CN104506322B - A kind of certification of exam inee's identity data compression encryption method and decryption method - Google Patents
A kind of certification of exam inee's identity data compression encryption method and decryption method Download PDFInfo
- Publication number
- CN104506322B CN104506322B CN201410789352.XA CN201410789352A CN104506322B CN 104506322 B CN104506322 B CN 104506322B CN 201410789352 A CN201410789352 A CN 201410789352A CN 104506322 B CN104506322 B CN 104506322B
- Authority
- CN
- China
- Prior art keywords
- character
- string
- key
- character string
- biological characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 63
- 238000013144 data compression Methods 0.000 title claims abstract description 20
- 238000007906 compression Methods 0.000 claims abstract description 26
- 230000006835 compression Effects 0.000 claims abstract description 26
- 230000004044 response Effects 0.000 claims abstract description 12
- 230000005856 abnormality Effects 0.000 claims description 8
- 230000006837 decompression Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 8
- 230000000694 effects Effects 0.000 abstract description 6
- 239000004576 sand Substances 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 235000017351 Carissa bispinosa Nutrition 0.000 description 1
- 240000002199 Carissa bispinosa Species 0.000 description 1
- 241000244514 Lymania Species 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001151 other effect Effects 0.000 description 1
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The invention discloses a kind of certification of exam inee's identity data compression encryption method and decryption method, the compression encryption method includes:The biological characteristic of examinee is read, and generates multiple biological characteristic character strings;With reference to the length and the identification number of examinee of first key, the character of first key is one by one added in each biological characteristic character string it is encrypted;The total characteristic character string that all biological characteristic character strings are arranged to make up is compressed;With reference to the length of the second key, the character of the second key is one by one added in the total characteristic character string after compression it is encrypted;Total characteristic character string is changed into Quick Response Code.This method ciphering process is random, and Information Security is high, and examinee can be avoided to prepare information of practising fraud in advance, and certification of exam inee's identity data are compressed after encryption, data volume is not changed significantly, and arithmetic speed is fast, recognition effect preferably, can be widely applied in examination security supervision area.
Description
Technical field
The present invention relates to data encrypting and deciphering field, more particularly to a kind of certification of exam inee's identity data compression encryption method and
Decryption method.
Background technology
Increase year by year with the scale and quantity of various examinations, the importance of various examinations is also increasingly improved, it is corresponding
Be that various examinee's cheatings are also increasing.Examinee's identity forgery technology is also increasingly advanced, causes one of cheating
Phenomenon of praticing fraud it is more and more rampant, although examination management mechanism takes many kinds of measures and prevented, and all can not effectively prevent generation
Examine phenomenon.Differentiate the authenticity of examinee's identity, with vital status, be related to the result, fairness and achievement of examination
Authenticity.One of means for generally using are that the biological characteristics such as fingerprint, head portrait of examinee are gathered when entering oneself for the examination at present, take an examination into
The sample feature that the collection in worksite feature of examinee is compared during field and is gathered before.Examinee's feature can be issued to equipment, can also make
Accomplish on admission card for entrance examination, so as to carry out authentication to examinee according to biological characteristic in examination.But in the prior art, typically simultaneously
These biological characteristics will not be encrypted, or encryption is excessively simple, Information Security is not high, is easily tampered;Or can root
Biological characteristic is encrypted according to some existing AESs, but so encrypted data amount can be caused excessive, influence is known
Other effect.In addition, also other methods being authenticated to examinee's identity, but also not to examinee's individual information and examinee
Biological information is associated encryption, is easily replaced, and security is low.Generally speaking, identity is carried out to examinee in the prior art to recognize
The method of card has that Information Security is low, computationally intensive or recognition effect.
The content of the invention
In order to solve above-mentioned technical problem, it is an object of the invention to provide a kind of certification of exam inee's identity data compression encryption
Method.It is a further object of the present invention to provide a kind of decryption method of certification of exam inee's identity data compression encryption method.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of certification of exam inee's identity data compression encryption method, including:
S1, the biological characteristic for reading examinee, and generate multiple biological characteristic character strings;
S2, the length with reference to first key and examinee identification number, the character of first key are one by one added to each
It is encrypted in biological characteristic character string;
S3, the total characteristic character string that all biological characteristic character strings are arranged to make up is compressed;
S4, the length with reference to the second key, the total characteristic character after compression is one by one added to by the character of the second key
It is encrypted in string;
S5, total characteristic character string changed into Quick Response Code.
Further, the step S2, including:
S21, the default first key of reading are simultaneously obtained after its length N, the N number of numeral of random read take from the identification number of examinee
Character, while the digit of N number of numerical character is combined to form random number character string in order;
S22, for each biological characteristic character string, according to N number of numerical character of reading, by the character of first key one by one
Ground is added to the diverse location of the biological characteristic character string.
Further, the step S3, including:
S31, all biological characteristic character strings are arranged in order, and the position of last biological characteristic character string according to
Total characteristic character string is constituted after secondary addition separator and random number character string;
S32, total characteristic character string is compressed.
Further, the step S4, including:
S41, default second key of reading are simultaneously obtained after its length M, from last of the total characteristic character string after compression
Position starts, and searches in order and reads M numerical character, and M numerical character of reading is incremented by one by one according to reading order
10, finally obtain M numeral;
S42, according to numerical order from big to small, the character of the second key is from left to right one by one added to after compression
Total characteristic character string in M digital corresponding character positions.
Further, the S22, including:
S221, for each biological characteristic character string, according to N number of numerical character of reading, calculated using following formula and obtain N number of
Encryption numeral:
jmnum=i * 100 + (zwnum-1) *10 + num
In above formula, jmnum represents encryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word
The value of symbol, zwnum represents the sequence number of biological characteristic character string;
S222, according to numerical order from big to small, the character of first key is one by one added to the life from right to left
With N number of digital corresponding character position of encryption in thing feature string.
The present invention solves another technical scheme for being used of its technical problem:
Using a kind of certification of exam inee's identity data decryption method of described compression encryption method, including:
DS1, reading Quick Response Code simultaneously parse acquisition ciphertext feature string;
DS2, the length with reference to the second key, one by one verify and delete added in ciphertext feature string second close
The character of key;
DS3, ciphertext feature string decompressed;
DS4, for each biological characteristic character string in ciphertext feature string, one by one verify and to delete the biology special
Levy the character for the first key added in character string;
DS5, all biological characteristic character strings are converted into corresponding biological information.
Further, the step DS2, including:
DS21, default second key of reading are simultaneously obtained after its length M, are opened from last position of ciphertext feature string
Begin, search in order and read M numerical character, and M numerical character of reading is incremented by 10 one by one according to reading order, most
M numeral is obtained afterwards;
DS22, according to numerical order from small to large, gradually read in ciphertext feature string with M digital corresponding words
The character on position is accorded with, while gradually being read after the character of the second key according to the order turned left from the right side, whether two characters are judged
Unanimously, if so, then deleting the character of ciphertext feature string and continuing executing with step DS23, conversely, carrying out abnormality alarming simultaneously
Terminate;
Whether DS23, judgment step DS22 execution number of times are less than M, and step DS22 is performed if so, then returning, otherwise knot
Beam.
Further, the step DS3, it is specially:
Ciphertext feature string is decompressed, and then obtains the separator in the ciphertext feature string after decompression
Afterwards, all characters behind separator are obtained and are used as random number character string.
Further, the step DS4, including:
DS41, each character to random number character string, read the numeric word of correspondence position in the identification number of examinee one by one
Symbol;
DS42, for each biological characteristic character string in ciphertext feature string, according to all numerical characters of reading,
The character for the first key added in the biological characteristic character string is verified and deleted one by one.
Further, the step DS42, including:
DS421, for each biological characteristic character string in ciphertext feature string, according to N number of numerical character of reading,
Calculated using following formula and obtain N number of decryption numeral:
jm_num= i * 100 + (zwnum-1) *10 + num
In above formula, jm_num represents decryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word
The value of symbol, zwnum represents the sequence number of biological characteristic character string;
DS422, according to numerical order from small to large, gradually read corresponding with N number of numeral in biological characteristic character string
Character on character position, while from left to right gradually reading after the character of first key, judges whether two characters are consistent, if
It is then to delete the character of biological characteristic character string and continue executing with step DS423, conversely, carrying out abnormality alarming and terminating;
Whether DS423, judgment step DS422 execution number of times are less than N, if so, then return execution step DS422, on the contrary
Terminate.
The beneficial effects of the invention are as follows:A kind of certification of exam inee's identity data compression encryption method of the present invention, including:S1、
The biological characteristic of examinee is read, and generates multiple biological characteristic character strings;S2, the length with reference to first key and examinee mark
Number, the character of first key is one by one added in each biological characteristic character string it is encrypted;S3, to all biologies
The total characteristic character string that feature string is arranged to make up is compressed;S4, the length with reference to the second key, by the word of the second key
Symbol is one by one added in the total characteristic character string after compression, and it is encrypted;S5, total characteristic character string changed into two dimension
Code.This method ciphering process is random, and Information Security is high, and examinee can be avoided to prepare information of practising fraud in advance, and to examinee's identity
Authentication data is compressed after encryption, and data volume is not changed significantly, and arithmetic speed is fast, and recognition effect is preferable.
The present invention another beneficial effect be:A kind of certification of exam inee's identity data decryption method of the present invention, including:DS1、
Read Quick Response Code and parse acquisition ciphertext feature string;DS2, the length with reference to the second key, one by one verify and delete close
The character of the second key added in literary feature string;DS3, ciphertext feature string decompressed;DS4, it is directed to
Each biological characteristic character string in ciphertext feature string, one by one verifies and deletes and added in the biological characteristic character string
First key character;DS5, all biological characteristic character strings are converted into corresponding biological information.This method has
Personalized difference, Information Security is high, can effectively verify the legitimacy of the conscientious data of examinee's identity, and data volume is small, computing
Speed is fast, and recognition effect is good.
Brief description of the drawings
The invention will be further described with reference to the accompanying drawings and examples.
