[go: up one dir, main page]

CN104506322B - A kind of certification of exam inee's identity data compression encryption method and decryption method - Google Patents

A kind of certification of exam inee's identity data compression encryption method and decryption method Download PDF

Info

Publication number
CN104506322B
CN104506322B CN201410789352.XA CN201410789352A CN104506322B CN 104506322 B CN104506322 B CN 104506322B CN 201410789352 A CN201410789352 A CN 201410789352A CN 104506322 B CN104506322 B CN 104506322B
Authority
CN
China
Prior art keywords
character
string
key
character string
biological characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410789352.XA
Other languages
Chinese (zh)
Other versions
CN104506322A (en
Inventor
许�鹏
廖力
余亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU MORNING STAR TECHNOLOGY Co Ltd
Original Assignee
GUANGZHOU MORNING STAR TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU MORNING STAR TECHNOLOGY Co Ltd filed Critical GUANGZHOU MORNING STAR TECHNOLOGY Co Ltd
Priority to CN201410789352.XA priority Critical patent/CN104506322B/en
Publication of CN104506322A publication Critical patent/CN104506322A/en
Application granted granted Critical
Publication of CN104506322B publication Critical patent/CN104506322B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses a kind of certification of exam inee's identity data compression encryption method and decryption method, the compression encryption method includes:The biological characteristic of examinee is read, and generates multiple biological characteristic character strings;With reference to the length and the identification number of examinee of first key, the character of first key is one by one added in each biological characteristic character string it is encrypted;The total characteristic character string that all biological characteristic character strings are arranged to make up is compressed;With reference to the length of the second key, the character of the second key is one by one added in the total characteristic character string after compression it is encrypted;Total characteristic character string is changed into Quick Response Code.This method ciphering process is random, and Information Security is high, and examinee can be avoided to prepare information of practising fraud in advance, and certification of exam inee's identity data are compressed after encryption, data volume is not changed significantly, and arithmetic speed is fast, recognition effect preferably, can be widely applied in examination security supervision area.

