11 2013-08-28 深圳鼎识科技有限公司 证件识读系统及证件识读方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1365063A (zh) * 2001-12-12 2002-08-21 湖南省公安厅户政服务中心 公民身份核查新方法
CN101101677A (zh) * 2007-07-13 2008-01-09 臧伟仲 门卫电子信息化自动登记管理设备及系统
CN102402664A (zh) * 2011-12-28 2012-04-04 用友软件股份有限公司 数据访问控制装置和数据访问控制方法
CN202383724U (zh) * 2011-12-30 2012-08-15 中国移动通信集团广东有限公司 业务办理一体机

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883260A (zh) * 2015-06-11 2015-09-02 深圳市易普森科技有限公司 证件信息处理和验证方法、处理终端及验证服务器

Also Published As

Publication number Publication date
CN103632102B (zh) 2018-01-12
CN103632102A (zh) 2014-03-12

Similar Documents

Publication Publication Date Title
WO2014029258A1 (zh) 证件处理方法及终端
CN104662870B (zh) 数据安全管理系统
US9740849B2 (en) Registration and authentication of computing devices using a digital skeleton key
US10771256B2 (en) Method for generating an electronic signature
CN112468506B (zh) 获取、下发电子证件的实现方法和装置
US20140181520A1 (en) Method using a single authentication device to authenticate a user to a service provider among a plurality of service providers and device for performing such a method
US20070136599A1 (en) Information processing apparatus and control method thereof
CN102761870B (zh) 一种终端身份验证和服务鉴权的方法、系统和终端
WO2012116543A1 (zh) 一种登录手机网上银行的方法和系统、银行服务器
TW201424324A (zh) 帳戶登入的方法及裝置
WO2012151785A1 (zh) 移动终端内置文件加密方法及移动终端
CN101359989A (zh) 生成安全数字照片的方法、装置及移动通信终端
WO2022252983A1 (zh) 一体化管理终端装置及一体化管理方法
CN104035733A (zh) 分布式打印管理
CN101409618B (zh) 一种多读者文档加密和解密方法
CN108415672B (zh) 输出方法与输出装置
CN111770081B (zh) 基于角色认证的大数据机密文件访问方法
WO2015090055A1 (zh) 一种数据存储、读取方法、装置及设备
US11010331B2 (en) Document management system
US11853102B2 (en) Remote control system, remote control method, and non-transitory information recording medium
JP2002366523A (ja) 可変認証情報を用いた資格認証方法
CN106209381B (zh) 一种照片加解密方法及其系统
CN106453273B (zh) 一种基于云技术的信息保险管理系统和方法
US20140003601A1 (en) Image data processing device and image data processing program
KR101467402B1 (ko) 네트워크 망을 통하여 수신된 팩스 데이터 관리 방법 및 그 방법을 이용한 관리장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13831262

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13831262

Country of ref document: EP

Kind code of ref document: A1