[go: up one dir, main page]

CN119941272B - A method and application for generating and authenticating trusted business travel codes for online rental and homestays. - Google Patents

A method and application for generating and authenticating trusted business travel codes for online rental and homestays.

Info

Publication number
CN119941272B
CN119941272B CN202510018599.XA CN202510018599A CN119941272B CN 119941272 B CN119941272 B CN 119941272B CN 202510018599 A CN202510018599 A CN 202510018599A CN 119941272 B CN119941272 B CN 119941272B
Authority
CN
China
Prior art keywords
code
user
data
information
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202510018599.XA
Other languages
Chinese (zh)
Other versions
CN119941272A (en
Inventor
王海增
刘海军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Qilu Public Safety Research Institute Co ltd
Original Assignee
Shandong Qilu Public Safety Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Qilu Public Safety Research Institute Co ltd filed Critical Shandong Qilu Public Safety Research Institute Co ltd
Priority to CN202510018599.XA priority Critical patent/CN119941272B/en
Publication of CN119941272A publication Critical patent/CN119941272A/en
Application granted granted Critical
Publication of CN119941272B publication Critical patent/CN119941272B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明提供一种用于网约房民宿可信商旅码生成认证方法和应用方法。本申请基于用户信息和身份证照片初步校验户身份被和验证实名认证;实名认证通过后,将用户信息传输给CTID网证平台进行认证,CTID网证平台完成用户身份数据认证,为用户生成网证数据来作为A段码的明码数据并生成唯一认证编码;根据用户电子证照信息按照设定的格式和规则生成B段码的明码数据;基于A段码和B段码的明码数据生成校验用的S段码;A段码、B段码和S段码形成具备身份和证照双重属性的可信网证商旅明码;对可信网证商旅明码的各部分进行加密混淆,对加密混淆结果进行哈希处理,对哈希结果进行可解密加密处理,基于加密信息生成二维码形式的可信商旅码。

This invention provides a method and application for generating and authenticating trusted business travel codes for online rental and homestays. This application initially verifies the user's identity and verifies real-name authentication based on user information and ID card photos. After successful real-name authentication, the user information is transmitted to the CTID e-certificate platform for authentication. The CTID e-certificate platform completes user identity data authentication, generates e-certificate data for the user as plaintext data for the A-segment code, and generates a unique authentication code. Plaintext data for the B-segment code is generated according to the user's electronic certificate information in a set format and rules. An S-segment code for verification is generated based on the plaintext data of the A-segment code and the B-segment code. The A-segment code, B-segment code, and S-segment code form a trusted e-certificate business travel code with dual attributes of identity and certificate. Each part of the trusted e-certificate business travel code is encrypted and obfuscated, the encryption and obfuscation result is hashed, and the hash result is decryptably encrypted. A trusted business travel code in QR code form is generated based on the encrypted information.

Description

Authentication method and application method for generating trusted business travel code of network approximately Fang Minsu
Technical Field
The invention relates to the technical field of trusted business trip codes, in particular to a method for generating and authenticating a network approximately Fang Minsu trusted business trip code and an application method.
Background
With the current social development, the network about houses and the civilians are more and more, the network about Fang Min is transacted with a real name, and in the transacting process, the user needs to provide an identity card entity, so that the opportunity that multiple parties contact the identity information of the user is given, and the risk of information leakage of the user is increased. Moreover, the accommodation registering mode depends on manual verification of identity cards, and the mode is low in efficiency, and guests are easy to wait in a queue particularly in a traveling season, so that the living experience is affected. For users, the house cards can be distributed after the users check in, and the users need to manage the house cards, which is inconvenient.
Disclosure of Invention
To solve the above technical problems or at least partially solve the above technical problems, the present invention provides a trusted business code generation authentication method and application method for network approximately Fang Minsu.
The invention provides a method for generating and authenticating a trusted business travel code of a network approximately Fang Minsu, which comprises the steps of collecting user information user_info and a user identity card photo id_card_image and preliminarily verifying user identities, wherein after the user identities are preliminarily verified, verification of real-name authentication is carried out through a real-name authentication interface based on the user information user_info and the identity card photo id_card_image;
After the real name authentication is passed, transmitting user information user_info to CTID network card platform for authentication, after the user completes user identity data authentication through CTID network card platform, CTID network card platform generates corresponding network card data as open code data a_segment_data of A section code for the user based on the user identity data, after authentication is successful, generates unique authentication code timestamped _hash with time mark of encrypted user information encrypted_user_info through hash time stamp algorithm GENERATEHASHTIMESTAMP (), and is convenient for CTID network card platform to trace and verify the network card data of trusted business travel code;
acquiring electronic license information provided by user authorization, and generating the plain code data of the B section code according to the electronic license information provided by the user and the set format and rule;
the method comprises the steps of generating S section codes for verification on the basis of the clear data of the A section codes and the B section codes, combining and correlating the generated A section codes, B section codes and S section codes according to established coding standards to form a complete trusted network license business clear code with identity and license dual attributes;
The method comprises the steps of encrypting and confusing all parts of a trusted network license business travel code combined_code to obtain an encrypted confusing result of the encrypted confusing_combined_code, hashing the encrypted confusing result of the trusted network license business travel code combinedcode, correlating the hash result of a B section code with an electronic license, correlating the hash result of an A section code with network license data, decrypting and encrypting the hash result, converting encryption information into two-dimensional code content, optimizing the two-dimensional code content to obtain compressed two-dimensional code content, and generating a trusted business travel code in the form of the two-dimensional code according to the compressed two-dimensional code content, wherein a verification mark is constructed by utilizing the hash value of the encrypted confusing result of the encrypted confusing_code and a salt value based on user information.
Furthermore, when a user initiates login and registration operation on the civil booking platform, the civil booking platform records initial login data based on a distributed account book technology of a blockchain, and ensures traceability of login behavior, wherein the initial login data comprises login and registration time and equipment information used for login;
When a user initiates a login or registration operation on a civil booking platform, a graphic verification code and short message verification code dual verification mechanism is adopted, wherein a complex graphic verification code is generated through a random deformation character and an interference line generation algorithm, the user provides a correct graphic verification code to request the login or registration, a one-time password algorithm generates a short message verification code with shorter effective time, and the user provides a correct short message verification code to request the login or registration.
Further, the preliminary verification of the user identity comprises extracting certificate information extracted _info from the identity card photo by OCR for extracting the identity card photo information at the civil booking platform, wherein the certificate information extracted _info comprises a name extracted _info name and an identity card number extracted _info.id_number;
A living body algorithm PerformLivenessCheck () based on the face action sequence confirms that the user is a real living body;
And checking the name extracted _info name character rule in the certificate information by checking the weighted checksum of the identity card number extracted _info.id_number in the certificate information through an information redundancy check algorithm CheckRedundancy () of the identity card number and the name.
Further, the verifying that the real-name authentication is performed through the real-name authentication interface based on the user information user_info and the identity card photo id_card_image includes:
checking whether user information user_info and an identity card photo id_card_image are matched or not through a data matching bit pairing algorithm DATAMATCH ();
Comparing whether the characteristics of the user uploading identity photo user_photo and the public security system archiving photo police _records are consistent or not through an image recognition algorithm ImageRecognition (), wherein the user uploading identity photo user_photo is obtained from an identity card photo id_card_image;
Integrating multidimensional data information multiple_ databases of a plurality of databases such as a public security system and the like through a multi-data source cross-validation algorithm CrossValidation (), carrying out multidimensional cross-validation on the multidimensional data information multiple_ databases and user information user_info, and if the cross-validation fails, recording the failure reason and the number of times, and starting a manual auditing process when the number of times reaches a threshold value;
And combining the three modes to perform real-name authentication, and prompting that the real-name authentication fails when the real-name authentication fails, and carrying out re-operation.
Furthermore, CTID net card platform collects user identity data through CollectUserIdentityData (), CTID net card platform verifies user identity data through ValidateUserIdentity (), if verification is passed, CTID net card platform signs net card data as a segment A code of clear data a segment data through IssueNetIDData (), user information user info is processed into encrypted user information encrypted user info through block chain encryption protocol EncryptUsingBlockchain (), and after verification is successful, hash time stamp algorithm GENERATEHASHTIMESTAMP () generates unique authentication code timestamped _hash with time stamp of encrypted user information encrypted user info, which is convenient for CTID net card platform and verification trusted business trip code.
Further, electronic license information electronic_id_info is collected from electronic license data electronic_id_data provided by the user through CollectElectronicIDInfo (), the sink booking platform verifies validity through ValidateElectronicID (), and if verification is passed, the B-segment code plaintext data b_segment_data is generated.
Further, converting the encrypted information into two-dimensional code content and optimizing includes:
Error correction coding is carried out on information spliced by the encrypted ciphertext and the metadata through a Reed-Solomon error correction code algorithm ReedSolomonEncode (), and redundant information is added;
and dynamically adjusting a compression strategy to process the two-dimensional code content according to the capacity limit and the data characteristics of the two-dimensional code through an adaptive data compression algorithm CompressData () to obtain compressed two-dimensional code content compressed_data.
Further, generating the trusted business code in the form of the two-dimensional code according to the compressed two-dimensional code content comprises:
Hiding the key information of the two-dimensional code in the two-dimensional code image by a DNA-based color image encryption algorithm VisualEncrypt ();
And performing edge enhancement and contrast adjustment operation on the two-dimensional code image by utilizing a YOLOv-based optimization method YOLOv8Optimize ().
Further, the authentication process of the trusted business trip code comprises the following steps:
the related verification party reads the trusted business travel code;
Decrypting the content scanned _code of the trusted business code to obtain a decryption result decrypted _code, and extracting the content of the A section code, the B section code and the S section code from the decryption result decrypted _code;
Verifying the B-section code through the electronic license associated with the hash result of the B-section code, and verifying the A-section code through the network license data corresponding to the hash result of the A-section code;
verifying the S-section code by using the corresponding network certificate data of the hash result of the electronic certificate A-section code associated with the hash result of the B-section code;
And synthesizing the verification results of A, B, S three-section codes to obtain a final verification result.
In a second aspect, the present invention provides a trusted business trip code-based registration method comprising subscribing to a service online and generating a trusted business trip code;
Scanning the trusted business travel code, and generating business registration information according to the scanned and read content;
Generating an authentication request based on the A code segment, the B code segment and the face image obtained by scanning, and initiating authentication verification by using the authentication request;
After identity verification is processed, generating a service serial number through user identity information associated with the B code segment and confirming the service serial number;
the related user identity information and the return service serial number enter room registration information to finish registration.
Compared with the prior art, the technical scheme provided by the embodiment of the invention has the following advantages:
The application relies on CTID network card platform to generate personal identification related and bound with personal data, thereby generating a trusted business trip code with dual attributes of identity and service. The information capacity of this trusted business code is fixed and does not increase with the accumulation of information. In practical application, the idea of 'people code unification, identity consensus and code passing' is realized through personal identity identification, so that the travel efficiency is ensured, and precise management is realized. The application improves the identity verification efficiency and the security of business accommodation, reduces the use of entity certificates, reduces the verification complexity, enhances the data security, and optimizes accommodation experience. The method specifically realizes the following aspects of ① improving safety and convenience of business accommodation, and optimizing accommodation experience. ② The registration efficiency is improved, the waiting time of passengers in the foreground is reduced, and the information acquisition and verification are rapidly completed by scanning the accommodation codes. ③ The information security is enhanced, namely identity information leakage and impersonation are prevented by means of CTID network certificate encryption technology and authoritative authentication mechanism. ④ Optimizing management flow, realizing automatic recording and updating of accommodation information, and reducing manual operation error and workload.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flow chart of a method for generating and authenticating a trusted business trip code for a network approximately Fang Minsu according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a trusted business trip code provided by an embodiment of the present invention;
FIG. 3 is a schematic diagram of trusted business travel code-based business registration provided by an embodiment of the present invention;
fig. 4 is a flowchart of a trusted business trip code-based business registration provided in an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
Example 1
As shown in fig. 1, the technology of the present invention realizes a trusted business trip code generation authentication method for a network approximately Fang Minsu, and the present invention includes the following steps:
The trusted business travel code generation flow comprises the following steps:
step1, initiating login registration on the sink booking platform.
The user initiates a login registration operation at the APP or applet end of the civilian subscription platform.
When a user initiates login and registration operation on a civil booking platform, initial login data are collected and recorded on the basis of a distributed account book of a blockchain, the initial login data comprise login and registration time and equipment information used for login, and traceability of login behavior is ensured through the initial login data recorded by the distributed account book.
When a user initiates login or registration operation on the civil booking platform, a graphic verification code and short message verification code dual verification mechanism is adopted:
The one-time password algorithm generates a short message verification code with shorter effective time, and the user provides the correct short message verification code to request for login or registration, thereby preventing malicious registration and violent cracking.
The code is as follows:
Step2, collecting user information user_info and a user identity card photo id_card_image and primarily checking the user identity.
Uploading an identity card photo id_card_image by a user;
Extracting certificate information extracted _info from the identity card photo by OCR for extracting identity card photo information, wherein the certificate information extracted _info comprises a name extracted _info name and an identity card number extracted _info id number;
the living body algorithm PerformLivenessCheck () based on the face action sequence confirms that the user is a real living body, preventing photograph or video falsification. The living body detection algorithm requires the user to perform actions such as blinking, shaking head and the like to acquire a facial action sequence. The living body algorithm PerformLivenessCheck () returns the detection result liveness_result.
And checking the name extracted _info name character rule in the certificate information by checking the weighted checksum of the identity card number extracted _info.id_number in the certificate information through an information redundancy check algorithm CheckRedundancy () of the identity card number and the name. The information redundancy check algorithm CheckRedundancy () returns a check result initial_validation.
The code is as follows:
step3, after the user identity is preliminarily verified, verifying real-name authentication through a real-name authentication interface based on the user information user_info and the identity card photo id_card_image.
Step3 includes checking whether the user information user_info and the identification card photo id_card_image match through the data matching bit pairing algorithm DATAMATCH (). Data matching match algorithm DATAMATCH () returns the match result as match_result.
The comparison of the user's upload identity photo user_photo to the public security system archive photo police _records feature is made by image recognition algorithm ImageRecognition (). The user uploads an identity photo user_photo to be obtained from an identity card photo id_card_image, and a public security system archive photo police _records are obtained through a real-name authentication interface. The image recognition algorithm ImageRecognition () returns a picture matching result as image_match_result.
And integrating multidimensional data information multiple_ databases of a plurality of databases such as a public security system and the like through a multidimensional data source cross-validation algorithm CrossValidation (), and carrying out multidimensional cross-validation on the multidimensional data information multiple_ databases and user information user_info so as to reduce the false judgment rate. The multi-data source cross-validation algorithm CrossValidation () returns a cross-validation result as cross-validation result. If the cross verification fails, recording the failure reason and the times, and starting a manual auditing process when the times reach a threshold value.
The code is as follows:
And combining the three modes to perform real-name authentication, and prompting that the real-name authentication fails when the real-name authentication fails, and carrying out re-operation.
Step4, transmitting user_info to CTID network card platform for authentication, after user authentication of user identity data is completed by CTID network card platform, CTID network card platform generates corresponding network card data as a segment A code of plain data a segment_data for user based on user identity data;
In the specific implementation process, CTID network card platform collects user identity data user_identity_data through CollectUserIdentityData (), CTID network card platform verifies user identity data user_identity_data through ValidateUserIdentity (), if verification is passed, CTID network card platform signs network card data as clear data a_segment_data of A section code according to user identity data user_identity_data through IssueNetIDData (), otherwise, returns 'invalid user identity'.
The code is as follows:
in the specific implementation process, the user information user_info is processed into encrypted user information encrypted_user_info through the blockchain encryption protocol EncryptUsingBlockchain (), so that the confidentiality and the integrity of data are ensured. After authentication is successful, a unique authentication code timestamped _hash with a time mark of encrypted user information encrypted_user_info is generated through a hash time stamp algorithm GENERATEHASHTIMESTAMP (), so that the tracing and verification are facilitated.
The code is as follows:
Step5, acquiring electronic license information electronic_id_info provided by the user, and generating a B section code according to the electronic license information electronic_id_info provided by the user and the set format and rule.
Electronic license information electronic_id_info is collected from electronic license data electronic_id_data provided by a user through CollectElectronicIDInfo (), the sink booking platform verifies validity through ValidateElectronicID (), and if verification is passed, the B-section data b_segment_data of the B-section code is generated through CreateBSegmentCode ().
The code is as follows:
FUNCTION GenerateBSegment(electronic_id_data)
the B section code corresponds to the electronic license presented by the witness and is the business attribute of the trusted business trip code. The electronic license type and the application are identified, and related information such as validity period and issuing organization is associated for business process control such as authority control and process approval. The B section code is matched with the A section code to jointly realize the identity authentication and business functions of the electronic license.
Step6, generating the S section code based on the plain code data of the A section code and the B section code.
The process includes receiving the A-segment code and the B-segment code, calculating check values of the A-segment code and the B-segment code by CalculateChecksum () algorithm, and combining the check values with the A-segment code and the B-segment code to form the S-segment code.
The S-segment code has the function of supplementing or checking. The S section code contains check bit information, is obtained by calculating the A section code and the B section code through a specific algorithm and is used for verifying the accuracy and the integrity of the whole trusted business trip code and preventing errors in the data transmission or generation process.
The code is as follows:
Step7, combining and correlating the generated A section code, B section code and S section code according to a set coding standard to form a complete trusted network license business travel plain code with identity and license dual attributes.
The generated a-segment code, B-segment code, and S-segment code are combined and associated by EncodeSegments () according to a given coding standard.
The code is as follows:
a given encoding standard uses a separator relimiter to concatenate the segments or encode them in a particular order and format.
delimiter="-"
combined_code=A_segment+delimiter+B_segment+delimiter+S_segment;
And (3) carrying out encryption confusion on each part of the trusted network card business travel plain code combined_code to obtain an encryption confusion result encrypted_combined_code.
The encryption confusion is carried out through each part of the elliptic curve encryption technology EncryptUsingECC (), so that the data is not easy to steal or tamper in the storage and transmission processes, and the data security is improved.
encrypted_combined_code=EncryptUsingECC(combined_code)
Step8, hash the encrypted confusion result encrypted_combined_code of the trusted network card business trip code combinedcode. And carrying out hash processing on the CombinedCode of the encryption confusion by using a SHA-256 hash algorithm to obtain a hash value hash_ CombinedCode of the encryption confusion result encrypted_combined_code.
And processing the encrypted confusion result encrypted_combined_code of the trusted network license business figure combinedcode by using an SHA-256 hash algorithm to generate a hash value with a fixed length, so as to ensure the irreversibility and the integrity of the information. In the specific implementation process, the multi-core GPU processor is utilized to simultaneously carry out SHA-256 hash operation on a plurality of data blocks which are encrypted and confused CombinedCode, so that the operation speed is improved. And (3) carrying out rapid screening and collision detection on hash values through a bloom filter, so as to ensure uniqueness.
And the hash value and the salt value are combined to realize the correlation of the B-segment code and the identity information, and GENERATEHMAC () algorithm is combined with the system time stamp, the random character string generated by the random number generator and the user information to generate the salt value hmac _value, so that the randomness and the safety are improved, the attack of a rainbow table is resisted, and the quality of the verification mark is comprehensively ensured.
The code is as follows:
step9, carrying out decryptable encryption on the hash value:
The hash value hash_ CombinedCode of the encrypted-mixed-result-obtained encrypted-code is encrypted by the AES encryption algorithm AESENCRYPT () in combination with a dynamic key dynamic_key generated by the TOTP dynamic key generation algorithm to obtain AES encryption information ae_encrypted_info;
Encrypting the hashed information, wherein the step emphasizes the further encryption operation of the hashed information. On the other hand, the data analysis requirements possibly related in the follow-up process are met by means of the characteristics of a specific encryption algorithm, so that the whole system still has good data processing and analysis capability on the premise of ensuring the data safety.
The code is as follows:
Step10, converting the encrypted information into two-dimensional code content and optimizing the two-dimensional code content.
And error correction coding is carried out on the information spliced by the encrypted ciphertext and the metadata through a Reed-Solomon error correction code algorithm ReedSolomonEncode (), redundant information is added, and the fault tolerance of the two-dimensional code is improved.
The compression strategy is dynamically adjusted to process the two-dimensional code content according to the capacity limit and the data characteristics of the two-dimensional code through the self-adaptive data compression algorithm CompressData () to obtain compressed two-dimensional code content compressed_data, the data storage efficiency and the generation speed are improved, the processing time is prevented from being increased due to the fact that the data quantity exceeds the capacity limit, and the compression strategy comprises Huffman coding or arithmetic coding.
The code is as follows:
The encrypted information is further processed by applying a specific data coding and format conversion algorithm, so that the generation process of the whole two-dimensional code content is optimized, the generated two-dimensional code can accurately bear the encrypted key information, and the encrypted two-dimensional code has good fault tolerance and meets the capacity limit requirement, so that the encrypted two-dimensional code can be stably and efficiently used in the follow-up operations such as display, scanning verification and the like.
Step11, generating a trusted business trip code in a two-dimension code form according to the compressed two-dimension code content.
The color image encryption algorithm VisualEncrypt () based on the DNA conceals the key information of the two-dimensional code in the two-dimensional code image, improves the anti-counterfeiting and safety performance and prevents malicious counterfeiting and information theft.
And performing edge enhancement and contrast adjustment operation on the two-dimensional code image by utilizing the YOLOv-based optimization method YOLOv8Optimize (), improving the readability and recognition rate under different environments, expanding the application scene and the use convenience, and improving the user experience and the service operation efficiency.
The code is as follows:
authentication of trusted business travel codes:
The related verifier reads the trusted business travel code through code scanning equipment or software;
decrypting the trusted business code, and then respectively extracting the contents of the A section code, the B section code and the S section code for verification. Through interaction with CTID network card platforms and an electronic card system, whether the user identity corresponding to the A section code is legal, whether the electronic card pointed by the B section code is truly effective, whether the verification of the S section code is passed or not and the like are confirmed, so that the whole verification process of the bright card is completed.
In the specific implementation process, a verification party reads a trusted business travel code through code scanning equipment or software, assigns the read content to scanned _code, decrypts the content scanned _code of the trusted business travel code to obtain a decryption result decrypted _code, and extracts the content of the A section code, the B section code and the S section code from the decryption result decrypted _code;
Verifying the B-section code through the electronic license associated with the hash result of the B-section code, and verifying the A-section code through the network license data corresponding to the hash result of the A-section code;
verifying the S-section code by using the corresponding network certificate data of the hash result of the electronic certificate A-section code associated with the hash result of the B-section code;
And synthesizing the verification results of A, B, S three-section codes to obtain a final verification result. The code is as follows:
example 2
Referring to fig. 3 and 4, an embodiment of the present invention provides a registration method based on a trusted business trip code, and the identity information of a user is authenticated and verified by scanning the trusted business trip code, so as to finally complete the room registration. The specific business process comprises the following steps:
Online booking business through online booking website and generating trusted business travel code;
when registering, the business REGISTRATION window scans the trusted business TRAVEL CODE MERC HANT _TRAVEL_CODE through ScanQRCode (), and generates business REGISTRATION information REGISTRATION_INFO according to the scanned and read content SCANNED _DATA;
The service registration window generates an authentication request valid_response based on the scanned A CODE segment A_CODE, B CODE segment B_CODE and the FACE IMAGE FACE_IMAGE, and initiates authentication verification to the service system by using the authentication request valid_response, wherein the CODE is as follows:
The business service system uploads the A code segment, the B code segment and the face image, interacts with the trusted business code platform to carry out identity verification, wherein the trusted business code platform interacts with the CTID network card platform when verifying the A code segment. The code is as follows:
After IDENTITY verification is processed, the BUSINESS service system generates a BUSINESS SERIAL NUMBER business_service_number through user IDENTITY information ASSOCIATED with the B code segment. The code is as follows:
User IDENTITY information ASSOCIAT ED _identity_info associated with the B-code segment and a return service SERIAL number business_service_ NUMB ER are confirmed within the service registration window. The code is as follows:
the service registration window enters the ASSOCIATED user IDENTITY information associated_identity_info and the return service SERIAL NUMBER business_service_number into the room registration information maintained by the room registration management system.
And returning a business handling result to finish the room registration.
In the embodiments provided in the present invention, it should be understood that the disclosed structures and methods may be implemented in other manners. For example, the structural embodiments described above are merely illustrative, and for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via interfaces, structures or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The foregoing is only a specific embodiment of the invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. The authentication method for generating the trusted business travel code of the network approximately Fang Minsu is characterized by comprising the steps of collecting user information user_info and a user identity card photo id_card_image and primarily checking the user identity;
After the real name authentication is passed, transmitting user information user_info to CTID network card platform for authentication, after the user completes user identity data authentication through CTID network card platform, CTID network card platform generates corresponding network card data as open code data a_segment_data of A section code for the user based on the user identity data, after authentication is successful, generates unique authentication code timestamped _hash with time mark of encrypted user information encrypted_user_info through hash time stamp algorithm GENERATEHASHTIMESTAMP (), and is convenient for CTID network card platform to trace and verify the network card data of trusted business travel code;
acquiring electronic license information provided by user authorization, and generating the plain code data of the B section code according to the electronic license information provided by the user and the set format and rule;
the method comprises the steps of generating S section codes for verification on the basis of the clear data of the A section codes and the B section codes, combining and correlating the generated A section codes, B section codes and S section codes according to established coding standards to form a complete trusted network license business clear code with identity and license dual attributes;
The method comprises the steps of encrypting and confusing all parts of a trusted network license and a public code to obtain an encrypted and confusing result encrypted-combined-code, hashing the encrypted and confusing result encrypted-combined-code of the trusted network license and the public code, correlating the hash result of a B-section code with an electronic license, the hash result of an A-section code corresponding to network license data, decrypting and encrypting the hash result, converting encryption information into two-dimensional code content, optimizing the two-dimensional code content to obtain compressed two-dimensional code content, generating a trusted business code in the form of a two-dimensional code according to the compressed two-dimensional code content, and constructing a verification mark by utilizing the hash value of the encrypted and confusing result encrypted-combined-code and a salt value based on user information.
2. The method for generating and authenticating the trusted business travel code of the network approximately Fang Minsu as claimed in claim 1, wherein when a user initiates a login registration operation on a civil booking platform, the civil booking platform records initial login data based on a distributed account book technology of a blockchain, and ensures traceability of login behavior, wherein the initial login data comprises login registration time and equipment information used for login;
When a user initiates a login or registration operation on a civil booking platform, a graphic verification code and short message verification code dual verification mechanism is adopted, wherein a complex graphic verification code is generated through a random deformation character and an interference line generation algorithm, the user provides a correct graphic verification code to request the login or registration, a one-time password algorithm generates a short message verification code with shorter effective time, and the user provides a correct short message verification code to request the login or registration.
3. The method for generating and authenticating a trusted business trip code for a network claim Fang Minsu as set forth in claim 1, wherein initially verifying the user identity comprises extracting credential information extracted _info from the identification card photograph at the civilian subscription platform via OCR for extracting identification card photograph information, the credential information extracted _info comprising a name extracted _info.name, an identification card number extracted _info.id_number;
A living body algorithm PerformLivenessCheck () based on the face action sequence confirms that the user is a real living body;
And checking the name extracted _info name character rule in the certificate information by checking the weighted checksum of the identity card number extracted _info.id_number in the certificate information through an information redundancy check algorithm CheckRedundancy () of the identity card number and the name.
4. The authentication method for generating trusted business travel codes for network approximately Fang Minsu as claimed in claim 1, wherein the verification of real-name authentication based on user information user_info and identification card photo id_card_image through real-name authentication interface includes:
checking whether user information user_info and an identity card photo id_card_image are matched or not through a data matching bit pairing algorithm DATAMATCH ();
Comparing whether the characteristics of the user uploading identity photo user_photo and the public security system archiving photo police _records are consistent or not through an image recognition algorithm ImageRecognition (), wherein the user uploading identity photo user_photo is obtained from an identity card photo id_card_image;
Multi-dimensional data information multiple_ databases of a plurality of databases of the public security system is integrated through a multi-data source cross-validation algorithm CrossValidation (), multi-dimensional cross-validation is carried out on the multi-dimensional data information multiple_ databases and user information user_info, if the cross-validation fails, the reasons and times of the failure are recorded, and when the times reach a threshold value, a manual auditing process is started;
And combining the three modes to perform real-name authentication, and prompting that the real-name authentication fails when the real-name authentication fails, and carrying out re-operation.
5. The authentication method for generating the trusted business code for the network approximately Fang Minsu according to claim 1, wherein the CTID network card platform collects user identity data user_identity_data through CollectUserIdentityData (), the CTID network card platform verifies the user identity data user_identity_data through ValidateUserIdentity (), if verification is passed, the CTID network card platform signs the network card data as the open code data a_segment_data of the A-segment code according to the user identity data user_identity_data through IssueNetIDData (), processes the user information user_info into encrypted user information encrypted_user_info through a blockchain encryption protocol EncryptUsingBlockchain (), and generates a unique authentication code timestamped _hash with a time stamp of the encrypted user information encrypted_user_info through a hash time stamp algorithm GENERATEHASHTIMESTAMP (), thereby facilitating CTID network card platform and verification of the trusted business code.
6. The authentication method for generating the trusted business code for the network approximately Fang Minsu as claimed in claim 1, wherein the electronic license information electronic_id_info is collected from the electronic license data electronic_id_data provided by the user through CollectElectronicIDInfo (), the sink reservation platform verifies the validity through ValidateElectronicID (), and if the verification is passed, the clear data b_segment_data of the B-segment code is generated.
7. The authentication method for generating the trusted business code for the network approximately Fang Minsu as claimed in claim 1, wherein the steps of converting the encrypted information into two-dimensional code content and optimizing include:
Error correction coding is carried out on information spliced by the encrypted ciphertext and the metadata through a Reed-Solomon error correction code algorithm ReedSolomonEncode (), and redundant information is added;
and dynamically adjusting a compression strategy to process the two-dimensional code content according to the capacity limit and the data characteristics of the two-dimensional code through an adaptive data compression algorithm CompressData () to obtain compressed two-dimensional code content compressed_data.
8. The authentication method for generating a trusted business code for network approximately Fang Minsu as claimed in claim 1, wherein generating a trusted business code in the form of a two-dimensional code from compressed two-dimensional code content comprises:
Hiding the key information of the two-dimensional code in the two-dimensional code image by a DNA-based color image encryption algorithm VisualEncrypt ();
And performing edge enhancement and contrast adjustment operation on the two-dimensional code image by utilizing a YOLOv-based optimization method YOLOv8Optimize ().
9. The authentication method for trusted travel code generation of network approximately Fang Minsu as claimed in claim 1, wherein the authentication process of the trusted travel code includes:
the related verification party reads the trusted business travel code;
Decrypting the content scanned _code of the trusted business code to obtain a decryption result decrypted _code, and extracting the content of the A section code, the B section code and the S section code from the decryption result decrypted _code;
Verifying the B-section code through the electronic license associated with the hash result of the B-section code, and verifying the A-section code through the network license data corresponding to the hash result of the A-section code;
verifying the S-section code by using the corresponding network certificate data of the hash result of the electronic certificate A-section code associated with the hash result of the B-section code;
And synthesizing the verification results of A, B, S three-section codes to obtain a final verification result.
10. The method for authentication of trusted business code generation for network approximately Fang Minsu as claimed in claim 1, wherein the registration process based on the trusted business code includes online booking business through an online booking website and generating the trusted business code;
when registering, the business registration window scans the trusted business travel code and generates business registration information according to the scanned and read content;
the business registration window generates an authentication request based on the scanned A section code, B section code and face image, and initiates authentication verification to a business service system by using the authentication request;
the business service system uploads the A section code, the B section code and the face image, interacts with the trusted business travel code platform to carry out identity verification, and after the identity verification is processed, the business service system generates a business serial number through user identity information associated with the B section code and is confirmed by a business registration window;
the service registration window inputs the related user identity information and the return service serial number into the room registration information to finish registration.
CN202510018599.XA 2025-01-07 2025-01-07 A method and application for generating and authenticating trusted business travel codes for online rental and homestays. Active CN119941272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510018599.XA CN119941272B (en) 2025-01-07 2025-01-07 A method and application for generating and authenticating trusted business travel codes for online rental and homestays.

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510018599.XA CN119941272B (en) 2025-01-07 2025-01-07 A method and application for generating and authenticating trusted business travel codes for online rental and homestays.

Publications (2)

Publication Number Publication Date
CN119941272A CN119941272A (en) 2025-05-06
CN119941272B true CN119941272B (en) 2025-12-02

Family

ID=95540858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510018599.XA Active CN119941272B (en) 2025-01-07 2025-01-07 A method and application for generating and authenticating trusted business travel codes for online rental and homestays.

Country Status (1)

Country Link
CN (1) CN119941272B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117811757A (en) * 2022-11-28 2024-04-02 中移系统集成有限公司 Service data acquisition method, device, equipment and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105745954B (en) * 2014-10-24 2019-11-01 华为技术有限公司 A M2M terminal control method and related equipment
WO2018046009A1 (en) * 2016-09-12 2018-03-15 上海鼎利信息科技有限公司 Block chain identity system
CN113360134B (en) * 2020-03-06 2022-06-17 武汉斗鱼网络科技有限公司 Method, device, equipment and storage medium for generating security verification program
KR20210116821A (en) * 2020-03-17 2021-09-28 주식회사 야놀자 Check-in system using qr code based on blockchain identity verification and method thereof
CN112926969B (en) * 2021-02-07 2022-07-05 新大陆(福建)公共服务有限公司 Payment method and device based on trusted digital identity two-dimensional code
CN113641975A (en) * 2021-10-18 2021-11-12 国网电子商务有限公司 Identification registration method, identification verification method, device and system
CN114862630B (en) * 2022-07-04 2022-11-04 成都桐领智能科技有限公司 Trusted barcode-based networking contract management method and system
CN116915482A (en) * 2023-08-09 2023-10-20 山东齐鲁公共安全研究院有限公司 Identity authentication platform and method integrating multi-platform identity information

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117811757A (en) * 2022-11-28 2024-04-02 中移系统集成有限公司 Service data acquisition method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN119941272A (en) 2025-05-06

Similar Documents

Publication Publication Date Title
US11108546B2 (en) Biometric verification of a blockchain database transaction contributor
US12126715B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
CN103679436B (en) A kind of electronic contract security system and method based on biological information identification
JP7458661B2 (en) Biometric digital signature generation for identity verification
JP2009519490A (en) Secure threshold decryption protocol calculation
CN101369892A (en) A Method of Enhancing the Security of Fingerprint Fuzzy Vault System
CN116112242B (en) Unified safety authentication method and system for power regulation and control system
CN114531277A (en) User identity authentication method based on block chain technology
CN112039665A (en) A key management method and device
WO2009073144A2 (en) Bio-cryptography: secure cryptographic protocols with bipartite biotokens
US12375484B2 (en) Decentralized secure true digital ID for communication
EP3937037B1 (en) A system and method for digital identity authentication based on biometric data
JP6502083B2 (en) Authentication device, information terminal device, program, and authentication method
CN109447029B (en) Electronic identity card photo generation system and method
CN116094724A (en) Registration and authentication method and device for electronic identity
CA2590387A1 (en) A system and method for creating a virtual private network (vpn) over a computer network using multi-layered permissions-based access control
CN119941272B (en) A method and application for generating and authenticating trusted business travel codes for online rental and homestays.
CN110619228B (en) File decryption method, file encryption method, file management system and storage medium
Saraswathi et al. Retinal biometrics based authentication and key exchange system
CN114928469A (en) IDaaS system for access control based on mutual authentication mechanism
JP2025128021A (en) Method for providing content for authentication and authenticating content - Patent Application 20070122999
CN120512270A (en) Distributed identity remote authentication method, device and storage medium
CN104702417A (en) Security authentication system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant