[go: up one dir, main page]

CN118677620A - Information acquisition system and method, real-name information acquisition system and method and application thereof - Google Patents

Information acquisition system and method, real-name information acquisition system and method and application thereof Download PDF

Info

Publication number
CN118677620A
CN118677620A CN202410633945.0A CN202410633945A CN118677620A CN 118677620 A CN118677620 A CN 118677620A CN 202410633945 A CN202410633945 A CN 202410633945A CN 118677620 A CN118677620 A CN 118677620A
Authority
CN
China
Prior art keywords
information
hash value
express
ciphertext
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410633945.0A
Other languages
Chinese (zh)
Inventor
杨斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN118677620A publication Critical patent/CN118677620A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Operations Research (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Computing Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information acquisition system, a method, a real-name information acquisition system, a method and application thereof, wherein the information acquisition system comprises a first reader for acquiring first information; the encryption unit is used for encrypting the first information by using a first key of an encryption algorithm to form a first information ciphertext; the Hash unit is used for carrying out Hash operation on the first information by using a Hash algorithm to generate a first information Hash value; the second reader collects second information; the data processing unit stores or sends the second information, the first information ciphertext and the first information hash value; the first information hash value is directly used and/or operated on.

Description

Information acquisition system and method, real-name information acquisition system and method and application thereof
The invention is a divisional application based on an invention patent application (application number 2016111120010, invention name: information acquisition method and system, real-name system information acquisition method, system and application) submitted to the China national intellectual property office by the applicant in 2016 12/06.
Technical Field
The invention relates to the field of data acquisition, in particular to an information acquisition method and system.
Background
With the rapid development of information technology, the information technology has wide application in various fields, and the collection, management and use of various information are the basis of the application of the information technology in various fields, so how to collect, manage and use information efficiently, safely and reliably is an important subject, especially for collecting information containing privacy. For example, for some collected confidential or private information, the information needs to be used in an unsafe environment such as a public communication network, and meanwhile, the information needs to be used in a safe environment such as a private communication network, so that how to ensure safe, efficient and reliable use of the information is a problem to be solved.
Taking the recent express real name system specified in China as an example, the real name system is required to be adopted for sending and receiving the express, and the identity card information of the sender and the receiver is required to be checked and registered so as to ensure the safety of the express. However, the mode increases the workload of the staff of the express company (including postal system and logistics company) (the staff for inputting the identity card information of the express company and the delivery staff); secondly, the identity card cannot be identified due to the professionality of identity card identification; thirdly, because the existing manual identification and registration of the identity card information of related personnel are then manually input into a system appointed by a public security department, the whole link has more participants, and the personnel quality of the personnel in the express delivery industry is uneven due to the fact that the personnel quality of the personnel in the express delivery industry is recorded and transferred in advance manually and paper, the leakage of privacy information on express delivery sheets which are continuously exploded in the earlier stage and the like are caused, and the concern of the leakage of the identity card information is increased. Moreover, existing approaches do have the risk of causing identity card information to leak. Fourth, although the prior art has an identification card reading device for identifying and verifying the authenticity of an identification card and reading the data information of the real identification card, the read information is stored and used in a plaintext manner, and the security of sensitive information cannot be guaranteed. How to efficiently, safely and effectively and comprehensively popularize the express real-name system work, and besides the guarantee in a system, the technical support is more needed.
Disclosure of Invention
Aiming at the defects, the technical problem to be solved by the invention is to provide a system and a method for ensuring the information acquisition safety; further, an acquisition system, a method and application thereof capable of ensuring the safety of real-name information are provided.
The method can be applied to the safe collection and verification of various sensitive information, real-name information and other sensitive information and/or information needing confidentiality and the like.
An information acquisition system, comprising,
The first reader is used for collecting first information;
The encryption unit is used for encrypting the first information by using a first key of an encryption algorithm to form a first information ciphertext;
The Hash unit is used for carrying out Hash operation on the first information by using a Hash algorithm to generate a first information Hash value;
the second reader collects second information;
the data processing unit stores or sends the second information, the first information ciphertext and the first information hash value; the first information hash value is directly used and/or operated on.
An information verification system for verifying the data formed by the method, comprising,
The first information decryption system is used for extracting the bound or serially connected second information and the first information ciphertext, and decrypting the first information ciphertext by utilizing a corresponding second key of the encryption algorithm to obtain first information;
and the first information verification system is used for verifying the first information.
The safe collection system for express real-name system information comprises,
The identity card reader is used for verifying and collecting identity card information;
the encryption unit is used for encrypting the identity card information by using a public key of an asymmetric encryption algorithm to form an identity card information ciphertext;
the Hash unit is used for carrying out Hash operation on the identity card information by using a Hash algorithm to generate an identity card Hash value;
The express bill reader is used for collecting express information;
The data processing unit stores and/or sends the express information, the identity card information ciphertext and the identity card hash value; and directly using and/or operating the identity card hash value.
A verification system for express real-name system information, which verifies data formed by the system of claim 3, comprising,
The identity card information decryption system is used for extracting the identity card information ciphertext according to the express information, and decrypting the identity card information ciphertext by utilizing a corresponding private key of the asymmetric encryption algorithm to obtain the identity card information;
The real-name express checking system is used for verifying the identity card information;
Or, including,
The identity card information decryption system is used for extracting the bound or concatenated express information and the identity card information ciphertext according to the express information, and decrypting the identity card information ciphertext by utilizing a corresponding private key of an asymmetric encryption algorithm to obtain the identity card information;
And the real-name express checking system is used for verifying the identity card information.
An information acquisition system, comprising,
The first reader is used for collecting first information;
The Hash unit is used for carrying out Hash operation on the first information by using a Hash algorithm to generate a first information Hash value;
the second reader collects second information;
the data processing unit stores or sends the second information, the first information ciphertext and the first information hash value; the first information hash value is directly used and/or operated on.
An information verification system for verifying data formed by the system, comprising,
And the first information verification system is used for extracting a first information hash value and verifying the first information hash value.
The safe collection system for express real-name system information comprises,
The identity card reader is used for verifying and collecting identity card information;
the Hash unit is used for carrying out Hash operation on the identity card information by using a Hash algorithm to generate an identity card Hash value;
The express bill reader is used for collecting express information;
The data processing unit stores and/or sends the express information, the identity card information ciphertext and the identity card hash value; and directly using and/or operating the identity card hash value.
A verification system for express real-name system information, which verifies data formed by the system of claim 7, comprising,
The real-name express checking system is used for extracting the identity card hash value according to express information and verifying the identity card information hash value;
Or, include;
And the real-name express checking system is used for extracting the bound or serially connected express information and the identity card hash value and verifying the identity card information hash value.
An information acquisition method, which comprises the steps of,
Collecting first information;
performing hash operation on the first information by using a hash algorithm to generate a first information hash value;
collecting second information;
storing or sending the second information, the first information ciphertext and a first information hash value; the first information hash value is directly used and/or operated on.
The information security collection method is that the collected information is respectively encrypted and hashed to form ciphertext and hash value, the hash value is used for the application of non-security environment; the ciphertext is used for decrypting into plaintext applications and/or operations in a secure environment, or the applications and/or operations are directly performed in a ciphertext manner.
The invention encrypts the identity card information by adopting an asymmetric encryption algorithm (calculation key system) (of course, symmetric encryption can be adopted, and only the encryption key is recorded in the equipment in a specific mode), and the encryption party only can encrypt the public key (of course, the private key) and can only encrypt the encrypted information but can not decrypt the encrypted information, wherein the encrypted ciphertext is sent to a supervision platform (safe environment), and the supervision platform only holds the corresponding private key (or the corresponding public key) which can be decrypted, so that the encrypted information is decrypted, and the identity card information is obtained. Meanwhile, the encrypted secret key can be disclosed or office opened to express companies or equipment developers, different express companies can use different secret key pairs (public key and private key) according to the needs, and dynamic replacement can be performed according to the needs. The express company uses the hash value of the identity card information to carry out express sorting, dispatch and storage, and the hash value has unidirectionality and is difficult to restore the corresponding identity card information, so that the safety of the identity card information is ensured, and although different information possibly exists in a hash algorithm to obtain the same hash value (namely, hash conflict), the probability is extremely low, a conflict mechanism is difficult to find, and the data of the identity card information is short, so that the conflict is less; of course, the length of the hash value may also be increased to reduce the occurrence of collisions. Moreover, the hash value is used for storage and comparison, so that the efficiency can be improved.
Drawings
In order to more clearly describe the relevant technical solutions to which the invention relates, the figures to which it relates will be briefly described below, it being obvious that the figures in the following description are only some embodiments of the invention, from which other figures can be obtained, without the inventive effort, for a person skilled in the art.
FIG. 1 is a schematic diagram of a system for collecting and verifying information security of an express real name system;
One embodiment of the data structure of FIG. 2;
another embodiment of the data structure of fig. 3;
FIG. 4 is a flow chart (receiving part) for the safe collection and verification of express real name system information;
FIG. 5 is a flow chart (dispatch) for secure collection and verification of information in the express real name system;
FIG. 6 is a schematic diagram illustrating the operation of an embodiment of an information security collection terminal (one of the devices belonging to the front end) for the real name system of express delivery;
FIG. 7 is a schematic diagram of the information security acquisition and verification system.
Reference numerals illustrate:
1. A collecting terminal; 11. touching the display screen; 12. an identity card reader radio frequency antenna; 13. a bar code reading window; 2. express delivery; 21. express bill bar codes; 3. an identity card.
Detailed Description
For the purpose of facilitating further understanding of the present application and for clearly understanding the technical solutions described in the present application, a complete and thorough disclosure of the relevant technical contents of the present application will be provided to those skilled in the art, and the detailed description of the embodiments of the present application will be given with reference to the accompanying drawings, of course, the detailed description of the embodiments of the present application being given by way of example only, and being used to facilitate understanding of the present application and its core ideas.
Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts and/or without departing from the spirit and substance of the present invention are intended to fall within the protection scope of the present invention even if the execution sequence (connection relation or structure of parts) of the steps is changed and various corresponding changes and modifications are made according to the present invention.
The relevant terms referred to in the present invention are defined as follows:
The identity card information comprises an identity card number, a name, an identity card validity period, a photo and fingerprint information. The photo and the fingerprint of the sender, the photo of the receiver and the fingerprint acquired on site can be checked according to the requirement, so that the comparison of the person and the certificate is realized, and the information is required to be read independently instead of the identity card reader, and the photo, the fingerprint collector and the like are added on the acquisition terminal to be realized and are matched with corresponding software to realize.
And encrypting the identity card information to obtain data.
The hash value of the identity card is obtained by carrying out operation on the identity card information by adopting a hash function, such as a value obtained by adopting MD 5. In practical use, in order to facilitate use, the identification card number, the name, the validity period and the like can be respectively hashed, or hashed (hashed) after combination, and corresponding hashed values are selected for use according to requirements.
Express information, information read from the express bill, including bar code information, telephone number information and the like on the express bill, and other readable information, even information such as addresses, names and the like of a sender and a receiver on the express bill.
Express delivery receiving data, wherein the express delivery person receives information data generated by a sender, and the information data comprises express delivery information, an identity card information ciphertext, an identity card hash value, express delivery information and other related information (such as photos, fingerprint information and the like).
And the express delivery data is delivered by the express delivery person to the information data generated by the addressee.
The following describes, by way of example, a specific technical scheme of the present invention and specific technical means implemented:
Referring to fig. 1 and 6, the acquisition terminal 1 includes an identity card reader for reading identity card information, a barcode or two-dimensional code reader for reading the barcode, and corresponding units of data processing, man-machine interaction, communication, etc., if a photo (personnel or express photo), a fingerprint, etc., a camera, a fingerprint collector, etc. are required to be added; and meanwhile, corresponding software or an application specific integrated circuit is configured on the terminal to realize corresponding functions. The acquisition terminal can also select the components or parts and modules suitable for the acquisition terminal according to different requirements or application scenes. In the embodiment for application to the express industry, the terminal constituted by the above-described components is described as an example, but the description is not limited to the above-described configuration. In addition, as an application of the express industry, other devices and/or software may be loaded on the terminal 1 to meet the application requirements thereof.
The touch display 11 is used for man-machine interaction operation between the user (courier) and the acquisition terminal 1, and of course, it can also be other man-machine interaction devices, such as a common display or information output mechanism, a keyboard or other input mechanisms, and the like.
An identification card reader radio frequency antenna 12 for reading identification card information; of course, other information collecting components or devices of the reader may be adopted as required, which are not described herein in detail.
The barcode reading window 13 can read the identity card and express single code information at one time through the arrangement scheme of the reading window and the radio frequency antenna of the identity card reader, so that the efficiency is improved, and errors are avoided; when the reading device is used, the identity card is placed under the express bill or is placed flat with the express bill, so that reading of the identity card and the express bill can be realized.
Express delivery 2: the express delivery needs to be carried out, and the express delivery can be documents or articles and is reasonably packaged.
Express bill bar code 21: and recording information such as names, addresses, telephones and the like of the receiving/sending persons, the single number information of the express company and the express bill of the bar code. The information can be recorded by a machine or a visual reading mode, such as digitized information (two-dimensional code, bar code, part-of-speech medium information waiting), natural language and the like.
The identity card 3, the second generation of the Chinese identity card, records the identity information of the user. The reader can also be other certificates with readable chips, such as magnetic stripes, radio frequency cards, contact type IC cards, magnetic codes, optical codes and the like, and the corresponding identity card reader is also a corresponding device capable of verifying and reading the chips and is provided with a corresponding reading mechanism, such as a magnetic head, an antenna, a card slot and the like.
The system and the method implemented with reference to fig. 1 and 4 comprise:
The system is a safe collection system of express real-name information at the front end, such as a collection terminal, which is held and carried by an express delivery person (user) to collect information in the process of express delivery receiving/sending, corresponding communication and the like. The identity card reader is used for verifying and collecting identity card information; encrypting the identity card information by using a public key (a private key or a symmetric encryption algorithm) of an asymmetric encryption algorithm to form an encryption unit of an identity card information ciphertext; performing a hash operation on the identity card information by using a hash algorithm to generate a hash unit of a hash value; the data processing unit forms the data into real-name express data of the data structure shown in fig. 2 and 3, and sends the real-name express data to an express company data center at the rear end and/or a public security part data center (which can also be a supervision platform of a feasible third party supervision mechanism of a public security part), generally sends the real-name express data to the express company data center, and sends the real-name express data to the public security part data center of the public security part supervision platform after subsequent processing, or can directly and respectively send the real-name express data center to the express company data center by front-end equipment, so that the real-name express monitoring platform is unfavorable for information security, and the power consumption load and structure of the front-end equipment are increased.
The express sorting platform is positioned at the rear end; the real-name express delivery supervision platform (abbreviated as supervision platform or supervision platform of a feasible third party supervision organization of public security department).
The express sorting platform is located in each express company, and generally each express company at least has one shown platform, and the shown platform can be improved or otherwise realized based on the original platform according to the technical scheme of the invention. The system comprises a communication system, a data splitting system, an express company data center and a checking and verifying system. The communication system establishes communication connection with front-end devices of a plurality of express companies respectively, and is used for receiving data with a data structure shown in fig. 2 and 3, and connecting with a real-name express supervision platform (abbreviated as supervision platform) (generally adopting special line connection to ensure safety), and sending the data with the corresponding structure shown in fig. 2 and 3 to the supervision platform. And the data splitting system splits the data to different platforms according to the requirement, or further splits the data to facilitate the data storage of the data center. The express company data center is used for storing express data and related express data, processing related express information and real-name system information, and directly comparing the processing by using the hash value of the identity information. And the checking and verifying system is used for scanning the fast-forward and other checking and verifying.
The real-name express delivery supervision platform stores and records the received real-name express delivery number according to the public security department data center; the public security department key management center manages and applies the identity information encryption keys of all express companies; the identity card information decryption system decrypts real-name express information sent by the corresponding express company according to a key recorded by a public security key management center to obtain identity card information; and the real-name express delivery checking system checks the identity card information, performs early warning or corresponding operation according to the checking result, and determines whether to send the identity card information to an express delivery company according to the checking condition and the established checking mechanism. In addition, in order to realize communication, a communication system should be established, and a communication link should be established with an express company or the like.
Fig. 2 provides a data structure, wherein data a is data generated by front-end equipment and sent to an express sorting platform of an express company, and a data splitting system in the sorting platform is split into data A1 stored by the system and data A2 sent to a police supervision platform. The data A is the serial connection or packaging of the hash value, express information and the ciphertext of the information of the identity card; the data A1 is the hash value of the identity card and the serial connection or packaging of express information; the data A2 is the serial connection or package of the express company ID (used for the supervision platform to identify the data source), the express information and the cipher text of the identity card information.
The structure shown in fig. 3 is that the data B is data generated by front-end equipment, and is sent to an express sorting platform of an express company, and a data splitting system in the sorting platform is split into data B1 stored by the system and data B2 sent to a police supervision platform. The data B is a serial connection or package of an identity card hash value, express inspection and vision and image information, express information and an identity card information ciphertext; the data B1 is the serial connection or package of the hash value of the identity card, the express inspection and the image information and the express information; the data B2 is serial connection or package of express company ID (for the supervision platform to identify the data source), express information and ID card information ciphertext.
Fig. 4 and 5 show collection and delivery data acquisition and verification flows of real-name express application respectively.
The safe collection system for express real-name system information comprises,
An identity card reader for verifying and collecting identity card information;
Encrypting the identity card information by using a public key of an asymmetric encryption algorithm to form an encryption unit of an identity card information ciphertext;
carrying out hash operation on the identity card information by using a hash algorithm to generate a hash unit of a hash value;
an express bill reader for collecting express information;
And a storage unit or a communication unit for storing or sending the express information, the identification card information ciphertext and the hash value.
Preferably, the system further comprises a data processing unit, wherein the express information and the hash value are bound or connected in series and then sent to an express sorting platform; and the express information and the identity card information ciphertext are bound or connected in series and then sent to the verification platform.
The verification system for the express real-name system information verifies the data formed by the method, which comprises,
Extracting the bound or serially connected express information and the identity card information ciphertext according to the express information, and decrypting the identity card information ciphertext by utilizing a corresponding private key of an asymmetric encryption algorithm to obtain an identity card information decryption system of the identity card information; and a real-name express checking system for verifying the identity card information.
An information acquisition system, comprising,
A first reader for collecting first information;
Encrypting the first information by using a first key of an encryption algorithm to form an encryption unit of a first information ciphertext;
performing hash operation on the first information by using a hash algorithm to generate a hash unit of a hash value;
a second reader that collects second information;
And a storage unit or a communication unit for storing or sending the second information and the first information ciphertext and the hash value.
Preferably, the method further comprises a data processing unit, wherein the second information and the hash value are bound or concatenated and then sent to a data application platform or a public network platform; and the second information and the first information ciphertext are bound or connected in series and then sent to the verification platform.
An information verification system for verifying data formed by the system, comprising,
According to the second information, extracting the bound or serially connected second information and the first information ciphertext, and decrypting the first information ciphertext by utilizing a corresponding second key of an asymmetric encryption algorithm to obtain a first information decryption system of the first information; and a first information verification system for verifying the first information.
The information acquisition system is used for respectively encrypting and hashing the acquired information to form an encryption unit and a hash operation unit of the ciphertext and the hash value respectively and an application system for applying the hash value; a decryption unit for decrypting the ciphertext, and an application system for applying the decrypted plaintext; alternatively, the application system may apply and/or operate directly in a ciphertext manner.
As a specific technical scheme, the real-name information acquisition system at the front end comprises the steps of verifying and acquiring identity card information; encrypting the identity card information by using a public key of an encryption algorithm to form an identity card information ciphertext; performing hash operation on the identity card information by using a hash algorithm to generate a hash value; the ciphertext is sent to a security environment to be decrypted into plaintext application or operation, or the ciphertext is directly used for application and/or operation; and sending the hash value to an unsafe environment to directly use or operate.
A method for the secure collection of information, comprising,
Collecting first information;
Encrypting the first information by using a first key of an encryption algorithm to form a first information ciphertext;
Performing hash operation on the first information by using a hash algorithm to generate a hash value;
collecting second information;
And storing or sending the second information and the first information ciphertext and the hash value.
Preferably, the second information and the hash value are bound or concatenated and then sent to a data application platform or a public network platform; and the second information and the first information ciphertext are bound or connected in series and then sent to the verification platform.
An information verification method for verifying data formed by the method, which comprises,
And according to the second information, extracting the bound or serially connected second information and the first information ciphertext, decrypting the first information ciphertext by utilizing a corresponding second key of the asymmetric encryption algorithm to obtain first information, and verifying the first information.
The information security collection method is that the collected information is respectively encrypted and hashed to form ciphertext and hash value, the hash value is used for the application of non-security environment; ciphertext is used for plaintext application or operation in a secure environment, or is directly applied and/or operated in a ciphertext mode.
The real-name system information acquisition method comprises the steps of verifying and acquiring identity card information; encrypting the identity card information by using a public key of an encryption algorithm to form an identity card information ciphertext; performing hash operation on the identity card information by using a hash algorithm to generate a hash value; the ciphertext is sent to a security environment to be decrypted into plaintext application or operation, or the ciphertext is directly used for application and/or operation; and sending the hash value to an unsafe environment to directly use or operate.
The information acquisition system is used for realizing the system of the information safety acquisition method.
The system realizes the system of the real-name system information acquisition method.
The safe collection method of the express real-name system information comprises the steps of,
Verifying and collecting identity card information;
Encrypting the identity card information by using a public key of an asymmetric encryption algorithm to form an identity card information ciphertext;
Hash algorithm is used for carrying out hash operation on the identity card information to generate a hash value;
Collecting express information;
And storing or sending the express information and the identification card information ciphertext and the hash value.
Preferably, the express information and the hash value are bound or connected in series and then sent to an express sorting platform; and the express information and the identity card information ciphertext are bound or connected in series and then sent to the verification platform.
The verification method of the express real name system information verifies the data formed by the method, which comprises the steps of,
And extracting the bound or serially connected express information and the identity card information ciphertext according to the express information, decrypting the identity card information ciphertext by utilizing a corresponding private key of an asymmetric encryption algorithm to obtain the identity card information, and verifying the identity card information.
A method for the secure collection of information, comprising,
Collecting first information;
Encrypting the first information by using a first key of an asymmetric encryption algorithm to form a first information ciphertext;
Performing hash operation on the first information by using a hash algorithm to generate a hash value;
collecting second information;
And storing or sending the second information and the first information ciphertext and the hash value.
Binding or concatenating the second information and the hash value, and then sending the second information and the hash value to a data application platform or a public network platform; and the second information and the first information ciphertext are bound or connected in series and then sent to the verification platform.