Description

A kind of certification of exam inee's identity data compression encryption method and decryption method
Technical field
The present invention relates to data encrypting and deciphering field, more particularly to a kind of certification of exam inee's identity data compression encryption method and Decryption method.
Background technology
Increase year by year with the scale and quantity of various examinations, the importance of various examinations is also increasingly improved, it is corresponding Be that various examinee's cheatings are also increasing.Examinee's identity forgery technology is also increasingly advanced, causes one of cheating Phenomenon of praticing fraud it is more and more rampant, although examination management mechanism takes many kinds of measures and prevented, and all can not effectively prevent generation Examine phenomenon.Differentiate the authenticity of examinee's identity, with vital status, be related to the result, fairness and achievement of examination Authenticity.One of means for generally using are that the biological characteristics such as fingerprint, head portrait of examinee are gathered when entering oneself for the examination at present, take an examination into The sample feature that the collection in worksite feature of examinee is compared during field and is gathered before.Examinee's feature can be issued to equipment, can also make Accomplish on admission card for entrance examination, so as to carry out authentication to examinee according to biological characteristic in examination.But in the prior art, typically simultaneously These biological characteristics will not be encrypted, or encryption is excessively simple, Information Security is not high, is easily tampered;Or can root Biological characteristic is encrypted according to some existing AESs, but so encrypted data amount can be caused excessive, influence is known Other effect.In addition, also other methods being authenticated to examinee's identity, but also not to examinee's individual information and examinee Biological information is associated encryption, is easily replaced, and security is low.Generally speaking, identity is carried out to examinee in the prior art to recognize The method of card has that Information Security is low, computationally intensive or recognition effect.
The content of the invention
In order to solve above-mentioned technical problem, it is an object of the invention to provide a kind of certification of exam inee's identity data compression encryption Method.It is a further object of the present invention to provide a kind of decryption method of certification of exam inee's identity data compression encryption method.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of certification of exam inee's identity data compression encryption method, including:
S1, the biological characteristic for reading examinee, and generate multiple biological characteristic character strings;
S2, the length with reference to first key and examinee identification number, the character of first key are one by one added to each It is encrypted in biological characteristic character string;
S3, the total characteristic character string that all biological characteristic character strings are arranged to make up is compressed;
S4, the length with reference to the second key, the total characteristic character after compression is one by one added to by the character of the second key It is encrypted in string;
S5, total characteristic character string changed into Quick Response Code.
Further, the step S2, including:
S21, the default first key of reading are simultaneously obtained after its length N, the N number of numeral of random read take from the identification number of examinee Character, while the digit of N number of numerical character is combined to form random number character string in order;
S22, for each biological characteristic character string, according to N number of numerical character of reading, by the character of first key one by one Ground is added to the diverse location of the biological characteristic character string.
Further, the step S3, including:
S31, all biological characteristic character strings are arranged in order, and the position of last biological characteristic character string according to Total characteristic character string is constituted after secondary addition separator and random number character string;
S32, total characteristic character string is compressed.
Further, the step S4, including:
S41, default second key of reading are simultaneously obtained after its length M, from last of the total characteristic character string after compression Position starts, and searches in order and reads M numerical character, and M numerical character of reading is incremented by one by one according to reading order 10, finally obtain M numeral;
S42, according to numerical order from big to small, the character of the second key is from left to right one by one added to after compression Total characteristic character string in M digital corresponding character positions.
Further, the S22, including:
S221, for each biological characteristic character string, according to N number of numerical character of reading, calculated using following formula and obtain N number of Encryption numeral:
jmnum=i * 100 + (zwnum-1) *10 + num
In above formula, jmnum represents encryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word The value of symbol, zwnum represents the sequence number of biological characteristic character string;
S222, according to numerical order from big to small, the character of first key is one by one added to the life from right to left With N number of digital corresponding character position of encryption in thing feature string.
The present invention solves another technical scheme for being used of its technical problem:
Using a kind of certification of exam inee's identity data decryption method of described compression encryption method, including:
DS1, reading Quick Response Code simultaneously parse acquisition ciphertext feature string;
DS2, the length with reference to the second key, one by one verify and delete added in ciphertext feature string second close The character of key;
DS3, ciphertext feature string decompressed;
DS4, for each biological characteristic character string in ciphertext feature string, one by one verify and to delete the biology special Levy the character for the first key added in character string;
DS5, all biological characteristic character strings are converted into corresponding biological information.
Further, the step DS2, including:
DS21, default second key of reading are simultaneously obtained after its length M, are opened from last position of ciphertext feature string Begin, search in order and read M numerical character, and M numerical character of reading is incremented by 10 one by one according to reading order, most M numeral is obtained afterwards;
DS22, according to numerical order from small to large, gradually read in ciphertext feature string with M digital corresponding words The character on position is accorded with, while gradually being read after the character of the second key according to the order turned left from the right side, whether two characters are judged Unanimously, if so, then deleting the character of ciphertext feature string and continuing executing with step DS23, conversely, carrying out abnormality alarming simultaneously Terminate;
Whether DS23, judgment step DS22 execution number of times are less than M, and step DS22 is performed if so, then returning, otherwise knot Beam.
Further, the step DS3, it is specially:
