CN118677620A - Information acquisition system and method, real-name information acquisition system and method and application thereof - Google Patents
Information acquisition system and method, real-name information acquisition system and method and application thereof Download PDFInfo
- Publication number
- CN118677620A CN118677620A CN202410633945.0A CN202410633945A CN118677620A CN 118677620 A CN118677620 A CN 118677620A CN 202410633945 A CN202410633945 A CN 202410633945A CN 118677620 A CN118677620 A CN 118677620A
- Authority
- CN
- China
- Prior art keywords
- information
- hash value
- express
- ciphertext
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000012545 processing Methods 0.000 claims abstract description 17
- 238000012795 verification Methods 0.000 claims description 35
- 239000000284 extract Substances 0.000 claims 2
- 238000004891 communication Methods 0.000 description 12
- 230000007246 mechanism Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000002716 delivery method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Operations Research (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Marketing (AREA)
- Computing Systems (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an information acquisition system, a method, a real-name information acquisition system, a method and application thereof, wherein the information acquisition system comprises a first reader for acquiring first information; the encryption unit is used for encrypting the first information by using a first key of an encryption algorithm to form a first information ciphertext; the Hash unit is used for carrying out Hash operation on the first information by using a Hash algorithm to generate a first information Hash value; the second reader collects second information; the data processing unit stores or sends the second information, the first information ciphertext and the first information hash value; the first information hash value is directly used and/or operated on.
Description
The invention is a divisional application based on an invention patent application (application number 2016111120010, invention name: information acquisition method and system, real-name system information acquisition method, system and application) submitted to the China national intellectual property office by the applicant in 2016 12/06.
Technical Field
The invention relates to the field of data acquisition, in particular to an information acquisition method and system.
Background
With the rapid development of information technology, the information technology has wide application in various fields, and the collection, management and use of various information are the basis of the application of the information technology in various fields, so how to collect, manage and use information efficiently, safely and reliably is an important subject, especially for collecting information containing privacy. For example, for some collected confidential or private information, the information needs to be used in an unsafe environment such as a public communication network, and meanwhile, the information needs to be used in a safe environment such as a private communication network, so that how to ensure safe, efficient and reliable use of the information is a problem to be solved.
Taking the recent express real name system specified in China as an example, the real name system is required to be adopted for sending and receiving the express, and the identity card information of the sender and the receiver is required to be checked and registered so as to ensure the safety of the express. However, the mode increases the workload of the staff of the express company (including postal system and logistics company) (the staff for inputting the identity card information of the express company and the delivery staff); secondly, the identity card cannot be identified due to the professionality of identity card identification; thirdly, because the existing manual identification and registration of the identity card information of related personnel are then manually input into a system appointed by a public security department, the whole link has more participants, and the personnel quality of the personnel in the express delivery industry is uneven due to the fact that the personnel quality of the personnel in the express delivery industry is recorded and transferred in advance manually and paper, the leakage of privacy information on express delivery sheets which are continuously exploded in the earlier stage and the like are caused, and the concern of the leakage of the identity card information is increased. Moreover, existing approaches do have the risk of causing identity card information to leak. Fourth, although the prior art has an identification card reading device for identifying and verifying the authenticity of an identification card and reading the data information of the real identification card, the read information is stored and used in a plaintext manner, and the security of sensitive information cannot be guaranteed. How to efficiently, safely and effectively and comprehensively popularize the express real-name system work, and besides the guarantee in a system, the technical support is more needed.
Disclosure of Invention
Aiming at the defects, the technical problem to be solved by the invention is to provide a system and a method for ensuring the information acquisition safety; further, an acquisition system, a method and application thereof capable of ensuring the safety of real-name information are provided.
The method can be applied to the safe collection and verification of various sensitive information, real-name information and other sensitive information and/or information needing confidentiality and the like.
An information acquisition system, comprising,
The first reader is used for collecting first information;
The encryption unit is used for encrypting the first information by using a first key of an encryption algorithm to form a first information ciphertext;
The Hash unit is used for carrying out Hash operation on the first information by using a Hash algorithm to generate a first information Hash value;
the second reader collects second information;
the data processing unit stores or sends the second information, the first information ciphertext and the first information hash value; the first information hash value is directly used and/or operated on.
