Identity information security authorization system and method

文档序号:192478 发布日期:2021-11-02 浏览:29次 中文

阅读说明:本技术 一种身份信息安全授权系统与方法 (Identity information security authorization system and method ) 是由 丁全 于 2021-08-06 设计创作,主要内容包括:本发明实施例涉及信息安全领域,具体公开了一种身份信息安全授权系统与方法。本发明实施例通过获取身份信息图像,并记录获取时间;获取授权截止时间和授权用途信息,生成关键用途信息;将所述获取时间和关键用途信息生成身份信息水印图像;访问授权操作时间,将所述授权操作时间与授权截止时间对比,并在授权操作时间不超过授权截止时间时,授权发送身份信息水印图像。能够将获取时间和关键用途信息水印至身份信息图像,且对比授权操作时间与授权截止时间,只有在授权操作时间不超过授权截止时间时,进行授权发送,使得身份信息只能在一定的时间进行专门业务的授权上传,有效避免身份信息泄露,防止身份信息用于其他业务,损害所有者的利益。(The embodiment of the invention relates to the field of information security, and particularly discloses an identity information security authorization system and method. The embodiment of the invention acquires the identity information image and records the acquisition time; obtaining authorization deadline and authorization use information to generate key use information; generating an identity information watermark image by the acquisition time and the key purpose information; and accessing the authorized operation time, comparing the authorized operation time with the authorized deadline, and authorizing to send the identity information watermark image when the authorized operation time does not exceed the authorized deadline. The method and the device can watermark the acquired time and the key purpose information to the identity information image, compare the authorization operation time with the authorization deadline time, and perform authorization sending only when the authorization operation time does not exceed the authorization deadline time, so that the identity information can only be authorized and uploaded for special services in a certain time, thereby effectively avoiding identity information leakage, preventing the identity information from being used for other services and damaging the interests of owners.)

1. A method for security authorization of identity information is characterized by comprising the following steps:

acquiring an identity information image and recording the acquisition time of the identity information image;

obtaining authorization deadline and authorization use information, extracting keywords in the authorization use information, and generating key use information;

watermarking the acquisition time and the key use information to an identity information image to generate an identity information watermark image;

and accessing the authorized operation time, comparing the authorized operation time with the authorized deadline, and authorizing to send the identity information watermark image when the authorized operation time does not exceed the authorized deadline.

2. The identity information security authorization method according to claim 1, wherein the acquiring authorization deadline and authorization usage information, extracting keywords in the authorization usage information, and generating key usage information specifically includes the following steps:

obtaining an authorization deadline;

obtaining authorized use information;

matching the authorization use information with a preset keyword library, and extracting keywords in the authorization use information;

and matching the keywords with a preset key use library to generate key use information.

3. The method for security authorization of identity information according to claim 1, wherein the watermarking the acquisition time and the key usage information into the identity information image to generate the identity information watermark image specifically comprises the following steps:

imaging the acquisition time and the key purpose information to generate a watermark image layer;

extracting pixel points of the watermark image layer to generate watermark pixel points;

and synthesizing the watermark pixel points to an identity information image to generate an identity information watermark image.

4. The identity information security authorization method according to claim 3, wherein the synthesizing the watermark pixel points into the identity information image to generate the identity information watermark image specifically comprises the following steps:

obtaining color values of all pixel points in the identity information image, and generating color values of the identity image;

adjusting the transparency of the watermark pixel points according to the identity image color values to generate watermark transparent pixel points;

and synthesizing the watermark transparent pixel points into an identity information image to generate an identity information watermark image.

5. The method for security authorization of identity information according to claim 1, wherein the accessing the authorization operation time, comparing the authorization operation time with the information authorization deadline, and authorizing the sending of the identity information watermark image when the authorization operation time does not exceed the information authorization deadline specifically comprises the following steps:

access an authorized operating time;

comparing the authorized operation time to an authorized deadline;

refusing to send the identity information watermark image when the authorized operation time exceeds the authorized deadline time;

and when the authorized operation time does not exceed the authorized deadline, authorizing to send the identity information watermark image.