Ciphertext feature string is decompressed, and then obtains the separator in the ciphertext feature string after decompression Afterwards, all characters behind separator are obtained and are used as random number character string.
Further, the step DS4, including:
DS41, each character to random number character string, read the numeric word of correspondence position in the identification number of examinee one by one Symbol;
DS42, for each biological characteristic character string in ciphertext feature string, according to all numerical characters of reading, The character for the first key added in the biological characteristic character string is verified and deleted one by one.
Further, the step DS42, including:
DS421, for each biological characteristic character string in ciphertext feature string, according to N number of numerical character of reading, Calculated using following formula and obtain N number of decryption numeral:
jm_num= i * 100 + (zwnum-1) *10 + num
In above formula, jm_num represents decryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word The value of symbol, zwnum represents the sequence number of biological characteristic character string;
DS422, according to numerical order from small to large, gradually read corresponding with N number of numeral in biological characteristic character string Character on character position, while from left to right gradually reading after the character of first key, judges whether two characters are consistent, if It is then to delete the character of biological characteristic character string and continue executing with step DS423, conversely, carrying out abnormality alarming and terminating;
Whether DS423, judgment step DS422 execution number of times are less than N, if so, then return execution step DS422, on the contrary Terminate.
The beneficial effects of the invention are as follows:A kind of certification of exam inee's identity data compression encryption method of the present invention, including:S1、 The biological characteristic of examinee is read, and generates multiple biological characteristic character strings;S2, the length with reference to first key and examinee mark Number, the character of first key is one by one added in each biological characteristic character string it is encrypted;S3, to all biologies The total characteristic character string that feature string is arranged to make up is compressed;S4, the length with reference to the second key, by the word of the second key Symbol is one by one added in the total characteristic character string after compression, and it is encrypted;S5, total characteristic character string changed into two dimension Code.This method ciphering process is random, and Information Security is high, and examinee can be avoided to prepare information of practising fraud in advance, and to examinee's identity Authentication data is compressed after encryption, and data volume is not changed significantly, and arithmetic speed is fast, and recognition effect is preferable.
The present invention another beneficial effect be:A kind of certification of exam inee's identity data decryption method of the present invention, including:DS1、 Read Quick Response Code and parse acquisition ciphertext feature string;DS2, the length with reference to the second key, one by one verify and delete close The character of the second key added in literary feature string;DS3, ciphertext feature string decompressed;DS4, it is directed to Each biological characteristic character string in ciphertext feature string, one by one verifies and deletes and added in the biological characteristic character string First key character;DS5, all biological characteristic character strings are converted into corresponding biological information.This method has Personalized difference, Information Security is high, can effectively verify the legitimacy of the conscientious data of examinee's identity, and data volume is small, computing Speed is fast, and recognition effect is good.
Brief description of the drawings
The invention will be further described with reference to the accompanying drawings and examples.
Fig. 1 is a kind of flow chart of certification of exam inee's identity data compression encryption method of the present invention;
Fig. 2 is a kind of flow chart of certification of exam inee's identity data decryption method of the present invention;
Fig. 3 is a kind of flow signal of a specific embodiment of certification of exam inee's identity data compression encryption method of the present invention Figure;
Fig. 4 is a kind of schematic flow sheet of a specific embodiment of certification of exam inee's identity data decryption method of the present invention.
Embodiment
Reference picture 1, the invention provides a kind of certification of exam inee's identity data compression encryption method, including:
S1, the biological characteristic for reading examinee, and generate multiple biological characteristic character strings;
S2, the length with reference to first key and examinee identification number, the character of first key are one by one added to each It is encrypted in biological characteristic character string;
S3, the total characteristic character string that all biological characteristic character strings are arranged to make up is compressed;
S4, the length with reference to the second key, the total characteristic character after compression is one by one added to by the character of the second key It is encrypted in string;
S5, total characteristic character string changed into Quick Response Code.
It is further used as preferred embodiment, the step S2, including:
S21, the default first key of reading are simultaneously obtained after its length N, the N number of numeral of random read take from the identification number of examinee Character, while the digit of N number of numerical character is combined to form random number character string in order;
S22, for each biological characteristic character string, according to N number of numerical character of reading, by the character of first key one by one Ground is added to the diverse location of the biological characteristic character string.
It is further used as preferred embodiment, the step S3, including:
S31, all biological characteristic character strings are arranged in order, and the position of last biological characteristic character string according to Total characteristic character string is constituted after secondary addition separator and random number character string;
S32, total characteristic character string is compressed.
It is further used as preferred embodiment, the step S4, including:
S41, default second key of reading are simultaneously obtained after its length M, from last of the total characteristic character string after compression Position starts, and searches in order and reads M numerical character, and M numerical character of reading is incremented by one by one according to reading order 10, finally obtain M numeral;
S42, according to numerical order from big to small, the character of the second key is from left to right one by one added to after compression Total characteristic character string in M digital corresponding character positions.
It is further used as preferred embodiment, the S22, including:
S221, for each biological characteristic character string, according to N number of numerical character of reading, calculated using following formula and obtain N number of Encryption numeral:
jmnum=i * 100 + (zwnum-1) *10 + num
In above formula, jmnum represents encryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word The value of symbol, zwnum represents the sequence number of biological characteristic character string;