Fig. 1 is a kind of flow chart of certification of exam inee's identity data compression encryption method of the present invention;
Fig. 2 is a kind of flow chart of certification of exam inee's identity data decryption method of the present invention;
Fig. 3 is a kind of flow signal of a specific embodiment of certification of exam inee's identity data compression encryption method of the present invention
Figure;
Fig. 4 is a kind of schematic flow sheet of a specific embodiment of certification of exam inee's identity data decryption method of the present invention.
Embodiment
Reference picture 1, the invention provides a kind of certification of exam inee's identity data compression encryption method, including:
S1, the biological characteristic for reading examinee, and generate multiple biological characteristic character strings;
S2, the length with reference to first key and examinee identification number, the character of first key are one by one added to each
It is encrypted in biological characteristic character string;
S3, the total characteristic character string that all biological characteristic character strings are arranged to make up is compressed;
S4, the length with reference to the second key, the total characteristic character after compression is one by one added to by the character of the second key
It is encrypted in string;
S5, total characteristic character string changed into Quick Response Code.
It is further used as preferred embodiment, the step S2, including:
S21, the default first key of reading are simultaneously obtained after its length N, the N number of numeral of random read take from the identification number of examinee
Character, while the digit of N number of numerical character is combined to form random number character string in order;
S22, for each biological characteristic character string, according to N number of numerical character of reading, by the character of first key one by one
Ground is added to the diverse location of the biological characteristic character string.
It is further used as preferred embodiment, the step S3, including:
S31, all biological characteristic character strings are arranged in order, and the position of last biological characteristic character string according to
Total characteristic character string is constituted after secondary addition separator and random number character string;
S32, total characteristic character string is compressed.
It is further used as preferred embodiment, the step S4, including:
S41, default second key of reading are simultaneously obtained after its length M, from last of the total characteristic character string after compression
Position starts, and searches in order and reads M numerical character, and M numerical character of reading is incremented by one by one according to reading order
10, finally obtain M numeral;
S42, according to numerical order from big to small, the character of the second key is from left to right one by one added to after compression
Total characteristic character string in M digital corresponding character positions.
It is further used as preferred embodiment, the S22, including:
S221, for each biological characteristic character string, according to N number of numerical character of reading, calculated using following formula and obtain N number of
Encryption numeral:
jmnum=i * 100 + (zwnum-1) *10 + num
In above formula, jmnum represents encryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word
The value of symbol, zwnum represents the sequence number of biological characteristic character string;
S222, according to numerical order from big to small, the character of first key is one by one added to the life from right to left
With N number of digital corresponding character position of encryption in thing feature string.
Reference picture 2, present invention also offers a kind of certification of exam inee's identity data solution using described compression encryption method
Decryption method, including:
DS1, reading Quick Response Code simultaneously parse acquisition ciphertext feature string;
DS2, the length with reference to the second key, one by one verify and delete added in ciphertext feature string second close
The character of key;
DS3, ciphertext feature string decompressed;
DS4, for each biological characteristic character string in ciphertext feature string, one by one verify and to delete the biology special
Levy the character for the first key added in character string;
DS5, all biological characteristic character strings are converted into corresponding biological information.
It is further used as preferred embodiment, the step DS2, including:
DS21, default second key of reading are simultaneously obtained after its length M, are opened from last position of ciphertext feature string
Begin, search in order and read M numerical character, and M numerical character of reading is incremented by 10 one by one according to reading order, most
M numeral is obtained afterwards;
DS22, according to numerical order from small to large, gradually read in ciphertext feature string with M digital corresponding words
The character on position is accorded with, while gradually being read after the character of the second key according to the order turned left from the right side, whether two characters are judged
Unanimously, if so, then deleting the character of ciphertext feature string and continuing executing with step DS23, conversely, carrying out abnormality alarming simultaneously
Terminate;
Whether DS23, judgment step DS22 execution number of times are less than M, and step DS22 is performed if so, then returning, otherwise knot
Beam.
It is further used as preferred embodiment, the step DS3, it is specially:
Ciphertext feature string is decompressed, and then obtains the separator in the ciphertext feature string after decompression
Afterwards, all characters behind separator are obtained and are used as random number character string.
It is further used as preferred embodiment, the step DS4, including:
DS41, each character to random number character string, read the numeric word of correspondence position in the identification number of examinee one by one
Symbol;
DS42, for each biological characteristic character string in ciphertext feature string, according to all numerical characters of reading,
The character for the first key added in the biological characteristic character string is verified and deleted one by one.
It is further used as preferred embodiment, the step DS42, including:
DS421, for each biological characteristic character string in ciphertext feature string, according to N number of numerical character of reading,
Calculated using following formula and obtain N number of decryption numeral:
jm_num= i * 100 + (zwnum-1) *10 + num
In above formula, jm_num represents decryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word
The value of symbol, zwnum represents the sequence number of biological characteristic character string;
DS422, according to numerical order from small to large, gradually read corresponding with N number of numeral in biological characteristic character string
Character on character position, while from left to right gradually reading after the character of first key, judges whether two characters are consistent, if
It is then to delete the character of biological characteristic character string and continue executing with step DS423, conversely, carrying out abnormality alarming and terminating;
Whether DS423, judgment step DS422 execution number of times are less than N, if so, then return execution step DS422, on the contrary
Terminate.
