CN102724039A - Method for authenticating copy information of identity card - Google Patents

Method for authenticating copy information of identity card Download PDF

Info

Publication number
CN102724039A
CN102724039A CN2011100787009A CN201110078700A CN102724039A CN 102724039 A CN102724039 A CN 102724039A CN 2011100787009 A CN2011100787009 A CN 2011100787009A CN 201110078700 A CN201110078700 A CN 201110078700A CN 102724039 A CN102724039 A CN 102724039A
Authority
CN
China
Prior art keywords
information
copy
card
identity card
applicant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100787009A
Other languages
Chinese (zh)
Inventor
程建岭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2011100787009A priority Critical patent/CN102724039A/en
Publication of CN102724039A publication Critical patent/CN102724039A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a method for authenticating copy identity card information. The technical scheme of the method is the method for authenticating copy information identity card , comprising the steps of: reading information stored in the identity card and digitizing the usage information of the identity card copy; utilizing an encryption program to encrypt read identity card information and digitized usage information of the identity card copy ,and generating encrypted information; outputting the encrypted information;acquiring the encrypted information through information inputting equipment and decrypting the information to obtain decrypted information; verifying that the identity card copy used by the applicant is valid if the information submitted by the applicant is identical with the decrypted information, and otherwise, determining that the identity card copy used by the applicant is forged or fake. The beneficial effects of the method is that the method helps to greatly prevent other people from impersonating the owner of an identity card to swindle the housing loan and the car loan of the owner and is beneficial for establishing the personal credit evaluation system.

Description

A kind of method of Copy of ID Card authentification of message
Technical field
The present invention relates to a kind of method of Copy of ID Card authentification of message.
Background technology
Identity card is as the storage and the documentary evidence of individual citizens identity information, and the importance in politics, economy and daily life is self-evident.Particularly national China second-generation identity card of exerting to promote has become the documentation of identity that the individual carries in problems in present society, be widely used in the every field of social life.
Be accompanied by members of society and participate in the increase of social activities; Greatly to buy house, buying car, investment, establishment enterprise, little of doing a phonecard, the card of surfing Internet of playing games etc.; All inevitably to use identity card; But the individual's of authentication at present identity information generally is to carry out authentication through Copy of ID Card, causes a large amount of Copy of ID Cards to be retained in each place, not only causes a hidden trouble to leakage of personal information; The Copy of ID Card that also can usurp, falsely use other people to the law-breaker offers an opportunity, and brings harmful effect to social stability.
The China second-generation identity card that the present Ministry of Public Security uses in China; Be to adopt the manufacturing of non-contact IC card technique; Reading in conventional artificial on the basis of mode has increased machine-readable function, makes the anti-counterfeiting performance of China second-generation identity card be greatly improved, and has increased the difficulty of forged identity card; Collective and individual loss and the non-persistent factor of bringing on the limit of maximum, have been reduced owing to the identity card that uses forgery is country.But in the authentication of the copy of identity card, not very big breakthrough, the copy of the copy of the Certification of Second Generation of some personations that exist at present and the Certification of Second Generation that generated by program has no idea to solve in some fields.
For example the patent No. 200710149524.7, and the patent of invention of title " id card scanning control method and device " discloses a kind of id card scanning control method, and it comprises: the chip information that reading identity card is inner; Judge whether the ID card verification facility can decipher the chip information that reads, if then scan said identity card; Otherwise, the said identity card of refusal scanning.Use the present invention when identity card is scanned; Increased the process of differentiating the identity card true and false through the ID card verification facility; The circulation and the use of false identity card have been avoided; Effectively prevented the use of false identity card in industries such as bank, telecommunications, hotels, fraud that in these industries, causes and unnecessary dispute have reduced the loss that these industries possibly cause.But the method that its invention provides can only scan the identity card original paper, thereby judges the true and false of original paper, and can't compare to the authentication of follow-up Copy of ID Card, can bring hidden danger to carrying out of related service.Claim the identity of others fraudulently card copy apply for loan or handle business such as credit card of related personnel is arranged in the related news reports, give country, collective and individual all cause very big harm, have upset normal civil order.
Summary of the invention
For addressing the above problem special proposition the present invention.
Technical scheme of the present invention is: a kind of method of Copy of ID Card authentification of message comprises step: the information of reading identity card storage inside, simultaneously the use information of Copy of ID Card is carried out digitized processing; Use encipheror that the ID card information that reads is carried out encryption with the use information of the Copy of ID Card after the digitlization, and the generation enciphered message; Output encrypted message; Gather enciphered message and it is carried out decryption processing through information input equipment, obtain decryption information; Information and decryption information that the applicant submits to are compared, if coincide, can confirm that the Copy of ID Card that the applicant uses is authentic and valid, if misfit, then the Copy of ID Card that uses of applicant is to forge or palm off.
The use information of said Copy of ID Card comprises application target, applying unit, useful life.
Because the uniqueness of personal identity card, consequent enciphered message also has uniqueness, like this when the related personnel has received the enciphered message that provides, and mode information extraction that can be by appointment, deciphering, and simultaneously individual's information is compared.
In the department that need maintain secrecy to individual's privacy; Enciphered message can only be provided; If other staff can't extract relevant information not obtaining licensing under the situation of special equipment, only be authorized to compare after the talent can the applying decryption program deciphers; To reduce the accidental release problem of personal information so greatly, and reduce the situation generation of being falsely used identity card by other people.
Beneficial effect of the present invention is; The id card scanning control method of comparing and generally using at present, the possibility of leaking personal information reduces greatly, and the ten minutes that makes the purpose wanting to utilize other people identity information to reach oneself to become is difficult; To significantly reduce members of society and assumed another's name to defraud of housing loan by other people; The risk of loan for purchasing car helps the foundation of individual's credit appraisal system, reduces because of the social dispute of illegal use identity card photograph and the generation of unstability privacy incident; Safeguard wide law-abiding citizen's individual rights, promote social harmony.
Description of drawings
Fig. 1 flow chart of the present invention.
Wherein, 101, the information of reading identity card storage inside, identity card is used information digitalization; 102, generate enciphered message; 103, output encrypted message; 104, deciphering, acquisition decryption information; 105, verify comparison.
Embodiment
Specify the present invention below in conjunction with embodiment.
Embodiment 1: when method provided by the invention is used to handle telecommunication service:
(1) applicant provides China second-generation identity card, and the handler utilizes task equipment to read the machine sensible information of Certification of Second Generation, and utilizes the termination number of the telecommunications service project of input equipment input applicant selection, the use information such as useful life of Copy of ID Card;
(2) through the for example enciphered message and the output of " XXXXX number private identity card copy, date XXXX XX month XX day are handled in the XX telecommunication business Room " of encryption device generation;
(3) handler handles related service to the enciphered message of output as annex, and retains for future reference;
(4) use decryption device that information encrypted is deciphered;
(5) relevant information and the decryption information of comparison Copy of ID Card; Use information to transactor's identity information and Copy of ID Card is verified; If coincide; Can confirm that the Copy of ID Card that the applicant uses is authentic and valid, if misfit, then the Copy of ID Card that uses of applicant is to forge or personation.
Embodiment 2: when arranging bank loans, mortgage, applying for that credit card etc. is professional:
(1) applicant provides China second-generation identity card, and the handler utilizes task equipment to read the machine sensible information of Certification of Second Generation, and utilizes the relevant use information of input equipment input applicant handling bank business;
(2) generate the for example enciphered message and the output of " XX bank handles XXXXX service-specific Copy of ID Card, date XXXX XX month XX day " through encryption device;
(3) handler handles related service to the enciphered message of output as annex, and retains for future reference;
(4) use decryption device that information encrypted is deciphered;
(5) relevant information and the decryption information of comparison Copy of ID Card; Use information to transactor's identity information and Copy of ID Card is verified; If coincide; Can confirm that the Copy of ID Card that the applicant uses is authentic and valid, if misfit, then the Copy of ID Card that uses of applicant is to forge or personation.
Embodiment 3: daily use, as move in the hotel, handle member card etc.:
(1) applicant provides China second-generation identity card, and the handler utilizes task equipment to read the machine sensible information of Certification of Second Generation, and utilizes input equipment input applicant to handle the relevant use information of item;
(2) through the for example enciphered message and the output of " XX hotel (unit) handles XXXXX item private identity card copy, date XXXX XX month XX day " of encryption device generation;
(3) handler handles related service to the enciphered message of output as annex, and retains for future reference;
(4) use decryption device that information encrypted is deciphered;
(5) relevant information and the decryption information of comparison Copy of ID Card; Use information to transactor's identity information and Copy of ID Card is verified; If coincide; Can confirm that the Copy of ID Card that the applicant uses is authentic and valid, if misfit, then the Copy of ID Card that uses of applicant is to forge or personation.
Embodiment comprises but not exclusively contains the present invention that any method that does not break away from claims protection range of the present invention all is included in the field of the present invention's protection.

Claims (2)

1. the method for a Copy of ID Card authentification of message is characterized in that, comprises step:
The information of reading identity card storage inside is carried out digitized processing with the use information of Copy of ID Card simultaneously;
Use encipheror that the ID card information that reads is carried out encryption with the use information of the Copy of ID Card after the digitlization, and the generation enciphered message;
Output encrypted message;
Gather enciphered message and it is carried out decryption processing through decrypts information equipment, obtain decryption information;
Information and decryption information that the applicant submits to are compared, if coincide, can confirm that the Copy of ID Card that the applicant uses is authentic and valid, if misfit, then the Copy of ID Card that uses of applicant is to forge or palm off.
2. the method for Copy of ID Card authentification of message according to claim 1 is characterized in that, the use information of said Copy of ID Card comprises application target, applying unit, useful life.
CN2011100787009A 2011-03-30 2011-03-30 Method for authenticating copy information of identity card Pending CN102724039A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100787009A CN102724039A (en) 2011-03-30 2011-03-30 Method for authenticating copy information of identity card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100787009A CN102724039A (en) 2011-03-30 2011-03-30 Method for authenticating copy information of identity card

Publications (1)

Publication Number Publication Date
CN102724039A true CN102724039A (en) 2012-10-10

Family

ID=46949711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100787009A Pending CN102724039A (en) 2011-03-30 2011-03-30 Method for authenticating copy information of identity card

Country Status (1)

Country Link
CN (1) CN102724039A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573647A (en) * 2014-12-30 2015-04-29 福建三元达软件有限公司 Recognition method and device for illegal identity document
CN104883260A (en) * 2015-06-11 2015-09-02 深圳市易普森科技有限公司 Certificate information processing and verification methods, processing terminal, and verification server
CN106569756A (en) * 2016-11-04 2017-04-19 北京小米移动软件有限公司 Method and device for copy false proofing
CN108492023A (en) * 2018-03-19 2018-09-04 浙江工业大学 A kind of vehicle loan air control method based on trajectory analysis

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6567530B1 (en) * 1997-11-25 2003-05-20 Canon Kabushiki Kaisha Device and method for authenticating and certifying printed documents

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6567530B1 (en) * 1997-11-25 2003-05-20 Canon Kabushiki Kaisha Device and method for authenticating and certifying printed documents

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573647A (en) * 2014-12-30 2015-04-29 福建三元达软件有限公司 Recognition method and device for illegal identity document
CN104883260A (en) * 2015-06-11 2015-09-02 深圳市易普森科技有限公司 Certificate information processing and verification methods, processing terminal, and verification server
CN106569756A (en) * 2016-11-04 2017-04-19 北京小米移动软件有限公司 Method and device for copy false proofing
CN108492023A (en) * 2018-03-19 2018-09-04 浙江工业大学 A kind of vehicle loan air control method based on trajectory analysis

Similar Documents

Publication Publication Date Title
US9900309B2 (en) Methods for using digital seals for non-repudiation of attestations
CN106452756B (en) Can the safe Quick Response Code construction verification method of off-line verification and device
CN102880960B (en) Based on the payment by using short messages method and system of fingerprint recognition mobile phone
CN103440444B (en) The signing method of electronic contract
CN103985036B (en) Two-dimension code payment method with biological characteristics
CN104322003B (en) Cryptographic authentication and identification method using real-time encryption
US20060072745A1 (en) Encryption system using device authentication keys
CN104321777B (en) Public identifier is generated to verify the personal method for carrying identification object
CN202854880U (en) SMS payment system based on fingerprint identification mobile phone
CN102769531A (en) Identity authentication device and method thereof
CN101355422A (en) Novel authentication mechanism for encrypting vector
CN102724039A (en) Method for authenticating copy information of identity card
US20220188836A1 (en) Anti-Money Laundering Blockchain Technology
CN108400874A (en) The method that the digital signature function of terminal is authenticated printed text is verified using seal
Mishra et al. Multilevel security feature for online transaction using QR code & digital watermarking
CN107196965A (en) A kind of secure network real name registers technology
CN1997954A (en) Securing of electronic transactions
Zhao et al. Card user authentication based on generalized image morphing
CN105429986B (en) A kind of system of genuine cyber identification verifying and secret protection
CN111523141B (en) Personal privacy protection-based identity identification and verification system
Smejkal et al. Strong authentication using dynamic biometric signature
CN101951365A (en) Network information counterfeiting issuing system, counterfeiting receiving system, and counterfeiting system and method
Zhao et al. A new protocol for user awareness in card based shopping
Bharvada Electronic Signatures, Biometrics and PKI in the UK
Sharma et al. Survey of Reliable PIN confirmation for ATM’s using Smartphone and Wearable Devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20121010