An information verification system for verifying the data formed by the method, comprising,
The first information decryption system is used for extracting the bound or serially connected second information and the first information ciphertext, and decrypting the first information ciphertext by utilizing a corresponding second key of the encryption algorithm to obtain first information;
and the first information verification system is used for verifying the first information.
The safe collection system for express real-name system information comprises,
The identity card reader is used for verifying and collecting identity card information;
the encryption unit is used for encrypting the identity card information by using a public key of an asymmetric encryption algorithm to form an identity card information ciphertext;
the Hash unit is used for carrying out Hash operation on the identity card information by using a Hash algorithm to generate an identity card Hash value;
The express bill reader is used for collecting express information;
The data processing unit stores and/or sends the express information, the identity card information ciphertext and the identity card hash value; and directly using and/or operating the identity card hash value.
A verification system for express real-name system information, which verifies data formed by the system of claim 3, comprising,
The identity card information decryption system is used for extracting the identity card information ciphertext according to the express information, and decrypting the identity card information ciphertext by utilizing a corresponding private key of the asymmetric encryption algorithm to obtain the identity card information;
The real-name express checking system is used for verifying the identity card information;
Or, including,
The identity card information decryption system is used for extracting the bound or concatenated express information and the identity card information ciphertext according to the express information, and decrypting the identity card information ciphertext by utilizing a corresponding private key of an asymmetric encryption algorithm to obtain the identity card information;
And the real-name express checking system is used for verifying the identity card information.
An information acquisition system, comprising,
The first reader is used for collecting first information;
The Hash unit is used for carrying out Hash operation on the first information by using a Hash algorithm to generate a first information Hash value;
the second reader collects second information;
the data processing unit stores or sends the second information, the first information ciphertext and the first information hash value; the first information hash value is directly used and/or operated on.
An information verification system for verifying data formed by the system, comprising,
And the first information verification system is used for extracting a first information hash value and verifying the first information hash value.
The safe collection system for express real-name system information comprises,
The identity card reader is used for verifying and collecting identity card information;
the Hash unit is used for carrying out Hash operation on the identity card information by using a Hash algorithm to generate an identity card Hash value;
The express bill reader is used for collecting express information;
The data processing unit stores and/or sends the express information, the identity card information ciphertext and the identity card hash value; and directly using and/or operating the identity card hash value.
A verification system for express real-name system information, which verifies data formed by the system of claim 7, comprising,
The real-name express checking system is used for extracting the identity card hash value according to express information and verifying the identity card information hash value;
Or, include;
And the real-name express checking system is used for extracting the bound or serially connected express information and the identity card hash value and verifying the identity card information hash value.
An information acquisition method, which comprises the steps of,
Collecting first information;
performing hash operation on the first information by using a hash algorithm to generate a first information hash value;
collecting second information;
storing or sending the second information, the first information ciphertext and a first information hash value; the first information hash value is directly used and/or operated on.
The information security collection method is that the collected information is respectively encrypted and hashed to form ciphertext and hash value, the hash value is used for the application of non-security environment; the ciphertext is used for decrypting into plaintext applications and/or operations in a secure environment, or the applications and/or operations are directly performed in a ciphertext manner.
The invention encrypts the identity card information by adopting an asymmetric encryption algorithm (calculation key system) (of course, symmetric encryption can be adopted, and only the encryption key is recorded in the equipment in a specific mode), and the encryption party only can encrypt the public key (of course, the private key) and can only encrypt the encrypted information but can not decrypt the encrypted information, wherein the encrypted ciphertext is sent to a supervision platform (safe environment), and the supervision platform only holds the corresponding private key (or the corresponding public key) which can be decrypted, so that the encrypted information is decrypted, and the identity card information is obtained. Meanwhile, the encrypted secret key can be disclosed or office opened to express companies or equipment developers, different express companies can use different secret key pairs (public key and private key) according to the needs, and dynamic replacement can be performed according to the needs. The express company uses the hash value of the identity card information to carry out express sorting, dispatch and storage, and the hash value has unidirectionality and is difficult to restore the corresponding identity card information, so that the safety of the identity card information is ensured, and although different information possibly exists in a hash algorithm to obtain the same hash value (namely, hash conflict), the probability is extremely low, a conflict mechanism is difficult to find, and the data of the identity card information is short, so that the conflict is less; of course, the length of the hash value may also be increased to reduce the occurrence of collisions. Moreover, the hash value is used for storage and comparison, so that the efficiency can be improved.