With reference to specific embodiment, the present invention will be further described.
Embodiment one
Reference picture 1, a kind of certification of exam inee's identity data compression encryption method, including:
S1, the biological characteristic for reading examinee, and generate multiple biological characteristic character strings.
S2, the length with reference to first key and examinee identification number, the character of first key are one by one added to each
It is encrypted in biological characteristic character string;Step S1 and S2 order can be exchanged, and the implementation of this method is not influenceed;
Specifically, step S2 includes:
S21, the default first key of reading are simultaneously obtained after its length N, the N number of numeral of random read take from the identification number of examinee
Character, while the digit of N number of numerical character is combined to form random number character string in order;
S22, for each biological characteristic character string, according to N number of numerical character of reading, by the character of first key one by one
Ground is added to the diverse location of the biological characteristic character string;
It is preferred that, step S22 is that the character of first key is one by one added into each biology by step S221 ~ S222
Feature string:
S221, for each biological characteristic character string, according to N number of numerical character of reading, calculated using following formula and obtain N number of
Encryption numeral:
jmnum=i * 100 + (zwnum-1) *10 + num
In above formula, jmnum represents encryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word
The value of symbol, zwnum represents the sequence number of biological characteristic character string;
S222, according to numerical order from big to small, the character of first key is one by one added to the life from right to left
With N number of digital corresponding character position of encryption in thing feature string.
S3, the total characteristic character string that all biological characteristic character strings are arranged to make up is compressed;
Specifically, step S3 includes S31 ~ S32:
S31, all biological characteristic character strings are arranged in order, and the position of last biological characteristic character string according to
Total characteristic character string is constituted after secondary addition separator and random number character string;Separator can be the symbol such as comma, fullstop, branch
Number, compartmentation is played together with random number character string;
S32, total characteristic character string is compressed.
S4, the length with reference to the second key, the total characteristic character after compression is one by one added to by the character of the second key
It is encrypted in string;
Specifically, step S4 includes S41 ~ S42:
S41, default second key of reading are simultaneously obtained after its length M, from last of the total characteristic character string after compression
Position starts, and searches in order and reads M numerical character, and M numerical character of reading is incremented by one by one according to reading order
10, finally obtain M numeral;
S42, according to numerical order from big to small, the character of the second key is from left to right one by one added to after compression
Total characteristic character string in M digital corresponding character positions.
S5, total characteristic character string changed into Quick Response Code.
M, N are positive integer.
Biological characteristic alleged by the present invention can be fingerprint characteristic, characteristics of image etc., and preferably safe fingerprint is special
Levy.
This method is by the way that the character of first key to be added to the diverse location of biological characteristic character string one by one, and by
The character of two keys is added to the diverse location of the total characteristic character string after compression, realizes that the process re-encrypted-is compressed-in encryption,
Ciphering process is random, and in advance without precognition, and the biological information of encryption data and examinee are closely related, poor with individuation
Different, difficulty is replaced, and Information Security is high, and examinee can be avoided to prepare information of practising fraud in advance.And this compression encryption method is to examinee
Identification authentication data is compressed after encryption, and data volume is not changed significantly, and arithmetic speed is fast, and recognition effect is preferable.
Embodiment two
Reference picture 2, using a kind of certification of exam inee's identity data decryption method of the compression encryption method described in embodiment one,
Including:
DS1, reading Quick Response Code, and then the two-dimensional code data read is parsed, obtain ciphertext feature string;
DS2, the length with reference to the second key, one by one verify and delete added in ciphertext feature string second close
The character of key;
Specifically, step DS2 includes DS21 ~ DS23:
DS21, default second key of reading are simultaneously obtained after its length M, are opened from last position of ciphertext feature string
Begin, search in order and read M numerical character, and M numerical character of reading is incremented by 10 one by one according to reading order, most
M numeral is obtained afterwards;
DS22, according to numerical order from small to large, gradually read in ciphertext feature string with M digital corresponding words
The character on position is accorded with, while gradually being read after the character of the second key according to the order turned left from the right side, whether two characters are judged
Unanimously, if so, then deleting the character of ciphertext feature string and continuing executing with step DS23, conversely, carrying out abnormality alarming simultaneously
Terminate;It is opposite process with the step S42 in compression encryption method in this step, is according to character string during addition character
A high position is added to the order of low level, is verified and is according to from low level to the order of a high position when deleting character.It is close by first
The character of key or the second key be added in character string can be according to from left to right, the order such as from right to left, when checking is deleted
Accordingly in turn.
Whether DS23, judgment step DS22 execution number of times are less than M, and step DS22 is performed if so, then returning, otherwise knot
Beam.Here end refers to end step DS2, is not the end of whole method.
DS3, ciphertext feature string decompressed:Ciphertext feature string is decompressed, and then obtains solution
After the separator in ciphertext feature string after compression, obtain all characters behind separator and be used as random number character string.
DS4, for each biological characteristic character string in ciphertext feature string, one by one verify and to delete the biology special
Levy the character for the first key added in character string;
Specifically, step DS4, including DS41 ~ DS42:
DS41, each character to random number character string, read the numeric word of correspondence position in the identification number of examinee one by one
Symbol;
DS42, for each biological characteristic character string in ciphertext feature string, according to all numerical characters of reading,
The character for the first key added in the biological characteristic character string is verified and deleted one by one.
It is that each biological characteristic character string is tested by step DS421 ~ DS423 in the present embodiment, in step DS42
Card:
DS421, for each biological characteristic character string in ciphertext feature string, according to N number of numerical character of reading,
Calculated using following formula and obtain N number of decryption numeral:
jm_num= i * 100 + (zwnum-1) *10 + num
In above formula, jm_num represents decryption numeral, and i represents the sequence number of numerical character and i=1,2 ... N, num represent numeric word
The value of symbol, zwnum represents the sequence number of biological characteristic character string;
DS422, according to numerical order from small to large, gradually read corresponding with N number of numeral in biological characteristic character string
Character on character position, while from left to right gradually reading after the character of first key, judges whether two characters are consistent, if
It is then to delete the character of biological characteristic character string and continue executing with step DS423, conversely, carrying out abnormality alarming and terminating;Class
As, this step is also opposite process with the step S22 in compression encryption method;
Whether DS423, judgment step DS422 execution number of times are less than N, if so, then return execution step DS422, on the contrary
Terminate.Here end, refers to end step S42, completes the checking to a biological characteristic character string, does not imply that end is whole
Individual method.
DS5, all biological characteristic character strings are converted into corresponding biological information.Hereafter, system can speak
Sound is reminded or word is reminded, and reminds examinee to provide corresponding characteristic information, completes to compare.
The character for the second key that this method is added in ciphertext feature string by progressively verifying and deletion, are then solved
Compress after ciphertext feature string, then progressively checking is added to the character of the first key in each biological characteristic character string, it is real
Now decryption-decompression-process decrypted again, so as to verify the legal of ciphertext feature string and each biological characteristic character string
Property, corresponding biological information finally is converted to when verifying that data are legal, the comparison basis of certification of exam inee's identity is used as.
This method has personalized difference, and Information Security is high, can effectively verify the legitimacy of the conscientious data of examinee's identity, and data
Amount is small, and arithmetic speed is fast, and recognition effect is good.
Embodiment three
The present embodiment is a specific example of embodiment one, and reference picture 3, this compression decryption method is as follows:
A. the unique identifying number KSNO of examinee is taken out, 3 are taken at random in each position of KSNO(The digit of first key " MST ",
It is 4 herein if first key is 4)Individual numerical character(If KSNO digits are more than 10, first 10 are only taken, if
Encounter letter, then skip, 10 chances take 3 numerical characters, if repeatedly getting letter in 10 times, are likely to occur and get
Numeral less than 3, such as 1,2, if getting 0, null-encryption), as KSNO is:325A3993229, then random read take 3
The detailed process of numerical character is as follows:
A. a position random number is taken(0-ksno.length or 1-9)1 time, as being for the first time 3, then the 4th number A is taken, jumped
Cross;
B. a position random number is taken(0-ksno.length or 1-9)1 time, it is for the second time such as 8, then takes the 9th number 2;
C. a position random number is taken(0-ksno.length or 1-9)1 time, it is for the second time such as 0, then takes the 1st number 3;
D. a position random number is taken(0-ksno.length or 1-9)1 time, it is for the second time such as 2, then takes the 3rd number 5;
Here by multiple generation random number, then using random number as KSNO character strings character subscript, to read
Numerical character.For example, when random number is 0, the corresponding reality of character string subscript 0 is first character.
B. it is 2,3,5 that what is obtained, which will fill the digit of password,;
C. fingerprint characteristic character string is started the cycle over, is mixed by formula jmnum=i * 100+(tznum-1) * 10+num
Password, jmnum represents encryption numeral, and the sequence number and i=1,2 ... N, num that i represents numerical character represent the value of numerical character,
Zwnum represents the sequence number of biological characteristic character string:
A.i=1, num=2, zwnum=1, therefore (i * 100+(tznum-1) * 10+num=1*100+ (1-
1) * 10+2=102, to the 102nd addition letter M of first fingerprint characteristic character string;
B. i=2, num=3, zwnum=1, therefore (i * 100+(tznum-1) * 10+num=2*100+ (1-
1) * 10+3=203, to the 203rd addition letter S of first fingerprint characteristic character string;
C. i=3, num=5, zwnum=1, therefore (i * 100+(tznum-1) * 10+num=3*100+ (1-
1) * 10+5=305, tee is added to the 305th of first fingerprint characteristic character string;
D. to the special character string of second fingerprint:I=1, num=2, zwnum=2, therefore (i * 100+(tznum-1) *
10+num=1*100+ (2-1) * 10+2=112, to the 112nd addition letter M of second fingerprint characteristic character string;
E. i=2, num=3, zwnum=2, therefore (i * 100+(tznum-1) * 10+num=2*100+ (2-
1) * 10+3=213, to the 213rd addition letter S of second fingerprint characteristic character string;
F. i=3, num=5, zwnum=2, therefore (i * 100+(tznum-1) * 10+num=3*100+ (2-
1) * 10+5=315, tee is added to the 315th of second fingerprint characteristic character string;
The order of above step addition character is added according to character position from big to small, and step a ~ f sequence number is only
It is to be used to distinguish each step, does not represent the order of addition;
G. the 3rd and below other fingerprint characteristic character strings are circulated.
D. random cipher number 802 is added to finally behind character string after addition password, addition ", 802 ", constitute total characteristic word
Symbol string;
E. the length of the second key is obtained, when such as the second key is " MSTCHINA ", length is 8;
F. it upside down and find forward from last position of total characteristic character string, 8 numeric type letters are found in order, obtain
To numeral be 1,6,2,6,1,7,6,7 respectively;
G. to prevent overlapping and repeating to be shown in character string head, it is incremented by 10 per digit before when taking one more, passs
It is 71,66,52,46,31,27,16,7 after increasing;
H. a code characters, such as 71- are added behind each respectively in order>M, 66->S, 52->T, 46->C,
31->H, 27->I, 16->N, 7->A;The order for adding character is added according to character position from big to small;
I. the total characteristic character string and the other information of examinee after conversion are converted into Quick Response Code in the lump, formed with examinee only
The picture of one mark name.
It is noted that in Fig. 3, the description of use is that " sand " in " mixing sand " " sand ", figure is to mention in the present invention
First key, process of as " mixing sand " is added in fingerprint characteristic character string by the character of first key one by one.
Example IV
Reference picture 4 a, specific example of embodiment two, i.e. one kind of compression encryption method described in embodiment three is examined
Raw identification authentication data decryption method, including:
A. first ciphertext feature string is obtained with QRcode Quick Response Codes identification two-dimensional code data;
B. it is 8 to obtain the second key " MSTCHINA " length;
C. it upside down and find forward from last position of ciphertext feature string, M numeric type letter is found in order, is obtained
To numeral be 1,6,2,6,1,7,6,7 respectively;
D. per taking a numeral more, before digit be incremented by 10, be 71,66,52,46,31,27,16,7 after being incremented by;
E. verified respectively in each digital corresponding character position in order and delete the character of second key, such as
71->M, 66->S, 52->T, 46->C, 31->H, 27->I, 16->N, 7->A;The order for deleting character is according to from small to large
What character position was deleted;
F. ciphertext feature string is decompressed;
G. the digit strings " 802 " of ciphertext feature string backmost after ", " are obtained, and it is long to record digit strings
N=3 are spent, examinee's unique identifying number KSNO is obtained;
H. the corresponding digit strings " character in 8,0,2 " digit order numbers in examinee's unique identifying number KSNO in first 10 is taken;
I. confirm that to delete the circulation for before of the original figure of sand takes out numeral, the digit that delete password of acquisition is
2,3,5;
J. take out ciphertext feature string in each fingerprint characteristic character string, and fingerprint characteristic character string sequence number
zwnum(zwnum<10);
K. fingerprint characteristic is started the cycle over, password, wherein jm_ are mixed by formula jm_num=i*100+ (zwnum-1) * 10+num
Num represents decryption numeral, and the sequence number and i=1,2 ... N, num that i represents numerical character represent the value of numerical character, and zwnum represents life
The sequence number of thing feature string:
A. to first fingerprint characteristic character string, i=1, num=2, zwnum=1, therefore (i*100+ (tznum-1) * 10+
Num=1*100+ (1-1) * 10+2=102, to the 102nd of first fingerprint characteristic character string, are verified whether as alphabetical M, if
It is to delete M;
B.i=2, num=3, zwnum=1, therefore (i*100+ (tznum-1) * 10+num=2*100+ (1-1) * 10+3=203,
To the 203rd of first fingerprint characteristic character string, verify whether as alphabetical S, if then deleting S;
C.i=3, num=5, zwnum=1, therefore (i*100+ (tznum-1) * 10+num=3*100+ (1-1) * 10+5=305,
To the 305th of first fingerprint characteristic character string, verify whether as tee, if then deleting T;
D. to the special character string of second fingerprint:I=1, num=2, zwnum=2, therefore (i*100+ (tznum-1) * 10+
Num=1*100+ (2-1) * 10+2=112, to the 112nd of second fingerprint characteristic character string, are verified whether as alphabetical M, if
It is to delete M;
E.i=2, num=3, zwnum=2, therefore (i*100+ (tznum-1) * 10+num=2*100+ (2-1) * 10+3=213,
To the 213rd of second fingerprint characteristic character string, verify whether as alphabetical S, if then deleting S;
F.i=3, num=5, zwnum=2, therefore (i*100+ (tznum-1) * 10+num=3*100+ (2-1) * 10+5=315,
To the 315th of second fingerprint characteristic character string, verify whether as tee, if then deleting T;
The order that character is deleted in step a ~ f is deleted according to character position from big to small;
L. read fingerprint characteristic character string and be converted to fingerprint feature information, and remind examinee to provide pair by sound, word
The characteristic information answered, completes to compare.
Above is the preferable implementation to the present invention is illustrated, but the invention is not limited to the implementation
Example, those skilled in the art can also make a variety of equivalent variations or replace on the premise of without prejudice to spirit of the invention
Change, these equivalent modifications or replacement are all contained in the application claim limited range.
Claims (9)
1. a kind of certification of exam inee's identity data compression encryption method, it is characterised in that including:
S1, the biological characteristic for reading examinee, and generate multiple biological characteristic character strings;
S2, the length with reference to first key and examinee identification number, each biology is one by one added to by the character of first key
It is encrypted in feature string;
S3, the total characteristic character string that all biological characteristic character strings are arranged to make up is compressed;
S4, the length with reference to the second key, the character of the second key is one by one added in the total characteristic character string after compression
It is encrypted;
S5, total characteristic character string changed into Quick Response Code;
The step S2, including:
S21, the default first key of reading are simultaneously obtained after its length N, the N number of numeric word of random read take from the identification number of examinee
Symbol, while the digit of N number of numerical character is combined to form random number character string in order;
S22, for each biological characteristic character string, according to N number of numerical character of reading, the character of first key is one by one added
It is added to the diverse location of the biological characteristic character string.
2. a kind of certification of exam inee's identity data compression encryption method according to claim 1, it is characterised in that the step
S3, including:
S31, all biological characteristic character strings are arranged in order, and added successively in the position of last biological characteristic character string
Plus total characteristic character string is constituted after separator and random number character string;
S32, total characteristic character string is compressed.
3. a kind of certification of exam inee's identity data compression encryption method according to claim 2, it is characterised in that the step
S4, including:
S41, default second key of reading are simultaneously obtained after its length M, are opened from last position of the total characteristic character string after compression
Begin, search in order and read M numerical character, and M numerical character of reading is incremented by 10 one by one according to reading order, most
M numeral is obtained afterwards;
S42, according to numerical order from big to small, the character of the second key is from left to right one by one added to total after compression
With M digital corresponding character positions in feature string.
4. a kind of certification of exam inee's identity data compression encryption method according to claim 1, it is characterised in that the S22,
Including:
S221, for each biological characteristic character string, according to N number of numerical character of reading, calculated using following formula and obtain N number of encryption
Numeral:
Jmnum=i*100+ (zwnum-1) * 10+num
In above formula, jmnum represents encryption numeral, and i represents the sequence number and i=1 of numerical character, and 2 ... N, num represents numerical character
Value, zwnum represents the sequence number of biological characteristic character string;
S222, according to numerical order from big to small, the character of first key is one by one added to the biology from right to left special
Levy in character string with the digital corresponding character position of N number of encryption.
5. using a kind of certification of exam inee's identity data decryption method of the compression encryption method described in claim 1, its feature exists
In, including:
DS1, reading Quick Response Code simultaneously parse acquisition ciphertext feature string;
DS2, the length with reference to the second key, one by one verify and delete the second key for being added in ciphertext feature string
Character;
DS3, ciphertext feature string decompressed;
DS4, for each biological characteristic character string in ciphertext feature string, one by one verify and delete the biological characteristic word
The character for the first key added in symbol string;
DS5, all biological characteristic character strings are converted into corresponding biological information.
6. a kind of certification of exam inee's identity data compression encryption method according to claim 5, it is characterised in that the step
DS2, including:
DS21, default second key of reading are simultaneously obtained after its length M, since last position of ciphertext feature string, are pressed
Sequential search simultaneously reads M numerical character, and M numerical character of reading is incremented by into 10 one by one according to reading order, finally obtains
Obtain M numeral;
DS22, according to numerical order from small to large, gradually read in ciphertext feature string with M digital corresponding character bits
The character put, while gradually being read after the character of the second key according to the order turned left from the right side, judges whether two characters are consistent,
If so, then deleting the character of ciphertext feature string and continuing executing with step DS23, conversely, carrying out abnormality alarming and terminating;
Whether DS23, judgment step DS22 execution number of times are less than M, perform step DS22 if so, then returning, otherwise terminate.
7. a kind of certification of exam inee's identity data compression encryption method according to claim 6, it is characterised in that the step
DS3, it is specially:
Ciphertext feature string is decompressed, and then obtained after the separator in the ciphertext feature string after decompression,
Obtain all characters behind separator and be used as random number character string.
8. a kind of certification of exam inee's identity data compression encryption method according to claim 7, it is characterised in that the step
DS4, including:
DS41, each character to random number character string, read the numerical character of correspondence position in the identification number of examinee one by one;
DS42, for each biological characteristic character string in ciphertext feature string, according to all numerical characters of reading, one by one
Verify and delete the character for the first key added in the biological characteristic character string.
9. a kind of certification of exam inee's identity data compression encryption method according to claim 8, it is characterised in that the step
DS42, including:
DS421, for each biological characteristic character string in ciphertext feature string, according to N number of numerical character of reading, use
Following formula, which is calculated, obtains N number of decryption numeral:
Jm_num=i*100+ (zwnum-1) * 10+num
In above formula, jm_num represents decryption numeral, and i represents the sequence number and i=1 of numerical character, and 2 ... N, num represents numerical character
Value, zwnum represents the sequence number of biological characteristic character string;
DS422, according to numerical order from small to large, gradually read in biological characteristic character string with N number of digital corresponding character
Character on position, while from left to right gradually reading after the character of first key, judges whether two characters are consistent, if so, then
Delete the character of biological characteristic character string and continue executing with step DS423, conversely, carrying out abnormality alarming and terminating;
Whether DS423, judgment step DS422 execution number of times are less than N, perform step DS422 if so, then returning, otherwise terminate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410789352.XA CN104506322B (en) | 2014-12-17 | 2014-12-17 | A kind of certification of exam inee's identity data compression encryption method and decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410789352.XA CN104506322B (en) | 2014-12-17 | 2014-12-17 | A kind of certification of exam inee's identity data compression encryption method and decryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104506322A CN104506322A (en) | 2015-04-08 |
CN104506322B true CN104506322B (en) | 2017-10-17 |
Family
ID=52948038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410789352.XA Active CN104506322B (en) | 2014-12-17 | 2014-12-17 | A kind of certification of exam inee's identity data compression encryption method and decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104506322B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106411813A (en) * | 2015-07-28 | 2017-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Biological characteristic transmission method and device and mobile terminal |
CN105978889B (en) * | 2016-06-20 | 2019-06-11 | 北京集创北方科技股份有限公司 | Biological feature encryption method and device |
CN106330464B (en) * | 2016-10-26 | 2019-04-23 | 上海众人网络安全技术有限公司 | An identity authentication method, device and system |
CN107180255A (en) * | 2017-06-09 | 2017-09-19 | 江苏物码信息技术有限公司 | A kind of examination based on Quick Response Code enters field system |
CN108769052A (en) * | 2018-06-12 | 2018-11-06 | 北斗巡星信息科技有限公司 | Wrist strap transmits the encrypted method and device of information |
CN117238065B (en) * | 2023-11-10 | 2024-03-26 | 深圳市每开创新科技有限公司 | A lock unlocking method, passive electronic lock, electronic device and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1259712A (en) * | 2000-01-11 | 2000-07-12 | 熊猫电子集团有限公司 | Finger print, IC card identification method and device for status differentiation |
CN101753304A (en) * | 2008-12-17 | 2010-06-23 | 中国科学院自动化研究所 | Method for binding biological specificity and key |
CN102970144A (en) * | 2012-12-20 | 2013-03-13 | 四川长虹电器股份有限公司 | Identity-based authentication method |
-
2014
- 2014-12-17 CN CN201410789352.XA patent/CN104506322B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1259712A (en) * | 2000-01-11 | 2000-07-12 | 熊猫电子集团有限公司 | Finger print, IC card identification method and device for status differentiation |
CN101753304A (en) * | 2008-12-17 | 2010-06-23 | 中国科学院自动化研究所 | Method for binding biological specificity and key |
CN102970144A (en) * | 2012-12-20 | 2013-03-13 | 四川长虹电器股份有限公司 | Identity-based authentication method |
Non-Patent Citations (1)
Title |
---|
"基于加密二维条码和指纹识别的证件防伪系统";方媛等,;《计算机与数字工程》;20090130;第37卷(第1期);第112-114页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104506322A (en) | 2015-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104506322B (en) | A kind of certification of exam inee's identity data compression encryption method and decryption method | |
Katiyar et al. | Online voting system powered by biometric security using steganography | |
CN109241756B (en) | Data processing method, system, server and medium based on block chain | |
Hakak et al. | Preserving content integrity of digital holy Quran: Survey and open challenges | |
WO2017045594A1 (en) | Anti-counterfeit method | |
CN104823203A (en) | Biometric template security and key generation | |
CN107749848A (en) | Processing method, device and the Internet of things system of Internet of Things data | |
CN109803142B (en) | Encrypted domain image reversible data hiding method based on neighborhood prediction | |
CN104993923A (en) | Radar data protection method based on combination of information hiding and encryption techniques | |
CN107516045A (en) | Document protection method and device | |
CN107113170A (en) | Biometric templates preservation, verification method and biometric devices, terminal | |
Alkhudaydi et al. | Integrating light-weight cryptography with diacritics Arabic text steganography improved for practical security applications | |
Hazarika et al. | A novel partial image encryption using chaotic logistic map | |
Gandhi et al. | Study on security of online voting system using biometrics and steganography | |
CN102567657A (en) | Digital work ownership authentication system and digital work ownership authentication method | |
CN105872305B (en) | A kind of completely separable encryption area image reversible data concealing method | |
CN105912894B (en) | A method of it is anti-fake that passport NO. being used for E-seal printed text | |
CN103646121B (en) | A kind of identification code and using method and device | |
CN119675967A (en) | A file transmission protection method, system and device based on multiple encryption algorithms | |
CN101626290A (en) | Method for signature and confidentiality by fingerprints | |
KR20200085204A (en) | Verifiable Electronic Voting System | |
CN105844723B (en) | PSAM card safeguard management method and system | |
Mark et al. | A secured online voting system by using blockchain as the medium | |
CN112446021A (en) | Fingerprint authentication method and device based on SM9 encryption and related equipment | |
CN104036773B (en) | The content of text of typing is passed through into method and system of the false proof condition discriminating apparatus to play |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |