Method for preventing tampering of identity information in real name authentication

A technology of identity information and real-name authentication, applied in the direction of user identity/authority verification, etc., can solve the problems of no further verification mechanism in the business system, security loopholes in real-name authentication work, etc., to achieve secure identity recognition and tamper-proof, guarantee security, and prevent The effect of illegal tampering

Active Publication Date: 2015-12-23
SHANDONG SENTER ELECTRONICS
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the radio frequency device is located at the business system end, the business system and the decoding equipment are connected through the Internet, which gives the possibility of criminals infiltrating the decoding process. of security holes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing tampering of identity information in real name authentication
  • Method for preventing tampering of identity information in real name authentication
  • Method for preventing tampering of identity information in real name authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] Embodiment 1: as figure 1 As shown, the method for preventing identity information tampering in real-name authentication of the present invention includes a business system, the business system is connected with a radio frequency device, and reads the encrypted identity information in the ID card through the radio frequency device, and the business system passes through the decoding device at the other end of the network. After decoding, return the decoded identity information to the business system. After the business system controls the radio frequency device through the interface library to obtain the encrypted identity information, it sends the encrypted identity information to the decoding device through the TCP / IP network. The business system includes the business system front desk located at the front desk terminal and the business system background located at the background server. The feature code is Corresponding to the unique code of the identity information,...

Embodiment 2

[0019] Embodiment 2: as figure 2 and image 3 As shown, the method for preventing identity information tampering in real-name authentication according to the present invention includes a business system. The business system is connected with a radio frequency device, and reads the encrypted identity information in the ID card through the radio frequency device. After decoding by the dedicated decoding device, the decoded identity information is returned to the business system. After the business system controls the radio frequency device through the interface library to obtain the encrypted identity information, it sends the encrypted identity information to the decoding device through the TCP / IP network. The business system includes the business system front desk located at the front desk terminal and the business system background located at the background server. The feature code is Corresponding to the unique code of the identity information, the decoding device decodes ...

Embodiment 3

[0027] Embodiment 3: as Figure 4 As shown, the method for preventing identity information tampering in real-name authentication of the present invention includes a business system, the business system is connected with a radio frequency device, and reads the encrypted identity information in the ID card through the radio frequency device, and the business system passes through the decoding device at the other end of the network. After decoding, return the decoded identity information to the business system. After the business system controls the radio frequency device to obtain the encrypted identity information through the interface library, it sends the encrypted identity information to the decoding device through the TCP / IP network. The decoding device decodes the received identity information and uses the name, gender, and ethnicity in the identity information. , date of birth, address, citizen identity number, issuing authority, validity period, validity period, photo da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for preventing tampering of identity information in real name authentication, and belongs to the field of methods for preventing tampering of identity information. A service system is provided. The service system is connected with radio-frequency equipment, and used for reading encrypted identity information in an identity card through the radio-frequency equipment, and decoding the encrypted identity information through decoding equipment at the other end of a network. Decoded identity information is returned to the service system. The method comprises the following steps that: the service system controls the radio-frequency equipment to acquire the encrypted identity information through an interface library, and transmits the encrypted identity information to the decoding equipment through a TCP / IP (Transmission Control Protocol / Internet Protocol) network; the decoding equipment decodes the received identity information, calculates a feature code with content in the identity information, and transmits the feature codes to the service system; and the service system verifies whether the identity information is tampered or not with the feature code. Through adoption of the method, the identity information can be effectively prevented from being tampered.

Description

technical field [0001] The invention provides a tamper-proof method for identity information in real-name authentication, and belongs to the field of tamper-proof methods for identity information. Background technique [0002] No matter it is on a computer or a mobile terminal, and no matter what kind of interface library is used, the ID card information after decoding must be located in the memory of the terminal and stored in plain code. [0003] For criminals with ulterior motives, you can use tools to find out the specific address of a field in the ID card information (such as: name, ID number, etc.) is falsified data. Similar modification tools are already very mature in the game field, as long as the modification tools used in the game field are used in identity real-name authentication. Since the radio frequency device is located at the business system end, the business system and the decoding equipment are connected through the Internet, which gives the possibility...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 李在学
Owner SHANDONG SENTER ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products