Disclosure of Invention
To solve the above technical problems or at least partially solve the above technical problems, the present invention provides a trusted business code generation authentication method and application method for network approximately Fang Minsu.
The invention provides a method for generating and authenticating a trusted business travel code of a network approximately Fang Minsu, which comprises the steps of collecting user information user_info and a user identity card photo id_card_image and preliminarily verifying user identities, wherein after the user identities are preliminarily verified, verification of real-name authentication is carried out through a real-name authentication interface based on the user information user_info and the identity card photo id_card_image;
After the real name authentication is passed, transmitting user information user_info to CTID network card platform for authentication, after the user completes user identity data authentication through CTID network card platform, CTID network card platform generates corresponding network card data as open code data a_segment_data of A section code for the user based on the user identity data, after authentication is successful, generates unique authentication code timestamped _hash with time mark of encrypted user information encrypted_user_info through hash time stamp algorithm GENERATEHASHTIMESTAMP (), and is convenient for CTID network card platform to trace and verify the network card data of trusted business travel code;
acquiring electronic license information provided by user authorization, and generating the plain code data of the B section code according to the electronic license information provided by the user and the set format and rule;
the method comprises the steps of generating S section codes for verification on the basis of the clear data of the A section codes and the B section codes, combining and correlating the generated A section codes, B section codes and S section codes according to established coding standards to form a complete trusted network license business clear code with identity and license dual attributes;
The method comprises the steps of encrypting and confusing all parts of a trusted network license business travel code combined_code to obtain an encrypted confusing result of the encrypted confusing_combined_code, hashing the encrypted confusing result of the trusted network license business travel code combinedcode, correlating the hash result of a B section code with an electronic license, correlating the hash result of an A section code with network license data, decrypting and encrypting the hash result, converting encryption information into two-dimensional code content, optimizing the two-dimensional code content to obtain compressed two-dimensional code content, and generating a trusted business travel code in the form of the two-dimensional code according to the compressed two-dimensional code content, wherein a verification mark is constructed by utilizing the hash value of the encrypted confusing result of the encrypted confusing_code and a salt value based on user information.
Furthermore, when a user initiates login and registration operation on the civil booking platform, the civil booking platform records initial login data based on a distributed account book technology of a blockchain, and ensures traceability of login behavior, wherein the initial login data comprises login and registration time and equipment information used for login;
When a user initiates a login or registration operation on a civil booking platform, a graphic verification code and short message verification code dual verification mechanism is adopted, wherein a complex graphic verification code is generated through a random deformation character and an interference line generation algorithm, the user provides a correct graphic verification code to request the login or registration, a one-time password algorithm generates a short message verification code with shorter effective time, and the user provides a correct short message verification code to request the login or registration.
Further, the preliminary verification of the user identity comprises extracting certificate information extracted _info from the identity card photo by OCR for extracting the identity card photo information at the civil booking platform, wherein the certificate information extracted _info comprises a name extracted _info name and an identity card number extracted _info.id_number;
A living body algorithm PerformLivenessCheck () based on the face action sequence confirms that the user is a real living body;
And checking the name extracted _info name character rule in the certificate information by checking the weighted checksum of the identity card number extracted _info.id_number in the certificate information through an information redundancy check algorithm CheckRedundancy () of the identity card number and the name.
Further, the verifying that the real-name authentication is performed through the real-name authentication interface based on the user information user_info and the identity card photo id_card_image includes:
checking whether user information user_info and an identity card photo id_card_image are matched or not through a data matching bit pairing algorithm DATAMATCH ();
Comparing whether the characteristics of the user uploading identity photo user_photo and the public security system archiving photo police _records are consistent or not through an image recognition algorithm ImageRecognition (), wherein the user uploading identity photo user_photo is obtained from an identity card photo id_card_image;
Integrating multidimensional data information multiple_ databases of a plurality of databases such as a public security system and the like through a multi-data source cross-validation algorithm CrossValidation (), carrying out multidimensional cross-validation on the multidimensional data information multiple_ databases and user information user_info, and if the cross-validation fails, recording the failure reason and the number of times, and starting a manual auditing process when the number of times reaches a threshold value;
And combining the three modes to perform real-name authentication, and prompting that the real-name authentication fails when the real-name authentication fails, and carrying out re-operation.