An information verification method for verifying the data formed by the method, which comprises,
And according to the second information, extracting the bound or serially connected second information and the first information ciphertext, decrypting the first information ciphertext by utilizing a corresponding second key of the asymmetric encryption algorithm to obtain first information, and verifying the first information.
The safe collection method of the express real-name system information comprises the steps of,
Verifying and collecting identity card information;
Encrypting the identity card information by using a public key of an asymmetric encryption algorithm to form an identity card information ciphertext;
Hash algorithm is used for carrying out hash operation on the identity card information to generate a hash value;
Collecting express information;
And storing or sending the express information and the identification card information ciphertext and the hash value.
Binding or concatenating the express information and the hash value and then sending the express information and the hash value to an express sorting platform; and the express information and the identity card information ciphertext are bound or connected in series and then sent to the verification platform.
The verification method of the express real name system information verifies the formed data, which comprises the steps of,
And extracting the bound or serially connected express information and the identity card information ciphertext according to the express information, decrypting the identity card information ciphertext by utilizing a corresponding private key of an asymmetric encryption algorithm to obtain the identity card information, and verifying the identity card information.
It should be noted that, due to the neglect of writing, related terms may be inconsistent in the specification and the drawings in the specification, the exact meaning of the related terms may be determined according to the context and the drawings, and the like, and the understanding of the present invention is not affected.
The invention encrypts the identity card information by adopting an asymmetric encryption algorithm (calculation key system), and the encrypted party only encrypts the public key (or the private key of course) for encryption and can not decrypt the encrypted information, the ciphertext formed by the encryption is sent to the supervision platform, and the supervision platform only holds the corresponding private key (or the corresponding public key) which can decrypt the encrypted information, so that the encrypted information is decrypted, and the identity card information is obtained. Meanwhile, the encrypted secret key can be disclosed or office opened to express companies or equipment developers, different express companies can use different secret key sets (public keys and private keys) according to the needs, and dynamic replacement can be performed according to the needs. The express company uses the hash value of the identity card information to sort, develop and store, and the hash value has singleness and is difficult to restore the corresponding identity card information, so that the safety of the identity card information is ensured, although the hash algorithm possibly has different information to obtain the same hash value, the probability is extremely low at the moment, the identity card information data is short, and the conflict is less; of course, the length of the hash value may also be increased to reduce the occurrence of collisions. Moreover, the hash value is used for storage and comparison, so that the efficiency can be improved.
In addition, as an improvement, the public security department sends an identity card hash to be monitored to the express company, and the express company verifies the received express site or the subsequent verification by utilizing the hash value. Specifically, for sensitive personnel needing to be monitored, the police department sends the hash value of the identity card information to the express company, and the express company gives an alarm according to the hash value of the relevant personnel when receiving and sending the express, and feeds the relevant information back to the police department for processing, for example, the express sent by the police department is not accepted, and the express delivery department can also operate according to the instruction at the lower part after the feedback.
The real-name system information may be a real-name system telephone number. At this time, verification is realized by only generating corresponding information to the mobile phone on the express bill and reading the information of the mobile phone through the acquisition terminal.
According to the technical scheme, the signature or the certificate can be added according to the requirement, and the signature authentication can be carried out on the data, so that later management and application are facilitated.
In addition, as a real-name express delivery method for ensuring privacy, only address and telephone information are recorded on a paper express delivery bill, other core information (such as information related to privacy, such as name and the like) is bound by adopting information for carrying out hash operation and express delivery bill numbers, the system and delivery personnel cannot see the privacy information, when receiving, a collection terminal collects sender information (such as identity card information) or inputs related information, and a receiver information (receiving input or scanning a prefabricated receiver information two-dimensional code) is input to generate a hash value and bind the express delivery information. During dispatch, the acquisition terminal reads the identity card information of the addressee, generates a hash value from related information, compares the hash value with the stored addressee information hash value, grants the receiving if the hash value accords with the stored addressee information hash value, and modifies corresponding addressee information by contacting a sender (sender) if the hash value does not accord with the stored addressee information, and performs comparison again to realize dispatch.
Fig. 7 shows a schematic diagram of a generic information acquisition and verification system, which differs from fig. 1 in that the objects involved differ from each other by a certain degree of difference in the corresponding units or modules.
It should be noted that, because the content of information interaction and execution process between the units in the device and the system is based on the same concept as the embodiment of the method of the present invention, specific content may be referred to the description in the embodiment of the method of the present invention, and will not be repeated here.
It will be apparent to those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, or they may alternatively be implemented in program code executable by computing devices, such that they may be stored in a memory device for execution by the computing devices, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.

Claims (10)

1.信息采集系统,其包括,1. Information collection system, which includes, 第一阅读器,采集第一信息;A first reader collects first information; 加密单元,运用加密算法的第一密钥对所述第一信息进行加密,形成第一信息密文;An encryption unit, using a first key of an encryption algorithm to encrypt the first information to form a ciphertext of the first information; Hash单元,运用杂凑算法对所述第一信息进行杂凑运算,生成第一信息杂凑值;A hash unit, using a hash algorithm to perform a hash operation on the first information to generate a hash value of the first information; 第二阅读器,采集第二信息;A second reader collects second information; 数据处理单元,将所述第二信息与所述第一信息密文、第一信息杂凑值进行存储或送出;对所述第一信息杂凑值直接进行使用和/或运算。The data processing unit stores or sends the second information, the first information ciphertext, and the first information hash value; and directly uses and/or operates on the first information hash value. 2.信息验证系统,对权利要求2所述方法形成的数据进行验证,其包括,2. An information verification system for verifying the data generated by the method of claim 2, comprising: 第一信息解密系统,提取绑定或串接的第二信息与所述第一信息密文,利用所述加密算法的对应第二密钥对所述第一信息密文进行解密,得到第一信息;A first information decryption system extracts the second information bound or concatenated with the first information ciphertext, and decrypts the first information ciphertext using a second key corresponding to the encryption algorithm to obtain the first information; 第一信息验证系统,对所述第一信息进行验证。The first information verification system verifies the first information. 3.快递实名制信息的安全采集系统,其包括,3. A secure collection system for express delivery real-name information, which includes: 身份证阅读器,用于验证并采集身份证信息;ID card reader, used to verify and collect ID card information; 加密单元,运用非对称加密算法的公钥对所述身份证信息进行加密,形成身份证信息密文;An encryption unit, using a public key of an asymmetric encryption algorithm to encrypt the identity card information to form a ciphertext of the identity card information; Hash单元,运用hash算法对所述身份证信息进行杂凑运算,生成身份证hash值;A hash unit, which uses a hash algorithm to perform a hash operation on the ID card information to generate a hash value of the ID card; 快递单阅读器,采集快递信息;Express delivery order reader, collects express delivery information; 数据处理单元,将所述快递信息与所述身份证信息密文、身份证hash值进行存储和/或送出;将所述身份证hash值直接进行使用和/或运算。The data processing unit stores and/or sends the express information, the ciphertext of the ID card information, and the ID card hash value; and directly uses and/or calculates the ID card hash value. 4.快递实名制信息的验证系统,对权利要求3所述系统形成的数据进行验证,其包括,4. A system for verifying the real-name information of express delivery, which verifies the data generated by the system of claim 3, comprising: 身份证信息解密系统,用于根据快递信息,提取所述身份证信息密文,利用非对称加密算法的对应私钥对所述身份证信息密文进行解密,得到身份证信息;The ID card information decryption system is used to extract the ID card information ciphertext according to the express information, and decrypt the ID card information ciphertext using the corresponding private key of the asymmetric encryption algorithm to obtain the ID card information; 实名制快递核查系统,用于对所述身份证信息进行验证;A real-name express delivery verification system is used to verify the identity card information; 或,包括,or, including, 身份证信息解密系统,用于根据快递信息,提取绑定或串接的快递信息与所述身份证信息密文,利用非对称加密算法的对应私钥对所述身份证信息密文进行解密,得到身份证信息;The ID card information decryption system is used to extract the bound or concatenated express information and the ID card information ciphertext according to the express information, and decrypt the ID card information ciphertext using the corresponding private key of the asymmetric encryption algorithm to obtain the ID card information; 实名制快递核查系统,用于对所述身份证信息进行验证。The real-name express delivery verification system is used to verify the identity card information. 5.信息采集系统,其包括,5. Information collection system, which includes, 第一阅读器,采集第一信息;A first reader collects first information; Hash单元,运用杂凑算法对所述第一信息进行杂凑运算,生成第一信息杂凑值;A hash unit, using a hash algorithm to perform a hash operation on the first information to generate a hash value of the first information; 第二阅读器,采集第二信息;A second reader collects second information; 数据处理单元,将所述第二信息与所述第一信息密文、第一信息杂凑值进行存储或送出;对所述第一信息杂凑值直接进行使用和/或运算。The data processing unit stores or sends the second information, the first information ciphertext, and the first information hash value; and directly uses and/or operates on the first information hash value. 6.信息验证系统,对权利要求5所述系统形成的数据进行验证,其包括,6. An information verification system for verifying data generated by the system of claim 5, comprising: 第一信息验证系统,提取第一信息杂凑值,对所述第一信息杂凑值进行验证。The first information verification system extracts the first information hash value and verifies the first information hash value. 7.快递实名制信息的安全采集系统,其包括,7. A secure collection system for express delivery real-name information, which includes: 身份证阅读器,用于验证并采集身份证信息;ID card reader, used to verify and collect ID card information; Hash单元,运用hash算法对所述身份证信息进行杂凑运算,生成身份证hash值;A hash unit, using a hash algorithm to perform a hash operation on the ID card information to generate a hash value of the ID card; 快递单阅读器,采集快递信息;Express delivery order reader, collects express delivery information; 数据处理单元,将所述快递信息与所述身份证信息密文、身份证hash值进行存储和/或送出;将所述身份证hash值直接进行使用和/或运算。The data processing unit stores and/or sends the express information, the ciphertext of the ID card information, and the ID card hash value; and directly uses and/or calculates the ID card hash value. 8.快递实名制信息的验证系统,对权利要求7所述系统形成的数据进行验证,其包括,8. A system for verifying the real-name information of express delivery, which verifies the data generated by the system of claim 7, comprising: 实名制快递核查系统,用于根据快递信息,提取所述身份证身份证hash值,对所述身份证信息hash值进行验证;The real-name express delivery verification system is used to extract the ID card hash value according to the express delivery information and verify the ID card information hash value; 或,包括;or, including; 实名制快递核查系统,用于提取绑定或串接的快递信息与所述身份证hash值,对所述身份证信息hash值进行验证。The real-name express delivery verification system is used to extract the bound or concatenated express delivery information and the ID card hash value, and verify the ID card information hash value. 9.信息采集方法,其包括,9. Information collection methods, including: 采集第一信息;collecting first information; 运用杂凑算法对所述第一信息进行杂凑运算,生成第一信息杂凑值;Using a hash algorithm to perform a hash operation on the first information to generate a first information hash value; 采集第二信息;collecting second information; 将所述第二信息与所述第一信息密文、第一信息杂凑值进行存储或送出;对所述第一信息杂凑值直接进行使用和/或运算。The second information, the first information ciphertext, and the first information hash value are stored or sent; and the first information hash value is directly used and/or calculated. 10.信息的安全采集方法,将采集的信息分别进行加密和杂凑运算分别形成密文和杂凑值,杂凑值用于非安全环境的应用;密文用于安全环境中解密为明文应用和/或运算,或,直接以密文方式进行应用和/或运算。10. A method for securely collecting information, wherein the collected information is encrypted and hashed to form ciphertext and hash value, respectively. The hash value is used for application in a non-secure environment; the ciphertext is decrypted into plaintext for application and/or operation in a secure environment, or is directly applied and/or operated in ciphertext.
CN202410633945.0A 2015-12-06 2016-12-06 Information acquisition system and method, real-name information acquisition system and method and application thereof Pending CN118677620A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201510891851 2015-12-06
CN2015108918514 2015-12-06
CN201611112001.0A CN106712958B (en) 2015-12-06 2016-12-06 Information collection method and system, real-name information collection method, system and application

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201611112001.0A Division CN106712958B (en) 2015-12-06 2016-12-06 Information collection method and system, real-name information collection method, system and application

Publications (1)

Publication Number Publication Date
CN118677620A true CN118677620A (en) 2024-09-20

Family

ID=58935916

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201621333112.XU Active CN206481316U (en) 2015-12-06 2016-12-06 Information acquisition system and system of real name information gathering, application system
CN201611112001.0A Active CN106712958B (en) 2015-12-06 2016-12-06 Information collection method and system, real-name information collection method, system and application
CN202410633945.0A Pending CN118677620A (en) 2015-12-06 2016-12-06 Information acquisition system and method, real-name information acquisition system and method and application thereof

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN201621333112.XU Active CN206481316U (en) 2015-12-06 2016-12-06 Information acquisition system and system of real name information gathering, application system
CN201611112001.0A Active CN106712958B (en) 2015-12-06 2016-12-06 Information collection method and system, real-name information collection method, system and application

Country Status (1)

Country Link
CN (3) CN206481316U (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN206481316U (en) * 2015-12-06 2017-09-08 杨斌 Information acquisition system and system of real name information gathering, application system
CN109492427A (en) * 2018-10-17 2019-03-19 航天信息股份有限公司 Online shopping method and device
CN111506894A (en) * 2019-01-31 2020-08-07 金联汇通信息技术有限公司 Data processing method, system, electronic device and computer readable storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8989387B2 (en) * 2006-03-31 2015-03-24 International Business Machines Corporation Using identifier tags and authenticity certificates for detecting counterfeited or stolen brand objects
CN101335627B (en) * 2008-07-31 2011-01-19 中兴通讯股份有限公司 Network facsimile system and using method thereof
CN104967612A (en) * 2015-05-27 2015-10-07 李明 Data encryption storage method, server and system
CN206481316U (en) * 2015-12-06 2017-09-08 杨斌 Information acquisition system and system of real name information gathering, application system

Also Published As

Publication number Publication date
CN206481316U (en) 2017-09-08
CN106712958A (en) 2017-05-24
CN106712958B (en) 2024-06-11

Similar Documents

Publication Publication Date Title
US20220327304A1 (en) Transferring data files using a series of visual codes
US20210406495A1 (en) Large data transfer using visual codes with feedback confirmation
CN111859348B (en) Identity authentication method and device based on user identification module and block chain technology
KR102477453B1 (en) Transaction messaging
CN105554032B (en) A kind of identity real name verification method and verification system for posting part based on express delivery
WO2019152892A1 (en) Technologies for private key recovery in distributed ledger systems
CN105656920B (en) A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery
CN106656476A (en) Password protecting method and device
US20080263645A1 (en) Privacy identifier remediation
JP2018516030A (en) ID management service using blockchain
CN107342867A (en) Signature sign test method and apparatus
CN108540470B (en) Authentication system and method based on electronic authentication mark
CN101651675A (en) Method and system for enhancing security of network transactions
CN106788972A (en) A kind of train ticket self-help ticket-buying fetching system based on block chain authentication
CN113420049B (en) Data circulation method, device, electronic equipment and storage medium
CN110598433A (en) Anti-counterfeiting information processing method and device based on block chain
CN105335109A (en) File printing control system based on smart password keys and achieving method thereof
CN101409622B (en) Digital signing system and method
CN118677620A (en) Information acquisition system and method, real-name information acquisition system and method and application thereof
EA035937B1 (en) Secure item identification based on physical label properties
CN109472667A (en) Airline tickets management method and device
CN113298476A (en) Safety consignment method, system, electronic equipment and storage medium
WO2024114095A1 (en) Data transmission control method and apparatus, electronic device, and readable storage medium
CN115270189B (en) Data reading method, device, equipment and storage medium based on identity authority
CN111127673A (en) Invoice self-service authentication method and system supporting high-speed scanner

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination