CN102724039A - Method for authenticating copy information of identity card - Google Patents
Method for authenticating copy information of identity card Download PDFInfo
- Publication number
- CN102724039A CN102724039A CN2011100787009A CN201110078700A CN102724039A CN 102724039 A CN102724039 A CN 102724039A CN 2011100787009 A CN2011100787009 A CN 2011100787009A CN 201110078700 A CN201110078700 A CN 201110078700A CN 102724039 A CN102724039 A CN 102724039A
- Authority
- CN
- China
- Prior art keywords
- information
- copy
- card
- identity card
- applicant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention relates to a method for authenticating copy identity card information. The technical scheme of the method is the method for authenticating copy information identity card , comprising the steps of: reading information stored in the identity card and digitizing the usage information of the identity card copy; utilizing an encryption program to encrypt read identity card information and digitized usage information of the identity card copy ,and generating encrypted information; outputting the encrypted information;acquiring the encrypted information through information inputting equipment and decrypting the information to obtain decrypted information; verifying that the identity card copy used by the applicant is valid if the information submitted by the applicant is identical with the decrypted information, and otherwise, determining that the identity card copy used by the applicant is forged or fake. The beneficial effects of the method is that the method helps to greatly prevent other people from impersonating the owner of an identity card to swindle the housing loan and the car loan of the owner and is beneficial for establishing the personal credit evaluation system.
Description
Technical field
The present invention relates to a kind of method of Copy of ID Card authentification of message.
Background technology
Identity card is as the storage and the documentary evidence of individual citizens identity information, and the importance in politics, economy and daily life is self-evident.Particularly national China second-generation identity card of exerting to promote has become the documentation of identity that the individual carries in problems in present society, be widely used in the every field of social life.
Be accompanied by members of society and participate in the increase of social activities; Greatly to buy house, buying car, investment, establishment enterprise, little of doing a phonecard, the card of surfing Internet of playing games etc.; All inevitably to use identity card; But the individual's of authentication at present identity information generally is to carry out authentication through Copy of ID Card, causes a large amount of Copy of ID Cards to be retained in each place, not only causes a hidden trouble to leakage of personal information; The Copy of ID Card that also can usurp, falsely use other people to the law-breaker offers an opportunity, and brings harmful effect to social stability.
The China second-generation identity card that the present Ministry of Public Security uses in China; Be to adopt the manufacturing of non-contact IC card technique; Reading in conventional artificial on the basis of mode has increased machine-readable function, makes the anti-counterfeiting performance of China second-generation identity card be greatly improved, and has increased the difficulty of forged identity card; Collective and individual loss and the non-persistent factor of bringing on the limit of maximum, have been reduced owing to the identity card that uses forgery is country.But in the authentication of the copy of identity card, not very big breakthrough, the copy of the copy of the Certification of Second Generation of some personations that exist at present and the Certification of Second Generation that generated by program has no idea to solve in some fields.
For example the patent No. 200710149524.7, and the patent of invention of title " id card scanning control method and device " discloses a kind of id card scanning control method, and it comprises: the chip information that reading identity card is inner; Judge whether the ID card verification facility can decipher the chip information that reads, if then scan said identity card; Otherwise, the said identity card of refusal scanning.Use the present invention when identity card is scanned; Increased the process of differentiating the identity card true and false through the ID card verification facility; The circulation and the use of false identity card have been avoided; Effectively prevented the use of false identity card in industries such as bank, telecommunications, hotels, fraud that in these industries, causes and unnecessary dispute have reduced the loss that these industries possibly cause.But the method that its invention provides can only scan the identity card original paper, thereby judges the true and false of original paper, and can't compare to the authentication of follow-up Copy of ID Card, can bring hidden danger to carrying out of related service.Claim the identity of others fraudulently card copy apply for loan or handle business such as credit card of related personnel is arranged in the related news reports, give country, collective and individual all cause very big harm, have upset normal civil order.
Summary of the invention
For addressing the above problem special proposition the present invention.
Technical scheme of the present invention is: a kind of method of Copy of ID Card authentification of message comprises step: the information of reading identity card storage inside, simultaneously the use information of Copy of ID Card is carried out digitized processing; Use encipheror that the ID card information that reads is carried out encryption with the use information of the Copy of ID Card after the digitlization, and the generation enciphered message; Output encrypted message; Gather enciphered message and it is carried out decryption processing through information input equipment, obtain decryption information; Information and decryption information that the applicant submits to are compared, if coincide, can confirm that the Copy of ID Card that the applicant uses is authentic and valid, if misfit, then the Copy of ID Card that uses of applicant is to forge or palm off.
The use information of said Copy of ID Card comprises application target, applying unit, useful life.
Because the uniqueness of personal identity card, consequent enciphered message also has uniqueness, like this when the related personnel has received the enciphered message that provides, and mode information extraction that can be by appointment, deciphering, and simultaneously individual's information is compared.
In the department that need maintain secrecy to individual's privacy; Enciphered message can only be provided; If other staff can't extract relevant information not obtaining licensing under the situation of special equipment, only be authorized to compare after the talent can the applying decryption program deciphers; To reduce the accidental release problem of personal information so greatly, and reduce the situation generation of being falsely used identity card by other people.
Beneficial effect of the present invention is; The id card scanning control method of comparing and generally using at present, the possibility of leaking personal information reduces greatly, and the ten minutes that makes the purpose wanting to utilize other people identity information to reach oneself to become is difficult; To significantly reduce members of society and assumed another's name to defraud of housing loan by other people; The risk of loan for purchasing car helps the foundation of individual's credit appraisal system, reduces because of the social dispute of illegal use identity card photograph and the generation of unstability privacy incident; Safeguard wide law-abiding citizen's individual rights, promote social harmony.
Description of drawings
Fig. 1 flow chart of the present invention.
Wherein, 101, the information of reading identity card storage inside, identity card is used information digitalization; 102, generate enciphered message; 103, output encrypted message; 104, deciphering, acquisition decryption information; 105, verify comparison.
Embodiment
Specify the present invention below in conjunction with embodiment.
Embodiment 1: when method provided by the invention is used to handle telecommunication service:
(1) applicant provides China second-generation identity card, and the handler utilizes task equipment to read the machine sensible information of Certification of Second Generation, and utilizes the termination number of the telecommunications service project of input equipment input applicant selection, the use information such as useful life of Copy of ID Card;
(2) through the for example enciphered message and the output of " XXXXX number private identity card copy, date XXXX XX month XX day are handled in the XX telecommunication business Room " of encryption device generation;
(3) handler handles related service to the enciphered message of output as annex, and retains for future reference;
(4) use decryption device that information encrypted is deciphered;
(5) relevant information and the decryption information of comparison Copy of ID Card; Use information to transactor's identity information and Copy of ID Card is verified; If coincide; Can confirm that the Copy of ID Card that the applicant uses is authentic and valid, if misfit, then the Copy of ID Card that uses of applicant is to forge or personation.
Embodiment 2: when arranging bank loans, mortgage, applying for that credit card etc. is professional:
(1) applicant provides China second-generation identity card, and the handler utilizes task equipment to read the machine sensible information of Certification of Second Generation, and utilizes the relevant use information of input equipment input applicant handling bank business;
(2) generate the for example enciphered message and the output of " XX bank handles XXXXX service-specific Copy of ID Card, date XXXX XX month XX day " through encryption device;
(3) handler handles related service to the enciphered message of output as annex, and retains for future reference;
(4) use decryption device that information encrypted is deciphered;
(5) relevant information and the decryption information of comparison Copy of ID Card; Use information to transactor's identity information and Copy of ID Card is verified; If coincide; Can confirm that the Copy of ID Card that the applicant uses is authentic and valid, if misfit, then the Copy of ID Card that uses of applicant is to forge or personation.
Embodiment 3: daily use, as move in the hotel, handle member card etc.:
(1) applicant provides China second-generation identity card, and the handler utilizes task equipment to read the machine sensible information of Certification of Second Generation, and utilizes input equipment input applicant to handle the relevant use information of item;
(2) through the for example enciphered message and the output of " XX hotel (unit) handles XXXXX item private identity card copy, date XXXX XX month XX day " of encryption device generation;
(3) handler handles related service to the enciphered message of output as annex, and retains for future reference;
(4) use decryption device that information encrypted is deciphered;
(5) relevant information and the decryption information of comparison Copy of ID Card; Use information to transactor's identity information and Copy of ID Card is verified; If coincide; Can confirm that the Copy of ID Card that the applicant uses is authentic and valid, if misfit, then the Copy of ID Card that uses of applicant is to forge or personation.
Embodiment comprises but not exclusively contains the present invention that any method that does not break away from claims protection range of the present invention all is included in the field of the present invention's protection.
Claims (2)
1. the method for a Copy of ID Card authentification of message is characterized in that, comprises step:
The information of reading identity card storage inside is carried out digitized processing with the use information of Copy of ID Card simultaneously;
Use encipheror that the ID card information that reads is carried out encryption with the use information of the Copy of ID Card after the digitlization, and the generation enciphered message;
Output encrypted message;
Gather enciphered message and it is carried out decryption processing through decrypts information equipment, obtain decryption information;
Information and decryption information that the applicant submits to are compared, if coincide, can confirm that the Copy of ID Card that the applicant uses is authentic and valid, if misfit, then the Copy of ID Card that uses of applicant is to forge or palm off.
2. the method for Copy of ID Card authentification of message according to claim 1 is characterized in that, the use information of said Copy of ID Card comprises application target, applying unit, useful life.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100787009A CN102724039A (en) | 2011-03-30 | 2011-03-30 | Method for authenticating copy information of identity card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100787009A CN102724039A (en) | 2011-03-30 | 2011-03-30 | Method for authenticating copy information of identity card |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102724039A true CN102724039A (en) | 2012-10-10 |
Family
ID=46949711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100787009A Pending CN102724039A (en) | 2011-03-30 | 2011-03-30 | Method for authenticating copy information of identity card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102724039A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104573647A (en) * | 2014-12-30 | 2015-04-29 | 福建三元达软件有限公司 | Recognition method and device for illegal identity document |
CN104883260A (en) * | 2015-06-11 | 2015-09-02 | 深圳市易普森科技有限公司 | Certificate information processing and verification methods, processing terminal, and verification server |
CN106569756A (en) * | 2016-11-04 | 2017-04-19 | 北京小米移动软件有限公司 | Method and device for copy false proofing |
CN108492023A (en) * | 2018-03-19 | 2018-09-04 | 浙江工业大学 | A kind of vehicle loan air control method based on trajectory analysis |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6567530B1 (en) * | 1997-11-25 | 2003-05-20 | Canon Kabushiki Kaisha | Device and method for authenticating and certifying printed documents |
-
2011
- 2011-03-30 CN CN2011100787009A patent/CN102724039A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6567530B1 (en) * | 1997-11-25 | 2003-05-20 | Canon Kabushiki Kaisha | Device and method for authenticating and certifying printed documents |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104573647A (en) * | 2014-12-30 | 2015-04-29 | 福建三元达软件有限公司 | Recognition method and device for illegal identity document |
CN104883260A (en) * | 2015-06-11 | 2015-09-02 | 深圳市易普森科技有限公司 | Certificate information processing and verification methods, processing terminal, and verification server |
CN106569756A (en) * | 2016-11-04 | 2017-04-19 | 北京小米移动软件有限公司 | Method and device for copy false proofing |
CN108492023A (en) * | 2018-03-19 | 2018-09-04 | 浙江工业大学 | A kind of vehicle loan air control method based on trajectory analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9900309B2 (en) | Methods for using digital seals for non-repudiation of attestations | |
CN106452756B (en) | Can the safe Quick Response Code construction verification method of off-line verification and device | |
CN102880960B (en) | Based on the payment by using short messages method and system of fingerprint recognition mobile phone | |
CN103440444B (en) | The signing method of electronic contract | |
CN103985036B (en) | Two-dimension code payment method with biological characteristics | |
CN104322003B (en) | Cryptographic authentication and identification method using real-time encryption | |
US20060072745A1 (en) | Encryption system using device authentication keys | |
CN104321777B (en) | Public identifier is generated to verify the personal method for carrying identification object | |
CN202854880U (en) | SMS payment system based on fingerprint identification mobile phone | |
CN102769531A (en) | Identity authentication device and method thereof | |
CN101355422A (en) | Novel authentication mechanism for encrypting vector | |
CN102724039A (en) | Method for authenticating copy information of identity card | |
US20220188836A1 (en) | Anti-Money Laundering Blockchain Technology | |
CN108400874A (en) | The method that the digital signature function of terminal is authenticated printed text is verified using seal | |
Mishra et al. | Multilevel security feature for online transaction using QR code & digital watermarking | |
CN107196965A (en) | A kind of secure network real name registers technology | |
CN1997954A (en) | Securing of electronic transactions | |
Zhao et al. | Card user authentication based on generalized image morphing | |
CN105429986B (en) | A kind of system of genuine cyber identification verifying and secret protection | |
CN111523141B (en) | Personal privacy protection-based identity identification and verification system | |
Smejkal et al. | Strong authentication using dynamic biometric signature | |
CN101951365A (en) | Network information counterfeiting issuing system, counterfeiting receiving system, and counterfeiting system and method | |
Zhao et al. | A new protocol for user awareness in card based shopping | |
Bharvada | Electronic Signatures, Biometrics and PKI in the UK | |
Sharma et al. | Survey of Reliable PIN confirmation for ATM’s using Smartphone and Wearable Devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20121010 |