6. The identity information security authorization system is characterized by comprising an identity information image acquisition unit, a key purpose information generation unit, an identity information watermark image generation unit and a comparison sending unit, wherein:

the identity information image acquisition unit is used for acquiring the identity information image and recording the acquisition time of the identity information image;

the key purpose information generating unit is used for acquiring authorization deadline and authorization purpose information, extracting keywords in the authorization purpose information and generating key purpose information;

the identity information watermark image generating unit is used for watermarking the acquisition time and the key purpose information to an identity information image to generate an identity information watermark image;

and the comparison sending unit is used for accessing the authorized operation time, comparing the authorized operation time with the information authorization deadline, and authorizing and sending the identity information watermark image when the authorized operation time does not exceed the information authorization deadline.

7. The identity information security authorization system according to claim 6, wherein the key usage information generating unit specifically includes:

the authorization deadline acquisition module is used for acquiring authorization deadline;

the authorization use information acquisition module is used for acquiring authorization use information;

the keyword extraction module is used for matching the authorized use information with a preset keyword library and extracting keywords in the authorized use information; and

and the key purpose information generating module is used for pairing the key words with a preset key purpose library to generate key purpose information.

8. The identity information security authorization system according to claim 6, wherein the identity information watermark image generating unit specifically includes:

the watermark image layer generating module is used for imaging the acquisition time and the key purpose information to generate a watermark image layer;

the watermark pixel point generating module is used for extracting pixel points of the watermark image layer and generating watermark pixel points; and

and the identity information watermark image generation module is used for synthesizing the watermark pixel points into the identity information image to generate the identity information watermark image.

9. The identity information security authorization system according to claim 7, wherein the identity information watermark image generation module specifically includes:

the identity image color value generation submodule is used for acquiring the color value of each pixel point in the identity information image and generating the color value of the identity image;

the watermark transparent pixel point generating submodule is used for adjusting the transparency of the watermark pixel points according to the identity image color value and generating watermark transparent pixel points; and

and the identity information watermark image generation submodule is used for synthesizing the watermark transparent pixel points into the identity information image to generate the identity information watermark image.

10. The identity information security authorization system according to claim 6, wherein the comparison sending unit specifically includes:

the authorized operation time access module is used for accessing the authorized operation time;

the comparison module is used for comparing the authorization operation time with the authorization deadline;

and the sending judgment module is used for refusing to send the identity information watermark image when the authorized operation time exceeds the authorized deadline time, and authorizing to send the identity information watermark image when the authorized operation time does not exceed the authorized deadline time.

Technical Field

The invention belongs to the field of information security, and particularly relates to a system and a method for security authorization of identity information.

Background

In the information-oriented society, identity information security is the most important information security. Identity information is a basic social attribute of a person, and the validity of business, such as banking business, social security business, city service business and the like, are confirmed by personal identity information authorization in most social business transactions.

The information-based society lacks effective protection on identity information, when people transact business, authorized identity information is easy to leak and may be subjected to secondary utilization by lawbreakers, and under the condition that an owner does not know, the identity information is used for transacting other businesses, so that the interests of the owner are damaged.

Disclosure of Invention

The embodiment of the invention aims to provide a system and a method for security authorization of identity information, aiming at solving the problems in the background technology.

In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions:

a method for security authorization of identity information specifically comprises the following steps:

acquiring an identity information image and recording the acquisition time of the identity information image;

obtaining authorization deadline and authorization use information, extracting keywords in the authorization use information, and generating key use information;

watermarking the acquisition time and the key use information to an identity information image to generate an identity information watermark image;

and accessing the authorized operation time, comparing the authorized operation time with the authorized deadline, and authorizing to send the identity information watermark image when the authorized operation time does not exceed the authorized deadline.

As a further limitation of the technical solution of the embodiment of the present invention, the acquiring authorization deadline and authorization usage information, extracting a keyword in the authorization usage information, and generating the key usage information specifically includes the following steps:

obtaining an authorization deadline;

obtaining authorized use information;

matching the authorization use information with a preset keyword library, and extracting keywords in the authorization use information;

and matching the keywords with a preset key use library to generate key use information.

As a further limitation of the technical solution of the embodiment of the present invention, the watermarking the acquisition time and the key usage information into the identity information image to generate the identity information watermark image specifically includes the following steps:

imaging the acquisition time and the key purpose information to generate a watermark image layer;

extracting pixel points of the watermark image layer to generate watermark pixel points;

and synthesizing the watermark pixel points to an identity information image to generate an identity information watermark image.