Drawings
In order to more clearly describe the relevant technical solutions to which the invention relates, the figures to which it relates will be briefly described below, it being obvious that the figures in the following description are only some embodiments of the invention, from which other figures can be obtained, without the inventive effort, for a person skilled in the art.
FIG. 1 is a schematic diagram of a system for collecting and verifying information security of an express real name system;
One embodiment of the data structure of FIG. 2;
another embodiment of the data structure of fig. 3;
FIG. 4 is a flow chart (receiving part) for the safe collection and verification of express real name system information;
FIG. 5 is a flow chart (dispatch) for secure collection and verification of information in the express real name system;
FIG. 6 is a schematic diagram illustrating the operation of an embodiment of an information security collection terminal (one of the devices belonging to the front end) for the real name system of express delivery;
FIG. 7 is a schematic diagram of the information security acquisition and verification system.
Reference numerals illustrate:
1. A collecting terminal; 11. touching the display screen; 12. an identity card reader radio frequency antenna; 13. a bar code reading window; 2. express delivery; 21. express bill bar codes; 3. an identity card.
Detailed Description
For the purpose of facilitating further understanding of the present application and for clearly understanding the technical solutions described in the present application, a complete and thorough disclosure of the relevant technical contents of the present application will be provided to those skilled in the art, and the detailed description of the embodiments of the present application will be given with reference to the accompanying drawings, of course, the detailed description of the embodiments of the present application being given by way of example only, and being used to facilitate understanding of the present application and its core ideas.
Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts and/or without departing from the spirit and substance of the present invention are intended to fall within the protection scope of the present invention even if the execution sequence (connection relation or structure of parts) of the steps is changed and various corresponding changes and modifications are made according to the present invention.
The relevant terms referred to in the present invention are defined as follows:
The identity card information comprises an identity card number, a name, an identity card validity period, a photo and fingerprint information. The photo and the fingerprint of the sender, the photo of the receiver and the fingerprint acquired on site can be checked according to the requirement, so that the comparison of the person and the certificate is realized, and the information is required to be read independently instead of the identity card reader, and the photo, the fingerprint collector and the like are added on the acquisition terminal to be realized and are matched with corresponding software to realize.
And encrypting the identity card information to obtain data.
The hash value of the identity card is obtained by carrying out operation on the identity card information by adopting a hash function, such as a value obtained by adopting MD 5. In practical use, in order to facilitate use, the identification card number, the name, the validity period and the like can be respectively hashed, or hashed (hashed) after combination, and corresponding hashed values are selected for use according to requirements.
Express information, information read from the express bill, including bar code information, telephone number information and the like on the express bill, and other readable information, even information such as addresses, names and the like of a sender and a receiver on the express bill.
Express delivery receiving data, wherein the express delivery person receives information data generated by a sender, and the information data comprises express delivery information, an identity card information ciphertext, an identity card hash value, express delivery information and other related information (such as photos, fingerprint information and the like).
And the express delivery data is delivered by the express delivery person to the information data generated by the addressee.
The following describes, by way of example, a specific technical scheme of the present invention and specific technical means implemented:
Referring to fig. 1 and 6, the acquisition terminal 1 includes an identity card reader for reading identity card information, a barcode or two-dimensional code reader for reading the barcode, and corresponding units of data processing, man-machine interaction, communication, etc., if a photo (personnel or express photo), a fingerprint, etc., a camera, a fingerprint collector, etc. are required to be added; and meanwhile, corresponding software or an application specific integrated circuit is configured on the terminal to realize corresponding functions. The acquisition terminal can also select the components or parts and modules suitable for the acquisition terminal according to different requirements or application scenes. In the embodiment for application to the express industry, the terminal constituted by the above-described components is described as an example, but the description is not limited to the above-described configuration. In addition, as an application of the express industry, other devices and/or software may be loaded on the terminal 1 to meet the application requirements thereof.
The touch display 11 is used for man-machine interaction operation between the user (courier) and the acquisition terminal 1, and of course, it can also be other man-machine interaction devices, such as a common display or information output mechanism, a keyboard or other input mechanisms, and the like.
An identification card reader radio frequency antenna 12 for reading identification card information; of course, other information collecting components or devices of the reader may be adopted as required, which are not described herein in detail.
The barcode reading window 13 can read the identity card and express single code information at one time through the arrangement scheme of the reading window and the radio frequency antenna of the identity card reader, so that the efficiency is improved, and errors are avoided; when the reading device is used, the identity card is placed under the express bill or is placed flat with the express bill, so that reading of the identity card and the express bill can be realized.
Express delivery 2: the express delivery needs to be carried out, and the express delivery can be documents or articles and is reasonably packaged.
Express bill bar code 21: and recording information such as names, addresses, telephones and the like of the receiving/sending persons, the single number information of the express company and the express bill of the bar code. The information can be recorded by a machine or a visual reading mode, such as digitized information (two-dimensional code, bar code, part-of-speech medium information waiting), natural language and the like.
The identity card 3, the second generation of the Chinese identity card, records the identity information of the user. The reader can also be other certificates with readable chips, such as magnetic stripes, radio frequency cards, contact type IC cards, magnetic codes, optical codes and the like, and the corresponding identity card reader is also a corresponding device capable of verifying and reading the chips and is provided with a corresponding reading mechanism, such as a magnetic head, an antenna, a card slot and the like.
The system and the method implemented with reference to fig. 1 and 4 comprise:
The system is a safe collection system of express real-name information at the front end, such as a collection terminal, which is held and carried by an express delivery person (user) to collect information in the process of express delivery receiving/sending, corresponding communication and the like. The identity card reader is used for verifying and collecting identity card information; encrypting the identity card information by using a public key (a private key or a symmetric encryption algorithm) of an asymmetric encryption algorithm to form an encryption unit of an identity card information ciphertext; performing a hash operation on the identity card information by using a hash algorithm to generate a hash unit of a hash value; the data processing unit forms the data into real-name express data of the data structure shown in fig. 2 and 3, and sends the real-name express data to an express company data center at the rear end and/or a public security part data center (which can also be a supervision platform of a feasible third party supervision mechanism of a public security part), generally sends the real-name express data to the express company data center, and sends the real-name express data to the public security part data center of the public security part supervision platform after subsequent processing, or can directly and respectively send the real-name express data center to the express company data center by front-end equipment, so that the real-name express monitoring platform is unfavorable for information security, and the power consumption load and structure of the front-end equipment are increased.
The express sorting platform is positioned at the rear end; the real-name express delivery supervision platform (abbreviated as supervision platform or supervision platform of a feasible third party supervision organization of public security department).
The express sorting platform is located in each express company, and generally each express company at least has one shown platform, and the shown platform can be improved or otherwise realized based on the original platform according to the technical scheme of the invention. The system comprises a communication system, a data splitting system, an express company data center and a checking and verifying system. The communication system establishes communication connection with front-end devices of a plurality of express companies respectively, and is used for receiving data with a data structure shown in fig. 2 and 3, and connecting with a real-name express supervision platform (abbreviated as supervision platform) (generally adopting special line connection to ensure safety), and sending the data with the corresponding structure shown in fig. 2 and 3 to the supervision platform. And the data splitting system splits the data to different platforms according to the requirement, or further splits the data to facilitate the data storage of the data center. The express company data center is used for storing express data and related express data, processing related express information and real-name system information, and directly comparing the processing by using the hash value of the identity information. And the checking and verifying system is used for scanning the fast-forward and other checking and verifying.
The real-name express delivery supervision platform stores and records the received real-name express delivery number according to the public security department data center; the public security department key management center manages and applies the identity information encryption keys of all express companies; the identity card information decryption system decrypts real-name express information sent by the corresponding express company according to a key recorded by a public security key management center to obtain identity card information; and the real-name express delivery checking system checks the identity card information, performs early warning or corresponding operation according to the checking result, and determines whether to send the identity card information to an express delivery company according to the checking condition and the established checking mechanism. In addition, in order to realize communication, a communication system should be established, and a communication link should be established with an express company or the like.
Fig. 2 provides a data structure, wherein data a is data generated by front-end equipment and sent to an express sorting platform of an express company, and a data splitting system in the sorting platform is split into data A1 stored by the system and data A2 sent to a police supervision platform. The data A is the serial connection or packaging of the hash value, express information and the ciphertext of the information of the identity card; the data A1 is the hash value of the identity card and the serial connection or packaging of express information; the data A2 is the serial connection or package of the express company ID (used for the supervision platform to identify the data source), the express information and the cipher text of the identity card information.
The structure shown in fig. 3 is that the data B is data generated by front-end equipment, and is sent to an express sorting platform of an express company, and a data splitting system in the sorting platform is split into data B1 stored by the system and data B2 sent to a police supervision platform. The data B is a serial connection or package of an identity card hash value, express inspection and vision and image information, express information and an identity card information ciphertext; the data B1 is the serial connection or package of the hash value of the identity card, the express inspection and the image information and the express information; the data B2 is serial connection or package of express company ID (for the supervision platform to identify the data source), express information and ID card information ciphertext.
Fig. 4 and 5 show collection and delivery data acquisition and verification flows of real-name express application respectively.
The safe collection system for express real-name system information comprises,
An identity card reader for verifying and collecting identity card information;
Encrypting the identity card information by using a public key of an asymmetric encryption algorithm to form an encryption unit of an identity card information ciphertext;
carrying out hash operation on the identity card information by using a hash algorithm to generate a hash unit of a hash value;
an express bill reader for collecting express information;
And a storage unit or a communication unit for storing or sending the express information, the identification card information ciphertext and the hash value.
Preferably, the system further comprises a data processing unit, wherein the express information and the hash value are bound or connected in series and then sent to an express sorting platform; and the express information and the identity card information ciphertext are bound or connected in series and then sent to the verification platform.
The verification system for the express real-name system information verifies the data formed by the method, which comprises,
Extracting the bound or serially connected express information and the identity card information ciphertext according to the express information, and decrypting the identity card information ciphertext by utilizing a corresponding private key of an asymmetric encryption algorithm to obtain an identity card information decryption system of the identity card information; and a real-name express checking system for verifying the identity card information.
An information acquisition system, comprising,
A first reader for collecting first information;
Encrypting the first information by using a first key of an encryption algorithm to form an encryption unit of a first information ciphertext;
performing hash operation on the first information by using a hash algorithm to generate a hash unit of a hash value;
a second reader that collects second information;
And a storage unit or a communication unit for storing or sending the second information and the first information ciphertext and the hash value.
Preferably, the method further comprises a data processing unit, wherein the second information and the hash value are bound or concatenated and then sent to a data application platform or a public network platform; and the second information and the first information ciphertext are bound or connected in series and then sent to the verification platform.
An information verification system for verifying data formed by the system, comprising,
According to the second information, extracting the bound or serially connected second information and the first information ciphertext, and decrypting the first information ciphertext by utilizing a corresponding second key of an asymmetric encryption algorithm to obtain a first information decryption system of the first information; and a first information verification system for verifying the first information.
The information acquisition system is used for respectively encrypting and hashing the acquired information to form an encryption unit and a hash operation unit of the ciphertext and the hash value respectively and an application system for applying the hash value; a decryption unit for decrypting the ciphertext, and an application system for applying the decrypted plaintext; alternatively, the application system may apply and/or operate directly in a ciphertext manner.
As a specific technical scheme, the real-name information acquisition system at the front end comprises the steps of verifying and acquiring identity card information; encrypting the identity card information by using a public key of an encryption algorithm to form an identity card information ciphertext; performing hash operation on the identity card information by using a hash algorithm to generate a hash value; the ciphertext is sent to a security environment to be decrypted into plaintext application or operation, or the ciphertext is directly used for application and/or operation; and sending the hash value to an unsafe environment to directly use or operate.
A method for the secure collection of information, comprising,
Collecting first information;
Encrypting the first information by using a first key of an encryption algorithm to form a first information ciphertext;
Performing hash operation on the first information by using a hash algorithm to generate a hash value;
collecting second information;
And storing or sending the second information and the first information ciphertext and the hash value.
Preferably, the second information and the hash value are bound or concatenated and then sent to a data application platform or a public network platform; and the second information and the first information ciphertext are bound or connected in series and then sent to the verification platform.
An information verification method for verifying data formed by the method, which comprises,
And according to the second information, extracting the bound or serially connected second information and the first information ciphertext, decrypting the first information ciphertext by utilizing a corresponding second key of the asymmetric encryption algorithm to obtain first information, and verifying the first information.
The information security collection method is that the collected information is respectively encrypted and hashed to form ciphertext and hash value, the hash value is used for the application of non-security environment; ciphertext is used for plaintext application or operation in a secure environment, or is directly applied and/or operated in a ciphertext mode.
The real-name system information acquisition method comprises the steps of verifying and acquiring identity card information; encrypting the identity card information by using a public key of an encryption algorithm to form an identity card information ciphertext; performing hash operation on the identity card information by using a hash algorithm to generate a hash value; the ciphertext is sent to a security environment to be decrypted into plaintext application or operation, or the ciphertext is directly used for application and/or operation; and sending the hash value to an unsafe environment to directly use or operate.
The information acquisition system is used for realizing the system of the information safety acquisition method.
The system realizes the system of the real-name system information acquisition method.
The safe collection method of the express real-name system information comprises the steps of,
Verifying and collecting identity card information;
Encrypting the identity card information by using a public key of an asymmetric encryption algorithm to form an identity card information ciphertext;
Hash algorithm is used for carrying out hash operation on the identity card information to generate a hash value;
Collecting express information;
And storing or sending the express information and the identification card information ciphertext and the hash value.
Preferably, the express information and the hash value are bound or connected in series and then sent to an express sorting platform; and the express information and the identity card information ciphertext are bound or connected in series and then sent to the verification platform.
The verification method of the express real name system information verifies the data formed by the method, which comprises the steps of,
And extracting the bound or serially connected express information and the identity card information ciphertext according to the express information, decrypting the identity card information ciphertext by utilizing a corresponding private key of an asymmetric encryption algorithm to obtain the identity card information, and verifying the identity card information.
A method for the secure collection of information, comprising,
Collecting first information;
Encrypting the first information by using a first key of an asymmetric encryption algorithm to form a first information ciphertext;
Performing hash operation on the first information by using a hash algorithm to generate a hash value;
collecting second information;
And storing or sending the second information and the first information ciphertext and the hash value.
Binding or concatenating the second information and the hash value, and then sending the second information and the hash value to a data application platform or a public network platform; and the second information and the first information ciphertext are bound or connected in series and then sent to the verification platform.
An information verification method for verifying the data formed by the method, which comprises,
And according to the second information, extracting the bound or serially connected second information and the first information ciphertext, decrypting the first information ciphertext by utilizing a corresponding second key of the asymmetric encryption algorithm to obtain first information, and verifying the first information.
The safe collection method of the express real-name system information comprises the steps of,
Verifying and collecting identity card information;
Encrypting the identity card information by using a public key of an asymmetric encryption algorithm to form an identity card information ciphertext;
Hash algorithm is used for carrying out hash operation on the identity card information to generate a hash value;
Collecting express information;
And storing or sending the express information and the identification card information ciphertext and the hash value.
Binding or concatenating the express information and the hash value and then sending the express information and the hash value to an express sorting platform; and the express information and the identity card information ciphertext are bound or connected in series and then sent to the verification platform.
The verification method of the express real name system information verifies the formed data, which comprises the steps of,
And extracting the bound or serially connected express information and the identity card information ciphertext according to the express information, decrypting the identity card information ciphertext by utilizing a corresponding private key of an asymmetric encryption algorithm to obtain the identity card information, and verifying the identity card information.
It should be noted that, due to the neglect of writing, related terms may be inconsistent in the specification and the drawings in the specification, the exact meaning of the related terms may be determined according to the context and the drawings, and the like, and the understanding of the present invention is not affected.
The invention encrypts the identity card information by adopting an asymmetric encryption algorithm (calculation key system), and the encrypted party only encrypts the public key (or the private key of course) for encryption and can not decrypt the encrypted information, the ciphertext formed by the encryption is sent to the supervision platform, and the supervision platform only holds the corresponding private key (or the corresponding public key) which can decrypt the encrypted information, so that the encrypted information is decrypted, and the identity card information is obtained. Meanwhile, the encrypted secret key can be disclosed or office opened to express companies or equipment developers, different express companies can use different secret key sets (public keys and private keys) according to the needs, and dynamic replacement can be performed according to the needs. The express company uses the hash value of the identity card information to sort, develop and store, and the hash value has singleness and is difficult to restore the corresponding identity card information, so that the safety of the identity card information is ensured, although the hash algorithm possibly has different information to obtain the same hash value, the probability is extremely low at the moment, the identity card information data is short, and the conflict is less; of course, the length of the hash value may also be increased to reduce the occurrence of collisions. Moreover, the hash value is used for storage and comparison, so that the efficiency can be improved.
In addition, as an improvement, the public security department sends an identity card hash to be monitored to the express company, and the express company verifies the received express site or the subsequent verification by utilizing the hash value. Specifically, for sensitive personnel needing to be monitored, the police department sends the hash value of the identity card information to the express company, and the express company gives an alarm according to the hash value of the relevant personnel when receiving and sending the express, and feeds the relevant information back to the police department for processing, for example, the express sent by the police department is not accepted, and the express delivery department can also operate according to the instruction at the lower part after the feedback.
The real-name system information may be a real-name system telephone number. At this time, verification is realized by only generating corresponding information to the mobile phone on the express bill and reading the information of the mobile phone through the acquisition terminal.
According to the technical scheme, the signature or the certificate can be added according to the requirement, and the signature authentication can be carried out on the data, so that later management and application are facilitated.
In addition, as a real-name express delivery method for ensuring privacy, only address and telephone information are recorded on a paper express delivery bill, other core information (such as information related to privacy, such as name and the like) is bound by adopting information for carrying out hash operation and express delivery bill numbers, the system and delivery personnel cannot see the privacy information, when receiving, a collection terminal collects sender information (such as identity card information) or inputs related information, and a receiver information (receiving input or scanning a prefabricated receiver information two-dimensional code) is input to generate a hash value and bind the express delivery information. During dispatch, the acquisition terminal reads the identity card information of the addressee, generates a hash value from related information, compares the hash value with the stored addressee information hash value, grants the receiving if the hash value accords with the stored addressee information hash value, and modifies corresponding addressee information by contacting a sender (sender) if the hash value does not accord with the stored addressee information, and performs comparison again to realize dispatch.
Fig. 7 shows a schematic diagram of a generic information acquisition and verification system, which differs from fig. 1 in that the objects involved differ from each other by a certain degree of difference in the corresponding units or modules.
It should be noted that, because the content of information interaction and execution process between the units in the device and the system is based on the same concept as the embodiment of the method of the present invention, specific content may be referred to the description in the embodiment of the method of the present invention, and will not be repeated here.
It will be apparent to those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, or they may alternatively be implemented in program code executable by computing devices, such that they may be stored in a memory device for execution by the computing devices, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
Claims (10)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510891851 | 2015-12-06 | ||
CN2015108918514 | 2015-12-06 | ||
CN201611112001.0A CN106712958B (en) | 2015-12-06 | 2016-12-06 | Information collection method and system, real-name information collection method, system and application |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611112001.0A Division CN106712958B (en) | 2015-12-06 | 2016-12-06 | Information collection method and system, real-name information collection method, system and application |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118677620A true CN118677620A (en) | 2024-09-20 |
Family
ID=58935916
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201621333112.XU Active CN206481316U (en) | 2015-12-06 | 2016-12-06 | Information acquisition system and system of real name information gathering, application system |
CN201611112001.0A Active CN106712958B (en) | 2015-12-06 | 2016-12-06 | Information collection method and system, real-name information collection method, system and application |
CN202410633945.0A Pending CN118677620A (en) | 2015-12-06 | 2016-12-06 | Information acquisition system and method, real-name information acquisition system and method and application thereof |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201621333112.XU Active CN206481316U (en) | 2015-12-06 | 2016-12-06 | Information acquisition system and system of real name information gathering, application system |
CN201611112001.0A Active CN106712958B (en) | 2015-12-06 | 2016-12-06 | Information collection method and system, real-name information collection method, system and application |
Country Status (1)
Country | Link |
---|---|
CN (3) | CN206481316U (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN206481316U (en) * | 2015-12-06 | 2017-09-08 | 杨斌 | Information acquisition system and system of real name information gathering, application system |
CN109492427A (en) * | 2018-10-17 | 2019-03-19 | 航天信息股份有限公司 | Online shopping method and device |
CN111506894A (en) * | 2019-01-31 | 2020-08-07 | 金联汇通信息技术有限公司 | Data processing method, system, electronic device and computer readable storage medium |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8989387B2 (en) * | 2006-03-31 | 2015-03-24 | International Business Machines Corporation | Using identifier tags and authenticity certificates for detecting counterfeited or stolen brand objects |
CN101335627B (en) * | 2008-07-31 | 2011-01-19 | 中兴通讯股份有限公司 | Network facsimile system and using method thereof |
CN104967612A (en) * | 2015-05-27 | 2015-10-07 | 李明 | Data encryption storage method, server and system |
CN206481316U (en) * | 2015-12-06 | 2017-09-08 | 杨斌 | Information acquisition system and system of real name information gathering, application system |
-
2016
- 2016-12-06 CN CN201621333112.XU patent/CN206481316U/en active Active
- 2016-12-06 CN CN201611112001.0A patent/CN106712958B/en active Active
- 2016-12-06 CN CN202410633945.0A patent/CN118677620A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CN206481316U (en) | 2017-09-08 |
CN106712958A (en) | 2017-05-24 |
CN106712958B (en) | 2024-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220327304A1 (en) | Transferring data files using a series of visual codes | |
US20210406495A1 (en) | Large data transfer using visual codes with feedback confirmation | |
CN111859348B (en) | Identity authentication method and device based on user identification module and block chain technology | |
KR102477453B1 (en) | Transaction messaging | |
CN105554032B (en) | A kind of identity real name verification method and verification system for posting part based on express delivery | |
WO2019152892A1 (en) | Technologies for private key recovery in distributed ledger systems | |
CN105656920B (en) | A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery | |
CN106656476A (en) | Password protecting method and device | |
US20080263645A1 (en) | Privacy identifier remediation | |
JP2018516030A (en) | ID management service using blockchain | |
CN107342867A (en) | Signature sign test method and apparatus | |
CN108540470B (en) | Authentication system and method based on electronic authentication mark | |
CN101651675A (en) | Method and system for enhancing security of network transactions | |
CN106788972A (en) | A kind of train ticket self-help ticket-buying fetching system based on block chain authentication | |
CN113420049B (en) | Data circulation method, device, electronic equipment and storage medium | |
CN110598433A (en) | Anti-counterfeiting information processing method and device based on block chain | |
CN105335109A (en) | File printing control system based on smart password keys and achieving method thereof | |
CN101409622B (en) | Digital signing system and method | |
CN118677620A (en) | Information acquisition system and method, real-name information acquisition system and method and application thereof | |
EA035937B1 (en) | Secure item identification based on physical label properties | |
CN109472667A (en) | Airline tickets management method and device | |
CN113298476A (en) | Safety consignment method, system, electronic equipment and storage medium | |
WO2024114095A1 (en) | Data transmission control method and apparatus, electronic device, and readable storage medium | |
CN115270189B (en) | Data reading method, device, equipment and storage medium based on identity authority | |
CN111127673A (en) | Invoice self-service authentication method and system supporting high-speed scanner |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |