Credential Information Security Supervision Method and System

An information security and supervision system technology, applied in the field of credential information security supervision methods and systems, can solve the problems of easy copying, forgery or misappropriation, easy misappropriation, insecurity, etc., to enhance the anti-counterfeiting effect, improve security, guarantee The effect of authenticity

Active Publication Date: 2016-04-20
广东云诺科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, all kinds of certificates have more or less various security problems, which are easy to be copied, forged or embezzled, causing serious losses and greatly damaging the interests of the people and the country.
Although many certificates are currently under the real-name system, they need to be verified in combination with information such as ID cards or other certificates before they can be processed or used for transactions. This method improves the security of the certificate to a certain extent. However, There are still certain loopholes. For example, people with similar looks can use other people's ID cards to conduct various transactions, or use their degree certificates, graduation certificates, marriage certificates or driver's licenses to conduct various activities.
Moreover, at present, many fake certificates can often be faked. Moreover, since the current certificates generally only register the basic information of the obligee, they are easy to be stolen. fraudulent use
Moreover, with the development of society, the use of various types of vouchers is becoming more and more frequent under the circumstances of increasingly frequent commercial activities and more and more tourism activities. However, the current low level of anti-counterfeiting of vouchers has resulted in the production of vouchers. There are various loopholes in the later query, verification, update, etc., and its security cannot be guaranteed, let alone the security of various credential information
At the same time, due to the current insecurity of various types of credential information, it is impossible to conduct unified management and control, and because the authenticity cannot be verified in a timely manner, which in turn further deepens the insecurity of various types of credential information, resulting in serious consequences.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credential Information Security Supervision Method and System
  • Credential Information Security Supervision Method and System
  • Credential Information Security Supervision Method and System

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0099] In combination with the above embodiment of the credential information security supervision system, a specific embodiment of the credential information security supervision method of the present invention is as follows:

[0100] The credential information security supervision method includes a data collection step, a registration step, a certificate making step, a verification step and an authority authentication step, and after the certificate making step, an inquiry step is also included, and the data collection step includes:

[0101] S01. Collect the identity information and biometric information of the certificate obligee.

[0102] S02. After the identity information, biometric information and collection verification parameters are extracted and processed using a hash algorithm, the first private key is used to encrypt to generate a first digital signature value, and the collection verification parameters, identity information, biometric information and The first d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for monitoring of certificate information security. The method comprises the steps of acquiring a first label on a certificate, and acquiring a first information code; processing the first information code for reduction, and acquiring a location parameter, an accreditation verification parameter and a third digital signature value; verifying the legitimacy of the location parameter, the accreditation verification parameter and the third digital signature value; verifying whether information of the certificate is valid; acquiring biological features of a certificate holder, and matching and verifying the biological features of the certificate holder and biological features of a legal certificate holder stored in a certificate information database. By adopting the method, the authenticity of the certificate and the certificate holder can be verified by acquiring the first label of the certificate and the biological features of the certificate holder or query can be performed by acquiring a second label via an intelligent mobile terminal. Query and verification of certificate information can be performed, unified regulatory control can be realized, the anti-counterfeit effect is good, the security is high, and the method and the system can be widely applied in the field of certificate regulation.

Description

technical field [0001] The invention relates to the fields of voucher anti-counterfeiting and voucher information security, in particular to a security supervision method and system for voucher information with good anti-counterfeiting effects. Background technique [0002] Credentials such as certificates, certificates or cards are an indispensable part of people's lives. They are important certificates to prove people's identity, status or ownership of property. They are used in various industries and are closely related to people's lives. However, at present, all kinds of certificates have more or less various security problems, which are easy to be copied, forged or embezzled, causing serious losses and greatly damaging the interests of the people and the country. Although many certificates are currently under the real-name system, they need to be verified in combination with information such as ID cards or other certificates before they can be processed or used for tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06K17/00H04L9/32
Inventor 周羽
Owner 广东云诺科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products