As a further limitation of the technical solution of the embodiment of the present invention, the synthesizing the watermark pixel point to the identity information image and generating the identity information watermark image specifically includes the following steps:

obtaining color values of all pixel points in the identity information image, and generating color values of the identity image;

adjusting the transparency of the watermark pixel points according to the identity image color values to generate watermark transparent pixel points;

and synthesizing the watermark transparent pixel points into an identity information image to generate an identity information watermark image.

As a further limitation of the technical solution of the embodiment of the present invention, the accessing the authorized operation time, comparing the authorized operation time with the information authorization deadline, and authorizing sending the identity information watermark image when the authorized operation time does not exceed the information authorization deadline specifically includes the following steps:

access an authorized operating time;

comparing the authorized operation time to an authorized deadline;

refusing to send the identity information watermark image when the authorized operation time exceeds the authorized deadline time;

and when the authorized operation time does not exceed the authorized deadline, authorizing to send the identity information watermark image.

An identity information security authorization system comprises an identity information image acquisition unit, a key purpose information generation unit, an identity information watermark image generation unit and a comparison sending unit, wherein:

the identity information image acquisition unit is used for acquiring the identity information image and recording the acquisition time of the identity information image;

the key purpose information generating unit is used for acquiring authorization deadline and authorization purpose information, extracting keywords in the authorization purpose information and generating key purpose information;

the identity information watermark image generating unit is used for watermarking the acquisition time and the key purpose information to an identity information image to generate an identity information watermark image;

and the comparison sending unit is used for accessing the authorized operation time, comparing the authorized operation time with the information authorization deadline, and authorizing and sending the identity information watermark image when the authorized operation time does not exceed the information authorization deadline.

As a further limitation of the technical solution of the embodiment of the present invention, the key purpose information generating unit specifically includes:

the authorization deadline acquisition module is used for acquiring authorization deadline;

the authorization use information acquisition module is used for acquiring authorization use information;

the keyword extraction module is used for matching the authorized use information with a preset keyword library and extracting keywords in the authorized use information; and

and the key purpose information generating module is used for pairing the key words with a preset key purpose library to generate key purpose information.

As a further limitation of the technical solution of the embodiment of the present invention, the identity information watermark image generating unit specifically includes:

the watermark image layer generating module is used for imaging the acquisition time and the key purpose information to generate a watermark image layer;

the watermark pixel point generating module is used for extracting pixel points of the watermark image layer and generating watermark pixel points; and

and the identity information watermark image generation module is used for synthesizing the watermark pixel points into the identity information image to generate the identity information watermark image.

As a further limitation of the technical solution of the embodiment of the present invention, the identity information watermark image generating module specifically includes:

the identity image color value generation submodule is used for acquiring the color value of each pixel point in the identity information image and generating the color value of the identity image;

the watermark transparent pixel point generating submodule is used for adjusting the transparency of the watermark pixel points according to the identity image color value and generating watermark transparent pixel points; and

and the identity information watermark image generation submodule is used for synthesizing the watermark transparent pixel points into the identity information image to generate the identity information watermark image.

As a further limitation of the technical solution of the embodiment of the present invention, the comparison sending unit specifically includes:

the authorized operation time access module is used for accessing the authorized operation time;

the comparison module is used for comparing the authorization operation time with the authorization deadline;

and the sending judgment module is used for refusing to send the identity information watermark image when the authorized operation time exceeds the authorized deadline time, and authorizing to send the identity information watermark image when the authorized operation time does not exceed the authorized deadline time.

Compared with the prior art, the invention has the beneficial effects that:

the embodiment of the invention acquires the identity information image and records the acquisition time; obtaining authorization deadline and authorization use information to generate key use information; generating an identity information watermark image by the acquisition time and the key purpose information; and accessing the authorized operation time, comparing the authorized operation time with the authorized deadline, and authorizing to send the identity information watermark image when the authorized operation time does not exceed the authorized deadline. The method and the device can watermark the acquired time and the key purpose information to the identity information image, compare the authorization operation time with the authorization deadline time, and perform authorization sending only when the authorization operation time does not exceed the authorization deadline time, so that the identity information can only be authorized and uploaded for special services in a certain time, thereby effectively avoiding identity information leakage, preventing the identity information from being used for other services and damaging the interests of owners.

Drawings

In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention.

Fig. 1 shows an application architecture diagram of a system provided by an embodiment of the present invention.

Fig. 2 shows a flow chart of a method provided by an embodiment of the invention.

Fig. 3 shows a flowchart of generating the key usage information in the method provided by the embodiment of the present invention.

Fig. 4 shows a flowchart of generating an identity information watermark image in the method provided by the embodiment of the invention.

Fig. 5 shows a flow chart of watermark pixel point synthesis in the method provided by the embodiment of the invention.

Fig. 6 shows a flowchart of the identification information watermark image sending judgment in the method provided by the embodiment of the invention.

Fig. 7 shows a block diagram of a key usage information generating unit in the system according to the embodiment of the present invention.

Fig. 8 shows a block diagram of the structure of the identity information watermark image generation unit in the system provided by the embodiment of the invention.

Fig. 9 shows a block diagram of an identity information watermark image generation module in the system according to the embodiment of the present invention.

Fig. 10 shows a block diagram of a comparison transmitting unit in the system according to the embodiment of the present invention.

Detailed Description

In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.

It can be understood that, in the prior art, the information-based society lacks effective protection of identity information, when people transact business, authorized identity information is easy to leak and may be subject to secondary utilization by lawbreakers, and under the condition that the owner does not know, the identity information is used for transacting other business, which damages the interests of the owner.

In order to solve the above problems, the embodiment of the present invention obtains an identity information image and records the obtaining time; obtaining authorization deadline and authorization use information to generate key use information; generating an identity information watermark image by the acquisition time and the key purpose information; and accessing the authorized operation time, comparing the authorized operation time with the authorized deadline, and authorizing to send the identity information watermark image when the authorized operation time does not exceed the authorized deadline. The method and the device can watermark the acquired time and the key purpose information to the identity information image, compare the authorization operation time with the authorization deadline time, and perform authorization sending only when the authorization operation time does not exceed the authorization deadline time, so that the identity information can only be authorized and uploaded for special services in a certain time, thereby effectively avoiding identity information leakage, preventing the identity information from being used for other services and damaging the interests of owners.

Specifically, as shown in fig. 1, fig. 1 is a diagram illustrating an application architecture of a system provided by an embodiment of the present invention.

Specifically, the identity information security authorization system comprises an identity information image acquisition unit 101, a key purpose information generation unit 102, an identity information watermark image generation unit 103 and a comparison sending unit 104, wherein the identity information image acquisition unit 101 is in communication connection with the identity information watermark image generation unit 103, the key purpose information generation unit 102 is in communication connection with the identity information watermark image generation unit 103, and both the key purpose information generation unit 102 and the identity information watermark image generation unit 103 are in communication connection with the comparison sending unit 104.

The identity information image obtaining unit 101 is configured to obtain an identity information image and record obtaining time of the identity information image.

It is understood that the identity information image obtaining unit 101 may be a camera device, which is capable of capturing an identity information image and recording the capturing time, i.e. the obtaining time. The identity information image may be an identity card photograph, a family notebook photograph, a visa photograph, a wedding photograph, and the like.

The key purpose information generating unit 102 is configured to acquire authorization deadline and authorization purpose information, extract a keyword in the authorization purpose information, and generate key purpose information.

It is understood that, before the transaction is performed, the authorization deadline and the authorization-use information are input by the key-use information generating unit 102, and the key-use information generating unit 102 extracts a keyword in the authorization-use information to generate the key-use information.

An identity information watermark image generating unit 103, configured to watermark the acquisition time and the key usage information to an identity information image, and generate an identity information watermark image.

It can be understood that the identity information watermark image generating unit 103 is provided with a watermark generating algorithm, and can perform watermark coverage on the identity information image according to the acquisition time and the key usage information to generate the identity information watermark image.

And the comparison sending unit 104 is used for accessing the authorized operation time, comparing the authorized operation time with the information authorization deadline, and authorizing to send the identity information watermark image when the authorized operation time does not exceed the information authorization deadline.

It can be understood that the comparison sending unit 104 compares the authorized operation time with the information authorization deadline by accessing the authorized operation time, and ensures that the identity information watermark image is authorized and sent only when the authorized operation time does not exceed the information authorization deadline.

Specifically, fig. 2 shows a flowchart of a method provided by the embodiment of the present invention.

In another preferred embodiment, the present invention provides a method for securely authorizing identity information, which specifically includes the following steps:

step S101, acquiring an identity information image and recording the acquisition time of the identity information image.

In the embodiment of the invention, the identity information is photographed, the identity information image is obtained, the photographing time is recorded, and the obtaining time is generated, wherein the identity information image can be an identity card photo, a household notebook photo, a visa photo, a marriage certificate photo and the like.

Step S102, obtaining authorization deadline and authorization use information, extracting keywords in the authorization use information, and generating key use information.

In the embodiment of the invention, before business transaction, authorization deadline and authorization use information are acquired, keywords in the authorization use information are extracted, and key use information, such as house loan transaction, car loan transaction and the like, is generated.

Specifically, fig. 3 shows a flowchart of generating the key usage information in the method provided by the embodiment of the present invention.

In a preferred embodiment provided by the present invention, the acquiring authorization deadline and authorization usage information, extracting a keyword in the authorization usage information, and generating key usage information specifically includes the following steps:

step S1021, obtaining the authorization deadline.

In the embodiment of the invention, the authorization deadline input before the business transaction is acquired.

In step S1022, authorized use information is acquired.

In the embodiment of the invention, the authorization use information input before business transaction is obtained.

It is understood that the authorization-use information is an introduction to the transaction of the transaction, for example, the transaction is a credit transaction, and the authorization-use information is an introduction to the credit transaction.

And S1023, matching the authorization use information with a preset keyword library, and extracting keywords in the authorization use information.

In the embodiment of the invention, the authorization use information is paired with a preset keyword library, and keywords in the authorization use information are extracted. For example: the authorization purpose information is the house credit business handling introduction, when the authorization purpose information is matched with the preset keyword library, the authorization purpose information is successfully matched with the house credit in the preset keyword library, and at the moment, the keyword of the house credit is extracted.

And step S1024, matching the keywords with a preset key purpose library to generate key purpose information.

In the embodiment of the invention, the key words are paired with the preset key purpose library to generate the key purpose information. For example: when the keyword is "house loan", the keyword of "house loan" is paired with a preset key purpose library, and can be successfully paired with the purpose information of "only being used for house loan transaction" in the preset key purpose library, and at this time, the key purpose information of "only being used for house loan transaction" is generated.

Further, the method comprises the following steps:

step S103, watermarking the acquisition time and the key use information to an identity information image to generate an identity information watermark image.

In the embodiment of the invention, the acquired time and key purpose information are subjected to overlay watermarking on the identity information image through a watermarking algorithm to generate the identity information watermarking image.

Specifically, fig. 4 shows a flowchart of generating an identity information watermark image in the method provided by the embodiment of the present invention.

In an embodiment of the present invention, the watermarking the acquisition time and the key usage information into an identity information image to generate an identity information watermark image specifically includes the following steps:

and step S1031, imaging the acquisition time and the key purpose information to generate a watermark image layer.

In the embodiment of the invention, the acquisition time and the key purpose information are imaged to generate the watermark image layer with the same size as the identity information image.

Step S1032, extracting the pixel points of the watermark image layer and generating watermark pixel points.

In the embodiment of the invention, the pixel points of the watermark image layer about the acquisition time and the key purpose information are extracted, and the positions of the pixel points are recorded to generate the watermark pixel points.

Step S1033, synthesizing the watermark pixel points to an identity information image, and generating an identity information watermark image.

In the embodiment of the invention, the identity information watermark image is correspondingly synthesized according to the position of each pixel point in the watermark pixel points, and the generated watermark has the acquisition time and the key purpose information identity information watermark image. For example: one identification card photo and the time for taking the identification card photo and the business purpose of the identification card photo are printed on the identification card photo, and the identification card photo is only used for house loan business handling.

Specifically, fig. 5 shows a flowchart of the watermark pixel point synthesis in the method provided by the embodiment of the present invention.

In an embodiment of the present invention, the synthesizing the watermark pixel point into the identity information image and generating the identity information watermark image specifically includes the following steps:

step S10331 is to obtain a color value of each pixel point in the identity information image, and generate an identity image color value.

In the embodiment of the invention, the WINDOWS GDI library is adopted to obtain the image data of all pixel points in the identity information image, the image data comprises the color values and the coordinate information of the pixel points, and the color values of the identity image corresponding to the pixel points in the identity information image are generated.

Step S10332, the transparency of the watermark pixel points is adjusted according to the identity image color values, and watermark transparent pixel points are generated.

In the embodiment of the invention, according to the coordinate information of the color value of the identity image, the transparency of the watermark pixel point of the corresponding coordinate is adjusted according to the gray level algorithm, so that the watermark pixel point can be adapted to the color value of the identity image, and the watermark transparent pixel point is generated.

Step S10333, synthesizing the watermark transparent pixel points into an identity information image, and generating an identity information watermark image.

In the embodiment of the invention, the watermark transparent pixel points are synthesized to the relative position of the identity information image according to the coordinate information to generate the identity information watermark image.

Further, the method comprises the following steps:

and step S104, accessing the authorized operation time, comparing the authorized operation time with the authorized deadline, and authorizing to send the identity information watermark image when the authorized operation time does not exceed the authorized deadline.

In the embodiment of the invention, the authorized operation time is accessed and compared with the information authorization deadline, so that the identity information watermark image is authorized and sent only when the authorized operation time does not exceed the information authorization deadline.

Specifically, fig. 6 shows a flowchart of the identification information watermark image sending judgment in the method provided by the embodiment of the present invention.

In an embodiment of the present invention, the accessing the authorization operation time, comparing the authorization operation time with the information authorization deadline, and authorizing sending the identity information watermark image when the authorization operation time does not exceed the information authorization deadline specifically includes the following steps:

in step S1041, the authorized operation time is accessed.

In the embodiment of the invention, when the business is transacted, the time of the business transaction is accessed and recorded to obtain the authorized operation time.

Step S1042, comparing the authorized operation time with the authorized deadline, and determining whether the authorized operation time exceeds the authorized deadline.

In the embodiment of the invention, the authorized operation time is compared with the authorized deadline, and whether the authorized operation time exceeds the authorized deadline is judged.

And step S1043, refusing to send the identity information watermark image when the authorization operation time exceeds the authorization deadline.

In the embodiment of the invention, when the authorization operation time exceeds the authorization deadline, the authorization deadline is expired, and the identity information watermark image can not be used for business transaction at the moment, so the identity information watermark image is refused to be sent.

And step S1044, authorizing the sending of the identity information watermark image when the authorization operation time does not exceed the authorization deadline time.

In the embodiment of the invention, when the authorization operation time does not exceed the authorization deadline time, the identity information watermark image is authorized to be sent when the authorization operation time is within the authorization service transaction time range, and the identity information watermark image can be ensured to be only used for service transaction corresponding to the key use information because the watermark related key use information on the identity information watermark image.

Further, fig. 7 shows a block diagram of a structure of the key usage information generating unit 102 in the system according to the embodiment of the present invention.

In a preferred embodiment provided by the present invention, the key usage information generating unit 102 specifically includes:

an authorization deadline obtaining module 1021, configured to obtain an authorization deadline.

In the embodiment of the present invention, the authorization deadline obtaining module 1021 may obtain an authorization deadline input before transaction.

An authorized use information obtaining module 1022, configured to obtain authorized use information.

In this embodiment of the present invention, the authorized-use information obtaining module 1022 can obtain authorized-use information input before transaction.

And a keyword extraction module 1023, configured to pair the authorization usage information with a preset keyword library, and extract a keyword in the authorization usage information.

In the embodiment of the present invention, the keyword extraction module 1023 matches the authorization use information with a preset keyword library, and extracts keywords in the authorization use information. For example: the authorization purpose information is the house credit business handling introduction, when the authorization purpose information is matched with the preset keyword library, the authorization purpose information is successfully matched with the house credit in the preset keyword library, and at the moment, the keyword of the house credit is extracted.

And a key purpose information generating module 1024, configured to pair the keyword with a preset key purpose library according to the keyword, and generate key purpose information.

In the embodiment of the present invention, the key purpose information generating module 1024 matches the keyword with a preset key purpose library to generate key purpose information. For example: when the keyword is "house loan", the keyword of "house loan" is paired with a preset key purpose library, and can be successfully paired with the purpose information of "only being used for house loan transaction" in the preset key purpose library, and at this time, the key purpose information of "only being used for house loan transaction" is generated.

Further, fig. 8 shows a block diagram of the structure of the identity information watermark image generation unit 103 in the system provided by the embodiment of the present invention.

In a preferred embodiment provided by the present invention, the identity information watermark image generating unit 103 specifically includes:

and a watermark image layer generating module 1031, configured to image the acquisition time and the key usage information to generate a watermark image layer.

In this embodiment of the present invention, the watermark image layer generation module 1031 images the acquisition time and the key purpose information to generate a watermark image layer having the same size as the identity information image.

And the watermark pixel point generating module 1032 is configured to extract pixel points of the watermark image layer to generate watermark pixel points.

In the embodiment of the present invention, the watermark pixel point generating module 1032 extracts the pixel points related to the acquisition time and the key purpose information in the watermark image layer, and records the positions of the pixel points to generate the watermark pixel points.

An identity information watermark image generating module 1033, configured to synthesize the watermark pixel points into an identity information image, and generate an identity information watermark image.

In the embodiment of the present invention, the identity information watermark image generating module 1033 correspondingly synthesizes the identity information image according to the position of each pixel point in the watermark pixel points, and generates the identity information watermark image with the watermark acquisition time and the key usage information.

Specifically, fig. 9 shows a block diagram of the structure of the identity information watermark image generation module 1033 in the system according to the embodiment of the present invention.

In a preferred embodiment of the present invention, the identity information watermark image generating module 1033 specifically includes:

the identity image color value generation submodule 10331 is configured to obtain a color value of each pixel in the identity information image, and generate an identity image color value.

In this embodiment of the present invention, the identity image color value generation sub-module 10331 obtains image data of all pixel points in the identity information image by using a WINDOWS GDI library, where the image data includes color values and coordinate information of the pixel points, and generates an identity image color value corresponding to each pixel point in the identity information image.

The watermark transparent pixel point generating sub-module 10332 is configured to adjust the transparency of the watermark pixel point according to the identity image color value, and generate a watermark transparent pixel point.

In the embodiment of the present invention, the watermark transparent pixel point generating sub-module 10332 adjusts the transparency of the watermark pixel point of the corresponding coordinate according to the coordinate information of the color value of the identity image and the gray scale algorithm, so that the watermark pixel point can be adapted to the color value of the identity image to generate the watermark transparent pixel point, which not only can ensure the acquisition time of the watermark and the significance of the key purpose information, but also can reduce the influence on the identity information image as much as possible.

The identity information watermark image generation sub-module 10333 is configured to synthesize the watermark transparent pixel points into an identity information image, and generate an identity information watermark image.

In the embodiment of the present invention, the identity information watermark image generation sub-module 10333 synthesizes the watermark transparent pixel points to the position where the identity information image is relatively used according to the coordinate information, and generates the identity information watermark image.

Further, fig. 10 shows a block diagram of a comparative transmitting unit 104 in the system provided by the embodiment of the present invention.

In a preferred embodiment provided by the present invention, the comparison sending unit 104 specifically includes:

and an authorized operation time access module 1041 for accessing the authorized operation time.

In the embodiment of the present invention, when performing service transaction, the authorized operation time access module 1041 accesses and records the service transaction time to obtain the authorized operation time.

A comparing module 1042 for comparing the authorization operation time with the authorization deadline.

In this embodiment of the present invention, the comparing module 1042 compares the authorized operation time with the authorized deadline, and determines whether the authorized operation time exceeds the authorized deadline.

A sending determining module 1043, configured to refuse to send the identity information watermark image when the authorization operation time exceeds the authorization deadline, and authorize to send the identity information watermark image when the authorization operation time does not exceed the authorization deadline.

In the embodiment of the present invention, the sending determination module 1043 refuses to send the identity information watermark image when the authorization operation time exceeds the authorization deadline time, authorizes to send the identity information watermark image when the authorization operation time does not exceed the authorization deadline time, and can ensure that the identity information watermark image can only be used for business transaction corresponding to the key purpose information because of the key purpose information of the watermark on the identity information watermark image.

In summary, the embodiment of the present invention obtains the identity information image and records the obtaining time; obtaining authorization deadline and authorization use information to generate key use information; generating an identity information watermark image by the acquisition time and the key purpose information; and accessing the authorized operation time, comparing the authorized operation time with the authorized deadline, and authorizing to send the identity information watermark image when the authorized operation time does not exceed the authorized deadline. The method and the device can watermark the acquired time and the key purpose information to the identity information image, compare the authorization operation time with the authorization deadline time, and perform authorization sending only when the authorization operation time does not exceed the authorization deadline time, so that the identity information can only be authorized and uploaded for special services in a certain time, thereby effectively avoiding identity information leakage, preventing the identity information from being used for other services and damaging the interests of owners.

It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.

It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).

The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.

The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

18页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:加密模型训练、图像加密和加密人脸图像识别方法及装置

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!