Furthermore, CTID net card platform collects user identity data through CollectUserIdentityData (), CTID net card platform verifies user identity data through ValidateUserIdentity (), if verification is passed, CTID net card platform signs net card data as a segment A code of clear data a segment data through IssueNetIDData (), user information user info is processed into encrypted user information encrypted user info through block chain encryption protocol EncryptUsingBlockchain (), and after verification is successful, hash time stamp algorithm GENERATEHASHTIMESTAMP () generates unique authentication code timestamped _hash with time stamp of encrypted user information encrypted user info, which is convenient for CTID net card platform and verification trusted business trip code.
Further, electronic license information electronic_id_info is collected from electronic license data electronic_id_data provided by the user through CollectElectronicIDInfo (), the sink booking platform verifies validity through ValidateElectronicID (), and if verification is passed, the B-segment code plaintext data b_segment_data is generated.
Further, converting the encrypted information into two-dimensional code content and optimizing includes:
Error correction coding is carried out on information spliced by the encrypted ciphertext and the metadata through a Reed-Solomon error correction code algorithm ReedSolomonEncode (), and redundant information is added;
and dynamically adjusting a compression strategy to process the two-dimensional code content according to the capacity limit and the data characteristics of the two-dimensional code through an adaptive data compression algorithm CompressData () to obtain compressed two-dimensional code content compressed_data.
Further, generating the trusted business code in the form of the two-dimensional code according to the compressed two-dimensional code content comprises:
Hiding the key information of the two-dimensional code in the two-dimensional code image by a DNA-based color image encryption algorithm VisualEncrypt ();
And performing edge enhancement and contrast adjustment operation on the two-dimensional code image by utilizing a YOLOv-based optimization method YOLOv8Optimize ().
Further, the authentication process of the trusted business trip code comprises the following steps:
the related verification party reads the trusted business travel code;
Decrypting the content scanned _code of the trusted business code to obtain a decryption result decrypted _code, and extracting the content of the A section code, the B section code and the S section code from the decryption result decrypted _code;
Verifying the B-section code through the electronic license associated with the hash result of the B-section code, and verifying the A-section code through the network license data corresponding to the hash result of the A-section code;
verifying the S-section code by using the corresponding network certificate data of the hash result of the electronic certificate A-section code associated with the hash result of the B-section code;
And synthesizing the verification results of A, B, S three-section codes to obtain a final verification result.
In a second aspect, the present invention provides a trusted business trip code-based registration method comprising subscribing to a service online and generating a trusted business trip code;
Scanning the trusted business travel code, and generating business registration information according to the scanned and read content;
Generating an authentication request based on the A code segment, the B code segment and the face image obtained by scanning, and initiating authentication verification by using the authentication request;
After identity verification is processed, generating a service serial number through user identity information associated with the B code segment and confirming the service serial number;
the related user identity information and the return service serial number enter room registration information to finish registration.
Compared with the prior art, the technical scheme provided by the embodiment of the invention has the following advantages:
The application relies on CTID network card platform to generate personal identification related and bound with personal data, thereby generating a trusted business trip code with dual attributes of identity and service. The information capacity of this trusted business code is fixed and does not increase with the accumulation of information. In practical application, the idea of 'people code unification, identity consensus and code passing' is realized through personal identity identification, so that the travel efficiency is ensured, and precise management is realized. The application improves the identity verification efficiency and the security of business accommodation, reduces the use of entity certificates, reduces the verification complexity, enhances the data security, and optimizes accommodation experience. The method specifically realizes the following aspects of ① improving safety and convenience of business accommodation, and optimizing accommodation experience. ② The registration efficiency is improved, the waiting time of passengers in the foreground is reduced, and the information acquisition and verification are rapidly completed by scanning the accommodation codes. ③ The information security is enhanced, namely identity information leakage and impersonation are prevented by means of CTID network certificate encryption technology and authoritative authentication mechanism. ④ Optimizing management flow, realizing automatic recording and updating of accommodation information, and reducing manual operation error and workload.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
Example 1
As shown in fig. 1, the technology of the present invention realizes a trusted business trip code generation authentication method for a network approximately Fang Minsu, and the present invention includes the following steps:
The trusted business travel code generation flow comprises the following steps:
step1, initiating login registration on the sink booking platform.
The user initiates a login registration operation at the APP or applet end of the civilian subscription platform.
When a user initiates login and registration operation on a civil booking platform, initial login data are collected and recorded on the basis of a distributed account book of a blockchain, the initial login data comprise login and registration time and equipment information used for login, and traceability of login behavior is ensured through the initial login data recorded by the distributed account book.
When a user initiates login or registration operation on the civil booking platform, a graphic verification code and short message verification code dual verification mechanism is adopted:
The one-time password algorithm generates a short message verification code with shorter effective time, and the user provides the correct short message verification code to request for login or registration, thereby preventing malicious registration and violent cracking.
The code is as follows:
Step2, collecting user information user_info and a user identity card photo id_card_image and primarily checking the user identity.
Uploading an identity card photo id_card_image by a user;
Extracting certificate information extracted _info from the identity card photo by OCR for extracting identity card photo information, wherein the certificate information extracted _info comprises a name extracted _info name and an identity card number extracted _info id number;
the living body algorithm PerformLivenessCheck () based on the face action sequence confirms that the user is a real living body, preventing photograph or video falsification. The living body detection algorithm requires the user to perform actions such as blinking, shaking head and the like to acquire a facial action sequence. The living body algorithm PerformLivenessCheck () returns the detection result liveness_result.
And checking the name extracted _info name character rule in the certificate information by checking the weighted checksum of the identity card number extracted _info.id_number in the certificate information through an information redundancy check algorithm CheckRedundancy () of the identity card number and the name. The information redundancy check algorithm CheckRedundancy () returns a check result initial_validation.
The code is as follows:
step3, after the user identity is preliminarily verified, verifying real-name authentication through a real-name authentication interface based on the user information user_info and the identity card photo id_card_image.
Step3 includes checking whether the user information user_info and the identification card photo id_card_image match through the data matching bit pairing algorithm DATAMATCH (). Data matching match algorithm DATAMATCH () returns the match result as match_result.
The comparison of the user's upload identity photo user_photo to the public security system archive photo police _records feature is made by image recognition algorithm ImageRecognition (). The user uploads an identity photo user_photo to be obtained from an identity card photo id_card_image, and a public security system archive photo police _records are obtained through a real-name authentication interface. The image recognition algorithm ImageRecognition () returns a picture matching result as image_match_result.
And integrating multidimensional data information multiple_ databases of a plurality of databases such as a public security system and the like through a multidimensional data source cross-validation algorithm CrossValidation (), and carrying out multidimensional cross-validation on the multidimensional data information multiple_ databases and user information user_info so as to reduce the false judgment rate. The multi-data source cross-validation algorithm CrossValidation () returns a cross-validation result as cross-validation result. If the cross verification fails, recording the failure reason and the times, and starting a manual auditing process when the times reach a threshold value.
The code is as follows:
And combining the three modes to perform real-name authentication, and prompting that the real-name authentication fails when the real-name authentication fails, and carrying out re-operation.
Step4, transmitting user_info to CTID network card platform for authentication, after user authentication of user identity data is completed by CTID network card platform, CTID network card platform generates corresponding network card data as a segment A code of plain data a segment_data for user based on user identity data;
In the specific implementation process, CTID network card platform collects user identity data user_identity_data through CollectUserIdentityData (), CTID network card platform verifies user identity data user_identity_data through ValidateUserIdentity (), if verification is passed, CTID network card platform signs network card data as clear data a_segment_data of A section code according to user identity data user_identity_data through IssueNetIDData (), otherwise, returns 'invalid user identity'.
The code is as follows:
in the specific implementation process, the user information user_info is processed into encrypted user information encrypted_user_info through the blockchain encryption protocol EncryptUsingBlockchain (), so that the confidentiality and the integrity of data are ensured. After authentication is successful, a unique authentication code timestamped _hash with a time mark of encrypted user information encrypted_user_info is generated through a hash time stamp algorithm GENERATEHASHTIMESTAMP (), so that the tracing and verification are facilitated.
The code is as follows:
Step5, acquiring electronic license information electronic_id_info provided by the user, and generating a B section code according to the electronic license information electronic_id_info provided by the user and the set format and rule.
Electronic license information electronic_id_info is collected from electronic license data electronic_id_data provided by a user through CollectElectronicIDInfo (), the sink booking platform verifies validity through ValidateElectronicID (), and if verification is passed, the B-section data b_segment_data of the B-section code is generated through CreateBSegmentCode ().
The code is as follows:
FUNCTION GenerateBSegment(electronic_id_data)
the B section code corresponds to the electronic license presented by the witness and is the business attribute of the trusted business trip code. The electronic license type and the application are identified, and related information such as validity period and issuing organization is associated for business process control such as authority control and process approval. The B section code is matched with the A section code to jointly realize the identity authentication and business functions of the electronic license.
Step6, generating the S section code based on the plain code data of the A section code and the B section code.
The process includes receiving the A-segment code and the B-segment code, calculating check values of the A-segment code and the B-segment code by CalculateChecksum () algorithm, and combining the check values with the A-segment code and the B-segment code to form the S-segment code.
The S-segment code has the function of supplementing or checking. The S section code contains check bit information, is obtained by calculating the A section code and the B section code through a specific algorithm and is used for verifying the accuracy and the integrity of the whole trusted business trip code and preventing errors in the data transmission or generation process.
The code is as follows:
Step7, combining and correlating the generated A section code, B section code and S section code according to a set coding standard to form a complete trusted network license business travel plain code with identity and license dual attributes.
The generated a-segment code, B-segment code, and S-segment code are combined and associated by EncodeSegments () according to a given coding standard.
The code is as follows:
a given encoding standard uses a separator relimiter to concatenate the segments or encode them in a particular order and format.
delimiter="-"
combined_code=A_segment+delimiter+B_segment+delimiter+S_segment;
And (3) carrying out encryption confusion on each part of the trusted network card business travel plain code combined_code to obtain an encryption confusion result encrypted_combined_code.
The encryption confusion is carried out through each part of the elliptic curve encryption technology EncryptUsingECC (), so that the data is not easy to steal or tamper in the storage and transmission processes, and the data security is improved.
encrypted_combined_code=EncryptUsingECC(combined_code)
Step8, hash the encrypted confusion result encrypted_combined_code of the trusted network card business trip code combinedcode. And carrying out hash processing on the CombinedCode of the encryption confusion by using a SHA-256 hash algorithm to obtain a hash value hash_ CombinedCode of the encryption confusion result encrypted_combined_code.
And processing the encrypted confusion result encrypted_combined_code of the trusted network license business figure combinedcode by using an SHA-256 hash algorithm to generate a hash value with a fixed length, so as to ensure the irreversibility and the integrity of the information. In the specific implementation process, the multi-core GPU processor is utilized to simultaneously carry out SHA-256 hash operation on a plurality of data blocks which are encrypted and confused CombinedCode, so that the operation speed is improved. And (3) carrying out rapid screening and collision detection on hash values through a bloom filter, so as to ensure uniqueness.
And the hash value and the salt value are combined to realize the correlation of the B-segment code and the identity information, and GENERATEHMAC () algorithm is combined with the system time stamp, the random character string generated by the random number generator and the user information to generate the salt value hmac _value, so that the randomness and the safety are improved, the attack of a rainbow table is resisted, and the quality of the verification mark is comprehensively ensured.
The code is as follows:
step9, carrying out decryptable encryption on the hash value:
The hash value hash_ CombinedCode of the encrypted-mixed-result-obtained encrypted-code is encrypted by the AES encryption algorithm AESENCRYPT () in combination with a dynamic key dynamic_key generated by the TOTP dynamic key generation algorithm to obtain AES encryption information ae_encrypted_info;
Encrypting the hashed information, wherein the step emphasizes the further encryption operation of the hashed information. On the other hand, the data analysis requirements possibly related in the follow-up process are met by means of the characteristics of a specific encryption algorithm, so that the whole system still has good data processing and analysis capability on the premise of ensuring the data safety.
The code is as follows:
Step10, converting the encrypted information into two-dimensional code content and optimizing the two-dimensional code content.
And error correction coding is carried out on the information spliced by the encrypted ciphertext and the metadata through a Reed-Solomon error correction code algorithm ReedSolomonEncode (), redundant information is added, and the fault tolerance of the two-dimensional code is improved.
The compression strategy is dynamically adjusted to process the two-dimensional code content according to the capacity limit and the data characteristics of the two-dimensional code through the self-adaptive data compression algorithm CompressData () to obtain compressed two-dimensional code content compressed_data, the data storage efficiency and the generation speed are improved, the processing time is prevented from being increased due to the fact that the data quantity exceeds the capacity limit, and the compression strategy comprises Huffman coding or arithmetic coding.
The code is as follows:
The encrypted information is further processed by applying a specific data coding and format conversion algorithm, so that the generation process of the whole two-dimensional code content is optimized, the generated two-dimensional code can accurately bear the encrypted key information, and the encrypted two-dimensional code has good fault tolerance and meets the capacity limit requirement, so that the encrypted two-dimensional code can be stably and efficiently used in the follow-up operations such as display, scanning verification and the like.
Step11, generating a trusted business trip code in a two-dimension code form according to the compressed two-dimension code content.
The color image encryption algorithm VisualEncrypt () based on the DNA conceals the key information of the two-dimensional code in the two-dimensional code image, improves the anti-counterfeiting and safety performance and prevents malicious counterfeiting and information theft.
And performing edge enhancement and contrast adjustment operation on the two-dimensional code image by utilizing the YOLOv-based optimization method YOLOv8Optimize (), improving the readability and recognition rate under different environments, expanding the application scene and the use convenience, and improving the user experience and the service operation efficiency.
The code is as follows:
authentication of trusted business travel codes:
The related verifier reads the trusted business travel code through code scanning equipment or software;
decrypting the trusted business code, and then respectively extracting the contents of the A section code, the B section code and the S section code for verification. Through interaction with CTID network card platforms and an electronic card system, whether the user identity corresponding to the A section code is legal, whether the electronic card pointed by the B section code is truly effective, whether the verification of the S section code is passed or not and the like are confirmed, so that the whole verification process of the bright card is completed.
In the specific implementation process, a verification party reads a trusted business travel code through code scanning equipment or software, assigns the read content to scanned _code, decrypts the content scanned _code of the trusted business travel code to obtain a decryption result decrypted _code, and extracts the content of the A section code, the B section code and the S section code from the decryption result decrypted _code;
Verifying the B-section code through the electronic license associated with the hash result of the B-section code, and verifying the A-section code through the network license data corresponding to the hash result of the A-section code;
verifying the S-section code by using the corresponding network certificate data of the hash result of the electronic certificate A-section code associated with the hash result of the B-section code;
And synthesizing the verification results of A, B, S three-section codes to obtain a final verification result. The code is as follows:
example 2
Referring to fig. 3 and 4, an embodiment of the present invention provides a registration method based on a trusted business trip code, and the identity information of a user is authenticated and verified by scanning the trusted business trip code, so as to finally complete the room registration. The specific business process comprises the following steps:
Online booking business through online booking website and generating trusted business travel code;
when registering, the business REGISTRATION window scans the trusted business TRAVEL CODE MERC HANT _TRAVEL_CODE through ScanQRCode (), and generates business REGISTRATION information REGISTRATION_INFO according to the scanned and read content SCANNED _DATA;
The service registration window generates an authentication request valid_response based on the scanned A CODE segment A_CODE, B CODE segment B_CODE and the FACE IMAGE FACE_IMAGE, and initiates authentication verification to the service system by using the authentication request valid_response, wherein the CODE is as follows:
The business service system uploads the A code segment, the B code segment and the face image, interacts with the trusted business code platform to carry out identity verification, wherein the trusted business code platform interacts with the CTID network card platform when verifying the A code segment. The code is as follows:
After IDENTITY verification is processed, the BUSINESS service system generates a BUSINESS SERIAL NUMBER business_service_number through user IDENTITY information ASSOCIATED with the B code segment. The code is as follows:
User IDENTITY information ASSOCIAT ED _identity_info associated with the B-code segment and a return service SERIAL number business_service_ NUMB ER are confirmed within the service registration window. The code is as follows:
the service registration window enters the ASSOCIATED user IDENTITY information associated_identity_info and the return service SERIAL NUMBER business_service_number into the room registration information maintained by the room registration management system.
And returning a business handling result to finish the room registration.
In the embodiments provided in the present invention, it should be understood that the disclosed structures and methods may be implemented in other manners. For example, the structural embodiments described above are merely illustrative, and for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via interfaces, structures or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The foregoing is only a specific embodiment of the invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.