Check patentability & draft patents in minutes with Patsnap Eureka AI!

Personal identity information matching method based on tamper-proof encryption algorithm

A technology of identity information and encryption algorithm, which is applied in the field of personal identity information matching based on tamper-proof encryption algorithm, can solve the problems of transaction information and personal identity information leakage, lack of perfect protection system protection, simple identity information verification, etc., to reduce Loss, convenient remote management and monitoring, high safety factor effect

Inactive Publication Date: 2019-03-22
珠海横琴现联盛科技发展有限公司 +1
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the electronic channels of multiple merchants are not uniform. When users choose different products from multiple merchants, they often need to complete the payment one by one. Such user operation steps are too many, which may discourage users' desire to buy, which is not conducive to Carry out sales of goods
In addition, most of the payments on the market can be made with a simple fingerprint recognition. The identity information verification procedure is too simple, without perfect protection system protection, and is easy to be imitated by others, which makes the user's transaction information and personal identity information leaked, resulting in major The economic loss also makes online transactions very insecure, so we propose a personal identity information matching method based on tamper-proof encryption algorithm to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal identity information matching method based on tamper-proof encryption algorithm
  • Personal identity information matching method based on tamper-proof encryption algorithm
  • Personal identity information matching method based on tamper-proof encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] refer to Figure 1-3 , the personal identity information matching method based on the anti-tampering encryption algorithm proposed by the present invention comprises the following steps:

[0032] S1. Establish a personal identity information matching terminal and a server: the personal identity information matching terminal consists of an identity information collection module, an information matching times detection module, an MD5 algorithm checking module, and a DES information protection module. The personal identity information matching terminal is used to collect personal identities Various characteristic information, and verify and check the number of matching and information protection processing for the collected characteristic information, and the server will simultaneously perform information matching early warning and remote monitoring during the verification process of personal identity information;

[0033] S2. Identity information collection: the identity ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a personal identity information matching method based on a tamper-proof encryption algorithm, includes the following steps: S1, establishing a personal identity information matching end and a service end: At that personal identity information match end, information matching times detection module, MD5 algorithm checking module, DES information protection module, personal identity information matching terminal is used for collecting various characteristic information of personal identity, verifying and checking the matching times of the collected characteristic information and information protection processing, and the server synchronously carries out information matching early warning and remote monitoring in the process of personal identity information verification; S2, collecting identity information: the identity information collecting module comprises an identity information extracting unit, an identity information receiving unit, an information identifyingand analyzing unit, an information matching unit and an information transmitting unit. The invention greatly improves the safety level of the whole information matching system, also enhances the safety of the transaction and reduces the loss, which is worth popularizing.

Description

technical field [0001] The invention relates to the technical field of information protection, in particular to a method for matching personal identity information based on a tamper-resistant encryption algorithm. Background technique [0002] With the popularization of electronic devices and the continuous improvement of demand, online fingerprint transactions have become a current trend. Today, the importance of information security is particularly important. As one of the common methods to ensure information security, identity authentication has gradually become an indispensable technology in life. At the same time, it has played an important role in practical applications such as personnel attendance and public security monitoring. growing effect. [0003] At present, more and more merchants have joined the ranks of supporting electronic payment, and "cashless" supermarkets and shopping malls have been born. However, the electronic channels of multiple merchants are no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40
CPCG06Q20/40145
Inventor 苏永锋沈文临曾一鸣杨敬锋
Owner 珠海横琴现联盛科技发展有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More