S222, according to numerical order from big to small, the character of first key is one by one added to the life from right to left With N number of digital corresponding character position of encryption in thing feature string.
Reference picture 2, present invention also offers a kind of certification of exam inee's identity data solution using described compression encryption method Decryption method, including:
DS1, reading Quick Response Code simultaneously parse acquisition ciphertext feature string;
DS2, the length with reference to the second key, one by one verify and delete added in ciphertext feature string second close The character of key;
DS3, ciphertext feature string decompressed;
DS4, for each biological characteristic character string in ciphertext feature string, one by one verify and to delete the biology special Levy the character for the first key added in character string;
DS5, all biological characteristic character strings are converted into corresponding biological information.
It is further used as preferred embodiment, the step DS2, including:
DS21, default second key of reading are simultaneously obtained after its length M, are opened from last position of ciphertext feature string Begin, search in order and read M numerical character, and M numerical character of reading is incremented by 10 one by one according to reading order, most M numeral is obtained afterwards;
DS22, according to numerical order from small to large, gradually read in ciphertext feature string with M digital corresponding words The character on position is accorded with, while gradually being read after the character of the second key according to the order turned left from the right side, whether two characters are judged Unanimously, if so, then deleting the character of ciphertext feature string and continuing executing with step DS23, conversely, carrying out abnormality alarming simultaneously Terminate;
Whether DS23, judgment step DS22 execution number of times are less than M, and step DS22 is performed if so, then returning, otherwise knot Beam.
It is further used as preferred embodiment, the step DS3, it is specially:
Ciphertext feature string is decompressed, and then obtains the separator in the ciphertext feature string after decompression Afterwards, all characters behind separator are obtained and are used as random number character string.
It is further used as preferred embodiment, the step DS4, including:
DS41, each character to random number character string, read the numeric word of correspondence position in the identification number of examinee one by one Symbol;
DS42, for each biological characteristic character string in ciphertext feature string, according to all numerical characters of reading, The character for the first key added in the biological characteristic character string is verified and deleted one by one.
It is further used as preferred embodiment, the step DS42, including:
DS421, for each biological characteristic character string in ciphertext feature string, according to N number of numerical character of reading, Calculated using following formula and obtain N number of decryption numeral:
jm_num= i * 100 + (zwnum-1) *10 + num
In above formula, jm_num represents decryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word The value of symbol, zwnum represents the sequence number of biological characteristic character string;
DS422, according to numerical order from small to large, gradually read corresponding with N number of numeral in biological characteristic character string Character on character position, while from left to right gradually reading after the character of first key, judges whether two characters are consistent, if It is then to delete the character of biological characteristic character string and continue executing with step DS423, conversely, carrying out abnormality alarming and terminating;
Whether DS423, judgment step DS422 execution number of times are less than N, if so, then return execution step DS422, on the contrary Terminate.
With reference to specific embodiment, the present invention will be further described.
Embodiment one
Reference picture 1, a kind of certification of exam inee's identity data compression encryption method, including:
S1, the biological characteristic for reading examinee, and generate multiple biological characteristic character strings.
S2, the length with reference to first key and examinee identification number, the character of first key are one by one added to each It is encrypted in biological characteristic character string;Step S1 and S2 order can be exchanged, and the implementation of this method is not influenceed;
Specifically, step S2 includes:
S21, the default first key of reading are simultaneously obtained after its length N, the N number of numeral of random read take from the identification number of examinee Character, while the digit of N number of numerical character is combined to form random number character string in order;
S22, for each biological characteristic character string, according to N number of numerical character of reading, by the character of first key one by one Ground is added to the diverse location of the biological characteristic character string;
It is preferred that, step S22 is that the character of first key is one by one added into each biology by step S221 ~ S222 Feature string:
S221, for each biological characteristic character string, according to N number of numerical character of reading, calculated using following formula and obtain N number of Encryption numeral:
jmnum=i * 100 + (zwnum-1) *10 + num
In above formula, jmnum represents encryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word The value of symbol, zwnum represents the sequence number of biological characteristic character string;
S222, according to numerical order from big to small, the character of first key is one by one added to the life from right to left With N number of digital corresponding character position of encryption in thing feature string.
S3, the total characteristic character string that all biological characteristic character strings are arranged to make up is compressed;
Specifically, step S3 includes S31 ~ S32:
S31, all biological characteristic character strings are arranged in order, and the position of last biological characteristic character string according to Total characteristic character string is constituted after secondary addition separator and random number character string;Separator can be the symbol such as comma, fullstop, branch Number, compartmentation is played together with random number character string;
S32, total characteristic character string is compressed.
S4, the length with reference to the second key, the total characteristic character after compression is one by one added to by the character of the second key It is encrypted in string;
Specifically, step S4 includes S41 ~ S42:
S41, default second key of reading are simultaneously obtained after its length M, from last of the total characteristic character string after compression Position starts, and searches in order and reads M numerical character, and M numerical character of reading is incremented by one by one according to reading order 10, finally obtain M numeral;
S42, according to numerical order from big to small, the character of the second key is from left to right one by one added to after compression Total characteristic character string in M digital corresponding character positions.
S5, total characteristic character string changed into Quick Response Code.
M, N are positive integer.
Biological characteristic alleged by the present invention can be fingerprint characteristic, characteristics of image etc., and preferably safe fingerprint is special Levy.
This method is by the way that the character of first key to be added to the diverse location of biological characteristic character string one by one, and by The character of two keys is added to the diverse location of the total characteristic character string after compression, realizes that the process re-encrypted-is compressed-in encryption, Ciphering process is random, and in advance without precognition, and the biological information of encryption data and examinee are closely related, poor with individuation Different, difficulty is replaced, and Information Security is high, and examinee can be avoided to prepare information of practising fraud in advance.And this compression encryption method is to examinee Identification authentication data is compressed after encryption, and data volume is not changed significantly, and arithmetic speed is fast, and recognition effect is preferable.
Embodiment two
Reference picture 2, using a kind of certification of exam inee's identity data decryption method of the compression encryption method described in embodiment one, Including:
DS1, reading Quick Response Code, and then the two-dimensional code data read is parsed, obtain ciphertext feature string;
DS2, the length with reference to the second key, one by one verify and delete added in ciphertext feature string second close The character of key;
Specifically, step DS2 includes DS21 ~ DS23:
DS21, default second key of reading are simultaneously obtained after its length M, are opened from last position of ciphertext feature string Begin, search in order and read M numerical character, and M numerical character of reading is incremented by 10 one by one according to reading order, most M numeral is obtained afterwards;
DS22, according to numerical order from small to large, gradually read in ciphertext feature string with M digital corresponding words The character on position is accorded with, while gradually being read after the character of the second key according to the order turned left from the right side, whether two characters are judged Unanimously, if so, then deleting the character of ciphertext feature string and continuing executing with step DS23, conversely, carrying out abnormality alarming simultaneously Terminate;It is opposite process with the step S42 in compression encryption method in this step, is according to character string during addition character A high position is added to the order of low level, is verified and is according to from low level to the order of a high position when deleting character.It is close by first The character of key or the second key be added in character string can be according to from left to right, the order such as from right to left, when checking is deleted Accordingly in turn.
Whether DS23, judgment step DS22 execution number of times are less than M, and step DS22 is performed if so, then returning, otherwise knot Beam.Here end refers to end step DS2, is not the end of whole method.
DS3, ciphertext feature string decompressed:Ciphertext feature string is decompressed, and then obtains solution After the separator in ciphertext feature string after compression, obtain all characters behind separator and be used as random number character string.
DS4, for each biological characteristic character string in ciphertext feature string, one by one verify and to delete the biology special Levy the character for the first key added in character string;
Specifically, step DS4, including DS41 ~ DS42:
DS41, each character to random number character string, read the numeric word of correspondence position in the identification number of examinee one by one Symbol;
DS42, for each biological characteristic character string in ciphertext feature string, according to all numerical characters of reading, The character for the first key added in the biological characteristic character string is verified and deleted one by one.
It is that each biological characteristic character string is tested by step DS421 ~ DS423 in the present embodiment, in step DS42 Card:
DS421, for each biological characteristic character string in ciphertext feature string, according to N number of numerical character of reading, Calculated using following formula and obtain N number of decryption numeral:
jm_num= i * 100 + (zwnum-1) *10 + num
In above formula, jm_num represents decryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word The value of symbol, zwnum represents the sequence number of biological characteristic character string;
DS422, according to numerical order from small to large, gradually read corresponding with N number of numeral in biological characteristic character string Character on character position, while from left to right gradually reading after the character of first key, judges whether two characters are consistent, if It is then to delete the character of biological characteristic character string and continue executing with step DS423, conversely, carrying out abnormality alarming and terminating;Class As, this step is also opposite process with the step S22 in compression encryption method;
Whether DS423, judgment step DS422 execution number of times are less than N, if so, then return execution step DS422, on the contrary Terminate.Here end, refers to end step S42, completes the checking to a biological characteristic character string, does not imply that end is whole Individual method.
DS5, all biological characteristic character strings are converted into corresponding biological information.Hereafter, system can speak Sound is reminded or word is reminded, and reminds examinee to provide corresponding characteristic information, completes to compare.
The character for the second key that this method is added in ciphertext feature string by progressively verifying and deletion, are then solved Compress after ciphertext feature string, then progressively checking is added to the character of the first key in each biological characteristic character string, it is real Now decryption-decompression-process decrypted again, so as to verify the legal of ciphertext feature string and each biological characteristic character string Property, corresponding biological information finally is converted to when verifying that data are legal, the comparison basis of certification of exam inee's identity is used as. This method has personalized difference, and Information Security is high, can effectively verify the legitimacy of the conscientious data of examinee's identity, and data Amount is small, and arithmetic speed is fast, and recognition effect is good.
Embodiment three
The present embodiment is a specific example of embodiment one, and reference picture 3, this compression decryption method is as follows:
A. the unique identifying number KSNO of examinee is taken out, 3 are taken at random in each position of KSNO(The digit of first key " MST ", It is 4 herein if first key is 4)Individual numerical character(If KSNO digits are more than 10, first 10 are only taken, if Encounter letter, then skip, 10 chances take 3 numerical characters, if repeatedly getting letter in 10 times, are likely to occur and get Numeral less than 3, such as 1,2, if getting 0, null-encryption), as KSNO is:325A3993229, then random read take 3 The detailed process of numerical character is as follows:
A. a position random number is taken(0-ksno.length or 1-9)1 time, as being for the first time 3, then the 4th number A is taken, jumped Cross;
B. a position random number is taken(0-ksno.length or 1-9)1 time, it is for the second time such as 8, then takes the 9th number 2;
C. a position random number is taken(0-ksno.length or 1-9)1 time, it is for the second time such as 0, then takes the 1st number 3;
D. a position random number is taken(0-ksno.length or 1-9)1 time, it is for the second time such as 2, then takes the 3rd number 5;
Here by multiple generation random number, then using random number as KSNO character strings character subscript, to read Numerical character.For example, when random number is 0, the corresponding reality of character string subscript 0 is first character.
B. it is 2,3,5 that what is obtained, which will fill the digit of password,;
C. fingerprint characteristic character string is started the cycle over, is mixed by formula jmnum=i * 100+(tznum-1) * 10+num Password, jmnum represents encryption numeral, and the sequence number and i=1,2 ... N, num that i represents numerical character represent the value of numerical character, Zwnum represents the sequence number of biological characteristic character string:
A.i=1, num=2, zwnum=1, therefore (i * 100+(tznum-1) * 10+num=1*100+ (1- 1) * 10+2=102, to the 102nd addition letter M of first fingerprint characteristic character string;
B. i=2, num=3, zwnum=1, therefore (i * 100+(tznum-1) * 10+num=2*100+ (1- 1) * 10+3=203, to the 203rd addition letter S of first fingerprint characteristic character string;
C. i=3, num=5, zwnum=1, therefore (i * 100+(tznum-1) * 10+num=3*100+ (1- 1) * 10+5=305, tee is added to the 305th of first fingerprint characteristic character string;
D. to the special character string of second fingerprint:I=1, num=2, zwnum=2, therefore (i * 100+(tznum-1) * 10+num=1*100+ (2-1) * 10+2=112, to the 112nd addition letter M of second fingerprint characteristic character string;
E. i=2, num=3, zwnum=2, therefore (i * 100+(tznum-1) * 10+num=2*100+ (2- 1) * 10+3=213, to the 213rd addition letter S of second fingerprint characteristic character string;
F. i=3, num=5, zwnum=2, therefore (i * 100+(tznum-1) * 10+num=3*100+ (2- 1) * 10+5=315, tee is added to the 315th of second fingerprint characteristic character string;
The order of above step addition character is added according to character position from big to small, and step a ~ f sequence number is only It is to be used to distinguish each step, does not represent the order of addition;
G. the 3rd and below other fingerprint characteristic character strings are circulated.
D. random cipher number 802 is added to finally behind character string after addition password, addition ", 802 ", constitute total characteristic word Symbol string;
E. the length of the second key is obtained, when such as the second key is " MSTCHINA ", length is 8;
F. it upside down and find forward from last position of total characteristic character string, 8 numeric type letters are found in order, obtain To numeral be 1,6,2,6,1,7,6,7 respectively;
G. to prevent overlapping and repeating to be shown in character string head, it is incremented by 10 per digit before when taking one more, passs It is 71,66,52,46,31,27,16,7 after increasing;
H. a code characters, such as 71- are added behind each respectively in order>M, 66->S, 52->T, 46->C, 31->H, 27->I, 16->N, 7->A;The order for adding character is added according to character position from big to small;
I. the total characteristic character string and the other information of examinee after conversion are converted into Quick Response Code in the lump, formed with examinee only The picture of one mark name.
It is noted that in Fig. 3, the description of use is that " sand " in " mixing sand " " sand ", figure is to mention in the present invention First key, process of as " mixing sand " is added in fingerprint characteristic character string by the character of first key one by one.
Example IV
Reference picture 4 a, specific example of embodiment two, i.e. one kind of compression encryption method described in embodiment three is examined Raw identification authentication data decryption method, including:
A. first ciphertext feature string is obtained with QRcode Quick Response Codes identification two-dimensional code data;
B. it is 8 to obtain the second key " MSTCHINA " length;
C. it upside down and find forward from last position of ciphertext feature string, M numeric type letter is found in order, is obtained To numeral be 1,6,2,6,1,7,6,7 respectively;
D. per taking a numeral more, before digit be incremented by 10, be 71,66,52,46,31,27,16,7 after being incremented by;
E. verified respectively in each digital corresponding character position in order and delete the character of second key, such as 71->M, 66->S, 52->T, 46->C, 31->H, 27->I, 16->N, 7->A;The order for deleting character is according to from small to large What character position was deleted;
F. ciphertext feature string is decompressed;
G. the digit strings " 802 " of ciphertext feature string backmost after ", " are obtained, and it is long to record digit strings N=3 are spent, examinee's unique identifying number KSNO is obtained;
H. the corresponding digit strings " character in 8,0,2 " digit order numbers in examinee's unique identifying number KSNO in first 10 is taken;
I. confirm that to delete the circulation for before of the original figure of sand takes out numeral, the digit that delete password of acquisition is 2,3,5;
J. take out ciphertext feature string in each fingerprint characteristic character string, and fingerprint characteristic character string sequence number zwnum(zwnum<10);
K. fingerprint characteristic is started the cycle over, password, wherein jm_ are mixed by formula jm_num=i*100+ (zwnum-1) * 10+num Num represents decryption numeral, and the sequence number and i=1,2 ... N, num that i represents numerical character represent the value of numerical character, and zwnum represents life The sequence number of thing feature string:
A. to first fingerprint characteristic character string, i=1, num=2, zwnum=1, therefore (i*100+ (tznum-1) * 10+ Num=1*100+ (1-1) * 10+2=102, to the 102nd of first fingerprint characteristic character string, are verified whether as alphabetical M, if It is to delete M;
B.i=2, num=3, zwnum=1, therefore (i*100+ (tznum-1) * 10+num=2*100+ (1-1) * 10+3=203, To the 203rd of first fingerprint characteristic character string, verify whether as alphabetical S, if then deleting S;
C.i=3, num=5, zwnum=1, therefore (i*100+ (tznum-1) * 10+num=3*100+ (1-1) * 10+5=305, To the 305th of first fingerprint characteristic character string, verify whether as tee, if then deleting T;
D. to the special character string of second fingerprint:I=1, num=2, zwnum=2, therefore (i*100+ (tznum-1) * 10+ Num=1*100+ (2-1) * 10+2=112, to the 112nd of second fingerprint characteristic character string, are verified whether as alphabetical M, if It is to delete M;
E.i=2, num=3, zwnum=2, therefore (i*100+ (tznum-1) * 10+num=2*100+ (2-1) * 10+3=213, To the 213rd of second fingerprint characteristic character string, verify whether as alphabetical S, if then deleting S;
F.i=3, num=5, zwnum=2, therefore (i*100+ (tznum-1) * 10+num=3*100+ (2-1) * 10+5=315, To the 315th of second fingerprint characteristic character string, verify whether as tee, if then deleting T;
The order that character is deleted in step a ~ f is deleted according to character position from big to small;
L. read fingerprint characteristic character string and be converted to fingerprint feature information, and remind examinee to provide pair by sound, word The characteristic information answered, completes to compare.
Above is the preferable implementation to the present invention is illustrated, but the invention is not limited to the implementation Example, those skilled in the art can also make a variety of equivalent variations or replace on the premise of without prejudice to spirit of the invention Change, these equivalent modifications or replacement are all contained in the application claim limited range.

Claims (9)

1. a kind of certification of exam inee's identity data compression encryption method, it is characterised in that including:
S1, the biological characteristic for reading examinee, and generate multiple biological characteristic character strings;
S2, the length with reference to first key and examinee identification number, each biology is one by one added to by the character of first key It is encrypted in feature string;
S3, the total characteristic character string that all biological characteristic character strings are arranged to make up is compressed;
S4, the length with reference to the second key, the character of the second key is one by one added in the total characteristic character string after compression It is encrypted;
S5, total characteristic character string changed into Quick Response Code;
The step S2, including:
S21, the default first key of reading are simultaneously obtained after its length N, the N number of numeric word of random read take from the identification number of examinee Symbol, while the digit of N number of numerical character is combined to form random number character string in order;
S22, for each biological characteristic character string, according to N number of numerical character of reading, the character of first key is one by one added It is added to the diverse location of the biological characteristic character string.
2. a kind of certification of exam inee's identity data compression encryption method according to claim 1, it is characterised in that the step S3, including:
S31, all biological characteristic character strings are arranged in order, and added successively in the position of last biological characteristic character string Plus total characteristic character string is constituted after separator and random number character string;
S32, total characteristic character string is compressed.
3. a kind of certification of exam inee's identity data compression encryption method according to claim 2, it is characterised in that the step S4, including:
S41, default second key of reading are simultaneously obtained after its length M, are opened from last position of the total characteristic character string after compression Begin, search in order and read M numerical character, and M numerical character of reading is incremented by 10 one by one according to reading order, most M numeral is obtained afterwards;
S42, according to numerical order from big to small, the character of the second key is from left to right one by one added to total after compression With M digital corresponding character positions in feature string.
4. a kind of certification of exam inee's identity data compression encryption method according to claim 1, it is characterised in that the S22, Including:
S221, for each biological characteristic character string, according to N number of numerical character of reading, calculated using following formula and obtain N number of encryption Numeral:
Jmnum=i*100+ (zwnum-1) * 10+num
In above formula, jmnum represents encryption numeral, and i represents the sequence number and i=1 of numerical character, and 2 ... N, num represents numerical character Value, zwnum represents the sequence number of biological characteristic character string;
S222, according to numerical order from big to small, the character of first key is one by one added to the biology from right to left special Levy in character string with the digital corresponding character position of N number of encryption.
5. using a kind of certification of exam inee's identity data decryption method of the compression encryption method described in claim 1, its feature exists In, including:
DS1, reading Quick Response Code simultaneously parse acquisition ciphertext feature string;
DS2, the length with reference to the second key, one by one verify and delete the second key for being added in ciphertext feature string Character;
DS3, ciphertext feature string decompressed;
DS4, for each biological characteristic character string in ciphertext feature string, one by one verify and delete the biological characteristic word The character for the first key added in symbol string;
DS5, all biological characteristic character strings are converted into corresponding biological information.
6. a kind of certification of exam inee's identity data compression encryption method according to claim 5, it is characterised in that the step DS2, including:
DS21, default second key of reading are simultaneously obtained after its length M, since last position of ciphertext feature string, are pressed Sequential search simultaneously reads M numerical character, and M numerical character of reading is incremented by into 10 one by one according to reading order, finally obtains Obtain M numeral;
DS22, according to numerical order from small to large, gradually read in ciphertext feature string with M digital corresponding character bits The character put, while gradually being read after the character of the second key according to the order turned left from the right side, judges whether two characters are consistent, If so, then deleting the character of ciphertext feature string and continuing executing with step DS23, conversely, carrying out abnormality alarming and terminating;
Whether DS23, judgment step DS22 execution number of times are less than M, perform step DS22 if so, then returning, otherwise terminate.
7. a kind of certification of exam inee's identity data compression encryption method according to claim 6, it is characterised in that the step DS3, it is specially:
Ciphertext feature string is decompressed, and then obtained after the separator in the ciphertext feature string after decompression, Obtain all characters behind separator and be used as random number character string.
8. a kind of certification of exam inee's identity data compression encryption method according to claim 7, it is characterised in that the step DS4, including:
DS41, each character to random number character string, read the numerical character of correspondence position in the identification number of examinee one by one;
DS42, for each biological characteristic character string in ciphertext feature string, according to all numerical characters of reading, one by one Verify and delete the character for the first key added in the biological characteristic character string.
9. a kind of certification of exam inee's identity data compression encryption method according to claim 8, it is characterised in that the step DS42, including:
DS421, for each biological characteristic character string in ciphertext feature string, according to N number of numerical character of reading, use Following formula, which is calculated, obtains N number of decryption numeral:
Jm_num=i*100+ (zwnum-1) * 10+num
In above formula, jm_num represents decryption numeral, and i represents the sequence number and i=1 of numerical character, and 2 ... N, num represents numerical character Value, zwnum represents the sequence number of biological characteristic character string;
DS422, according to numerical order from small to large, gradually read in biological characteristic character string with N number of digital corresponding character Character on position, while from left to right gradually reading after the character of first key, judges whether two characters are consistent, if so, then Delete the character of biological characteristic character string and continue executing with step DS423, conversely, carrying out abnormality alarming and terminating;
Whether DS423, judgment step DS422 execution number of times are less than N, perform step DS422 if so, then returning, otherwise terminate.
CN201410789352.XA 2014-12-17 2014-12-17 A kind of certification of exam inee's identity data compression encryption method and decryption method Active CN104506322B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410789352.XA CN104506322B (en) 2014-12-17 2014-12-17 A kind of certification of exam inee's identity data compression encryption method and decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410789352.XA CN104506322B (en) 2014-12-17 2014-12-17 A kind of certification of exam inee's identity data compression encryption method and decryption method

Publications (2)

Publication Number Publication Date
CN104506322A CN104506322A (en) 2015-04-08
CN104506322B true CN104506322B (en) 2017-10-17

Family

ID=52948038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410789352.XA Active CN104506322B (en) 2014-12-17 2014-12-17 A kind of certification of exam inee's identity data compression encryption method and decryption method

Country Status (1)

Country Link
CN (1) CN104506322B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411813A (en) * 2015-07-28 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Biological characteristic transmission method and device and mobile terminal
CN105978889B (en) * 2016-06-20 2019-06-11 北京集创北方科技股份有限公司 Biological feature encryption method and device
CN106330464B (en) * 2016-10-26 2019-04-23 上海众人网络安全技术有限公司 An identity authentication method, device and system
CN107180255A (en) * 2017-06-09 2017-09-19 江苏物码信息技术有限公司 A kind of examination based on Quick Response Code enters field system
CN108769052A (en) * 2018-06-12 2018-11-06 北斗巡星信息科技有限公司 Wrist strap transmits the encrypted method and device of information
CN117238065B (en) * 2023-11-10 2024-03-26 深圳市每开创新科技有限公司 A lock unlocking method, passive electronic lock, electronic device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1259712A (en) * 2000-01-11 2000-07-12 熊猫电子集团有限公司 Finger print, IC card identification method and device for status differentiation
CN101753304A (en) * 2008-12-17 2010-06-23 中国科学院自动化研究所 Method for binding biological specificity and key
CN102970144A (en) * 2012-12-20 2013-03-13 四川长虹电器股份有限公司 Identity-based authentication method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1259712A (en) * 2000-01-11 2000-07-12 熊猫电子集团有限公司 Finger print, IC card identification method and device for status differentiation
CN101753304A (en) * 2008-12-17 2010-06-23 中国科学院自动化研究所 Method for binding biological specificity and key
CN102970144A (en) * 2012-12-20 2013-03-13 四川长虹电器股份有限公司 Identity-based authentication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于加密二维条码和指纹识别的证件防伪系统";方媛等,;《计算机与数字工程》;20090130;第37卷(第1期);第112-114页 *

Also Published As

Publication number Publication date
CN104506322A (en) 2015-04-08

Similar Documents

Publication Publication Date Title
CN104506322B (en) A kind of certification of exam inee&#39;s identity data compression encryption method and decryption method
Katiyar et al. Online voting system powered by biometric security using steganography
CN109241756B (en) Data processing method, system, server and medium based on block chain
Hakak et al. Preserving content integrity of digital holy Quran: Survey and open challenges
WO2017045594A1 (en) Anti-counterfeit method
CN104823203A (en) Biometric template security and key generation
CN107749848A (en) Processing method, device and the Internet of things system of Internet of Things data
CN109803142B (en) Encrypted domain image reversible data hiding method based on neighborhood prediction
CN104993923A (en) Radar data protection method based on combination of information hiding and encryption techniques
CN107516045A (en) Document protection method and device
CN107113170A (en) Biometric templates preservation, verification method and biometric devices, terminal
Alkhudaydi et al. Integrating light-weight cryptography with diacritics Arabic text steganography improved for practical security applications
Hazarika et al. A novel partial image encryption using chaotic logistic map
Gandhi et al. Study on security of online voting system using biometrics and steganography
CN102567657A (en) Digital work ownership authentication system and digital work ownership authentication method
CN105872305B (en) A kind of completely separable encryption area image reversible data concealing method
CN105912894B (en) A method of it is anti-fake that passport NO. being used for E-seal printed text
CN103646121B (en) A kind of identification code and using method and device
CN119675967A (en) A file transmission protection method, system and device based on multiple encryption algorithms
CN101626290A (en) Method for signature and confidentiality by fingerprints
KR20200085204A (en) Verifiable Electronic Voting System
CN105844723B (en) PSAM card safeguard management method and system
Mark et al. A secured online voting system by using blockchain as the medium
CN112446021A (en) Fingerprint authentication method and device based on SM9 encryption and related equipment
CN104036773B (en) The content of text of typing is passed through into method and system of the false proof condition discriminating apparatus to play

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant